Targeting Strategies Involved in E-marketing

Once the variables that form a lucrative cluster of customer base for the product is identified, advertising campaigns are decided to target those customers. The E-marketer arrives at the second stumbling block here “portals”. Portals have the most popular URLs on the web today. They claim to be a one-stop solution for anything and everything that the netizen looks for. For the netizen it means less URLs to remember and a place to meet people & socialize. It could have, in most probability, also been the place of a successful electronic transaction before, quelling his/her security concerns. Although portals deny their comparison with the supermarkets of the real world, they are doing just that right now.… Read the rest

What is a Proxy Server?

Proxy severs have been around for quite a while now. Most likely, the history of proxy servers dates back to the beginnings of networking and the internet itself. Proxy servers were originally developed as a tool for caching frequently accessed Web pages. A proxy server is a server that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. It may filter traffic by Internet Protocol (IP) address or protocol.

Read the rest

Proxy and Reverse Proxy Servers

Proxy Server

Proxy server is a computer system or application which works as an intermediary for clients searching resources which exist on other servers. It allows different users to access the internet at the same time on a single Internet connection.  It aims to improve the speed of surfing the internet and reducing network traffic. It receives requests from a web user such as a web page or a file available on a different server, then it evaluates at responds to the request. It simplifies this process and controls it. A proxy server is also part of a firewall and helps to prevent hackers from using the internet in order to not let them gain access to computers on a private network.… Read the rest

Data Transmission Modes in Computer Networks

Data communication circuits can be configured in a huge number of arrangements depending on the specifics of the circuit, such as how many stations are on the circuit, type of transmission facility, distance between the stations, how many users at each station and so on. Data communication circuits can however be classified as either two point or multipoint. A two-point configuration involves only two stations, whereas a multipoint configuration involves more than two stations. Regardless of configuration, each station can have one or more computers, computer terminals or workstations. A two point circuit involves the transfer of digital information from a mainframe computer and a personal computer, two mainframe computers, two personal computers or two data communication networks.

Read the rest

Open Systems Interconnection (OSI) Model

Open Systems Interconnection (OSI) model is a reference model developed by ISO (International Organization for Standardization) in 1984, as a conceptual framework of standards for communication in the network across different equipment and applications by different merchants. It is now considered the primary architectural model for inter-computing and inter-networking communications.  There are seven layers within the OSI model that serve to differentiate the various hardware and software functions that a network provides. Each layer depends on the proper functioning of the layer immediately below it to provide its raw functionality, which is enhanced and then passed to the next higher layer.

Read the rest

Network Topology and Types of Network Topologies

A network topology refers to the layout of the computers and devices in a communications network. Network topologies also may be physical or logical. Physical topology means the physical design of a network including design of a network including the devices, location and cable installation. Logical topology refers to how data is actually transferred in a network as opposed to its physical design. Now lets see in detail diffrent types network topologies.

Types of Network Topologies

The term Topology refers to a connected layout of devices shared in a network. Now we shall go ahead in the discussion of the standard Topologies from the computer networking.

Read the rest