Menu English Ukrainian russian Home

Free technical library for hobbyists and professionals Free technical library


Lecture notes, cheat sheets
Free library / Directory / Lecture notes, cheat sheets

Computer science. Internet networks (lecture notes)

Lecture notes, cheat sheets

Directory / Lecture notes, cheat sheets

Comments on the article Comments on the article

Table of contents (expand)

Topic 6. Internet networks

6.1. The emergence of the Internet

In 1962, D. Licklider, the first director of an experimental network research computer project whose purpose was to transmit packets to the US Department of Defense Advanced Research Projects Agency (DARPA), published a series of notes discussing the concept of a "galactic networks" (Galactic Network). It was based on the assertion that in the near future a global network of interconnected computers would be developed, allowing each user to quickly access data and programs located on any computer. This idea was the beginning of the development of the Internet.

In 1966, at DARPA, L. Roberts began work on the concept of a computer network, and the ARPANET plan soon appeared. At the same time, the main data transfer protocols in the network - TCP / IP - were created. Many public and private organizations wanted to use the ARPANET for daily data transmission. Because of this, in 1975, ARPANET went from experimental to operational.

In 1983, the first standard for TCP / IP protocols was developed and officially implemented, which was included in the Military Standards (MIL STD). In order to facilitate the transition to new standards, DARPA put forward a proposal to the leaders of Berkley Software Design to implement TCP / IP protocols in Berkeley (BSD) UNIX. After some time, the TCP / IP protocol was reworked into a common (public) standard, and the term "Internet" began to be used. In parallel, MILNET was separated from ARPANET, after which MILNET became part of the Defense Data Network (DDN) of the US Department of Defense. After that, the term "Internet" began to be used to refer to a single network: MILNET plus ARPANET.

In 1991, the ARPANET ceased to exist. But the Internet exists at the moment and develops. At the same time, its dimensions are much larger than the original ones.

The history of the development of the Internet can be divided into five stages:

1) 1945-1960 - the appearance of theoretical works on the interactive interaction of a person with a machine, as well as the first interactive devices and computers;

2) 1961-1970 - the beginning of the development of the technical principles of packet switching, the commissioning of ARPANET;

3) 1971-1980 - expansion of the number of ARPANET nodes up to several dozens, construction of special cable lines that connect some nodes, the beginning of the functioning of e-mail;

4) 1981-1990 - the implementation of the adoption of the TCP / IP protocol, the division into ARPANET and MILNET, the introduction of a "domain" name system - Domain Name System (DNS);

5) 1991-2007 - the latest stage in the development of the history of the global Internet.

6.2. Internet capabilities

The Internet is a global computer network that covers the whole world and contains a huge amount of information on any subject, available on a commercial basis to everyone. On the Internet, in addition to receiving information services, you can make purchases and commercial transactions, pay bills, order tickets for various types of transport, book hotel rooms, etc.

Any local network is a node, or site. The legal entity that ensures the operation of the site is called the provider. The site includes several computers - servers used to store information of a certain type and in a certain format. Each site and server on the site is assigned a unique name that identifies them on the Internet.

To connect to the Internet, the user must conclude a service contract with any of the existing providers in his region. To start working on the network, you need to connect to the provider's website. Communication with the provider is carried out either via a dial-up telephone channel using a modem, or using a permanent dedicated channel. When connecting to a provider via a dial-up telephone channel, communication is carried out using a modem and remote access tools. If communication with the provider is made through a permanent dedicated channel, then a simple call to the appropriate program for working on the Internet is used. The opportunities that open up to the user are determined by the terms of the contract concluded with the provider.

With the help of keywords throughout the Internet, each information system has its own means of finding the necessary information. The network includes the following information systems:

1) World Wide Web (WWW) - the World Wide Web. Information in this system consists of pages (documents). With the help of the WWW, you can watch movies, listen to music, play computer games, access various information sources;

2) FTR-system (File Transfer Program). It is used to transfer files that are available for work only after copying to the user's own computer;

3) e-mail (E-mail). Each of the subscribers has his own e-mail address with a "mailbox". It is some analogue of a postal address. Using e-mail, the user is able to send and receive text messages and arbitrary binary files;

4) news (teleconferencing system - Use Net Newsgroups). This service consists of a collection of documents grouped under specific topics;

5) IRC and ICQ. With the help of these systems, information is exchanged in real time. These functions on Windows are performed by the MS NetMeeting application, which allows you to share pictures and add text with other users on remote workstations.

Search, management and control tools on the Internet include:

▪ WWW search systems - used to search for information organized in one of the above methods (WWW, FTR);

▪ Telnet - a mode for remote control of any computer on the network, used to launch the necessary program on the server or any computer on the Internet;

▪ Ping utility - allows you to check the quality of communication with the server;

▪ Whois and Finger programs - used to find the coordinates of network users or determine the users currently working on a specific host.

6.3. Internet software

In order for the Internet system to function, there are the following programs:

1) universal programs or software packages that provide access to any Internet service;

2) specialized programs that provide more opportunities when working with a specific Internet service.

Browsers are called programs for working with the WWW. They are usually supplied as a set of software tools that provide all networking capabilities.

The most used complexes are Netsape Communicator complexes of various versions and Microsoft Internet Explorer (IE) versions 4.0 and 5.0. In Microsoft terminology, these complexes are called browsers. One of the important advantages of IE is that, along with the functions of the browser, it is also used as a file system explorer of the local computer. At the same time, work with the IE complex as a conductor is organized according to the same principles as work as a browser. It should be taken into account that the work is carried out in the same window, with the same menu, tool buttons and tools. Using IE eliminates the difference between working with the local computer's file system and working with the WWW. At the same time, IE is closely related to MS Office programs, providing work on the Internet directly from these programs. Such MS Office programs can be Word, Excel, Access, Power Point, etc.

In addition to the browser for working with the WWW, the IE complex includes the Outlook Express (OE) program. It is used for e-mail and teleconferencing. Thanks to the complexity of IE, the browser and Outlook Express are delivered as a single installation package. These programs can be installed simultaneously, have common settings, be called from each other and exchange information.

MS Office contains MS Outlook organizer programs (which are not included in the IE complex), which provide, among many of their functions, the ability to work with e-mail and News. The MS Outlook organizer can completely replace Outlook Express. In cases where it is not rational to use MS Outlook as an organizer, but only as a means of working on the Internet, it is preferable to work with Outlook Express.

In addition to the listed programs included in the IE complex, there are many programs from various companies designed to work with e-mail and FTR servers. They can be purchased and installed separately from the IE complex. Thanks to these programs, the user can get additional convenience.

Internet access is made through the provider. To contact him, use one of the following methods:

▪ Internet access via dial-up lines or Dial-Up. In this mode, the main limitation is the quality of the telephone line and modem;

▪ permanent connection to the Internet via a dedicated line. This method of work is the most advanced, but the most expensive. It automatically provides access to all Internet resources.

When concluding a contract with a dial-up telephone line provider, it is necessary that information be provided, which later needs to be specified as parameters in various communication programs with the provider. These programs are used when working directly on the Internet. When concluding a contract for Dial-Up-access, the provider is obliged to set a certain set of parameters for each subscriber.

6.4. Transfer of information on the Internet. Addressing system

On the Internet, by analogy with local area networks, information is transmitted in the form of separate blocks, which are called packets. If a long message is transmitted, it should be divided into a certain number of blocks. Any of these blocks consists of the address of the sender and recipient of data, as well as some service information. Any data packet is sent over the Internet independently of the others, while they can be transmitted by different routes. After the packets arrive at their destination, they form the original message, i.e., the packets are integrated.

There are three types of addresses used on the Internet:

1) IP address - the main network address assigned to each computer when entering the network. An IP address is represented by four decimal numbers separated by dots, such as 122.08.45.7. In each position, each value can range from 0 to 255. Any computer connected to the Internet has its own unique IP address. Such addresses can be divided into classes according to the scale of the network to which the user is connected. Class A addresses are used in large public networks. Class B addresses are used in medium-sized networks (networks of large companies, research institutes, universities). Class C addresses are used in networks with a small number of computers (networks of small companies and firms). You can also select class D addresses, intended for accessing groups of computers, and reserved class E addresses;

2) domain address - a symbolic address that has a strict hierarchical structure, for example yandex.ru. In this form of addresses, the top-level domain is indicated on the right. It can be two-, three-, four-letter, for example:

▪ com - commercial organization;

▪ edu - educational institution;

▪ net - network administration;

▪ firm - private company, etc.

On the left side of the domain address, the name of the server is used. Translation of a domain address into an IP address is done automatically by the Domain Name System (DNS), which is a method of assigning names by transferring responsibility for their subset of names to network groups;

3) URL address (Universal Recourse Locator) - a universal address that is used to designate the name of each object of storage on the Internet. This address has a specific structure: data transfer protocol: // computer name/directory/subdirectory/. /File name. An example of a name is http://rambler.ru/doc.html.

6.5. Internet addressing and protocols

A host is a computer connected to the Internet. Each host on the network is identified by two address systems that always work together.

Like a telephone number, an IP address is assigned by an ISP and consists of four bytes separated by dots and ending with a dot. Any computer on the Internet must have its own IP address.

In the domain name system, DNS names are named by the provider. Such a fully qualified domain name as win.smtp.dol.ru includes four simple domains separated by dots. The number of simple domains in a fully qualified domain name is arbitrary, and each simple domain describes some set of computers. In this case, the domains in the name are nested in each other. The fully qualified domain name must end with a dot.

Each of the domains has the following meaning:

▪ gu - country domain, denoting all hosts in Russia;

▪ dol - provider domain, denoting computers on the local network of the Russian company Demos;

▪ smtp - domain of the Demos server group, serving the email system;

▪ win - the name of one of the computers from the smtp group.

Of particular importance are the top-level domain names, located on the right side of the full name. They are fixed by the international organization InterNIC, and their construction is carried out on a regional or organizational basis.

The URL addressing system is used to indicate how information is organized on a particular host and the information resource hosted on it. For example, the URL might be written as follows: http://home.microsoft.com/intl/ru/www_tour.html. The elements of this address entry denote:

▪ http://- prefix, which indicates the protocol type, indicating that the address refers to a host that is a WWW server;

▪ home.microsoft.com - domain name of the host. A colon after the domain name may contain a number indicating the port through which the connection to the host will be made;

▪ /intl/ru/ - subdirectory of the root intl directory of the host;

▪ www_tour.html - file name (file extension can include any number of characters).

Remembering a long URL is difficult, which is why all Internet software has a Favorites tool. The existing networking tools provide convenient conditions for creating, storing and applying links. Among them are:

▪ the presence of a special Favorites folder. It exists in all WWW programs; you can create nested thematic folders in it. Examples of such folders may be, in particular, Banks, Socio-economic indicators, Analytical forecasts;

▪ introduction of tool buttons in the toolbars of Internet programs for using the most popular links;

▪ location of links or their shortcuts directly on the Desktop or in the taskbar;

▪ Automatic transfer of links from the Favorites folder to the Favorites menu item that appears when you click the Start button.

The E-mail address system is used to identify the e-mail addressee. This address must not contain spaces.

Addressing in the news system is similar to addressing with a domain name. Each group of characters, separated by dots, forms a subject. Each topic in the conference name, like the DNS, is a collection of some set of articles.

6.6. Problems of working on the Internet with Cyrillic texts

Different encoding systems were used for Cyrillic texts in DOS and Windows systems. DOS used ASCII codes that corresponded to code page 866, and Windows used an encoding that corresponded to code page 1251. Therefore, texts prepared in a text editor running under DOS could not be read directly in Windows and required recoding. The texts that were prepared by the Windows editors looked like gibberish if they were tried to be read in DOS encoding. To eliminate this problem, transcoders were created that were built into some text editors and provided transcoding from DOS to Windows and vice versa.

In the case of working with the Internet, the problem worsened. This was explained by the fact that Cyrillic characters were encoded in a third way, using the KOI8 code table. It was traditionally used in computers that ran the UNIX operating system. Initially, Internet servers were built exclusively on the basis of UNIX, as a result of which Russian-language texts were encoded only using KOI8. This explained the fact that on the Internet the Russian-language text was abracadabra when played in an encoding different from the one in which it was originally created. This problem can be solved when working in the WWW using the buttons on the screen that allow you to re-display the page of the document in a different encoding.

Difficulties with Cyrillic texts also arise when saving them. This can happen during further offline (outside the Internet) work with texts.

Save WWW pages in two ways:

1) saving in the same HTML format in which it was present on the Internet. In this case, such a file can be viewed and edited, firstly, with the same software that provided its viewing when working directly on the Internet, and secondly, with other specialized editors focused on working with the HTML format;

2) saving the document in the form of a plain text file. In this case, textual information is saved without formatting elements. A document is stored in ASCIL codes if it was created using code pages 866 or 1251 (in DOS or Windows). Such a document can be read and edited both in DOS and in Windows, but when transcoding it at the time of loading into Word, you must specify "Text Only" as the transcoding method, and not "DOS Text".

Protocols can be used for the following purposes:

1) implementation in the global network of the specified host addressing system;

2) organization of reliable information transfer;

3) transformation and presentation in accordance with the way it is organized.

The main protocol used when working on the Internet is TCP / IP, which combines the transfer protocols (TCP) and host identification protocols (IP). In fact, working on the Internet when accessing a provider using a modem via a dial-up telephone line is performed using one of two modifications of the TCP / IP protocol: using the SLIP protocol or PPP (a more modern protocol).

When a user uses only e-mail without realizing all the Internet, it is enough for him to work using the UUCP protocol. It's a little cheaper, but the user experience is degraded.

For some information services, in addition to network-wide protocols, their own protocols are used.

6.7. Establishing a connection with the provider (Internet access)

When carrying out any kind of work in global networks, the initial step is to connect to the provider via modem. The connection method (Dial-Up, dedicated channel) determines the method of connection with the provider and access to the Internet. Let's analyze the connection in the Dial-Up connection mode using the TCP/IP protocol, meaning that the TCP protocol is already installed in the Start/Settings/Control Panel/Network/Configuration window.

There are two ways to connect to the provider:

1) using the Remote Access tool, after which programs for working with the Internet are called;

2) through a special program for working with the Internet, such as Microsoft Internet Explorer. If there is no connection with the provider, the program itself establishes a connection with it.

In both cases, it is necessary to create a Connection, with the help of which communication with the provider is organized. In this case, the TCP / IP communication protocol must be configured in a special way. To create such a Connection, you can use the Internet Connection Wizard. Its shortcut is most often located on the Desktop. The Internet Connection Wizard can also be called directly from Internet Explorer (IE). In version IE5, for this purpose, you need to execute the menu commands Tools / Internet Options / Connection and click the Install button in the window that opens, then follow the instructions of the Wizard. After these procedures, not only the Connection will be made, but also the TCP / IP protocol will be configured in the necessary way. It is useful to be able to do this setting yourself by doing the following:

1) creating a regular Connection with the provider's phone number;

2) click on the created Connection with the right mouse button and select the Properties command from the context menu;

3) select the Server type tab in the opened window, and also:

▪ determining the type of remote access server (usually PPP);

▪ checking the TCP/IP Network Protocol checkbox and unchecking all other flags in this window. If it is necessary to mark other flags, you need to clarify this according to the instructions of the provider;

▪ click on the TCP/IP Settings button;

4) mark in the opened window Configuring TCP/IP selectors. The IP addresses at the top of the window are assigned by the server, while the addresses in the center of the window must be entered manually. In the center of the window, you should also set the provider's IP addresses. In the same window, the flags Use IP header compression and Use default gateway for remote network are most often placed. The meaning of the last flags must be checked with the provider. To implement the operation of such a connection, it is necessary that in the Control Panel / Network / Configuration in the Binding tab of the Properties window for the Remote Access Controller the TCP / IP flag is checked.

If the provider has several input phones, a separate connection is created for each of them. Any connection must be configured by the user in the specified way.

The password for connecting to the provider can be entered each time during the connection process or remembered and specified automatically. When connecting to an ISP, a certain message is displayed, in which a certain transfer rate is given; if this speed does not suit the user, then the connection must be terminated and repeated again.

6.8. World Wide Web, or WORLD WIDE WEB

The possibilities of the WWW provide access to almost all the resources of most major libraries in the world, museum collections, musical works, legislative and government regulations, reference books and operational collections on any topic, and analytical reviews. The WWW system has now become an intermediary and ensures the conclusion of contracts, the purchase of goods and settlements on them, the booking of transport tickets, the selection and ordering of excursion routes, etc. In addition, it conducts a public opinion survey, politicians and businessmen. Usually, any reputable company has its own WWW-page. The creation of such a page is quite accessible to every Internet user.

WWW provides interaction between distributed networks, including networks of financial companies.

WWW features include:

▪ hypertext organization of information elements, which are WWW pages;

▪ the potential to include modern multimedia and other means of artistic design of pages into WWW pages, unlimited possibilities for placing information on the screen;

▪ the ability to post various information on the owner’s website;

▪ the existence of free, good and simple software that allows a non-professional user not only to view, but also to create WWW pages;

▪ the presence of good search engines among the software, allowing you to quickly find the necessary information. The existence of convenient means of remembering the addresses where the necessary information is located, as well as its subsequent instant reproduction if necessary;

▪ the ability to quickly move back and forth through pages already viewed;

▪ the existence of means to ensure the reliability and confidentiality of information exchange.

Efficient and easy work with the WWW is ensured by the availability of search systems for the required information. For any kind of resources on the Internet, there are search engines, and the very work of search engines on the WWW is based on searching by keywords. For this purpose, it is possible to specify various masks or patterns and logical search functions, for example:

▪ search for documents that contain any of the specified keywords or phrases;

▪ search for documents that include several keywords or phrases.

All search tools can be divided into the following groups according to the method of organizing the search and the opportunities provided: catalogs and specialized databases, search and metasearch engines.

Catalogs on the WWW are similar in structure to organized library catalogs. The first page of the catalog contains links to major topics, such as Culture and Art, Medicine and Health, Society and Politics, Business and Economics, Entertainment, etc. If the desired link is activated, a page with links detailing the selected topic opens.

Search tools (search servers, search robots) enable the user, according to established rules, to formulate requirements for the information he needs. After that, the search engine automatically scans the documents on the sites it controls and selects those that meet the requirements put forward by the user. The search result may be the creation of one or more pages containing links to documents relevant to the query. If the search result led to the selection of a large number of documents, you can refine the query and repeat the search in accordance with it, but already among the selected pages.

6.9. intranet

An Intranet is a local or geographically distributed private network of an organization that is characterized by built-in security mechanisms. This network is based on Internet technologies. The term "Intranet" appeared and became widely used in 1995. It means that the company uses Internet technologies within (intra-) its local network. The advantage of using an intranet is to enable all company employees to access any information necessary for work, regardless of the location of the employee's computer and the available software and hardware. The main reason for using the Intranet in commercial organizations is the need to speed up the processes of collecting, processing, managing and providing information.

Often, companies that do e-business on the Internet form a mixed network, in which a subset of the internal nodes of the corporation forms an Intranet, and the external nodes connecting to the Internet are called Extranets (Extranet).

The basis of applications on the Intranet is the use of Internet and, in particular, Web technologies:

1) hypertext in HTML format;

2) HTTP hypertext transfer protocol;

3) CGI server application interface.

In addition, the Intranet includes Web servers for static or dynamic publishing of information, and Web browsers for viewing and interpreting hypertext. The basis of all Intranet application solutions for interacting with the database is the client-server architecture.

For various organizations, the use of intranets has a number of important advantages:

1) On the intranet, each user on a configured workstation can access any of the most recent versions of documents as soon as they are placed on the Web server. In this case, the location of the user and the Web server does not matter. This approach in large organizations allows for very significant cost savings;

2) documents on the Intranet are able to update automatically (in real time). In addition, when publishing a document on a Web server, at any time it is possible to obtain information about which of the company's employees, when and how many times accessed the published documents;

3) many organizations use applications that allow access to company databases directly from a Web browser;

4) access to published information can be made via the Internet if there is a password for access to the company's internal databases. An external user who does not have a password will not be able to access the firm's internal confidential information.

6.10. Creating a Web Page Using Front Page

Creating Web pages most often and most effectively is done using the Microsoft FrontPage 2000 Web editor, which is ideal for learning HTML programming and the art of developing your own Web sites.

The FrontPage 2000 editor is part of the Microsoft Office 2000 suite and can also be purchased as a standalone program.

Key features of FrontPage 2000 include:

1) creating and saving Web pages on a computer hard drive and directly on the Internet;

2) downloading Web pages from the Internet and editing them;

3) viewing and administration of the Web page;

4) development of complex design;

5) the use of ready-made HTML tags;

6) use of ready-made drawings;

7) use of ActiveX controls and scripts in Web pages.

To develop a new Web page, execute the commands File/ New/ Page or press the key combination Ctrl+N. In this case, the New dialog box will appear on the screen, in which you should select the required page template or go to the Frames Pages tab (Frames). Also, the formation of a new page according to the Normal Page template can be done using the New button on the standard toolbar.

Saving Web pages is done using the Save command of the File menu or by pressing the key combination Ctrl + S. The name of the page is entered in the dialog box that appears, and its type is determined in the Save as type list. Saving a page on the Web or on a hard drive is done by specifying its location in the field at the top of this dialog box.

You can enter text into a new Web page using the keyboard, copy it from other documents, or use drag-and-drop. Entering text from the keyboard is done in the same way as in any text editor. To insert images into a Web page, select the Picture command from the Insert menu.

Any image on a Web page can be associated with a hyperlink. This is done by selecting the desired pattern and on the General tab of the dialog box.

In order to create a hypertext link, you need to select text or an image, select the Hyperlink command from the Insert menu or the context menu. In the URL field that appears in the window, enter the URL address.

The properties of the created Web page are shown in the Page Properties dialog box, which is opened with the File/Properties command.

To publish Web pages, select the File/Publish Web command or press the button of the same name on the standard toolbar. In the resulting dialog box, you must specify the location of the Web page, options for publishing modified or all pages, and protection options. When you click the Publish button, the created Web pages will appear on the Internet.

6.11. FTP File Information Resources

The FTP system is a repository of various types of files (spreadsheets, programs, data, graphics, sound) that are stored on FTP servers. These servers are built by almost all major companies. The most common type of DNS name is ftp.<company name>.com.

By accessibility, information on FTP servers is divided into three categories:

1) freely distributed files (Freeshare), if their use is non-commercial;

2) protected information, access to which is provided to a special circle of registered users for an additional fee;

3) files with Shareware status. The user is able to try them out for free for a certain period of time. After this time, to continue the operation, you must register on the server and pay the cost of the file.

When you log in to the FTP server, you need to register with your ID and password. If there is no special registration system on the server, then it is recommended to indicate the word Anonymous as an identifier, and your E-mail address as a password. When accessing files of the Freeshare or Shareware category, this type of registration is used by the server developers to record and statistically analyze the circle of users.

Information on an FTP server is in the form of traditional directories. The directory names are in random order. Files on FTP servers are divided into text (in ASCII codes) and binary (documents prepared by Windows editors). These files are sent over the network in various ways. In the file copy program, you must specify the type of file to be transferred or set the Autodetect mode. In the latter mode, some programs consider that only files with the TXT extension are text files, while other programs provide the ability to specify a list of text files. Sending a binary file as a text file can lead to loss of information and its distortion during transfer. If you don't know what kind of file it is, you must send it as a binary file, which in turn can increase transfer time. Binary type files are converted to "pseudo-text" files to reduce transfer time. Uuencode programs are used for this.

It is possible to copy a file from an FTP server using a browser, but it is more convenient to do this using special programs (WSFTP or CuteFTP). Both programs have two types of windows:

1) some analogue of the address book, in which the conditional meaningful names of FTP servers, their URLs, the identification name and login password, as well as other information common to the server are formed;

2) working window for direct work with the server.

When using these programs, the desired server is first selected from the address book. Then a connection is automatically established with it, after which a working window opens, which includes two panels. One of them corresponds to the user's computer, and the other to the server. Both panels contain a tree of directories with files. Navigating the tree and activating directories on both panels proceeds in the usual way. The selected files are marked and copied by command (clicking on the appropriate button) to the current directory of the local computer. When the connection is broken, these programs allow you to continue sending the file from the interrupted place.

In order to find a file by its name or name fragment, you need to use the Archie search engine, which is hosted on numerous servers. A constantly updated list of Archie servers is available on the Internet.

6.12. E-mail (E-mail)

E-mail allows you to quickly transfer messages and files to a specific recipient and provides access to any other Internet resources.

There are two groups of protocols by which e-mail works:

1) SMTP and POP (or POPXNUMX) protocols. The SMTP (Simple Mail Transfer Protocol) protocol helps with the transfer of messages between Internet destinations and allows you to group messages to a single recipient address, as well as copy E-mail messages for transmission to different addresses. The POP (Post Office Protocol) protocol allows the end user to access the electronic messages that have come to him. When requesting a user to receive mail, POP clients are asked to enter a password, which provides increased confidentiality of correspondence;

2) IMAP protocol. It allows the user to act on emails directly on the provider's server and, therefore, spend less time browsing the Internet.

Special mail programs are used to send and receive e-mail messages. These programs are used to:

▪ composing and transmitting messages both in the form of text messages and in HTML format, adding directly to the text of the message in the form of graphics, animation, sound;

▪ adding files of any kind to messages (creating attachments). Attachments are displayed as icons that are placed in special areas of the email. Icons include the name of the attached file and its size;

▪ decryption of a message received in various Cyrillic encodings;

▪ managing the priority of sending messages (urgent, regular);

▪ reducing communication time if you need to view received mail. In this case, at first only the headers (short content) of the message are issued and only specially requested messages are sent in full;

▪ automatic spelling and grammar checking of messages before sending;

▪ storing in the address book the necessary E-mail addresses of message authors for further use of these addresses when sending messages.

Preparing and sending messages on the screen of the mail program is filled using the following fields:

1) To whom. This field is filled with the E-mail address of the main correspondent;

2) Copy. In this field, enter the addresses of correspondents who will receive a copy of the message;

3) Bcc. The purpose of the field is similar to the previous one, but even if there are addresses in it, the main correspondent is not aware of the presence of copies sent to these addresses;

4) Subject. This field contains a summary of the message. The text is given in the form of a message header when the addressee views incoming mail;

5) Messages. The text of the message is entered in this field. In mail programs, a text editor is used for this.

Attaching a file is carried out by a menu command or using a tool button; this opens a window familiar to Windows with a directory tree to select the attached file. The prepared message is sent by the Deliver Mail command. The message in this case goes to a special mail folder Outbox. Sending a message to the network is determined by the specified degree of urgency. An urgent message is sent immediately. In some programs, sent messages are sent to the Sent Items folder, where they can then be viewed or deleted by mail readers. If the delivery of the message for some reason turned out to be impossible (due to an error in the address), then the sender is automatically informed about this. The notice is in the form of an email in a folder.

6.13. News, or conferences

The conference is a collection of text messages, articles of its subscribers. Placing an article in the conference is called publication.

To work with the news, either Outlook Express or MS Outlook is used. Conference Action Programs provide:

▪ indication of the set of conferences in which the computer user plans to participate. This operation is called a subscription, and the set of conferences to which a subscription is made is called a subscription list. It is possible to make changes to any subscription list;

▪ viewing the names of authors and titles (topics) of articles in each specific conference from the subscription list;

▪ familiarization with the contents of articles and saving them in a file in some predetermined directory on the user’s computer;

▪ publication of your own article in a specific conference;

▪ individual response to the author of any article to his E-mail address;

▪ a collective response to the author of a specific article, appearing as a conference article.

The following settings apply to working with conferences:

1) DNS name of the provider's server where the conference articles are stored. This server is called NNTP, and its name must be specified in the contract with the provider;

2) username to identify the author when viewing the titles of articles;

3) E-mail address of the user in order to provide the possibility of personal addressing the response to the article.

There are three types of windows for working with conferences in the software:

1) conference subscription window;

2) a viewing window in which headings and the content of articles of conferences are noted;

3) a window for creating articles. This window forms a public response to the article.

Each of the windows can be called by the corresponding menu command or by clicking on the tool button.

In the subscription window, you can display either a complete list of all conference groups supported by the NNTP server, or only a list of conferences that have been subscribed to. In each of the lists, you can display a subset of conferences that have a name containing a given combination of characters. To add a conference to the subscription list, double-click on the conference name; to exclude a conference from the list, you must also double-click on its name in the subscription list.

The Viewer window appears when you call Outlok Express, and other windows are called from it. This window contains:

▪ a drop-down list listing the names of conferences from the subscription list, as well as the Outbox, Inbox, Sent, Deleted folders;

▪ headings field, which indicates the list of articles contained in the conference or folder selected in the previous paragraph. Only original articles may be included in the list. It is possible to exclude articles from the list that have already been read;

▪ content field, in which the main content of the article is displayed in the title. An article often includes attached files.

The article can be sent to the conference, and a copy - by e-mail to any addressee.

The article creation window must be opened when creating a new article, public or private response to the author. Working with this window is similar to creating and sending an e-mail. An article can be created in any of the following formats: HTML, Uuencode, MIME. If the message is sent in HTML format, it will be output when read in the same format, otherwise the message will be output as plain text with an HTML file attachment. The recipient will be able to view the attached file with full formatting in any WWW page viewer.

6.14. Electronic commerce. Online store. Internet payment systems

E-commerce is the acceleration of most business processes by conducting them electronically. In the mid 1990s. e-commerce began to grow rapidly all over the world, and numerous sellers of traditional goods appeared.

E-commerce uses many different technologies: EDI, email, Internet, Intranet, Extranet.

The most advanced information technology used by e-commerce is the Electronic Data Interchange (EDI) protocol, which eliminates the need for processing, mailing and additional input into computers of paper documents.

Electronic commerce on the Internet can be divided into two categories: B2C - "company-consumer" and B2B - "company-company".

The main model of B2C (business-to-business) trade is online retail stores, which are a developed structure for meeting consumer demand.

B2C e-commerce within the Internet has taken on a new meaning. The B2B marketplace was created for organizations to support interaction between companies and their suppliers, manufacturers and distributors. The B2B market is able to open up great opportunities compared to the B2C trading sector.

The main B2B model is online retail stores, which are technically a combination of an electronic storefront and a trading system.

To purchase any product in the online store, the buyer must go to the Web site of the online store. This Web site is an electronic storefront that contains a catalog of goods, the required interface elements for entering registration information, placing an order, making payments via the Internet, etc. In online stores, customers register when placing an order or entering a store.

The Internet server hosts an e-commerce storefront, which is a Web site with active content. Its basis is a catalog of goods with prices, containing complete information about each product.

Electronic storefronts perform the following functions:

▪ providing an interface to the database of offered goods;

▪ work with the buyer’s electronic “basket”;

▪ placing orders and choosing a method of payment and delivery;

▪ registration of buyers;

▪ online assistance to the buyer;

▪ collection of marketing information;

▪ ensuring the security of buyers’ personal information;

▪ automatic transmission of information to the trading system.

The buyer who has chosen the goods must fill out a special form, which includes the method of payment and delivery of the goods. After placing an order, all collected information about the buyer is transferred from the electronic storefront to the trading system of the online store. The availability of the required product is checked in the trading system. If the product is not available at the moment, the store sends a request to the supplier, and the buyer is informed of the delay time.

After payment for the goods, when it is transferred to the buyer, confirmation of the fact of the order is necessary, most often by e-mail. If the buyer can pay for the goods via the Internet, a payment system is used.

The most popular purchases in online stores include: software; computers and accessories; tourist service; Financial services; books, video cassettes, discs, etc.

6.15. Internet auctions. Internet banking

An online auction is an electronic trading showcase through which the user can sell any product. The owner of an online auction receives a commission from any of the transactions, while the turnover of online auctions is much larger than the turnover of the rest of the rest of the online retail trade.

The world's largest auction firms are also moving online. Any goods can be offered at online auctions. However, there are certain groups of goods that are most suitable for auction trading:

1) computers and components, high-tech goods;

2) discounted goods;

3) slow-moving goods;

4) recent sales leaders;

5) collectibles.

Auctions can be classified based on their division in the direction of growth or decrease in rates, which, in turn, can increase from the minimum to the maximum and vice versa.

A regular auction does not have a reserved or floor price; the goods are given to the buyer in exchange for paying the maximum price.

In a public auction, the current maximum bid and bid history are available to each participant and visitor. There are no restrictions for participants, except for the guarantee.

A private auction is a bid that is accepted for a strictly limited time. In this case, the participant can make only one bet and does not have the opportunity to find out the size and number of bets of other participants. After the end of the agreed period, the winner is determined.

A silent auction is a variation of a private auction where the bidder does not know who has bid but can find out the current maximum bid.

In a floor auction, the seller offers the item and determines the minimum starting selling price. When bidding, buyers know only the size of the minimum price.

A reserved price auction differs from a floor auction in that the bidders know the set floor price but do not know its value. When the minimum price is not reached during the auction during the bidding process, the item remains unsold.

A Danish auction is an auction where the starting price is set exaggeratedly high and is automatically reduced during the bidding process, and the price reduction stops when the bidder stops the auction.

The basis for the emergence and development of Internet banking are the types of remote banking used in the earlier stages of the existence of banking. Through the Internet banking system, a bank client can carry out the following operations:

1) transfer of funds from one of your accounts to another;

2) implementation of non-cash payments;

3) purchase and sale of non-cash currency;

4) opening and closing deposit accounts;

5) determination of the settlement schedule;

6) payment for various goods and services;

7) control over all banking transactions on your accounts for any period of time.

When using Internet banking systems, a bank client gains some advantages:

1) significant time savings;

2) the ability to monitor your financial resources 24 hours a day and better control them, quickly respond to any changes in the situation in the financial markets;

3) tracking operations with plastic cards to increase the client's control over their operations.

The disadvantages of Internet banking systems include the problems of ensuring the security of settlements and the safety of funds in customer accounts.

6.16. Internet insurance. Internet exchange

Internet insurance is currently a frequently used financial service provided via the Internet.

Insurance is the process of establishing and maintaining relations between the insured and the insurer, which are fixed by the contract. The insurer determines the various options for insurance programs offered to the insured. If the client chooses any insurance option, then both parties conclude an insurance contract. From the commencement of the insurance contract, the policyholder undertakes to pay lump-sum or regular sums of money specified in the concluded contract. In the event of an insured event, the insurer must pay the insured a monetary compensation, the amount of which was established by the terms of the insurance contract. An insurance policy is a document that certifies the conclusion of an insurance contract and contains the obligations of the insurer.

Internet insurance is a complex of all the elements of the relationship between the insurance company and its client listed above, arising in the process of selling an insurance product, servicing it and paying insurance compensation (using Internet technologies).

Online insurance services include:

1) filling out the application form, taking into account the selected program of insurance services;

2) ordering and direct payment for an insurance policy;

3) calculation of the amount of the insurance premium and determination of the conditions for its payment;

4) making periodic insurance payments;

5) maintenance of the insurance contract during its validity period.

When using Internet technologies for insurance companies, the client receives the following benefits:

1) reduction of capital costs in the creation of a global service distribution network;

2) a significant reduction in the cost of providing services;

3) creation of a permanent client base of the most active consumers.

An Internet exchange is a platform through which the state, legal entities or individuals trade in goods, services, shares and currencies. The electronic trading system is a central server and local servers connected to it. Through them, access to trading platforms is provided to trade participants. The advantages of the Internet exchange include the external simplicity of concluding transactions and reduced tariffs for the services of on-line brokers. The investor can use the advice of a broker or do without them.

Internet exchanges perform the following functions:

1) timely provision of necessary information to bidders;

2) organization of trade in goods between enterprises;

3) automated process of payment and delivery of goods;

4) cost reduction.

Among the well-known Internet exchanges, the following can be distinguished: oil exchanges, agricultural product markets, precious metals market, stock markets, foreign exchange markets.

The main segments of the global financial market include the precious metals market, stock and currency markets.

Commodities on stock markets are shares of various companies. Commodities on the foreign exchange market are the currencies of various countries. The foreign exchange market has a number of significant advantages compared to the securities market:

1) trading on the foreign exchange market can be started with a small initial capital;

2) in the foreign exchange market, transactions are carried out according to the principle of margin trading;

3) the functioning of currency exchanges occurs around the clock.

A trader is a natural or legal person who carries out transactions on his own behalf and at his own expense, whose profit is the difference between the purchase and sale prices of a commodity, share or currency.

6.17. Internet Marketing. Internet advertising

Marketing is a system for managing the production and marketing activities of an organization. Its goal is to obtain an acceptable amount of profit through accounting and active influence on market conditions. When creating a marketing concept for a company, the fundamental differences between the Internet and traditional media should be taken into account:

▪ The Internet consumer is an active component of the communication system. The use of the Internet allows for interaction between suppliers and consumers. In this case, consumers themselves become suppliers, in particular providers of information about their needs;

▪ the consumer’s level of awareness about the subject on which he is trying to find information is much higher than that of a person who watches an advertisement for the same product on TV;

▪ it is possible to exchange information directly with each consumer;

▪ the conclusion of a transaction is achieved through the interactivity of the Internet environment itself.

Any marketing campaign on the Internet is based on a corporate Web site around which the entire marketing system is built. In order to attract visitors to a particular Web server, a company must advertise it through registration in search engines, Web directories, links to other Web sites, etc. Marketing activities on the Internet are carried out due to the following advantages of e-mail marketing:

▪ Almost every Internet user has an email;

▪ there is the possibility of influencing a specific audience;

▪ modern email clients support the html format of letters.

The advantage of Internet marketing over other, more traditional forms of marketing is the lower cost of an advertising campaign. This is due to the fact that the Internet has a much larger audience than conventional media. The advantages of Internet marketing are also the ability to direct the flow of advertising only to the target audience, evaluate its effectiveness and quickly change the main focuses of the advertising company.

The disadvantages of Internet marketing include: the unknown size of the market, the passivity of consumers and ignorance of consumers.

Internet advertising is used to inform users about the Web site of a company. It can exist in the form of several main carriers.

A banner is a rectangular graphic image in GIF or JPEG formats, which is the most common advertising medium. When making banners, two conditions are met that are taken into account by Web designers:

1) the larger the size of the banner, the more effective it is;

2) Animated banners can be more effective than static ones.

A small Web page that is hosted on a Web publisher page is called a mini-site. Mini-sites are usually dedicated to a specific marketing campaign, product or service.

Advertiser information is a snippet of one or more Web publisher pages.

Placing a company's advertising on the Internet helps achieve the following goals:

1) creating a favorable image of your company;

2) widespread access to information about your company to many millions of Internet users;

3) reduction of advertising costs;

4) providing support to its advertising agents;

5) implementation of opportunities to present information about the product;

6) prompt changes to the price list, information about the company or products, prompt response to the market situation;

7) selling your products via the Internet without opening new retail outlets.

There are two methods for determining the effectiveness of online advertising:

1) study of server statistics and the number of hits to advertising pages;

2) a survey of the potential audience to determine the degree of familiarity with the advertised company.

These methods can be used alone or combined to improve the objectivity of the assessment.

Author: Kozlova I.S.

<< Back: Fundamentals of work in the environment of local and global computer networks (Evolution of computer networks. Basic software and hardware components of the network. Types of local networks. Organization of the domain structure of the network. Multi-level approach. Protocol. Interface. Protocol stack. Organization of accounts. Management of user groups. Management of security policy. Management of network resources. Network services. Tools that ensure interaction with other network operating systems. Organization of work in a hierarchical network. Organization of peer-to-peer networks and technology for working in them. Modem types of networks. Installing and configuring a modem. Organizing a connection with a remote personal computer. Working with switching programs. Working with fax machines. modem)

>> Forward: Fundamentals of working with general purpose applications (Definition of application programs. Text editors. Spreadsheet processors. The concept of shell programs. Graphic editors. The concept and structure of a data bank. Organizer programs. Presentation preparation programs. Working on the Internet with MS OFFICE applications. Stages of solving problems using a computer)

We recommend interesting articles Section Lecture notes, cheat sheets:

Microbiology. Lecture notes

Stocks and bods market. Crib

History and theory of religions. Crib

See other articles Section Lecture notes, cheat sheets.

Read and write useful comments on this article.

<< Back

Latest news of science and technology, new electronics:

The existence of an entropy rule for quantum entanglement has been proven 09.05.2024

Quantum mechanics continues to amaze us with its mysterious phenomena and unexpected discoveries. Recently, Bartosz Regula from the RIKEN Center for Quantum Computing and Ludovico Lamy from the University of Amsterdam presented a new discovery that concerns quantum entanglement and its relation to entropy. Quantum entanglement plays an important role in modern quantum information science and technology. However, the complexity of its structure makes understanding and managing it challenging. Regulus and Lamy's discovery shows that quantum entanglement follows an entropy rule similar to that for classical systems. This discovery opens new perspectives in the field of quantum information science and technology, deepening our understanding of quantum entanglement and its connection to thermodynamics. The results of the study indicate the possibility of reversibility of entanglement transformations, which could greatly simplify their use in various quantum technologies. Opening a new rule ... >>

Mini air conditioner Sony Reon Pocket 5 09.05.2024

Summer is a time for relaxation and travel, but often the heat can turn this time into an unbearable torment. Meet a new product from Sony - the Reon Pocket 5 mini-air conditioner, which promises to make summer more comfortable for its users. Sony has introduced a unique device - the Reon Pocket 5 mini-conditioner, which provides body cooling on hot days. With it, users can enjoy coolness anytime, anywhere by simply wearing it around their neck. This mini air conditioner is equipped with automatic adjustment of operating modes, as well as temperature and humidity sensors. Thanks to innovative technologies, Reon Pocket 5 adjusts its operation depending on the user's activity and environmental conditions. Users can easily adjust the temperature using a dedicated mobile app connected via Bluetooth. Additionally, specially designed T-shirts and shorts are available for convenience, to which a mini air conditioner can be attached. The device can oh ... >>

Energy from space for Starship 08.05.2024

Producing solar energy in space is becoming more feasible with the advent of new technologies and the development of space programs. The head of the startup Virtus Solis shared his vision of using SpaceX's Starship to create orbital power plants capable of powering the Earth. Startup Virtus Solis has unveiled an ambitious project to create orbital power plants using SpaceX's Starship. This idea could significantly change the field of solar energy production, making it more accessible and cheaper. The core of the startup's plan is to reduce the cost of launching satellites into space using Starship. This technological breakthrough is expected to make solar energy production in space more competitive with traditional energy sources. Virtual Solis plans to build large photovoltaic panels in orbit, using Starship to deliver the necessary equipment. However, one of the key challenges ... >>

Random news from the Archive

Heat shield for hypersonic aircraft 05.02.2024

Chinese scientists from Guangzhou University presented innovative 9PHEB ceramics intended for use in hypersonic aircraft. This material with a unique structure has outstanding strength and thermal insulation properties, opening up new prospects in the aerospace industry.

Scientists are addressing the long-term challenge of finding a balance between strength and thermal insulation in porous ceramic materials. 9PHEB offers a multi-scale structural design incorporating ultrafine pores, high-quality interfaces at the nanoscale and lattice distortion at the atomic level, making it an ideal choice for hypersonic technologies.

Ceramics have amazing compressive strength, superior to other porous materials, and exhibit high thermal stability. When tested for insulation and heat resistance, 9PHEB retains its strength even at extreme temperatures, making it a highly promising material for hypersonic aircraft.

The introduction of 9PHEB into various fields such as aerospace, energy and chemistry opens up new opportunities for its use in the next generation of hypersonic technologies.

Other interesting news:

▪ Recognition of dogs by nose pattern

▪ Power plant in the mountains

▪ Action Camera Osmo Action 4

▪ Voice control of LG air conditioners

▪ Different types of trees affect the climate in different ways.

News feed of science and technology, new electronics

 

Interesting materials of the Free Technical Library:

▪ section of the site Car. Article selection

▪ article Baffle. Popular expression

▪ What butterfly has transparent wings? Detailed answer

▪ Chinese cinnamon article. Legends, cultivation, methods of application

▪ article Black tanning of sheepskins. Simple recipes and tips

▪ article Always only two. Focus secret

Leave your comment on this article:

Name:


Email (optional):


A comment:





All languages ​​of this page

Home page | Library | Articles | Website map | Site Reviews

www.diagram.com.ua

www.diagram.com.ua
2000-2024