You are on page 1of 7

BRCM COLLEGE OF BUSINESS ADMINISTRATION:

SUBJECT: YEAR: TOPIC: COMPUTER APPLICATION SY BBA: SEM-4 1.METASEARCH ENGINE 2. META TAG 3. UPLOAD WEBSITE TO INTERNET 4. TCP/IP

GROUP NAME:

Roll no NAMES 236 237 238 239 240 Shah Binal Shah Dimple Shah Fenal Shah Kunjesh Shah Sagar

SUBMITTED TO: SUBMITTED ON:

Ms. Jagruti Palsanawala 2/3/2013

Meta Search Engines

Meta search engines are search engines that search other search engines. A meta search engine submits your query to several other search engines and returns a summary of the results. Therefore, the search results you receive are an aggregate result of multiple searches. The main advantage of using a Meta Search Engine is- You can avoid all the Junk or unwanted results. So, when you do a search on any meta search engine, you will be getting specific results that will match your requirements. The main disadvantage of this is that the results are not always better. This is because the meta search engine must use its own algorithm to choose the best results from multiple search engines. Often, the results returned by a metasearch engine are not as relevant as those returned by a standard search engine. In short, a metasearch engine is a search tool that sends user requests to several other search engines and aggregates the results into a single list or displays them according to their source. Metasearch engines enable users to enter search criteria once and access several search engines simultaneously. This also may save the user from having to use multiple search engines separately. When to use a metasearch engine

When you want to retrieve a relatively small number of relevant results When your topic is obscure When you are not having luck finding what you want When you want the convenience of searching a variety of different content sources from one search page

Examples of metasearch engines 1. . www.keyboardr.com This is just another meta search engine that displays results for almost everything. The specialty of this search engine is that the results are displays the next instant the letter/word is typed and doesnt wait for you to presenter key or Search button. You can navigate through the search results using your keyboard. 2. . www.justhearit.com This is basically a search engine where you can search for any song. You will find them. Its a legal site, no piracy issues at all. So, go listen to your favorite music. It has a decent flash basedinterface. You can share your favorite songs too. The other examples of metasearch engines are Browsys, Dogpile, Blingo, DeeperWeb, Dogpile, etc.

META TAG:
Meta tags are designed to be located in the head section of each web page and contain information about what is contained on that web page. The two most common meta tags are Description and Keywords. SearchSight.com used the Description meta tag for the text in each page's search engine listing, as well as the title tag for each listing's title. This is why it is important to have proper meta tags and a title on each page that you want listed on SearchSight.com. Meta tags provide information about your Web page to search engine robots so that the search engine can better understand what your site is about. Meta tags provide this information in a format that the web crawlers/spiders that visit your site can understand. Meta tag code is inserted into your html code at the head of the document between the head tags. Meta tags are used by many search engines, and those that choose to ignore certain portions of the meta tags field, may at any time change their algorithms to include it. There are meta tags for page title, page description, and page keywords and a range of other fields for not only classifying your website, but controlling how, where and when a web robot indexes your site. These tags help web indexing robots better understand your website for the purpose of assigning it a ranking in their database under specific search terms.

HOW TO UPLOAD WEBSITE ON INTERNET:


The Web site has been created and you have to upload it on an Internet server in order

to give it a worldwide audience. For this following steps are to be performed. File upload is made with FTP protocol: your Web server should also be a FTP server : most servers are both. Ask your internet service provider (ISP) for an allocated space, a user account and a password. An active internet connexion is mandatory to do the file transfer. To upload your web site, press the button "Upload web site" in the left side toolbar. Set your options as follow : FTP server : the server name, given by your ISP User account : your account name, Password : your password, Source local directory: the place where the web site was generated Target directory (distant): usually avoid, if you choose to install your web site at your user space root.

Open your Internet connection, and then, press the button "upload". Some messages and a progress bar show the progress and success of the upload. When it's finished, type your URL in a web browser. Your document has been published on the Internet, and you will easily modify and update it with WIT whenever you want.

TCP/IP: TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL:

TCP is a set of rules used along with IP to send data in the form of message units between computers over the internet. While IP takes care of handling the actual delivery of the data, TCP takes care of keeping track of the individual units of data that a message is divided into for efficient routing through the internet.TCP is known as a connection oriented protocol, which means that a connection is established and maintained until such time as the message or messages to be exchanged by the application programs at each end have been exchanged. TCP is responsible for ensuring that a message is divided into the packets that IP manages and for reassembling the packets back into the complete message at the other end.

There are four layers of TCP/IP which are explained as follows:

LAYER 1 - NETWORK ACCESS


This is a combination of the Data Link and Physical layers of the OSI model which consists of the actual hardware. This includes wires, network interface cards, etc. Other related details within this layer are connectors, signal strength, and wavelength along with various others. It is responsible for placing the data within a frame. The frame format is dependent on the system being used. The frame is the package that holds the data, in the same way as an envelope holds a letter. The frame holds the hardware address of the host and checking algorithms for data integrity. This layer has actually not been specified in details because it depends on which technology is being used such as Ethernet. So freedom is given to this layer as far as implementation is concerned.

LAYER 2 - INTERNET
The routing and delivery of data is the responsibility of this layer and is the key component of this architecture. It allows communication across networks of the same and different types and carries out translations to deal with dissimilar data addressing schemes. It injects packets into any network and delivers them to the destination independently to one another. Because the path through the network is not predetermined, the packets may be received out of order. The upper layers are responsible for the reordering of the data. This layer can be compared to the network layer of the OSI model. IP and ARP6 are the major protocols used at this layer.

LAYER 3 - TRANSPORT

This layer acts as the delivery service used by the application layer. Again the two protocols used are TCP and UDP. The choice is made based on the application's transmission reliability requirements. The transport layer also handles all error detection and recovery. It uses checksums, acknowledgements, and timeouts to control transmissions and end to end verification.

LAYER 4 - APPLICATION
This layer is comparable to the application, presentation, and session layers of the OSI model all combined into one. It provides a way for applications to have access to networked services. This layer also contains the high level protocols. The main issue with this layer is the ability to use both TCP and UDP protocols.

Layer Application

Description

Protocols

Defines TCP/IP application protocols and how HTTP, Telnet, FTP, host programs interface with transport layer TFTP, SNMP, DNS, services to use the network. SMTP, X Windows, other application

protocols Transport Provides communication session TCP, UDP, RTP management between host computers. Defines the level of service and status of the connection used when transporting data. Packages data into IP datagrams, which IP, ICMP, ARP, RARP contain source and destination address information that is used to forward the datagrams between hosts and across networks. Performs routing of IP datagrams. Specifies details of how data is physically sent through the network, including how bits are electrically signaled by hardware devices that interface directly with a network medium, such as coaxial cable, optical fiber, or twistedpair copper wire. Ethernet, Token Ring, FDDI, X.25, Frame Relay, RS-232, v.35

Internet

Network interface

You might also like