You are on page 1of 24

A study on Internet Browsing center

Table of Contents

Chapter Title

Acknowledgements

List of Tables

List of Charts

I Purpose of the Study

Product Profile

II Objectives

Methodology

Scope of the Study

Limitations

III Analysis

IV Findings

Suggestions

Bibliography

Questionnaire

List of Tables

1) Profession Vs Awareness
2) Profession Vs Time spent
3) Profession Vs Frequency
4) Profession Vs Amount
5) Profession Vs Purpose
6) Profession Vs Facilities
7) Profession Vs Problems
8) Browsing Centre Vs No. of systems available
9) Browsing Centre Vs No. of Users
10) Browsing Centre Vs Time spent
11) Browsing Centre Vs Browsing Charge
12) Browsing Centre Vs Facilities available
13) Internet user Vs Purpose of browsing
14) Browsing centre Vs Account Type
15) Browsing centre Vs Best ISP
16) Benefits of Internet over other communication media

List of Charts

1) Profession Vs Awareness
2) Profession Vs Time spent
3) Profession Vs Frequency
4) Profession Vs Amount
5) Profession Vs Purpose
6) Profession Vs Facilities
7) Profession Vs Problems
8) Browsing Centre Vs No. of systems available
9) Browsing Centre Vs No. of Users
10) Browsing Centre Vs Time spent
11) Browsing Centre Vs Browsing Charge
12) Browsing Centre Vs Facilities available
13) Internet user Vs Purpose of browsing
14) Browsing centre Vs Account Type
15) Browsing centre Vs Best ISP
16) Benefits of Internet over other communication media

Purpose of the Study

Internet which was almost non-existent during 1960 s has now shown tremendous strides that no
other can match to its development, growth and performance. The large part of stories of success in the
internet over longer periods is always based on emerging technology in hardware and software
business.

The immense growth of information and technology within a short expense of time has
prompted many to utilize it as a medium of communication. This idea has now been put into pragmatic
usage by means of Internet. Internet can be considered as millions of people constantly communicating
about every topic under the sun.

The process of accessing information on Internet is called Browsing the web. The web has
become the easy medium to project different products to end users in a fast, effective and economical
means.
Due to the immense growth of business in the Internet, study on Internet Browsing centre was
taken for a report study under the motive of finding the awareness, time and frequency spent in
Browsing centers.

Product Profile

Contents

☯ Introduction
☯ Origin of Internet
☯ About Networks
☯ Connecting to Internet
☯ Cost of Internet implementation
☯ E-Mail program
☯ E-Mail address
☯ Pseudo Internet Address
☯ Domain Names Allotment
☯ World wide web
☯ Linking of documents in www
☯ Uniform resource locator
☯ Websites
☯ Major categories of websites over internet
☯ Browsing the web
☯ Starting the browser
☯ Getting and viewing the document
☯ Browser operations
☯ Searching for information
☯ Internet access tools – Gopher
☯ Usenet
☯ telnet
☯ Archie
☯ wais
☯ TCP/IP
☯ FTP
☯ Veronica

Introduction
The immense growth of information and technology within a short expanse of time has
prompted many to utilize it as a medium communication. This idea has now been put into pragmatic
usage by means of internet. The internet also called as the net, is the world’s largest networks
connected together in such a way that data can be transmitted back and any other individual data
network with equal ease. Internet can be considered as millions of people constantly communication
about every topic under the sun.

The internet is similar to peer-to-peer connectivity. The net delivers data from one place to
another. It provides interesting services like E-Mail, file retrieval and other internet tools. Several
computers all over the world are networked together. Unlike other communications, internet provides
easy access to all. We can share data, ideas without any discretion to age, creed and country. Internet is
also a source of software. A new services or software can be downloaded within a few minutes. We can
write internet applications that are compatible with all internet software. The windows internet
software available are Mosaic, Gopher, Eudora and Trumpet. The net is expanding fast providing new
resources.

Origin of Internet

ARPANET (Advanced Research Projects Administration NET) is the ancestor of the internet. The
ARPA agency is called DARPA (D stands for Defense).

National Science Foundation

Unable to use the ARPANE, the NSF built its own NSFNET. This NSFNET was connected to the
regional network which in turn was connected to user in different regions. The NSFNET in the United
States provides services for education and research only. The other services can be controlled by
Commercial IP (Internet Protocols) services. These commercial services connected to the regional
networks and provide direct connection. The first international IP network connections were established
in 1973 between England and Norway. The term Internet First appeared in 1982 with DARPA’s launch of
the Internet Protocol (IP).

About Networks

A Network is a set of computers inter connected by transmission paths to exchange information.


In computer networks, a particular message or information is routed to a particular computer only.
Networks are two way in communications. For example, if computer 1 is sendinding message to
computer 2, then the computer 2 can send a reply to computer. A computer network varies depending
on the topology.

A Network Topology is the represent of physical connectivity of the computers. The most
common network topologies are:

☯ Hierarchical
☯ Horizontal
☯ Star
☯ Ring

Internet comprises several thousands of data networks. It is possible to go from any networks to
any other either directly over a direct inter connection or by traversing over another network or
networks till one reaches a network that has direct connection to the destination network.

Data Network
Data Network
2
4

Data Network

Data Network
Data Network
3
5

The internet Concept

The diagram explains that if data is to be sent from data network 1 to Data network 4, it may
either be sent directly over the direct inter connecting link between Networks 1 and 2, or if the same is
out of service, through Data network 2 via 1-2-4 route, or if the interconnecting data link between
Networks 2 and 4 is broken, via the route 1-2-3-4, or in case the Network 2 is out of bounds, via 1-3-4
route.

Definition of Internet

Internet is defines as

☯ A collection of a large number data networks connected together.


☯ A collection of computers, routers, LANs and WANs.
The largest Network using TCP/IP protocol.

☯ The fastest growing network of networks and


☯ The biggest electronic reservoir of information.

Connecting to Internet

The data is transmitted in the form of digital signals. These signals are analog transmission. The
process is called modulation. The process of transforming the analog signal into digital representation at
the receiving end is called demodulation. Thus the modification of frequency to carry data is called
modulation. The device used for this purpose is called a modem.

Internet connectivity is handled by the so called internet service providers or ISPs. ISPs register
themselves with Inter NIC and obtain rights to allot internet addresses to their customers. Besides the
access code they also acquire connectivity to some “Internet Access Points “. The ISPs establish an
Internet Gateway (IG) and connect it to an Internet Access Point (IAP) which is usually with a large
international carrier like MCI or Sprint. Vides Sanchar Nigam Limited, the international carrier of India,
and the department of Telecommunication (DOT) are the two ISPs in India.

There are five type of connectivity’s. They are

☯ Dial-up Connectivity.
☯ Lease line connectivity.
☯ Internet Access Point.
☯ Internet Gate Way.
☯ Internet Service Provider.

These five kinds of connectivity’s can be viewed in two groups- one group that is directly
connected to the ISP and the other group that is connected through another network. The group that is
directly connected to the ISP are sort of direct customers on the Net where as the group that is
connected through an interim network are members of another data network which may either be
Packet Switched Public Data Network (PSPDN) or Integrated Service Digital Network (ISDN) and in that
sense are indirect customers of Net.

Various Types of Connectivity’s to Internet shell account connectivity allows only text-based
access on host of the ISP. In shell account the computer terminal or the user’s PC works like a dumb
terminal connected to the host.

TCP/IP connectivity permits direct connection of the user computer to the Net. Thus all user
operations per for min this connectivity result in download of information directly on user’s PC. TCP/IP
account permits full graphics based access.

How to get an Internet Account


One should look reasonably priced Internet access and which has the reputation of possessing
adequate internet host facilities like sufficient number of dial-up ports and strong international telecom
backbone to internet access times and service obtained by the user is satisfactory. The next step is to
estimate your requirement of Internet access.

Internet accounts got are prone to, misuse. There is, therefore, a need to guard yours password
carefully. Besides taking other measures like selecting a combination of alphabetic and numeric
characters for password, you should change your password frequently so as to avoid its tracking on the
net.

Cost of internet implementation

The cost of the internet access depends on the type, flexibility and speed of the connection. The
cost factor is mainly influenced by the type of connection chosen by the user. The two factors that
determine the cost of an internet connection are.

☯ The cost of the connection to the access provider


☯ The cost of the telephone line.

Win socks

Win socks is expanded as Windows Sockets. It is a set of function for the Windows internet
application. The design of this internet package is based on the UNIX package (Sockets) and hence it is
called as windows sockets.

Terminal Emulation Software

Terminal Emulation Software usually comes with the computer or with the modem. When we
connect to the Net through a host, terminal emulation software is used. This software enables our
computer to act as a terminal.

Free Nets

Free Nets are a kind of local connectivity computer system or free computing systems. This
system usually has a link to the Net. They provide local community information and limited access to the
Telnet. They provide local community information and limited access to the Telnet and FTP (File Transfer
Protocol).

E-Mail

Introduction

Electronic Mail, sometimes called email, is a computer based method of sending messages from one
computer user to another. These messages usually consist of individual pieces of text which you can
send to another computer user even if the other user is not logged in (i.e. using the computer) at the
time you send your message. The message can then be read at a later time. This procedure is analogous
to sending and receiving a letter.
Originally, email messages were restricted to simple text, but now many systems can handle more
complicated formats, such as graphics and word processed documents.

When mail is received on a computer system, it is usually stored in an electronic mailbox for the
recipient to read later. Electronic mailboxes are usually special files on a computer which can be
accessed using various commands. Each user normally has their individual mailbox.

It is straightforward to send electronic mail between users of different computer systems which are
connected to major networks. Most major academic and research institutions and companies
throughout the world can now be reached by electronic mail. In addition, a growing number of
individuals can be contacted in this way. In the UK, most academic and research institutions are linked
by a network called JANET (or Super JANET). This is effectively part of the Internet, so email can be
exchanged with most national and international networks.

E-Mail Program

Mozilla Thunderbird

It is an e-mail and news cross-platform client software package by Mozilla Foundation. Thunderbird can
manage multiple e-mail, newsgroup and RSS accounts and supports multiple identities within accounts.
Features like quick search, saved search folders , advanced message filtering, message grouping, and
labels help manage and find messages. Just like Firefox, the tons of extensions and themes for this client
makes it very secure and flexible to to enhance your productivity.
Claws Mail
Claws Mail is a free, GTK+-based, open source email and news client. It is very light
lightweight. Like Firefox , the wide variety of plug-ins for this email client makes it very flexible
and secure. Claws Mail runs on Windows, Mac OS X and Unix-like systems such as Linux,
BSD, and Solaris.
Spicebird
Update: Ed - 23/June/2010 ~ Spicebird client is no longer supported on Mac OS X. We will
replace this email client with another supported product shortly.

Spicebird is a collaboration client that provides integrated access to email, contacts, calendaring
and instant messaging in a single application. It provides easy access to various web services
while retaining all the advantages of a desktop application. It is developed by an Indian company
called Synovel. It is a free, open source and cross-platform software.
Sylpheed
Sylpheed is a free, GTK+-based, open source email and news client. It is very light lightweight.
Sylpheed runs on Windows, Mac OS X and Unix-like systems such as Linux, and BSD.
E-Mail Address

Email addresses (both for senders and recipients) are two strings separated by the character "@" (the
"at sign"):

user@domain

The right-hand part describes the domain name involved, and the left-hand part refers to the user who
belongs to that domain. One or more mail servers (MX records in the Domain Name System) correspond
to each domain.

An email address can be up to 255 characters long and can include the following characters:

Lowercase letters from a to z;

Digits

The characters ".","_" and "-" (full stop, underscore, and hyphen)
In practice, an email address often looks something like this:

firstname.lastname@provider.domain

.com Commercial Organizations

.edu Educational Institutions

.net Networking Organizations

.gov US Government Sites

.mil Military Sites

.org Other Organizations

PSEUDO Internet Address

This address is given to the systems that do not have permanent connections to the Net. The
address looks similar to the standard internet address.

Domain Names Allotment

The top level Domains go with the type or organization intending to go up on the net. The
registration of second level domain names is co-ordinated by the inter NIC registry under the authority
of the Internet Assigned Numbers Authority (IANA), allocates blocks of IP address space to ISPs so that
they can allot the same name to their customer. The domain names are registered and maintained at a
nominal fee.

Domain Name System (DNS)

he Domain Name System (DNS) is a hierarchical naming system built on a distributed database
for computers, services, or any resource connected to the Internet or a private network. It
associates various information with domain names assigned to each of the participating entities.
Most importantly, it translates domain names meaningful to humans into the numerical
identifiers associated with networking equipment for the purpose of locating and addressing
these devices worldwide.

An often-used analogy to explain the Domain Name System is that it serves as the phone book
for the Internet by translating human-friendly computer hostnames into IP addresses. For
example, the domain name www.example.com translates to the addresses 192.0.32.10 (IPv4) and
2620:0:2d0:200::10 (IPv6).

The Domain Name System makes it possible to assign domain names to groups of Internet
resources and users in a meaningful way, independent of each entity's physical location. Because
of this, World Wide Web (WWW) hyperlinks and Internet contact information can remain
consistent and constant even if the current Internet routing arrangements change or the
participant uses a mobile device. Internet domain names are easier to remember than IP
addresses such as 208.77.188.166 (IPv4) or 2001:db8:1f70::999:de8:7648:6e8 (IPv6).
Users take advantage of this when they recite meaningful Uniform Resource Locators (URLs)
and e-mail addresses without having to know how the computer actually locates them.

The Domain Name System distributes the responsibility of assigning domain names and
mapping those names to IP addresses by designating authoritative name servers for each domain.
Authoritative name servers are assigned to be responsible for their particular domains, and in
turn can assign other authoritative name servers for their sub-domains. This mechanism has
made the DNS distributed and fault tolerant and has helped avoid the need for a single central
register to be continually consulted and updated.

In general, the Domain Name System also stores other types of information, such as the list of
mail servers that accept email for a given Internet domain. By providing a worldwide, distributed
keyword-based redirection service, the Domain Name System is an essential component of the
functionality of the Internet.

Other identifiers such as RFID tags, UPC codes, International characters in email addresses and
host names, and a variety of other identifiers could all potentially utilize DNS.[1]

The Domain Name System also defines the technical underpinnings of the functionality of this
database service. For this purpose it defines the DNS protocol, a detailed specification of the data
structures and communication exchanges used in DNS, as part of the Internet Protocol Suite.

Using E-Mail

Using Email Effectively


Email is an effective means of communication for business and personal use but it also has some
disadvantages.

Firstly, the advantages are;

1. Email is effective in providing quick answers to yes and no, type questions. eg. Do you
do international delivery?
2. Email is effective in finding the right person in an organisation or company to answer
your question.
3. Email is good to make appointments for busy people.
4. Email can distribute information quickly to many people for the time it takes to email one
person.

The disadvantages are;

1. Email can become timeconsuming for answering complicated questions and


misunderstandings can arise because cultural differences in the interpretation of certain
words. The telephone, is much better for providing detailed answers or if you feel that the
question is not absolutely clear.
2. Email can compromise the security of an organisation because sensitive information can
be easily distributed accidently or deliberately. Email should be entrusted to well trained
and trusted staff members.
3. Email can become impersonal or misunderstood.
4. The use of pronouns can lead to serious misunderstandings. Users should always try to
write the full description rather than abbreviate their sentences with pronouns.

Using business email

More and more individuals are receiving more emails than they can digest and because it is
physically more difficult to read on a computer screen, email writing is different from other
styles of letter writing.

In business it is important that emails do not become so burdensome, that more time is spent
answering email that doing work. Emails must be prioritized, and accurate subject lines chosen.
Skimming emails is common, so make sure that the major point in your email is handled first.
Make a decision whether it is best to divide the email into multiple emails with different subject
lines, because this is often easier and quickier to reply to and also because many people will read
one point in the email and totally miss another point.

Email security

Do not open an attachment or click on a link in an email from someone you don't know. If the
content of the email looks suspicious, but it is from someone you know - don't open until you
clarify it with the sender first. Trust your intuition or you may end up infected with a computer
virus.

Most honest people do not realize that email addresses are easily forged. This is because the
domain name system does not do a DNS check with the registrar of the domain, when email is
sent. So, even if you get an email appearing to be from a bank or person you know, if it looks
suspicious, email them and if they reply to the email, you know that they really did send the
email.

The Sender Policy Framework (SPF) is an attempt to control forged emails by editing the zone
file of a domain name, but since only a small number of domain name registrants enter the SPF
records into their zone file and not all mail servers subscribe to that policy, the policy is itself, a
work in progress.  Banks and hosting companies, increasingly request users to login, to send
secure mail because they cannot be certain that an email address is not being forged.

Lastly, never open attachments of forwarded emails that are offered for inspiration or
amusement. Among friendship groups emails may be forwarded that seem funny. The first
person in the loop may have been sent a message that they believed was from someone they
knew and this person becomes an innocent distributer of malware. Malware is malicious code
that is designed to steal confidential information. eg. login details to internet banking.
Use of Mailing Lists

Email is a highly effective medium of communication but a wise company needs to treat the
recipient like a person not a number on a mailing list. Email needs to be personal or else it is
regarded as SPAM and sent off to the recycling bin or blocked by the customer.

SPAM is unsolicited mail. Because it is easy and inexpensive to send email, it is also easy and
inexpensive to send junk email.

Just because a person joins your mailing list does not necessarily mean that he or she wants to be
bombarded with useless information or made feel as you are using the mailing list purely for
profit.

Email can look really impressive by adopting a brochure format, but unless the pictures are there
for a reason and the email engages the reader by providing useful information, then it is better to
send a text based email. If you need to display products, then a link inside an email to the page
on your web site where the product is displayed is in my opinion a better option. This leads the
person back to your web site. An email formatted like a brochure is uninviting because it
resembles advertising but by providing a link, you are giving the customer a choice to view your
product. This empowerment is the difference between informative email and advertising.
Informative email is inviting, email that resembles advertising is pushy.

Email needs to tread the line of being personal yet business like. It is a way of building good
customer relationships.

Email used well can make people feel as though they matter.

Relationships are the key to any business and it can make for a rewarding experience.

If the desire is to serve the customer, you will certainly be well in front of your competition by
responding to every email, promptly and politely.

See Using Mailing Lists for more information

World Wide Web

Introduction

The World Wide Web, abbreviated as WWW and commonly known as the Web, is a system of
interlinked hypertext documents accessed via the Internet. With a web browser, one can view
web pages that may contain text, images, videos, and other multimedia and navigate between
them by using hyperlinks. Using concepts from earlier hypertext systems, English engineer and
computer scientist Sir Tim Berners-Lee, now the Director of the World Wide Web Consortium,
wrote a proposal in March 1989 for what would eventually become the World Wide Web.[1] At
CERN in Geneva, Switzerland, Berners-Lee and Belgian computer scientist Robert Cailliau
proposed in 1990 to use "HyperText [...] to link and access information of various kinds as a web
of nodes in which the user can browse at will",[2] and publicly introduced the project in
December.[3]

"The World-Wide Web (W3) was developed to be a pool of human knowledge, and human
culture, which would allow collaborators in remote sites to share their ideas and all aspects of a
common project."

What is WWW?

The terms Internet and World Wide Web are often used in every-day speech without much
distinction. However, the Internet and the World Wide Web are not one and the same. The
Internet is a global system of interconnected computer networks. In contrast, the Web is one of
the services that runs on the Internet. It is a collection of interconnected documents and other
resources, linked by hyperlinks and URLs. In short, the Web is an application running on the
Internet.[21] Viewing a web page on the World Wide Web normally begins either by typing the
URL of the page into a web browser, or by following a hyperlink to that page or resource. The
web browser then initiates a series of communication messages, behind the scenes, in order to
fetch and display it.

First, the server-name portion of the URL is resolved into an IP address using the global,
distributed Internet database known as the Domain Name System (DNS). This IP address is
necessary to contact the Web server. The browser then requests the resource by sending an
HTTP request to the Web server at that particular address. In the case of a typical web page, the
HTML text of the page is requested first and parsed immediately by the web browser, which then
makes additional requests for images and any other files that complete the page image. Statistics
measuring a website's popularity are usually based either on the number of page views or
associated server 'hits' (file requests) that take place.

While receiving these files from the web server, browsers may progressively render the page
onto the screen as specified by its HTML, Cascading Style Sheets (CSS), or other page
composition languages. Any images and other resources are incorporated to produce the on-
screen web page that the user sees. Most web pages contain hyperlinks to other related pages and
perhaps to downloadable files, source documents, definitions and other web resources. Such a
collection of useful, related resources, interconnected via hypertext links is dubbed a web of
information. Publication on the Internet created what Tim Berners-Lee first called the
WorldWideWeb (in its original CamelCase, which was subsequently discarded) in November
1990

Linking of documents in WWW

Over time, many web resources pointed to by hyperlinks disappear, relocate, or are replaced with
different content. This makes hyperlinks obsolete, a phenomenon referred to in some circles as link rot
and the hyperlinks affected by it are often called dead links. The ephemeral nature of the Web has
prompted many efforts to archive web sites. The Internet Archive, active since 1996, is one of the best-
known efforts.

Any one website

☯ Yahoo

☯ Google
Uniform Resource Locator (URL)

HTTP Hyper Text Transfer Protocol

GOPHER A gopher menu

FTP FTP (File Transfer Protocol) Server

NEWS A UseNet News Item

Websites- A Versatile means of information Dissemination

Websites contain enormous information spread over several levels, each with varying degrees of
detail. The manner of information of dissemination, the rate of refreshment of information and the
depth of information handled are far more advanced in websites is so vast and deep that it has become
impossible to think of internet without the web. Websites are easier to create and equally easier to
update. A regular Net surfer would notice how quickly the data on websites is updated. Not only the text
but also the graphics are refreshed with great regularity. This availability of latest data facilitates better
and faster decision making by targeted group.

Websites are easier to create and have the ability to refresh information quickly, all at a small
cost. Websites are a facilitator of market research. Website owner can collect a number of statistics
from their sites which can be used by them to fine. Tune their production and marketing activities.
Websites are a multi-dimensional tool for mass communication and information dissemination.
Major Categories of websites over Internet

Almost all walks of life are represented on internet. The major site holders are educational
institutions, research laboratories and libraries; corporate houses and business organizations; tourism-
related business; and the entertainment industry.

Browsing

Browsing the web

Starting the Browser

Google.com

Getting and viewing the Document

After the document has been invoked, it takes some time before it is displayed on the PC screen.
This time is taken by the PC is sending a request to the website containing the addressed document and
waiting for its response. The time taken to fetch the document depends upon the relative congestion in
the inter connecting telecommunication lines. The congestion may also occur at the accessed website
due to a large number of simultaneous enquiries. Whatever be the time taken to fetch the invoke
information, the browser keeps the user informed about the goings on the Net, so that one does not
experience the feeling of being “lost” on the Net!.

The extent of information downloaded from the Net is displayed continuously in the bottom
most line of the display. This line displays several messages like “Connecting…” or “Waiting for reply” or
“document done” etc. The quantum of document received at any instant is also continuously displayed.
If a document is particular received, the percentage of the document received is displayed in the same
window. The extent of document downloaded is continuously updated with the same speed as the
receipt of the document. The same is also displayed graphically in the small window in the right- most
bottom of the screen by a gradually growing horizontal bar which fills the window completely.

Most sites contain documents that do not fit into one PC screen. Therefore there is a
requirement to move downloaded document in upwards and downwards directions. These tasks are
performed by the scrolling tabs located in the right margin of yahoo search site. By ‘Clicking’ on up
marked tab, one can see the upper portion of the document, i.e., the document scrolls down and
‘Clicking’ on the down arrow marked tab displays the lower part of the document meaning there by that
the document scrolls up. Different documents have different lengths. While some documents may fit in
one A4 size page, others may require several such pages. There is a sliding tab to indicate the amount of
information already perused or scrolled up and that yes to be seen or still to be displayed on the PC
screen the sliding tab positions itself right below the ‘up’ arrow marked tab after receipt of the home
page from a site. The in between position of the sliding tab in the sliding window is an indication of the
quantum of information still to be displayed on the screen.
Browser operations

Searching for information

Browsing Centers in Madurai

The Net resolution has caught up with the business as well as the general public, with more and
more dot com companies creating BB and BC portals in the web

The web has become the easy medium to project different products to end-users in a fast,
effective and economical means. And the consumer finds himself in a better position to buy quality
products from a wide variety of products than be used before.

Browsing centers are the fastest nodes, which provide internet access for end users, who wish
to purchase some commodity, or some vital information, as in student community. The browsing
centers provide a cheaper alternative for the Net user compacted to the capital investment in terms of
Hardware/Software to be incurred by individuals.

The Browsing centers at Madurai have tremendous potential, considering the hectic business
activity in Madurai and existence of numerous educational institutions in and around Madurai. The
objective of this project is to study, the frequency of usage, time and amount ready to spend at the
Browsing Centers by the net users of Madurai.

Internet Access Tools

Introduction

Gopher

UseNet

Telnet

TCP/IP
FTP

Anonymous FTP

ARCHIE

Archie is a program or a tool helps in locating a file anywhere on the net. Archie server exists all
over the worlds and we should select the one that is closer to us. This will help in minimizing the traffic
on the Net. We can access the archive servers in different ways as below.

☯ Use Archie client server.


☯ Telnet to an Archie server
☯ E-Mail the request to Archie

VERONICA

Veronica is a search tool that facilitates searching for information over gopher space by the
more user friendly mechanism of ‘Keywords’ based search instead of menu-by-menu access provided by
gopher. Veronica searches for the desired information through thousands of gopher sites, locates
directories and sub-directories containing the desired keywords, fetches them and places them in a
temporary gopher menu for easy retrieval by the user. The conventional gopher access manner.

WAIS

WAIS stands for Wide Area Information Server. It is a search tool that searches for information
stored on computers running WAIS software. WAIS also searches for information by using keywords. It is
a distributed text- searching system. It works on the basis of identification of keywords embedded in
each document. When the user wants information on a particular topic, it enters the corresponding
keywords. WAIS then searches through databases accessible by it and matches the keywords with those
contained on the documents and identifies them for user’s perusal.

Objectives

☯ To find the awareness of internet among students, employees and individuals.


☯ To find the purpose of using internet.
☯ To find the frequency, time and cost spent for internet.
☯ To find the advantages of using Internet over other communication media.
☯ To find out the facilities available at browsing centers.
☯ To find out the best Internet Service Provider (ISP).

Methodology
The moral “Method “indicates the mode of accomplishing an end only through methodical and
systematic procedure. If one has to think of accurate and clear-cut conclusions, there is no discipline
without a method. The methodology adopted in this study is discussed in brief below.

Research type

The research type adopted in this study is marketing research.

Data Collection

The convenience sampling method is adopted for data collection.

Sample plan

The total number of sample was taken to be for browsing centre and of
users. The samples were classified under status as student, employees and individuals.

Sample Element

The main sample elements were browsing centers and the users.

Nature of Data

Only primary data were used in the research.

Scope

Scope of the Study

The study was basically focused on the internet browsing centers. The study gives an idea of
how far students, employees and individuals are aware of internet. The study also gives an idea about
the purpose of using internet and also the Time, Frequency, Cost they are able to spend for internet. The
study also focuses on the advantages of internet over other communication media.

Limitations.

☯ The report study was limited to only Madurai city.


☯ Since Madurai is a semi urban city, the conclusions obtained cannot be generalized.
☯ The sample distribution was found to be uneven, i.e.,
Education =
Friends =
Advertising Media =

To send E-Mail =
For Chatting =
For Job Search =
For Information Collection =
Analysis

The study is basically oriented towards the samples, classified based on profession, browsing
center, internet users and communication media.

The analysis part of the study involves the percentage calculations. Various factor like
Awareness, Time Spent, Frequency, Charge, Facilities, Purpose and Problems were compared with
profession, Browsing center, Internet users and communication media.

The sample size taken for analysis was for Browsing centers and for Internet users. It
was classified based on profession. The number of samples containing students was calculated as
and Non Student i.e. Individuals, Employees etc as .

From the students sample the awareness through Education was calculated to be %
through friend’s %, through advertising media %.

A similar calculation was done with Non Students and the result was found to be % for
education, % for friends, % for advertising media.

The results thus obtained were tabulated under relative heads and the values were represented
graphically using charts like vertical bar.

You might also like