Wednesday

VPN Topic One - Answers

VPN

VPN stands for Virtual Private Network. VPN is a communication network which is bridge through another network more securely and in encrypted way. The combination of these terms produces VPN – a private network , where the privacy is introduced by some method of virtualization. A VPN could be built between two end-systems or between two organizations, between several end-systems within a single organization or between multiple organizations across the global Internet, between individual applications, or any combination of the above.
Attractions of VPNs to enterprises include:

  • Due to shared facilities, may be cheaper, especially in capital expenditure (CAPEX) than traditional routed networks over dedicated facilities.
  • Can rapidly link enterprise offices, as well as small-and-home-office and mobile workers.
  • Allow customization of security and quality of service as needed for specific applications
  • Especially when provider-provisioned on shared infrastructure, can scale to meet sudden demands
  • Reduce operational expenditure (OPEX) by outsourcing support and facilities
Ref :

http://en.wikipedia.org/wiki/Virtual_Private_Network
www.potaroo.net/papers/1998-3-vpn/vpn.pdf

E-Business Topic One - Answers

BUILDING E-BUSINESS APPLICATION

Now a days e-business applications are very common, as all the business is done on the internet. We can build e-business application by using some of the languages and databases such as ASP, JSP, ORACLE, MYSQL n etc. There are lot of examples of e-business websites we see in our daily life. One of the most and popular is Ebay and Amazon.

HTTP Topic One - Answers

HTTP ELEMENTS

HTTP stands for Hyper Text Transfer Protocol used for showing the Hyper Text on the Browser. It is a stateless protocol. The key elements of HTTP are
Connection : It creates the connection between two nodes.
Request : The sending of the request to the server.
Response : The response of the server to the client request
Close : The closing of the connection

Ref: Ince, D 2004, Developing distributed and e-commerce applications, 3rd edn, Addison-Wesley, Harlow, Essex, UK.

Differentiate Topic One - Answers

INTRANET AND EXTRANET : Differentiate

An Intranet is the portal/network specifically designed for internal communication of small or large business, government institutes/sectors, industries or financial institute. It is custom build to meet the requirements of that particular business no matter where they situated.
"Extranet is somewhat very similar to Intranet. Extranets are designed specifically to give external, limited access to certain files of your computer systems to."
Intranets and extranets all have three things in common
"They both use secured Internet access to the outside world; Both can drastically save your company or organization a lot of money; Both need a user ID & password to control access to the whole system."

TCP Topic One - Answers

TCP PROTOCOL

Transport protocols assist communication between application programs. They are used to pass messages from one port to another. The message is passed through a connection, or connection-less method of communication. TCP(Transfer Control Protocol) is an example of the connection method of communication. TCP establishes a link between the IP addresses of the sourced and the destination ports. These ports are bound via this link till the connection is terminated or broken. A simple example is that of a telephone conversation - a connection is established, the conversation takes place, and then, the connection is terminated. TCP implements the connection as a stream of bytes from the source to the destination.

DNS Topic One - Answers

DNS

"On the Internet, the Domain Name System (DNS) associates various sorts of information with so-called domain names; most importantly, it serves as the "phone book" for the Internet: it translates human-readable computer hostnames, e.g. en.wikipedia.org, into the IP addresses that networking equipment needs for delivering information. It also stores other information such as the list of mail exchange servers that accept email for a given domain. In providing a worldwide keyword-based redirection service, the Domain Name System is an essential component of contemporary Internet use."

Ref: www.en.wikipedia.org

IP Protocol Topic One - Answers

IP PROTOCOL

Protocols help in passing information from one computer to another. Computers exchange packets of data known as IP (Internet Protocol) to communicate with each other. IP is the network protocol used to send information from one computer to an other over the Internet. The IP has to identify the source and the destination computers. It uses IP Addresses to do this i.e.(202.196.9.0).
IP provides several services:
Addressing. IP headers contain 32-bit addresses which identify the sending and receiving hosts. These addresses are used by intermediate routers to select a path through the network for the packet.
Fragmentation. IP packets may be split, or fragmented, into smaller packets. This permits a large packet to travel across a network which can only handle smaller packets. IP fragments and reassembles packets transparently.
Packet timeouts. Each IP packet contains a Time To Live (TTL) field, which is decremented every time a router handles the packet. If TTL reaches zero, the packet is discarded, preventing packets from running in circles forever and flooding a network.
Type of Service. IP supports traffic prioritization by allowing packets to be labeled with an abstract type of service.
Options. IP provides several optional features, allowing a packet's sender to set requirements on the path it takes through the network (source routing), trace the route a packet takes (record route), and label packets with security features.