Chapter 3 Technology of Electronic Commerce 3.1 A short history of the Internet and the web The Internet was the result of some visionary thinking by people in the early 1960s who saw great potential value in allowing computers to share information on research and development in scientific and military fields. J CR Licklider of MIT, first proposed a global network of computers in 1962, and moved over to the Defense Advanced Research Projects Agency(DARPA) in late 1962 to head the work to develop it Leonard Kleinrock of MIT and later UCLA developed the theory of packet switching, which was to form the basis of Internet connections. Lawrence Roberts of MIT connected a Massachusetts computer with a California computer in 1965 over dial-up telephone lines. It showed the feasibility of wide area networking, but also showed that the telephone line's circuit switching was inadequate. Kleinrock's packet switching theory was confirmed. Roberts moved over to DARPA in 1966 and developed his plan for ARPANET. These visionaries and many more left unnamed here are the real founders of the Internet The Internet, then known as arPanet, was brought online in 1969 under a contract let the renamed Advanced Research Projects Agency(ARPA) which initially connected four major computers at universities in the southwestern US (UCLA, Stanford Research Institute, UCSB, and the University of Utah). The contract was carried out by BBN of Cambridge, MA under Bob Kahn and went online in December 1969. By June 1970, MIT, Harvard, BBN, and Systems Development Corp(SDC)in Santa Monica, Cal. were added. By January 1971, Stanford, MITs Lincoln Labs, Carnegie-Mellon, and Case-Western Reserve U were added. In months to come NASA/Ames, Mitre, Burroughs RAND, and the U of Illinois plugged in. After that, there were far too many to keep listing here The Internet was designed in part to provide a communications network that would work even if some of the sites were destroyed by nuclear attack. If the most direct route was not available. routers would direct traffic around the network via alternate routes The early Internet was used by computer experts, engineers, scientists, and librarians. There was nothing friendly about it. There were no home or office personal computers in those days, and anyone who used it, whether a computer professional or an engineer or scientist or librarian, had to learn to E-mail was adapted for ARPAnET by Ray Tomlinson of BBN in 1972. He picked the@ symbol from the available symbols on his teletype to link the username and address, The telnet protocol, enabling logging on to a remote computer, was published as a Request for Comments (RFC) in 1972. RFCs are a means of sharing developmental work throughout community. The ftp protocol, enabling file transfers between Internet sites, was published as an RFC in 1973, and from then on RFCs were available electronically to anyone who had use of the ftp protocol The Internet matured in the 70s as a result of the TCP/lP architecture first proposed by bob Kahn at BBn and further developed by Kahn and Vint Cerf at Stanford and others throughout the 70s. It was adopted by the Defense Department in 1980 replacing the earlier Network Control Protocol(NCP)and universally adopted by 1983 The Unix to Unix Copy Protocol (UUCP) was invented in 1978 at Bell Labs. Usenet was started in 1979 based on UUCP. Newsgroups, which are discussion groups focusing on a topic followed, providing a means of exchanging information throughout the world while Usenet is no considered as part of the Internet, since it does not share the use of TCP/IP, it linked UNIX systems around the world, and many Internet sites took advantage of the availability of newsgroups. It was a significant part of the community building that took place on the networks In 1986, the National Science Foundation funded NSFNet as a cross country 56 Kbps backbone for the Internet. They maintained their sponsorship for nearly a decade, setting rules for its non-commercial government and research uses As the commands for e-mail, FtP, and telnet were standardized, it became a lot easier for non-technical people to learn to use the nets. It was not easy by today's standards by any means
Chapter 3 Technology of Electronic Commerce 3.1 A short history of the Internet and the Web The Internet was the result of some visionary thinking by people in the early 1960s who saw great potential value in allowing computers to share information on research and development in scientific and military fields. J.C.R. Licklider of MIT, first proposed a global network of computers in 1962, and moved over to the Defense Advanced Research Projects Agency (DARPA) in late 1962 to head the work to develop it. Leonard Kleinrock of MIT and later UCLA developed the theory of packet switching, which was to form the basis of Internet connections. Lawrence Roberts of MIT connected a Massachusetts computer with a California computer in 1965 over dial-up telephone lines. It showed the feasibility of wide area networking, but also showed that the telephone line's circuit switching was inadequate. Kleinrock's packet switching theory was confirmed. Roberts moved over to DARPA in 1966 and developed his plan for ARPANET. These visionaries and many more left unnamed here are the real founders of the Internet. The Internet, then known as ARPANET, was brought online in 1969 under a contract let by the renamed Advanced Research Projects Agency (ARPA) which initially connected four major computers at universities in the southwestern US (UCLA, Stanford Research Institute, UCSB, and the University of Utah). The contract was carried out by BBN of Cambridge, MA under Bob Kahn and went online in December 1969. By June 1970, MIT, Harvard, BBN, and Systems Development Corp (SDC) in Santa Monica, Cal. were added. By January 1971, Stanford, MIT's Lincoln Labs, Carnegie-Mellon, and Case-Western Reserve U were added. In months to come, NASA/Ames, Mitre, Burroughs, RAND, and the U of Illinois plugged in. After that, there were far too many to keep listing here. The Internet was designed in part to provide a communications network that would work even if some of the sites were destroyed by nuclear attack. If the most direct route was not available, routers would direct traffic around the network via alternate routes. The early Internet was used by computer experts, engineers, scientists, and librarians. There was nothing friendly about it. There were no home or office personal computers in those days, and anyone who used it, whether a computer professional or an engineer or scientist or librarian, had to learn to use a very complex system. E-mail was adapted for ARPANET by Ray Tomlinson of BBN in 1972. He picked the @ symbol from the available symbols on his teletype to link the username and address. The telnet protocol, enabling logging on to a remote computer, was published as a Request for Comments (RFC) in 1972. RFC's are a means of sharing developmental work throughout community. The ftp protocol, enabling file transfers between Internet sites, was published as an RFC in 1973, and from then on RFC's were available electronically to anyone who had use of the ftp protocol. The Internet matured in the 70's as a result of the TCP/IP architecture first proposed by Bob Kahn at BBN and further developed by Kahn and Vint Cerf at Stanford and others throughout the 70's. It was adopted by the Defense Department in 1980 replacing the earlier Network Control Protocol (NCP) and universally adopted by 1983. The Unix to Unix Copy Protocol (UUCP) was invented in 1978 at Bell Labs. Usenet was started in 1979 based on UUCP. Newsgroups, which are discussion groups focusing on a topic, followed, providing a means of exchanging information throughout the world. While Usenet is not considered as part of the Internet, since it does not share the use of TCP/IP, it linked UNIX systems around the world, and many Internet sites took advantage of the availability of newsgroups. It was a significant part of the community building that took place on the networks. In 1986, the National Science Foundation funded NSFNet as a cross country 56 Kbps backbone for the Internet. They maintained their sponsorship for nearly a decade, setting rules for its non-commercial government and research uses. As the commands for e-mail, FTP, and telnet were standardized, it became a lot easier for non-technical people to learn to use the nets. It was not easy by today's standards by any means
but it did open up use of the Internet to many more people in universities in particular. Other departments besides the libraries, computer, physics, and engineering departments found ways to nake good use of the nets--to communicate with colleagues around the world and to share files d While the number of sites on the Internet was small, it was fairly easy to keep track of the resources of interest that were available. But as more and more universities and organizations--and their libraries-- connected the Internet became harder and harder to track. there was more and more need for tools to index the resources that were available In 1991, the first really friendly interface to the Internet was developed at the University of Minnesota. The University wanted to develop a simple menu system to access files and information on campus through their local network. a debate followed between mainframe dherents and those who believed in smaller systems with client-server architecture. The mainframe adherents"won"the debate initially, but since the client-server advocates said they could put up a prototype very quickly, they were given the go-ahead to do a demonstration system he demonstration system was called a gopher after the U of Minnesota mascot--the golden gopher. The gopher proved to be very prolific, and within a few years there were over 10,000 gophers around the world. It takes no knowledge of UNIX or computer architecture to use. In a gopher system, you type or click on a number to select the menu selection you want Gopher's usability was enhanced much more when the University of Nevada at Reno developed the VERONICA searchable index of gopher menus. It was purported to be an acronym for Very Easy Rodent-Oriented Netwide Index to Computerized Archives. A spider crawled gopher menus around the world, collecting links and retrieving them for the index. It was so popular that it was very hard to connect to, even though a number of other VERONICA sites were developed to ease the load. Similar indexing software was developed for single sites, called JUGHEAD (Jonzy's Universal Gopher Hierarchy Excavation And Display) In 1989 another significant event took place in making the nets easier to use. Tim Berners-Lee and others at the European Laboratory for Particle Physics, more popularly known as CERN, proposed a new protocol for information distribution This protocol, which became the World Wide Web in 1991, was based on hypertext--a system of embedding links in text to link to other text, which you have been using every time you selected a text link while reading these pages. Although started before gopher, it was slower to develop The development in 1993 of the graphical browser Mosaic by Marc Andreessen and his team at the National Center for Supercomputing Applications(NCSA)gave the protocol its big boost ater,Andreessen moved to become the brains behind Netscape Corp, which produced the most successful graphical type of browser and server until Microsoft declared war and developed its Microsoft Internet Explorer Since the Internet was initially funded by the government it was originally limited to research, education, and government uses. Commercial uses were prohibited unless they directly served the goals of research and education. This policy continued until the early 90s, when independent commercial networks began to grow. It then became possible to route traffic across the country from one commercial site to another without passing through the government funded NSFNet internet backbone Microsoft's full scale entry into the browser, server, and Internet Service Provider market completed the major shift over to a commercially based Internet. The release of windows 98 in June 1998 with the microsoft browser well integrated into the desktop shows Bill Gates determination to capitalize on the enormous growth of the Internet. Microsoft's success over the past few years has brought court challenges to their dominance A current trend with major implications for the future is the growth of high speed connections 56K modems and the providers who support them are spreading widely, but this is just a small step compared to what will follow. 56K is not fast enough to carry multimedia, such as sound and ideo except in low quality. But new technologies many times faster, such as cable modems digital subscriber lines(DSL), and satellite broadcast are available in limited locations now, and will become widely available in the next few years. These technologies present problems, not just in the user's connection, but in maintaining high speed data flow reliably from source to the user Those problems are being worked on, too During this period of enormous growth, businesses entering the Internet arena scrambled to find economic models that work. Free services supported by advertising shifted some of the direct
but it did open up use of the Internet to many more people in universities in particular. Other departments besides the libraries, computer, physics, and engineering departments found ways to make good use of the nets--to communicate with colleagues around the world and to share files and resources. While the number of sites on the Internet was small, it was fairly easy to keep track of the resources of interest that were available. But as more and more universities and organizations--and their libraries-- connected, the Internet became harder and harder to track. There was more and more need for tools to index the resources that were available. In 1991, the first really friendly interface to the Internet was developed at the University of Minnesota. The University wanted to develop a simple menu system to access files and information on campus through their local network. A debate followed between mainframe adherents and those who believed in smaller systems with client-server architecture. The mainframe adherents "won" the debate initially, but since the client-server advocates said they could put up a prototype very quickly, they were given the go-ahead to do a demonstration system. The demonstration system was called a gopher after the U of Minnesota mascot--the golden gopher. The gopher proved to be very prolific, and within a few years there were over 10,000 gophers around the world. It takes no knowledge of UNIX or computer architecture to use. In a gopher system, you type or click on a number to select the menu selection you want. Gopher's usability was enhanced much more when the University of Nevada at Reno developed the VERONICA searchable index of gopher menus. It was purported to be an acronym for Very Easy Rodent-Oriented Netwide Index to Computerized Archives. A spider crawled gopher menus around the world, collecting links and retrieving them for the index. It was so popular that it was very hard to connect to, even though a number of other VERONICA sites were developed to ease the load. Similar indexing software was developed for single sites, called JUGHEAD (Jonzy's Universal Gopher Hierarchy Excavation And Display). In 1989 another significant event took place in making the nets easier to use. Tim Berners-Lee and others at the European Laboratory for Particle Physics, more popularly known as CERN, proposed a new protocol for information distribution. This protocol, which became the World Wide Web in 1991, was based on hypertext--a system of embedding links in text to link to other text, which you have been using every time you selected a text link while reading these pages. Although started before gopher, it was slower to develop. The development in 1993 of the graphical browser Mosaic by Marc Andreessen and his team at the National Center for Supercomputing Applications (NCSA) gave the protocol its big boost. Later, Andreessen moved to become the brains behind Netscape Corp., which produced the most successful graphical type of browser and server until Microsoft declared war and developed its Microsoft Internet Explorer. Since the Internet was initially funded by the government, it was originally limited to research, education, and government uses. Commercial uses were prohibited unless they directly served the goals of research and education. This policy continued until the early 90's, when independent commercial networks began to grow. It then became possible to route traffic across the country from one commercial site to another without passing through the government funded NSFNet Internet backbone. Microsoft's full scale entry into the browser, server, and Internet Service Provider market completed the major shift over to a commercially based Internet. The release of Windows 98 in June 1998 with the Microsoft browser well integrated into the desktop shows Bill Gates' determination to capitalize on the enormous growth of the Internet. Microsoft's success over the past few years has brought court challenges to their dominance. A current trend with major implications for the future is the growth of high speed connections. 56K modems and the providers who support them are spreading widely, but this is just a small step compared to what will follow. 56K is not fast enough to carry multimedia, such as sound and video except in low quality. But new technologies many times faster, such as cable modems, digital subscriber lines (DSL), and satellite broadcast are available in limited locations now, and will become widely available in the next few years. These technologies present problems, not just in the user's connection, but in maintaining high speed data flow reliably from source to the user. Those problems are being worked on, too. During this period of enormous growth, businesses entering the Internet arena scrambled to find economic models that work. Free services supported by advertising shifted some of the direct
costs away from the consumer--temporarily. Services such as Delphi offered free web pages, chat rooms, and message boards for community building. Online sales have grown rapidly for such products as books and music CDs and computers, but the profit margins are slim when price comparisons are so easy, and public trust in online security is still shaky. Business models that have worked well are portal sites, which try to provide everything for everybody, and live auctions AOL's acquisition of Time-Warner was the largest merger in history when it took place and shows the enormous growth of Internet business! The stock market has had a rocky ride, swooping up and down as the new technology companies, the dot coms encountered good news and bad. The decline in advertising income spelled doom for many dot coms, and a major shakeout and search for better business models is underway by the survivors It is becoming more and more clear that many free services will not survive. While many users still expect a free ride, there are fewer and fewer providers who can find a way to provide it The value of the internet and the Web is undeniable. but there is a lot of shaking out to do and management of costs and expectations before it can regain its rapid growth 3.2 Internet Service And Tools 3.2.1 World wide Web(www) The World Wide Web(Www) is the latest development in network technologies for information presentation. It allows people to publish a vast array of information using text documents, pictures, sounds, movies and other types of documents. The documents that are published are placed on a networked computer(the server). People can then use other computers (usually desktop-based Macintosh and PC computers, called clients) to connect to the server and look at the documents that reside there. When a person wants to look at www documents, they have to use a browsing program that knows how to connect to the server and how to display the information that is stored there Two popular browsing programs are Microsoft Internet Explorer and Netscape The greatest innovation of the Web is that it eliminates the need to know the network address of a computer-rather computer addresses are stored as hyper-text links that one can click on with a mouse to move from one document to another. Each of the links can point to documents that are on the same server or on a different one across the world. Thus, getting from a computer here at UCSB to one in Australia or Germany is simply one mouse-click away -no complicated addresses to remember or complex instructions to execute. In addition, the Web allows transparent access to both text documents and binary documents (such as graphics, sound, video and other binary data types). This permits liberal use of pictures and sounds in the information presentations that are created Another advantage of the Web is its ability to recognize a special formatting language called HTML(Hyper-Text Markup Language). This permits fine control of the appearance of document that are sent over the net-thus, authors can use boldfaced or italicized type for emphasis, insert tables in their documents, and place pictures and other graphic elements throughout their acumen Finally, many Web browsers(including Netscape) are capable of communicating via the older network protocols like ftp and gopher as well. Thus, from within a browser like Netscape one can view Web documents, do FTP transfers to your computer, read Net News, send e-mail and look at Gopher sites. all that from one program 3.2.2 Electronic Mail(Email) 1. General Description of Electronic Mail Electronic mail, sometimes called email, is a computer based method of sending messages from one computer user to another. These messages usually consist of individual pieces of text which you can send to another computer user even if the other user is not logged in(i.e using the computer)at the time you send your message. The message can then be read at a later time. This procedure is analogous to sending and receiving a letter Originally, email messages were restricted to simple text, but now many systems can handle more complicated formats, such as graphics and word processed documents. Just as you can send attachments with your letters in the normal post(snail mail) you can also send computer
costs away from the consumer--temporarily. Services such as Delphi offered free web pages, chat rooms, and message boards for community building. Online sales have grown rapidly for such products as books and music CDs and computers, but the profit margins are slim when price comparisons are so easy, and public trust in online security is still shaky. Business models that have worked well are portal sites, which try to provide everything for everybody, and live auctions. AOL's acquisition of Time-Warner was the largest merger in history when it took place and shows the enormous growth of Internet business! The stock market has had a rocky ride, swooping up and down as the new technology companies, the dot.com's encountered good news and bad. The decline in advertising income spelled doom for many dot.coms, and a major shakeout and search for better business models is underway by the survivors. It is becoming more and more clear that many free services will not survive. While many users still expect a free ride, there are fewer and fewer providers who can find a way to provide it. The value of the Internet and the Web is undeniable, but there is a lot of shaking out to do and management of costs and expectations before it can regain its rapid growth. 3.2 Internet Service And Tools 3.2.1 World Wide Web (WWW) The World Wide Web (WWW) is the latest development in network technologies for information presentation. It allows people to publish a vast array of information using text documents, pictures, sounds, movies and other types of documents. The documents that are published are placed on a networked computer (the server). People can then use other computers (usually desktop-based Macintosh and PC computers, called clients) to connect to the server and look at the documents that reside there. When a person wants to look at WWW documents, they have to use a browsing program that knows how to connect to the server and how to display the information that is stored there. Two popular browsing programs are Microsoft Internet Explorer and Netscape. The greatest innovation of the Web is that it eliminates the need to know the network address of a computer - rather, computer addresses are stored as hyper-text links that one can click on with a mouse to move from one document to another. Each of the links can point to documents that are on the same server or on a different one across the world. Thus, getting from a computer here at UCSB to one in Australia or Germany is simply one mouse-click away - no complicated addresses to remember or complex instructions to execute. In addition, the Web allows transparent access to both text documents and binary documents (such as graphics, sound, video and other binary data types). This permits liberal use of pictures and sounds in the information presentations that are created. Another advantage of the Web is its ability to recognize a special formatting language called HTML (Hyper-Text Markup Language). This permits fine control of the appearance of documents that are sent over the net - thus, authors can use boldfaced or italicized type for emphasis, insert tables in their documents, and place pictures and other graphic elements throughout their documents. Finally, many Web browsers (including Netscape) are capable of communicating via the older network protocols like ftp and gopher as well. Thus, from within a browser like Netscape one can view Web documents, do FTP transfers to your computer, read Net News, send e-mail, and look at Gopher sites. All that from one program! 3.2.2 Electronic Mail (Email) 1. General Description of Electronic Mail Electronic mail, sometimes called email, is a computer based method of sending messages from one computer user to another. These messages usually consist of individual pieces of text which you can send to another computer user even if the other user is not logged in (i.e. using the computer) at the time you send your message. The message can then be read at a later time. This procedure is analogous to sending and receiving a letter. Originally, email messages were restricted to simple text, but now many systems can handle more complicated formats, such as graphics and word processed documents. Just as you can send attachments with your letters in the normal post (snail mail) you can also send computer
documents, graphics, software or anything else that can be turned into a digital form attached to an When mail is received on a computer system, it is usually stored in an electronic mailbox fo the recipient to read later. Electronic mailboxes are usually special files on a computer which can be accessed using various commands. Each user normally has their individual mailbox 2. How does it work? In order for messages to be sent from one computer to another, your message needs to be converted into a digital form and forwarded to a computer that acts as a mail server or post office This mail server sorts and directs your mail for you. The only way this mail server can direct mail though, to all users is by being connected to a network that all the users are also connected to This network can be internal(a stand-alone network)which means you can only send email to other users on that network. If your mail server is connected to the Internet you can also send your email messages to any other computer user that is connected to the internet anywhere in the world because the internet is a network of all the little networks of organizations around the world This mail server can be within your organization or with an Internet Service Provider, so you would connect to it by logging into your email account. When you send your email message, the mail server decides whether the message is to be passed on to a user on its immediate network or it will pass it onto another mail server on another network closest to it through these combination of networks and each mail server keeps passing it on until it reaches its intended destination. This is known as thestore and'forward system, storing your message at various points on the path to its receiver waiting for the link to be free for it to forward your message on the next part of its Journey The digital data can be broken up and follow different paths(go through different mail servers)to gets to its destination but always meets up when it gets to the post office or mail server of the recipient. The mail will stay at the post office until the recipient decides to collect it which is done by logging into their email account. 3.2.3 Bulletin Board Systems(BBS) 1. Bulletin Board Systems Bulletin Board Systems(BBS)are self-contained online communities. A BBS is almost like a iniaturized Internet. A BBS has a variety of things for users to do- Read and Write messages in Discussion Forums, Upload and Download files, and Play online games Most BBS systems offer a general perspective-they offer a little bit of everything General amounts of varying topic message forums covering a wide variety of topics and interests--using networks that you will never see on the Internet. Other BBS systems are specialized and follow specific themes such as Genealogy, Sports, Programming, Religion, or just about anything you can imagine. These sy stems usually carry and message forum conferences related to their themes Others might host a large selection of online games for their users to enjoy. Though dwarfed by the amount of software available now found on the Internet, some BBS systems are large repositories of a wide variety of software-and, in some cases- software not found anywhere on he Web As with any community, you will find some systems that appeal to you and others that ma not. After checking out various BBS systems, you will find several you will call"home". Then you will have yet another place to happily waste time having fun with your computer- just like the Web 2. Types of BBS Systems There are generally three types of BBS systems: Dial-Up, Telnet and Web-based Most BBS Systems fall under the first two categories. Once you have connected to a Dial-Up or Telnet BBS system, you will notice things are different from when you are surfing the World Wide Web. The graphics are not of the picture quality you are familiar with on the Web. Another big difference is that on most BBS systems your pointing device(mouse)does not work. Some
documents, graphics, software or anything else that can be turned into a digital form attached to an email message. When mail is received on a computer system, it is usually stored in an electronic mailbox for the recipient to read later. Electronic mailboxes are usually special files on a computer which can be accessed using various commands. Each user normally has their individual mailbox. 2. How does it Work? In order for messages to be sent from one computer to another, your message needs to be converted into a digital form and forwarded to a computer that acts as a mail server or post office. This mail server sorts and directs your mail for you. The only way this mail server can direct mail though, to all users is by being connected to a network that all the users are also connected to. This network can be internal (a stand-alone network) which means you can only send email to other users on that network. If your mail server is connected to the Internet you can also send your email messages to any other computer user that is connected to the internet anywhere in the world because the internet is a network of all the little networks of organizations around the world. This mail server can be within your organization or with an Internet Service Provider, so you would connect to it by logging into your email account. When you send your email message, the mail server decides whether the message is to be passed on to a user on its immediate network or it will pass it onto another mail server on another network closest to it through these combination of networks and each mail server keeps passing it on until it reaches its intended destination. This is known as the 'store' and 'forward' system, storing your message at various points on the path to its receiver waiting for the link to be free for it to forward your message on the next part of its journey. The digital data can be broken up and follow different paths (go through different mail servers) to gets to its destination but always meets up when it gets to the post office or mail server of the recipient. The mail will stay at the post office until the recipient decides to collect it which is done by logging into their email account. 3.2.3 Bulletin Board Systems (BBS) 1. Bulletin Board Systems Bulletin Board Systems (BBS) are self-contained online communities. A BBS is almost like a miniaturized Internet. A BBS has a variety of things for users to do - Read and Write messages in Discussion Forums, Upload and Download files, and Play online games. Most BBS systems offer a general perspective - they offer a little bit of everything. General perspective BBS systems do not have a topical theme. Some are dedicated to bringing in large amounts of varying topic message forums covering a wide variety of topics and interests--using networks that you will never see on the Internet. Other BBS systems are specialized and follow specific themes such as Genealogy, Sports, Programming, Religion, or just about anything you can imagine. These systems usually carry and message forum conferences related to their themes. Others might host a large selection of online games for their users to enjoy. Though dwarfed by the amount of software available now found on the Internet, some BBS systems are large repositories of a wide variety of software - and, in some cases - software not found anywhere on the Web. As with any community, you will find some systems that appeal to you and others that may not. After checking out various BBS systems, you will find several you will call "home". Then you will have yet another place to happily waste time having fun with your computer - just like the Web! 2. Types of BBS Systems There are generally three types of BBS systems: Dial-Up, Telnet and Web-based. Most BBS Systems fall under the first two categories. Once you have connected to a Dial-Up or Telnet BBS system, you will notice things are different from when you are surfing the World Wide Web. The graphics are not of the picture quality you are familiar with on the Web. Another big difference is that on most BBS systems your pointing device (mouse) does not work. Some
BBS users notice these differences and never see all what the bbs was offering. These users have truly missed out BBS software is currently under major re-development Many developers are working towards making their BBS application look and feel just like the Web. Until these applications are ready. the traditional ANSI video graphic interface will just have to do Traditional Dial-Up Based BBS Systems. Until recently, most Bulletin Board Systems used the concept of connecting personal computers together via modems using regular telephone lines. There are still a large number of"dial-up"based BBS systems in use worldwide. Accessing these dial-up BBS systems is different than accessing your dial-up Internet provider. You will need omething known as Terminal Software that allows you to use your computer modem to"call these BBSes via the regular telephone network There are many kinds to choose from Telnet BBS Systems- BBS systems on the Internet. The Internet has added greater accessibility to Bulletin Boards. Instead of having to dial BBSes individually, many systems are now available via the Internet using the Internet protocol called Telnet. Telnet BBS systems allow greater flexibility for the bBs user since they call their Internet Service Provider as usual, then they use special Telnet Client Software to access Bulletin Boards on the Internet. Web-based BBS Systems. New technology is arriving to bring the Bulletin Board System to the Internet with full point-and-click accessibility and full color graphics. These systems are still in their infancy and their numbers are few. as this technology improves you will see more of these systems in 3.2.4 File Transfer Protocol (FTP) 1. An introduction to ftp FTP(File Transfer Protocol) is the Internet standard file transfer program. FTP enables you to transfer nearly any kind of file between most computers connected to the Internet by logging on to a remote computer solely for the purpose of file transfer In current times if you want to transfer a file to a friend, you can just attach it in an email and send it off. With high speed bandwidth being so cheap and plentiful to the home user, transferring a file in this manner is usually more than adequate. What if you needed to transfer the file to someone immediately; there could be no delays, it has to be fast, and the files you are transferring may be very large. In a scenario like this, email will most likely not be dequate. This is because most email providers limit the size of your mailbox on their servers the size of attachments you may receive, and that there is no guarantee when you send email how long it will take for the recipient to receive it or if it will even get there. This is where FTP comes FTP stands for the File transfer protocol and is used to transfer files between an FTP server and another computer. In the past, FTP was much more common than it is today and was the dominant file transfer mechanism on the Internet. If you needed to transfer files between two computers, you would use FTP to do so. FTP is still very popular today when a service requires that a lot of files be hosted for other to people to download. FTP also tends to be faster than other contemporary methods of transferring files because it was designed to do so doiaEven more important, FTP support Automatic Resume. This means that if you are nloading the latest new game demo that is over 600 megs, and for some reason the download stops in the middle of the transfer, the ftp client will attempt to on the next download of the same file, to continue from where you left off. This feature can save you a huge amount of time but is generally only found in specialized FTP client software and not in your browser software 2. How to connect to an FtP server There are two approaches to allowing users to connect to an FTP Server. The first is to make it so anyone can log in anonymously, otherwise known as anonymous FTP, or you can names and passwords to people that they must use to log in to the server The two most common ways to connect to an FTP server is with your Web Browser or with cialized FTP Client. To connect to a FTp server with your browser you would prefix the hostname you are connecting to with the ftp: //protocol statement. For example ftp://www.bleepingcomputer.comItwouldthentrytoconnectanonymouslyIftheserveryou
BBS users notice these differences and never see all what the BBS was offering. These users have truly missed out. BBS software is currently under major re-development. Many developers are working towards making their BBS application look and feel just like the Web. Until these applications are ready, the traditional ANSI video graphic interface will just have to do. ▪ Traditional Dial-Up Based BBS Systems. Until recently, most Bulletin Board Systems used the concept of connecting personal computers together via modems using regular telephone lines. There are still a large number of "dial-up" based BBS systems in use worldwide. Accessing these dial-up BBS systems is different than accessing your dial-up Internet provider. You will need something known as Terminal Software that allows you to use your computer modem to "call" these BBSes via the regular telephone network There are many kinds to choose from. ▪ Telnet BBS Systems - BBS systems on the Internet. The Internet has added greater accessibility to Bulletin Boards. Instead of having to dial BBSes individually, many systems are now available via the Internet using the Internet protocol called Telnet. Telnet BBS systems allow greater flexibility for the BBS user since they call their Internet Service Provider as usual, then they use special Telnet Client Software to access Bulletin Boards on the Internet. ▪ Web-based BBS Systems. New technology is arriving to bring the Bulletin Board System to the Internet with full point-and-click accessibility and full color graphics. These systems are still in their infancy and their numbers are few. As this technology improves you will see more of these systems in use. 3.2.4 File Transfer Protocol (FTP) 1. An Introduction to FTP FTP (File Transfer Protocol) is the Internet standard file transfer program. FTP enables you to transfer nearly any kind of file between most computers connected to the Internet by logging on to a remote computer solely for the purpose of file transfer. In current times if you want to transfer a file to a friend, you can just attach it in an email and send it off. With high speed bandwidth being so cheap and plentiful to the home user, transferring a file in this manner is usually more than adequate. What if you needed to transfer the file to someone immediately; there could be no delays, it has to be fast, and the files you are transferring may be very large. In a scenario like this, email will most likely not be adequate. This is because most email providers limit the size of your mailbox on their servers, the size of attachments you may receive, and that there is no guarantee when you send email how long it will take for the recipient to receive it or if it will even get there. This is where FTP comes in. FTP stands for the File transfer protocol and is used to transfer files between an FTP server and another computer. In the past, FTP was much more common than it is today and was the dominant file transfer mechanism on the Internet. If you needed to transfer files between two computers, you would use FTP to do so. FTP is still very popular today when a service requires that a lot of files be hosted for other to people to download. FTP also tends to be faster than other contemporary methods of transferring files because it was designed to do so. Even more important, FTP support Automatic Resume. This means that if you are downloading the latest new game demo that is over 600 megs, and for some reason the download stops in the middle of the transfer, the ftp client will attempt to on the next download of the same file, to continue from where you left off. This feature can save you a huge amount of time but is generally only found in specialized FTP client software and not in your browser software. 2. How to Connect to an FTP Server There are two approaches to allowing users to connect to an FTP Server. The first is to make it so anyone can log in anonymously, otherwise known as anonymous FTP, or you can assign user names and passwords to people that they must use to log in to the server. The two most common ways to connect to an FTP server is with your Web Browser or with a specialized FTP Client. To connect to a FTP server with your browser you would prefix the hostname you are connecting to with the ftp:// protocol statement. For example, ftp://www.bleepingcomputer.com. It would then try to connect anonymously. If the server you
are trying to connect to requires a username and password, you can do so in the following format ftp//username:password@ftp.somedomain.com It is recommended when you do connect with a username and a password that you do not put the password in as well, otherwise it will show up in your browser's history. Instead do this ftp/username@ftp.somedomain.com This way your browser will prompt you for a password and you do not have to worry about being stored in your history list, which can potentially be a security risk The other method is to use an FTP Client that is designed specifically to connect to FTP servers. These types of software are generally the best as they have been streamlined for speed and support a lot of the advanced features like automatic resume. You should browse through the list of FTP Clients and find one you like 3. How to Transfer Files Whether you are connected to an FTP server via your web browser or an FTP client, you will be presented with a list of folders and documents that have files you can download to your computer. If you are using a web browser, you will click on the file you would like to download and it will prompt you to save it or open it Unless you really know what it is you are downloading, you should save it to a directory that you will know how to find later, and open it from there If you are using an FTP Client, you will be presented a list of the files that you can download. You should first specify where you would like downloads to save to, and then you can double click on the file to start the download. When you are done downloading, you can shut the FTP client and open the file from where it was stored 3.3 TCP/IP In the two decades since their invention, the heterogeneity of networks has expanded further with the deployment of Ethernet, Token Ring, Fiber Distributed Data Interface(FDDD),X2 Frame Relay, Switched Multimegabit Data Service(SMDS), Integrated Services Digital Network (ISDN), and most recently, Asynchronous Transfer Mode(ATM). The Internet protocols are the best proven approach to internetworking this diverse range of LAN and WAN technologigggd e) The Internet protocol suite includes not only lower-level specifications(such as TCP but specifications for such common applications as electronic mail, terminal emulation, and file transfer. Figure I shows some of the more important Internet protocols and their relationship to the OSI Reference Model The Internet protocols are the most widely implemented multivendor protocol suite in use oday. Support for at least part of the Internet protocol suite is available from virtually every computer vendor 3.3.1TCP TCP is a connection-oriented transport protocol that sends data as an unstructured stream of bytes. By using sequence numbers and acknowledgment messages, TCP can provide a sending node with delivery information about packets transmitted to a destination node. Where data has been lost in transit from source to destination, TCP can retransmit the data until either a timeout condition is reached or until successful delivery has been achieved. TCP can also recognize duplicate messages and will discard them appropriately. If the sending computer is transmitting too fast for the receiving computer, TCP can employ flow control mechanisms to slow data transfer. TCP can also communicate delivery information to the upper-layer protocols and applications it supports
are trying to connect to requires a username and password, you can do so in the following format: ftp://username:password@ftp.somedomain.com. It is recommended when you do connect with a username and a password that you do not put the password in as well, otherwise it will show up in your browser's history. Instead do this: ftp://username@ftp.somedomain.com This way your browser will prompt you for a password and you do not have to worry about it being stored in your history list, which can potentially be a security risk. The other method is to use an FTP Client that is designed specifically to connect to FTP servers. These types of software are generally the best as they have been streamlined for speed and support a lot of the advanced features like automatic resume. You should browse through the list of FTP Clients and find one you like. 3. How to Transfer Files Whether you are connected to an FTP server via your web browser or an FTP client, you will be presented with a list of folders and documents that have files you can download to your computer. If you are using a web browser, you will click on the file you would like to download and it will prompt you to save it or open it. Unless you really know what it is you are downloading, you should save it to a directory that you will know how to find later, and open it from there. If you are using an FTP Client, you will be presented a list of the files that you can download. You should first specify where you would like downloads to save to, and then you can double click on the file to start the download. When you are done downloading, you can shut the FTP client and open the file from where it was stored. 3.3 TCP/IP In the two decades since their invention, the heterogeneity of networks has expanded further with the deployment of Ethernet, Token Ring, Fiber Distributed Data Interface (FDDI), X.25, Frame Relay, Switched Multimegabit Data Service (SMDS), Integrated Services Digital Network (ISDN), and most recently, Asynchronous Transfer Mode (ATM). The Internet protocols are the best proven approach to internetworking this diverse range of LAN and WAN technologies. The Internet protocol suite includes not only lower-level specifications (such as TCP and IP), but specifications for such common applications as electronic mail, terminal emulation, and file transfer. Figure 1 shows some of the more important Internet protocols and their relationship to the OSI Reference Model. The Internet protocols are the most widely implemented multivendor protocol suite in use today. Support for at least part of the Internet protocol suite is available from virtually every computer vendor. 3.3.1 TCP TCP is a connection-oriented transport protocol that sends data as an unstructured stream of bytes. By using sequence numbers and acknowledgment messages, TCP can provide a sending node with delivery information about packets transmitted to a destination node. Where data has been lost in transit from source to destination, TCP can retransmit the data until either a timeout condition is reached or until successful delivery has been achieved. TCP can also recognize duplicate messages and will discard them appropriately. If the sending computer is transmitting too fast for the receiving computer, TCP can employ flow control mechanisms to slow data transfer. TCP can also communicate delivery information to the upper-layer protocols and applications it supports
7 DNS, SNMP NetBIOS OSPF IGRP RIP INT, IS-IS StAP MAany Physical Imp lem entation Figure3-1. Relationship of the Internet Protocol Suite to the OSI Reference Model 3.3.2IP IP is the primary layer 3 protocol in the Internet suite. In addition to internet work routing IP provides error reporting and fragmentation and reassembly of information units called datagrams for transmission over networks with different maximum data unit sizes. IP represents the heart of the Internet protocol suite IP addresses are globally unique, 32-bit numbers assigned by the Network Information Center Globally unique addresses permit IP networks any where in the world to communicate with each An IP address is divided into three parts. The first part designates the network address, the second part designates the subnet address, and the third part designates the host address IP addressing supports three different network classes. Class A networks are intended mainly for use with a few very large networks, because they provide only 8 bits for the network address field. Class B networks allocate 16 bits, and Class C networks allocate 24 bits for the network address field. Class C networks only provide 8 bits for the host field, however, so the number of hosts per network may be a limiting factor. In all three cases, the leftmost bit(s)indicate the network class. IP addresses are written in dotted decimal format; for example, 34.0.0.1. Figure 2 shows the address formats for Class A. B. and C IP networks Figure3-2 The address formats for Class A, B, and C IP networks IP networks also can be divided into smaller units called subnet works or "subnets. Subnets
Figure3-1. Relationship of the Internet Protocol Suite to the OSI Reference Model 3.3.2 IP IP is the primary layer 3 protocol in the Internet suite. In addition to internet work routing, IP provides error reporting and fragmentation and reassembly of information units called datagrams for transmission over networks with different maximum data unit sizes. IP represents the heart of the Internet protocol suite. IP addresses are globally unique, 32-bit numbers assigned by the Network Information Center. Globally unique addresses permit IP networks anywhere in the world to communicate with each other. An IP address is divided into three parts. The first part designates the network address, the second part designates the subnet address, and the third part designates the host address. IP addressing supports three different network classes. Class A networks are intended mainly for use with a few very large networks, because they provide only 8 bits for the network address field. Class B networks allocate 16 bits, and Class C networks allocate 24 bits for the network address field. Class C networks only provide 8 bits for the host field, however, so the number of hosts per network may be a limiting factor. In all three cases, the leftmost bit(s) indicate the network class. IP addresses are written in dotted decimal format; for example, 34.0.0.1. Figure 2 shows the address formats for Class A, B, and C IP networks. Figure3-2 The address formats for Class A, B, and C IP networks IP networks also can be divided into smaller units called subnet works or "subnets." Subnets
provide extra flexibility for the network administrator. For example, assume that a network has been assigned a Class a address and all the nodes on the network use a Class a address. Further assume that the dotted decimal representation of this network's address is 340.0.0.(All zeros in the host field of an address specify the entire network The administrator can subdivide the network using sub netting. This is done by"borrowing"bits from the host portion of the address and using them as a subnet field, as depicted in Figure 3 Figure 3-3 The administrator can subdivide the network using sub netting If the network administrator has chosen to use 8 bits of sub netting the second octet of a Class A IP address provides the subnet number. In our example, address 34 1.0.0 refers to network 34. subnet 1: address 34.2.0.0 refers to network 34. subnet 2. and so or The number of bits that can be borrowed for the subnet address varies. To specify how many bits are used and where they are located in the host field, IP provides subnet masks. Subnet masks use the same format and representation technique as IP addresses. Subnet masks have ones in all bits except those that specify the host field For example, the subnet mask that specifies 8 bits of sub netting for Class A address 34.0.0.0 is 255.255.0.0. The subnet mask that specifies 16 bits of sub netting for Class A address 34.0.0.0 is 255.255.255.0. Both of these subnet masks are pictured in Figure 4. Subnet masks can be passed through a network on demand so that new nodes can learn how many bits of sub netting are being used on their network 宁。 3-4 The subnet masks Traditionally, all subnets of the same network number used the same subnet mask. In other words, a network manager would choose an eight-bit mask for all subnets in the network. This
provide extra flexibility for the network administrator. For example, assume that a network has been assigned a Class A address and all the nodes on the network use a Class A address. Further assume that the dotted decimal representation of this network's address is 34.0.0.0. (All zeros in the host field of an address specify the entire network.) The administrator can subdivide the network using sub netting. This is done by "borrowing" bits from the host portion of the address and using them as a subnet field, as depicted in Figure 3. Figure3-3 The administrator can subdivide the network using sub netting If the network administrator has chosen to use 8 bits of sub netting, the second octet of a Class A IP address provides the subnet number. In our example, address 34.1.0.0 refers to network 34, subnet 1; address 34.2.0.0 refers to network 34, subnet 2, and so on. The number of bits that can be borrowed for the subnet address varies. To specify how many bits are used and where they are located in the host field, IP provides subnet masks. Subnet masks use the same format and representation technique as IP addresses. Subnet masks have ones in all bits except those that specify the host field. For example, the subnet mask that specifies 8 bits of sub netting for Class A address 34.0.0.0 is 255.255.0.0. The subnet mask that specifies 16 bits of sub netting for Class A address 34.0.0.0 is 255.255.255.0. Both of these subnet masks are pictured in Figure 4. Subnet masks can be passed through a network on demand so that new nodes can learn how many bits of sub netting are being used on their network. Figure3-4 The subnet masks Traditionally, all subnets of the same network number used the same subnet mask. In other words, a network manager would choose an eight-bit mask for all subnets in the network. This
strategy is easy to manage for both network administrators and routing protocols. However, this practice wastes address space in some networks. Some subnets have many hosts and some have only a few, but each consumes an entire subnet number Serial lines are the most extreme example because each has only two hosts that can be connected via a serial line subnet. As IP subnets have grown, administrators have looked for ways to use their address space more efficiently. One of the techniques that has resulted is called Variable Length Subnet Masks (VLSM). With VLSM, a network administrator can use a long mask on networks with few hosts and a short mask on subnets with many hosts. However, this technique is more complex than making them all one size and addresses must be assigned carefully Of course in order to use VlSM, a network administrator must use a routing protocol that supports it. Cisco routers support VLSM with Open Shortest Path First(OSPF), Integrated Intermediate System to Intermediate System(Integrated IS-IS), Enhanced Interior Gateway Routing Protocol(Enhanced IGRP), and static routing On some media, such as IEEE 802 LANS, IP addresses are dynamically discovered through the use of two other members of the Internet protocol suite: Address Resolution Protocol(ARP) and Reverse Address Resolution Protocol (RARP). ARP uses broadcast messages to determine the hardware (MAC layer) address corresponding to a particular network-layer address. ARP is sufficiently generic to allow use of IP with virtually any type of underlying media access mechanism. RARP uses broadcast messages to determine the network-layer address associated with a particular hardware address. RARP is especially important to diskless nodes, for which network-layer addresses usually are unknown at boot time 3. 4 Domain Name 3. 4.1 What is a Domain Name? Most computers connected to the Internet are identified by a unique number called an IP address(for instance, 234.208 12 129). IP addresses are neither intuitive( they don't correspond to a geographical location) nor easy to remember(you can prove that by glancing away from this page and then trying to quote the example IP address above Before you can send a letter to someone, you need to know his/her mailing address. If you want to visit a website, you also need to know its 'address, which is the domain name. Here are some examples of domain Amazon. com nternic. net Linux. org Yahoo co uk Natalie- Portman ws Domain name is case insensitive, which means Google. com, google. com and gOOgLE. coM are the same. a dot act as a separator in a domain name. The part after the last dot is called the Top Level Domain(TLD). From the examples above, their TLDs are showed in Table3-1 Table3-1 Domain Name and Top Level Domain (TLD) Domain name Top Level Domain(TLD) com Linux. org org Yahoo co uk Domain name registrations for the most seen com,. net,. org are unrestricted and are opened to anyone. They are usually referred to as International TLDs. When the internet started a decade
strategy is easy to manage for both network administrators and routing protocols. However, this practice wastes address space in some networks. Some subnets have many hosts and some have only a few, but each consumes an entire subnet number. Serial lines are the most extreme example, because each has only two hosts that can be connected via a serial line subnet. As IP subnets have grown, administrators have looked for ways to use their address space more efficiently. One of the techniques that has resulted is called Variable Length Subnet Masks (VLSM). With VLSM, a network administrator can use a long mask on networks with few hosts and a short mask on subnets with many hosts. However, this technique is more complex than making them all one size and addresses must be assigned carefully. Of course in order to use VLSM, a network administrator must use a routing protocol that supports it. Cisco routers support VLSM with Open Shortest Path First (OSPF), Integrated Intermediate System to Intermediate System (Integrated IS-IS), Enhanced Interior Gateway Routing Protocol (Enhanced IGRP), and static routing. On some media, such as IEEE 802 LANs, IP addresses are dynamically discovered through the use of two other members of the Internet protocol suite: Address Resolution Protocol (ARP) and Reverse Address Resolution Protocol (RARP). ARP uses broadcast messages to determine the hardware (MAC layer) address corresponding to a particular network-layer address. ARP is sufficiently generic to allow use of IP with virtually any type of underlying media access mechanism. RARP uses broadcast messages to determine the network-layer address associated with a particular hardware address. RARP is especially important to diskless nodes, for which network-layer addresses usually are unknown at boot time. 3.4 Domain Name 3.4.1 What is a Domain Name? Most computers connected to the Internet are identified by a unique number called an IP address (for instance, 234.208.12.129). IP addresses are neither intuitive (they don't correspond to a geographical location) nor easy to remember (you can prove that by glancing away from this page and then trying to quote the example IP address above! Before you can send a letter to someone, you need to know his/her mailing address. If you want to visit a website, you also need to know its 'address', which is the domain name. Here are some examples of domain names: ▪ Google.com ▪ Amazon.com ▪ Internic.net ▪ Linux.org ▪ Yahoo.co.uk ▪ Natalie-Portman.ws Domain name is case insensitive, which means Google.com, google.com and gOOgLE.coM are the same. A dot act as a separator in a domain name. The part after the last dot is called the Top Level Domain (TLD). From the examples above, their TLDs are showed in Table3-1. Table3-1 Domain Name and Top Level Domain (TLD) Domain Name Top Level Domain (TLD) Google.com .com Amazon.com .com Internic.net .net Linux.org .org Yahoo.co.uk .uk Natalie-Portman.ws .ws Domain name registrations for the most seen .com, .net, .org are unrestricted and are opened to anyone. They are usually referred to as International TLDs. When the internet started a decade
ago, it is recommended that companies should use. com, internet service providers should use. net and organizations should g. But today, these rules are no longer engaged and you can egister under any international TLDs you want Other international TLDs include aero (for the air-transport industry ), businesses, coop(for cooperatives),. info(for all uses), museum(for museums individuals), and pro(for professions). But they are not as popular as. com, net and. org. Choose a. com whenever possible! Most internet users are not familiar or even aware of the otherTldS.thEyusuallyassumealldomainnamesendupwith.com Two letter domains, such as. uk(United Kingdom ),ws(Western Samoa)and jp(Japan)are referred as country code Top Level Domains(cc TLDs)and are corresponded to a country, territory, or other geographic location The rules and policies for registering domain names under the CCTLDs vary significantly and some are reserved only for the citizens of the corresponding country. You might notice that for the some ccTLDs such as. uk or. my(Malaysia), the domain name has an extra portion between the name and the ccTLDs. For example, chosenname co uk or chosenname. net. my. These arrangements are also depends on the ruecorresponding country Some small countries such as Western Samoa( ws), Tuvalu( tv)and Belize( bz) have chosen to offer domain registration of their cctld to the public to raise funds for their countries Whenyouregisteradomainnameyoudonotneedtoregisterthe'www.Whenyouowna domain name, you can add whatever you want to the front with a dot as separator, such as www.yoursite.com,ftpyoursite.comdaddyyoursite.commydog.yoursite.cometc.Theyare called sub domains Every different sub domain can be configured to serve different purposes or as different websitesFollowingthetraditionthesubdomainwww.yoursite.comwillbeusedasyourmain website address which is actually an alias to yoursite. com. That means your visitors will see the samewebsitenomattertheyvisitwwwyoursite.comoryoursite.com.Nowadays,peopleusesub domains as the addresses for other websites, such as setting up dog yoursite. com as a website for your dog! 3. 4.2 The value of a domain Name There is a lot of value to a domain name n Branding- By using your own domain name, you are working towards building an image that applies to your business. It is just one of many indicia that people see of the whole package, from business name, domain name, logo, tagline, mission statement, corporate history, to the more involved aspects of the business relationship with customers, vendors, competitors, and others who might interact with the organization n Portability- you can take a domain name with you if you need to move from one server to another or one host to another. IP addresses change, as do server names, if you find yourself on a service that provides a directory or a sub domain for your site instead of a domain name Memorability- a good domain name is easy to remember, and may lead to people not having to look the name up, or search for it amongst bookmarks or favorites Credibility -a domain name is more credible than just an IP address, or a directory or sub domain that includes the name of an isp or shared host Type-in traffi he domain names have value in that people will just type the address in abrowserwithoutknowingwhatmightbeontheothersidesuchassexcomorbusiness.com Matching Offline Branding-branding efforts offline can be reflected on the web by the use of a well known business name or product name, or some other distinction about a business This is true enough that a well known company will fight others under a trademark theory to take over a domain name that is in commercial use, or that is held by someone only with the intent of lling it to th The appropriate tld- Chances are that if you are a commercial business that operates in a global environment, a name that uses the com ending may be the most attractive choice for your business. Or, if you are a nonprofit, you would prefer one that ends with a org If you want to focus upon business in a country where local business is important, and search engines dont question your place of origin and business, a country specific two-letter tld may be of more value The tld used in the domain name can be part of the value of a domain name by indicating what type of organization the site is, or where it is located
ago, it is recommended that companies should use .com, internet service providers should use .net and organizations should use .org. But today, these rules are no longer engaged and you can register under any international TLDs you want. Other international TLDs include .aero (for the air-transport industry), .biz (for businesses), .coop (for cooperatives), .info (for all uses), .museum (for museums), .name (for individuals), and .pro (for professions). But they are not as popular as .com, .net and .org. Choose a .com whenever possible! Most internet users are not familiar or even aware of the other TLDs. They usually assume all domain names end up with .com. Two letter domains, such as .uk (United Kingdom), .ws (Western Samoa) and .jp (Japan) are referred as country code Top Level Domains (ccTLDs) and are corresponded to a country, territory, or other geographic location. The rules and policies for registering domain names under the ccTLDs vary significantly and some are reserved only for the citizens of the corresponding country. You might notice that for the some ccTLDs such as .uk or .my (Malaysia), the domain name has an extra portion between the name and the ccTLDs. For example, chosenname.co.uk or chosenname.net.my. These arrangements are also depends on the ruecorresponding country. Some small countries such as Western Samoa (.ws), Tuvalu (.tv) and Belize (.bz) have chosen to offer domain registration of their ccTLD to the public to raise funds for their countries. When you register a domain name, you do not need to register the 'www'. When you own a domain name, you can add whatever you want to the front with a dot as separator, such as www.yoursite.com, ftp.yoursite.com, daddy.yoursite.com, mydog.yoursite.com, etc. They are called sub domains. Every different sub domain can be configured to serve different purposes or as different websites. Following the tradition, the sub domain www.yoursite.com will be used as your main website address which is actually an alias to yoursite.com. That means your visitors will see the same website no matter they visit www.yoursite.com or yoursite.com. Nowadays, people use sub domains as the addresses for other websites, such as setting up dog.yoursite.com as a website for your dog! 3.4.2 The Value of a Domain Name There is a lot of value to a domain name. ▪ Branding - By using your own domain name, you are working towards building an image that applies to your business. It is just one of many indicia that people see of the whole package, from business name, domain name, logo, tagline, mission statement, corporate history, to the more involved aspects of the business relationship with customers, vendors, competitors, and others who might interact with the organization. ▪ Portability - you can take a domain name with you if you need to move from one server to another or one host to another. IP addresses change, as do server names, if you find yourself on a service that provides a directory or a sub domain for your site instead of a domain name. ▪ Memorability - a good domain name is easy to remember, and may lead to people not having to look the name up, or search for it amongst bookmarks or favorites. ▪ Credibility - a domain name is more credible than just an IP address, or a directory or sub domain that includes the name of an ISP or shared host. ▪ Type-in traffic - some domain names have value in that people will just type the address in a browser without knowing what might be on the other side, such as sex.com, or business.com. ▪ Matching Offline Branding - branding efforts offline can be reflected on the web by the use of a well known business name or product name, or some other distinction about a business. This is true enough that a well known company will fight others under a trademark theory to take over a domain name that is in commercial use, or that is held by someone only with the intent of selling it to the trademark owner. ▪ The appropriate tld - Chances are that if you are a commercial business that operates in a global environment, a name that uses the .com ending may be the most attractive choice for your business. Or, if you are a nonprofit, you would prefer one that ends with a .org. If you want to focus upon business in a country where local business is important, and search engines don't question your place of origin and business, a country specific two-letter tld may be of more value. The tld used in the domain name can be part of the value of a domain name by indicating what type of organization the site is, or where it is located