Skip to main content

Web Technologies

WEB  Technology

TCP / IP :
TCP refers to Transmission Control Protocol.
IP refers to Information  Protocol.

TCP is protocol that establish connection among  sending and receiving web computers. It handles the assembly of packets at the point of transmission and then  reassemble at the receiving point. A protocol is a set of rules for formatting ordering ,compressing and errors checking  the messages.  It may also specify the speed of transmission  and the mean by which the devices  on the network will indicate whether they have stopped sending or receiving of messages.

The protocol can be implemented in hardware or software. TCP/IP  implemented in software is called ‘Server Software ‘. TCP is establishes connection among sending and receiving among  web computers. It is divided into four separate layers where each layers handles a different  communication problems.

1. Network Interface Layer:   It is responsible for placing the packets on and receiving them from network medium which could be LAN ( Local Area Network ), Token -ring network , frame relay, ATM (Automatic Teller Machine ). The TCP/IP is independent of local area technologies and can adopt to any charges.

2      2.The Internet Layer :   It is responsible for Addressing , Packaging and routing messages on internet.

3      3.  The Transport  Layer : It is responsible for providing  (Host –to –Host ) communication with application by acknowledging and  sequencing  the packages to and from the application .

4      4. The Application Layer  : It provides a variety of application with the ability to access the services of lower layer. Some of the best known application are   HTTP , Telnet , FTP , SMTP etc.

Comments

dipankar said…
its interesting..:)
dipankar said…
its interesting..:)
Garima Sood said…
very informative..gud job sumi!!
kriti said…
well done sumi!! very gud and useful content..:)
Akshay Kalra said…
gud work

Popular posts from this blog

Advantages and Disadvantages of EIS Advantages of EIS Easy for upper-level executives to use, extensive computer experience is not required in operations Provides timely delivery of company summary information Information that is provided is better understood Filters data for management Improves to tracking information Offers efficiency to decision makers Disadvantages of EIS System dependent Limited functionality, by design Information overload for some managers Benefits hard to quantify High implementation costs System may become slow, large, and hard to manage Need good internal processes for data management May lead to less reliable and less secure data

Inter-Organizational Value Chain

The value chain of   a company is part of over all value chain. The over all competitive advantage of an organization is not just dependent on the quality and efficiency of the company and quality of products but also upon the that of its suppliers and wholesalers and retailers it may use. The analysis of overall supply chain is called the value system. Different parts of the value chain 1.  Supplier     2.  Firm       3.   Channel 4 .   Buyer

Big-M Method and Two-Phase Method

Big-M Method The Big-M method of handling instances with artificial  variables is the “commonsense approach”. Essentially, the notion is to make the artificial variables, through their coefficients in the objective function, so costly or unprofitable that any feasible solution to the real problem would be preferred, unless the original instance possessed no feasible solutions at all. But this means that we need to assign, in the objective function, coefficients to the artificial variables that are either very small (maximization problem) or very large (minimization problem); whatever this value,let us call it Big M . In fact, this notion is an old trick in optimization in general; we  simply associate a penalty value with variables that we do not want to be part of an ultimate solution(unless such an outcome is unavoidable). Indeed, the penalty is so costly that unless any of the  respective variables' inclusion is warranted algorithmically, such variables will never be p