0% found this document useful (0 votes)
130 views

#3054 - Farhan - CSE Final Assignment - 48A PDF

The document provides information about different types of internet service providers (ISPs): - Dial-up ISPs provide slow internet access over traditional phone lines. - Cable ISPs use cable television infrastructure to provide faster broadband access to homes and businesses. - DSL ISPs utilize existing copper telephone lines to deliver broadband through digital subscriber line technology. - Fiber optic ISPs deliver very high-speed internet through fiber optic cables directly to customer premises or neighborhoods. - Wireless/mobile ISPs enable internet access over cellular or satellite networks without needing a physical connection.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
130 views

#3054 - Farhan - CSE Final Assignment - 48A PDF

The document provides information about different types of internet service providers (ISPs): - Dial-up ISPs provide slow internet access over traditional phone lines. - Cable ISPs use cable television infrastructure to provide faster broadband access to homes and businesses. - DSL ISPs utilize existing copper telephone lines to deliver broadband through digital subscriber line technology. - Fiber optic ISPs deliver very high-speed internet through fiber optic cables directly to customer premises or neighborhoods. - Wireless/mobile ISPs enable internet access over cellular or satellite networks without needing a physical connection.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

WORLD UNIVERSITY OF BANGLADESH

Department of Computer Science and Engineering

FINAL ASSIGNMENT
Course Name : Introduction to Internet
Course Code : CSE-302

Submitted by Submitted to
Md. FARHAN SHAHRIYAR AYESHA SIDDIKA
Roll: 3054
Batch : 48-A Senior Lecturer

ID. No. : WUB/03/19/48/3054 Department of CSE

Semester : 2nd

• Submission Date : 03 May 2020


Answer to the question no – 01

**Internet: Internet is a worldwide, publicly accessible computer


network of interconnected computer networks (internetwork) that
transmit data using the standard Internet Protocol (IP). Largest
Internetwork in the world is Internet. The terms World Wide Web
(WWW) and Internet are not the same. The Internet is a collection of
interconnected computer networks, linked by copper wires, fiber-optic
cables, wireless connections, etc.

**Intranet: An intranet is a private network that is contained within


an enterprise. Typical intranet for a business organization consists of
many interlinked local area networks (LAN) and use any Wide Area
Network (WAN) technology for network connectivity. The main
purpose of an intranet is to share company information and
computing resources among employees. Intranet is a private
Internetwork, which is usually created and maintained by a private
organization.

**Extranet: An extranet can be viewed as part of a company's intranet


that is extended to users outside the company like suppliers, vendors,
partners, customers, or other business associates. placing purchase
order to registered vendors, billing & invoices, payments related
activities, joint venture related activities, product brochures for
partners, discounted price lists for partners etc.. Extranet is required
for normal day-to-day business activities.
7 layers of the OSI model:

The seven Open Systems Interconnection layers are:

Layer 7 – Application
Layer 6 - Presentation
Layer 5 - Session
Layer 4 - Transport
Layer 3 - Network
Layer 2 - Data Link
Layer 1 – Physical

Layer 7: The application layer: Enables the user (human or software)


to interact with the application or network whenever the user elects to
read messages, transfer files or perform other network-related
activities. Web browsers and other internet-connected apps, such as
Outlook and Skype, use Layer 7 application protocols.

Layer 6: The presentation layer: Translates or formats data for the


application layer based on the semantics or syntax that the application
accepts. This layer is also able to handle the encryption and decryption
that the application layer requires.

Layer 5: The session layer: Sets up, coordinates and terminates


conversations between applications. Its services include authentication
and reconnection after an interruption. This layer determines how long
a system will wait for another application to respond. Examples of
session layer protocols include X.225, AppleTalk and Zone
Information Protocol (ZIP).
Layer 4: The transport layer: Is responsible for transferring data
across a network and provides error-checking mechanisms and data
flow controls. It determines how much data to send, where it gets sent
and at what rate. The Transmission Control Protocol is the best
known example of the transport layer.

Layer 3: The network layer: Primary function is to move data into and
through other networks. Network layer protocols accomplish this by
packaging data with correct network address information, selecting
the appropriate network routes and forwarding the packaged data up
the stack to the transport layer.

Layer 2: The data-link layer: The protocol layer in a program that


handles the moving of data into and out of a physical link in a
network. This layer handles problems that occur as a result of bit
transmission errors. It ensures that the pace of the data flow doesn’t
overwhelm the sending and receiving devices. This layer also permits
the transmission of data to Layer 3, the network layer, where it is
addressed and routed.

ss The physical layer: Transports data using electrical, mechanical or


procedural interfaces. This layer is responsible for sending computer
bits from one device to another along the network. It determines how
physical connections to the network are set up and how bits are
represented into predictable signals as they are transmitted either
electrically, optically or via radio waves.
Answer to the question no – 02

Architecture of e commerce businesses model:

*** Different types of e commerce business models with


examples :

1. Franchise model
Best for the company’s expansion, franchising allows the franchisor
to license its resources, brand name. Intellectual property and rights
for a franchise to sell its products and services in exchange for a
royalty. McDonalds’s is the best example which has 93% of its
franchised restaurants worldwide.
Example: Subway, McDonald’s, Gold’s Gym
2. Multi-sided platform model
Any company that offers services to both sides of business carries out
a multi-sided business model. The perfect example is LinkedIn, which
provides subscription services to people to find job opportunities as well
as to HR managers to find candidates for their vacancies.
Example: LinkedIn, Freelancer.com

3. Cash machine business model


Also known as the cash conversion cycle (CCC). It basically means
how quickly a company converts cash to good and services and then
again into cash. This model is used by the companies who make low-
profit margin but survive in the market with a disruptive position.
Like, Amazon generates a massive amount of cash from its online
store before it pays to its suppliers. Another way to look is that
Amazon runs its supply chain on vendor credit.
Example: Amazon, Alibaba, Apple

4. Freemium business model


A mix of free and paid services, the freemium model is mostly used
by tech companies in the Software as a Service (SaaS) or apps
business model. To grow business and acquire customers, companies
offer free (lite) versions to customers but for a limited time or with
limited features. To unlock the upgraded features, the customer has to
opt for paid services.

Examples: Zoom, Dropbox, MailChimp, Evernote etc.

5. Subscription business model


This model allows the customer to get services by paying a fixed
amount every month or year. In this case, the company has to provide
enough value to its customer, so they visit the website over and over
again.

Examples: Netflix, LinkedIn, Amazon Prime, Dollar Shave Club, are


few of its examples.

6. Peer-to-peer business model


As per this model, a company acts as a middleman between two
individual parties and create value for both demand and supply side.
It’s different than a typical relationship of a business selling its
services to consumers (B2B or B2C). It makes money through
commissions. Airbnb is the right example that allows transactions
between hosts and hostees.

Example: Airbnb, Uber, eBay, Offerup, Freelancer.com,

7. One-for-one business model


The one-for-one business model can be referred to as a social
entrepreneurship business model. It’s a hybrid solution, a
combination of both profit and not-for-profit services. Although there
are some debates about its long-term sustainability, many companies
are pivoting their business models to cater to socially conscious
millennials. The best example is TOMS Shoes that provides shoes to
underprivileged children globally for every pair of shoes sold.
Examples: TOMS Shoes, Warby Parker (donated eyeglasses), Two-
degree Food, Soapbox Soaps.

8. Hidden revenue business model


This model refers to a revenue generation system in which users don’t
have to pay for the services offered, but the company still earns
revenue streams from other sources. Like, Google earns from
advertising money spent by businesses to bid on keywords while
users don’t pay for the search engine.
Examples: Google, Facebook, Instagram, Twitter

9. Razor and blade business model


In this model, one item (Razor) is sold at a low price while another
associated item (blade) is sold at a premium price. It is also known as
a printer and cartridge business model. For example, the price of inkjet
printer itself was just a one-time expense, however, getting a new ink
cartridge replaced is an ongoing expense for consumers. The model is
great if you have a loyal customer base and if you can create some
sort of lock-in situation with customers.

Example: Xbox or PlayStation Video Games, HP Printers, Nespresso


coffee machines, AT&T Mobile phones with 2-year contract.

10. Reverse Razor and Blade business model


The business model is contrary to the razor blade model. It implies
offering low priced products to encourage customers to buy high
priced items as well.

xample:Apple’s App Store and iTunes sell apps, movies, songs, etc. at
reasonable rates but charges premium prices on its devices like iPhone,
iPad, and Mac.

11. Direct sales business model


In this model, products are directly sold to the end customers either in
a one-on-one conversation or small gathering, remember Tupperware
house parties? The salesperson gets a share of every sale. Although
technology has superseded the direct sales method in many ways,
still many companies prefer to give a personal touch to its customers.
Examples: Tupperware, personal care & nutrition brands (Avon,
Arbonne, and Herbalife) organization but having different brand
names. It is done to create economies of scale and to build an empire.

Examples: Procter & Gamble, Unilever, and Nestle are a few examples.

12. E-Commerce business model


A simple yet most promising business model, e-commerce allows
buyers and sellers to connect and transact using an online platform
(online shop).

Example: Amazon, Alibaba, eBay, OLX, Walmart, etc.

Answer to the question no – 03

The classification of ISP’s, it is divided into seven parts they are


written below.

1. Access provider
2. Mailbox provider
3. Hosting Provider
4. Transit ISPs
5. Virtual ISPs
6. Free ISPs
7. Wireless ISP
1) Access provider ISP:
These types of ISPs provide Internet access via two methods, such as
wireless and wired. In the wired method, the ISP provides various
devices to access the Internet for the customer such as telephone
modems, cables, and fiber optics.

In the wireless methods includes Ethernet(wireless internet), mobile


Internet, wifi, and satellite internet access. The ISP provides services
to both individuals and small companies as well as home users.

The customer can get both services wireless and wired from his ISP
according to his requirement.

2) Mailbox provider ISP:


The Mailbox provider is an organization which provides lots of services
like domain name and also provides email services to send (text,
documents, images, and videos), receives the mail and store emails
for users, individuals, or the organizations.
The ISP also provides storage space for its users’ email boxes. Some of
the ISPs are also access providers except the some of mailbox ISP like
Gmail, Yahoo Mail, Outlook, etc.
This type of ISP also provides the services to individuals, end
customers, and small organizations.

3) Hosting Providers ISP:


This type of ISP provides Hosting services (Hosting is storage space
on the internet where website or email are stored), email, and various
online storage.

It also provides all types of hosting like a dedicated hosting server,


virtual hosting, cloud hosting, and physical hosting.
The targeted customer of this ISP is an individual, end-users, and
organization.

4) Transit ISPs:
Transit ISP is another type of ISP which provides a huge amount of
internet bandwidth to another ISPs and customer for connecting both
hosting ISP and access ISP.
The transit ISP is called the internet and IP Transit and sometimes
also known as “upstream providers”.

5) Virtual ISP:-
The virtual ISP is also called VISP(Virtual ISP). This types of ISPs
purchase services from another ISP it means other Internet Service
Providers.
The customers of Virtual ISPs use the services(Internet Services) from
which the VISP purchased it. Sometimes these ISPs are called
wholesale ISPs.

6) Free ISP:-
The Free ISPs provide the service at free of cost, it means the users have
no need to pay any services charge to his ISPs. Instead of service
charges, the users may watch the advertisement provided by the ISPs
like the commercial television channels while they connected.
In other words, we can say that the Free ISPs are selling the user’s
attention to his advertiser.

7) Wireless ISP:-
Wireless ISPs uses wireless network technology. It provides Internet
services through wireless networking such as wifi technology.
The users are enjoying Internet services without connecting any
wires.

*** InternetService Provider provides lots of services,


some of the services are written below:

1. Internet services: Available technologies have ranged from


computer modems with acoustic couplers to telephone lines, to
television cable (CATV), wireless Ethernet (wi-fi), and fiber
optics. Answer: ISP stands for 'Internet Service Provider'.
Examples are- airtel, BSNL, etc
2. Domain services: Domain names are used to identify one or more
IP addresses. For example, the domain name microsoft.com
represents about a dozen IP addresses.
3. Hosting services: Web hosting is a service that allows
organizations and individuals to post a website or web page onto
the Internet. A web host, or web hosting service provider, is a
business that provides the technologies and services needed for
the website or webpage to be viewed in the Internet.
4. Colocation: A colocation (colo) is a data center facility in which
a business can rent space for servers and other computing
hardware. Typically, a colo provides the building, cooling, power,
bandwidth and physical security while the customer provides
servers and storage.
5. Email services: ISP stands for Internet Service Provider. When
we're talking email marketing, ISP refers to the major email
providers: AOL, Hotmail, Outlook, Yahoo, Gmail, Comcast, and
so on. Their customers are commonly your email recipients

6. Video services: In general, to stream most videos in standard


definition, you'll need internet speeds of at least 3 Mbps. You
need at least 25 Mbps for 4K streaming video on your computer
or Ultra HD enabled devices. Some streaming services suggest
faster

7. Storage services: Storage as a service (SaaS) is a business


model in which a company leases or rents its storage
infrastructure to another company or individuals to store data.
... A company providing SaaS may be called a storage service
provider (SSP)

8. Information retrieval services: Information retrieval (IR) is the


activity of obtaining information system resources that are
relevant to an information need from a collection of those
resources. Searches can be based on full-text or other content-
based indexing.
Answer to the question no – 04

Network topology is the arrangement of the elements of a


communication network. Network topology can be used to define or
describe the arrangement of various types of telecommunication
networks, including command and control radio networks,
industrial field busses and computer networks.

1) Bus Topology
Bus topology is the kind of network topology where every node, i.e.
every device on the network is connected to a solo main cable line.
Data is transmitted in a single route, from one point to the other. We
cannot transmit data in both ways. When this topology has precisely
two endpoints, it is known as Linear Bus Topology. It is mostly used
for small networks.

**Benefits of Bus Topology


1. It is cost effective.
2. The Cable length required is the least in comparison to other
topologies.
3. The working of this topology is easy to understand.
4. Expansion can be done easily by linking the cables together.
**Drawbacks of Bus Topology
If the main cable collapses, the complete network collapses.
The network performance is at stake and reduces if there are
numerous nodes and heavy network traffic.
The main cable can only be so long. The length of the cable is limited.
Bus Topology is not as fast as Ring Topology.

2) Ring Topology
Ring Topology is a type of topology in which every computer is
connected to another computer on each side, with the last computer
being connected to the first, thus forming a ring shape. This topology
allows for each computer to have exactly two neighboring computers.

In this topology, there is the main computer, known as the monitor


station, which is responsible for all the operations. Data transmission
amongst devices is done with the help of tokens. For transmitting
data, the computer station has to hold the token. The token is released
only when the transmission is complete, following which the token
can be used by other computer stations to transmit data.
Nwtopology2Benefits of Ring Topology

The network is not affected by numerous nodes or heavy traffic, as


only the nodes possessing tokens can transfer data.
Ring topology has cheap installation and expansion.
Drawbacks of Ring Topology

It is a tedious task to troubleshoot in Ring topology.


It is difficult to add or delete nodes, as it interrupts the network
activity.
If one computer crashes, the entire network activity is disrupted.

3) Star Topology
Star Topology is the kind of network topology in which all the nodes
are connected via cables to a single node called hub, which is the
central node. The hub can be active or passive in nature. Active hubs
contain repeaters, while passive hubs are considered as non-intelligent
nodes. Each node contains a reserved connection to the central node,
which the central node acting as a repeater during data transmission.
**Benefits of Star Topology

1. Star topology boasts fast performance due to low network


traffic.
2. It is easy to upgrade the Hub, as and when required.
3. Setup can be done easily and can be easily modified as well.
4. Star Topology is easy to troubleshoot.
5. In case a node has failed, it can easily be replaced without
affecting the working of the rest of the network.
Drawbacks of Star Topology

The installation cost is extreme and it is costly to use.


All the nodes are dependent on the hub.

4) Mesh Topology
Mesh topology is the kind of topology, in which all the nodes are
connected with all the other nodes via a network channel. Mesh
topology is a point-to-point connection. It has n(n-1)/2 network
channels to connect n nodes.
Mesh topology has two techniques for transmission of data, i.e.
routing and flooding. In the routing technique, the nodes possess a
routing logic, like the logic for the shortest distance to the destination
node or the logic to avoid routes with broken connections. In the
flooding technique, all the network nodes receive the same data. This
leaves us no need for routing logic. This technique makes the network
robust but results in unwanted load on the network.

**Benefits of Mesh Topology

1. Every connection has the ability to carry its particular data


load.
2. Mesh Topology is very robust.
3. It is easy to diagnose faults.
4. Mesh Topology provides with privacy and security.
5. Drawbacks of Mesh Topology

Mesh Topology is challenging to install and configure.


As all the nodes are connected with each other, the cabling is costly.
Bulk wiring is essential.
5) Tree Topology
Tree topology is the kind of topology in which the nodes are connected
in a hierarchical manner, with all the nodes being connected to the
topmost node or root node. Hence, it is also known as hierarchical
topology. Tree topology has at least three levels of hierarchy.

Tree topology is applied in Wide Area Network. It is an extension of


Bus topology and Star topology. It is best if the workstations are
situated in groups, for easy working and managing.

**Benefits of Tree Topology

1. It is easy to expand the network with more nodes.


2. It is easy to maintain and manage.
3. It is easy to detect an error in the network.

**Drawbacks of Tree Topology

1. It is profoundly cabled.
2. It is expensive when compared to other topologies.
3. If the root node collapses, the network will also collapse.
6) Hybrid Topology
Hybrid Topology is basically a network topology comprising of two or
more different types of topologies. It is a reliable and scalable
topology, but simultaneously, it is a costly one. It receives the merits
and demerits of the topologies used to build it.

***Benefits of Hybrid Topology

1. It is easy to troubleshoot and provides simple error detecting


techniques.
2. It is a flexible network topology, making it quite effective.
3. It is scalable since the size can be made greater easily.

**Drawbacks of Hybrid Topology

1. It is complicated to design it.


***Best topology :

A Star Network Topology is best suited for small networks and


works efficiently when there is limited number of receiver(node). One
has to ensure that the central device or the central node is always
working and extra security features should be added to the central
device because it s the best part of network.

Answer to the question no – 05

Difference between TCP and UDP:

TCP UDP

It is a connection-oriented protocol. It is a connectionless protocol.

TCP reads data as streams of bytes, UDP messages contain packets that
and the message is transmitted to were sent one by one. It also checks for
segment boundaries. integrity at the arrival time.

TCP messages make their way across It is not connection-based, so one


the internet from one computer to program can send lots of packets to
another. another.
TCP rearranges data packets in the UDP protocol has no fixed order because
specific order. all packets are independent of each
other.

The speed for TCP is slower. UDP is faster as error recovery is not
attempted.

Header size is 20 bytes Header size is 8 bytes.

TCP is heavy-weight. TCP needs three UDP is lightweight. There are no


packets to set up a socket connection tracking connections, ordering of
before any user data can be sent. messages, etc.

TCP does error checking and also UDP performs error checking, but it
makes error recovery. discards erroneous packets.

Acknowledgment segments No Acknowledgment segments

Using handshake protocol like SYN, No handshake (so connectionless


SYN-ACK, ACK protocol)

TCP is reliable as it guarantees delivery The delivery of data to the destination


of data to the destination router. can't be guaranteed in UDP.

TCP offers extensive error checking UDP has just a single error checking
mechanisms because it provides flow mechanism which is used for
control and acknowledgment of data. checksums.
 Popular Internet Terminologies :

Domain Name - A method of identifying computer addresses. Your e-


mail address has a domain address. If you have an "edu" at the end of
your e-mail address that means your account is affiliated with an
educational institution.

FAQs - Frequently Asked Questions. A list of questions and answers


to explain products and troubleshoot problems.

FTP - Using file transfer protocol software to receive from upload) or


send to (download) files (text, pictures, spreadsheets, etc.) from one
computer/server to another.

.gif - (graphic interchange format) the usual format for a graphic


that is not a photo. Animated gif files are embedded with coding that
creates movement when the graphic is activated. See more graphics
formats

Home page - Generally the first page retrieved when accessing a Web
site. Usually a "home" page acts as the starting point for a user to
access information on the site. The "home" page usually has some type
of table of contents for the rest of the site information or other
materials. When creating Web pages, the "home" page has the
filename "index.html," which is the default name. The "index" page
automatically opens up as the "home" page.

HTML - A type of text code in Hypertext Markup Language which,


when embedded in a document, allows that document to be read and
distributed across the Internet.
HTTP - The hypertext transfer protocol (http) that enables html
documents to be read on the Internet.

Hypertext - Text that is non-sequential, produced by writing in


HTML (Hypertext Markup Language) language. This HTML coding
allows the information (text, graphics, sound, video) to be accessed
using HTTP (Hypertext Transfer Protocol).

Hyperlink - Text, images, graphics that, when clicked with a mouse


(or activated by keystrokes) will connect the user to a new Web site.
The link is usually obvious, such as underlined text or a "button" of
some type, but not always.

IP Address - (Internet Protocol) The number or name of the computer


from which you send and receive information on the Internet.

You might also like