Skip to main content

Internet Protocols

There are various internet protocols such as HTTP, E-Mail, FTP, Telnet and SSL

1.     HTTP- it is the Internet protocol used to transfer web pages. HTTP was developed by World Wide Web Consortium (W3C) and the Internet Engineering Task Force (IETF). HTTP runs in the application layer of TCP/IP model.
An HTTP session begins when the client browser requests a web page from a remote internet server, when the server responds with the client’s requested page, the HTTP session for that object ends. Since a web page contains many objects such as graphics, sounds, videos, frames. Each of them must be requested by a separate HTTP message.

2.     E- Mail- it is one of the oldest, most important and frequently used internet services. Like HTTP, the various internet protocols used to handle e-mail all run in the application layer of the TCP/IP. Simple Mail Transfer Protocol is the Internet Protocol used to send e-mail to the server. SMTP is relatively simple, text based protocol that was developed in early 1980s. SMTP handles only the sending of e-mails. Post office protocol is used by the client to retrieve the message from the server. Mail settings for these protocols can be handled by your browser. Internet Message Access Protocol is supported by almost all the browsers and is used to search, organise and filter their mails.

3.     FTP- is one of the original Internet services. FTP runs in TCP/IP’s Application layer and permits users to transfer files from a server to their client computer, and vice versa. The files can be programs, documents or large database files. FTP is the fastest and most convenient way to transfer files larger than 1 megabyte, which some e-mail servers will not accept.

4.     Telnet- is a network protocol that also runs in TCP/IP’s Application layer and is used to remote login on another computer. The term Telnet also refers to the Telnet program which provides the client part of the protocol and enables the client to emulate a mainframe computer terminal. Telnet was the first “remote work” program that permitted users to work on computer from a remote location.

5.     Secure Sockets Layer (SSL)- is a protocol that operates between the transport and application layers of the TCP/IP and secures communications between the client and the server. SSL helps secure e-commerce communications and payments through a variety of techniques such as message encryption and digital signatures.

Comments

Garima Sood said…
gud info..
Akash said…
nice content.. very useful info..:)

Popular posts from this blog

Advantages and Disadvantages of EIS Advantages of EIS Easy for upper-level executives to use, extensive computer experience is not required in operations Provides timely delivery of company summary information Information that is provided is better understood Filters data for management Improves to tracking information Offers efficiency to decision makers Disadvantages of EIS System dependent Limited functionality, by design Information overload for some managers Benefits hard to quantify High implementation costs System may become slow, large, and hard to manage Need good internal processes for data management May lead to less reliable and less secure data

Inter-Organizational Value Chain

The value chain of   a company is part of over all value chain. The over all competitive advantage of an organization is not just dependent on the quality and efficiency of the company and quality of products but also upon the that of its suppliers and wholesalers and retailers it may use. The analysis of overall supply chain is called the value system. Different parts of the value chain 1.  Supplier     2.  Firm       3.   Channel 4 .   Buyer

Big-M Method and Two-Phase Method

Big-M Method The Big-M method of handling instances with artificial  variables is the “commonsense approach”. Essentially, the notion is to make the artificial variables, through their coefficients in the objective function, so costly or unprofitable that any feasible solution to the real problem would be preferred, unless the original instance possessed no feasible solutions at all. But this means that we need to assign, in the objective function, coefficients to the artificial variables that are either very small (maximization problem) or very large (minimization problem); whatever this value,let us call it Big M . In fact, this notion is an old trick in optimization in general; we  simply associate a penalty value with variables that we do not want to be part of an ultimate solution(unless such an outcome is unavoidable). Indeed, the penalty is so costly that unless any of the  respective variables' inclusion is warranted algorithmically, such variables will never be p