In this Chapter..
Introduction
InformationRetrieval
E-Mail (Electronic Mail)
Using Search Engine
FTP Protocol
Remote Login and File
Transfer Protocol
Web Servicing
Social Networking
Mobile Technologies
3.
Introduction
Internet Services areuseful because :
It provides access to vast amount of information.
Facilitate Communication
Enable Online Shopping and Banking.
Offers entertainment and educational Opportunity.
Support remote work and social networking.
E-Mail (Electronic Mail)
Email,or electronic
mail, is a digital
communication
method that allows
users to send and
receive messages
over computer
networks, primarily
the internet
6.
E-Mail
Advantages
Faster andeasy mean of
communication.
Provide management of messages.
Effective and cheap means of
communication
Single message can be send to
multiple people at same time.
Can send any kind of multimedia
within mail.
Environment friendly.
Disadvantages/Limitations
Can transport viruses which harm our
computer.
Unable to know whether E-mail is
seen or not by the receiver.
Can be source of various spams.
7.
E-Mail Address
Aunique identifier
used for sending
and receiving
electronic mail
messages.
It consists of a
username, the "@"
symbol, and a
domain name.
A username cannot
have blanks.
8.
• LAB Exercise
Creatingan E-Mail Account
Viewing Received Mails
Replying or Forwarding E-Mail
Compose and Send an E-mail
9.
Structure of anEmail Message
From : It is the address of the sender of the e-mail.
To : It is the address to which the mail is sent.
CC: To whom we want to send a copy of the e-mail.
BCC: Also receive a copy of message. BCC recipients
name is not visible to others.
Subject: A short title for the mail.
Body: The full message.
Attachment: we can attach one or more pictures/
Documents.
10.
Difference Between CCand BCC
CC (Carbon Copy)
The email
addresses of CC
recipients are
visible to all other
recipients.
BCC (Blind Carbon Copy)
The email addresses
of BCC recipients are
hidden from all other
recipients.
Protect the privacy.
11.
Difference between Spamand Junk
Mails
Spam Mail
unwanted bulk
email.
Often used for
advertising,
marketing
Junk Mail
email that is unwanted.
May include emails you
subscribed to but no
longer read, or
newsletters you no longer
want.
12.
Search
Engine
A Softwarewhich searches
different webpages on the
World Wide Web.
Eg:
http://www.google.com
http://www.yahoo.com
Google was developed by Larry
Page and Sergey Brin.
13.
How Search EngineWorks
1. Crawling: to scan the internet and discover new and updated web
pages.
2. Indexing: the search engine creates a database of keywords,
phrases, and other relevant information from the web pages.
3. Query Processing: uses algorithms to identify the most relevant
results based on the keywords.
4. Result Ranking: typically displaying the most relevant ones at the
top of the search results page
5. Displaying Results: typically displays a list of hyperlinks to web
pages, along with textual summaries and other relevant information like
images or videos
14.
FTP Protocol
FTP, orFile Transfer Protocol, is a
standard network protocol used to
transfer files between a client and a
server.
TCP/IP is called a chief protocol
utilized to communicate over
Internet.
Elements of aURL
Internet Servers and what they Provide
Server Protocol Information It Provides
ftp File Transfer Protocol Text and binary files that are organized in a
hierarchical structure, Much like a family tree.
gopher Transfer Control Protocol/
Internet Protocol (TCP/IP)
Text and binary files that are organized in a menu
structure.
http Hypertext Transfer Protocol Hypertext/ Hypermedia files.
mail Post Office Protocol (POP)
version 3 and Simple Mail
Transfer Protocol (SMTP)
Message sent via electronic mail.
news Network News Transfer Protocol
(NNTP)
Newsgroup that are organized in a hierarchical
structure.
17.
Most Common Domains
S.NoDomain ID Affiliation Remarks
1 com Commercial for commercial firms
2 edu Education for education firms
3 gov Government for government Organizations
4 mil Military for military
5 net Network Resources for ISPs /network
6 org Organization for NGOs and other no-profit organizations
7 co Company for listed companies
8 tv Television for TV channels and companies
18.
Some Country abbreviationsare:
au Australia
ca Canada
dk Denmark
fr France
in India
jp Japan
nz New Zealand
uk United Kingdom
us United States
19.
Downloading and Uploadingfiles from a Remote Site
Downloading
Downloading is receiving
data from the remote
server to your local
machine.
Examples: Downloading
files from a website,
receiving an email
attachment, or getting
updates from a software
Uploading
Uploading is sending data
from your computer to the
remote server.
Examples: Uploading files
to cloud storage (like
Google Drive or OneDrive),
posting photos to a social
media site, or sending an
email with an attachment.
SSH (Secure SHell)
SSH is remote logging protocol that logs into remote machine
via a shell where all data between the client and server is
encrypted.
It ensures security shell using other protocols like SCP and
SFTP.
This ensures that only the Client and the server will have the
access to actual data.
By default, SSH uses port 22 for communication.(0 to 65535)
SSH supports various authentication methods, including
password-based and public key-based authentication, ensuring
secure access.
FTP
FTP stands forFile transfer protocol.
It is a standard internet protocol provided by
TCP/IP used for transmitting the files from
one host to another.
It is also used for downloading the files to
computer from other servers.
Every computer platform supports FTP.
24.
How does FTPWork ?
There are two computers involved in an FTP
transfer:
FTP Server
FTP Client
25.
Difference Between:-
FTP Server
Itis a computer that
is running FTP server
software.
It listens on the
network for
connection requests
from other computers.
FTP Client
It is a computer that is
running FTP client
software.
It initiates a connection to
the server.
Once connected, the
customer can do a number of
file manipulation operations.
26.
SFTP
It stands forSecure File Transfer Protocol.
It is a protocol for transferring large files over the
web. It is a secure protocol for file transfer and it
ensures security of data based on the Secure Shell
(SSH) protocol.
SFTP as a successor to FTP is used for many
situations where file security is important.
SCP- Secure CopyProtocol
The SCP protocol helps transferring files
from a local to a remote host or between
two remote hosts.
It is a combination of the Remote Copy
Protocol (RCP) and the Secure Shell (SSH)
protocol.
TELNET (TELetype NETwork)
Telnetoperates on a client/server principle.
The local computer uses a telnet client program
and the remote computers use a telnet server
program.
The computer which starts the connection is
known as the local computer.
The computer which is being connected to i.e.
which accepts the connection known as the
31.
TELNET- Key Featuresand Uses
Allows users to access the command-line interface of a remote computer or device.
It's often used for managing network devices like routers, switches, and server
The data transmitted between the client and server is unencrypted, meaning login credentials and other
sensitive information are sent in plain text.
Due to security concerns, Telnet has largely been replaced by SSH.
Internet Services:-
InformationRetrieval
Locating Sites Using Search Engine.
Video Conferencing
E-Learning
E-Banking
E-Shopping
E-Reservation
E-Governance
Exploring the web is known as Net Surfing.
Video Conferencing
Advantages
Savestravel cost and travel time.
Allows meeting with people at
different locations.
It is an excellent way of keeping in
touch with friends and family, even
if they are in a different country.
Disadvantages
It requires specific hardware and
software.
Fast data link is needed.
If hardware/software breaks down,
meeting cannot be attended.
37.
Benefits of E-Learning
Reduced overall cost
Self-directed and self-paced
Easily manageable
Better Time Management
38.
Features of E-Banking
Account Management
Bill Payments
Security Features
Remote Deposits
Online Shopping
39.
E-Shopping
Advantages
Easy tobuy Products.
Price Comparison
Online stores never close, they are
open 24 hours a day.
Access to Product Reviews
Save Time and Effort
Disadvantages
Potential for Fraud
Delay in delivery
Replacement of products takes
time.
Technical Difficulties
Lack of Physical Inspection
40.
E-Reservation
Advantages
Time-Saving
Convenience
Easy Access to Information
Multiple Payment Options
Competitive Pricing
Disadvantages
Dependency on Internet Access
Security Concerns
Limited Options and Lack of
Personal Interaction
Potential for Hidden Fees
41.
E-Governance
E-governance isthe application of information and communication technology
(ICT) to improve government processes, information exchange, and service
delivery.
It means that we can interact with our government 24x7.
The National e-governance Plan (NeGP) has been formulated by the
government to promote e-governance on a massive scale.
42.
Major E-Governance Projectsin India
Income Tax Portal
DRDO
Supreme Court of India
RTI Portal
National Portal of India.
43.
E-Governance
Positive Impact
Improvedthe efficiency of
administration and service
delivery.
Reduced waiting time.
Reduced cost of availing the
services.
Keeping a tab on corruption.
Increased public participation.
Negative Impact
People living in rural and remote
areas could not benefit from it.
Lack of awareness about e-
governance programs.
Slow websites compared to other
websites.
44.
Social Networking
SocialNetworking is the use of internet based social media programs to make
connections with friends, family, classmates, customers and clients.
They are also known as Social Media.
Facebook, Instagram, LinkedIn, Myspace, Twitter, Youtube, Flickr, Wordpress,
Blogger, Typepad, etc.
45.
Ethics in SocialNetworking
Right perspective: Carefully upload the contents, pictures, videos, etc.
Utilitarian perspective: Keep away from indulging in illegal and unethical
activities.
Fairness perspective: No discrimination based on the gender, race, age, etc.
Common good perspective: Our action must not hinder in any way the
betterment of the society.
46.
How a SearchEngine Works.
A search engine works with the help of following three elements:
Spiders or Webcrawler or Bots or Agents
Indexing software and database
Search Algorithm
47.
How a SearchEngine Works.
SPIDERS OR WEBCRAWLER OR BOTS OR AGENTS
The Search engine uses these software which comb the Internet looking for
documents and their web addresses.
The Spiders or web crawlers perform the methodical searches needed to find
information
48.
How a SearchEngine Works.
INDEXING SOFTWARE AND DATABASE
The indexing software extracts
information from the documents
and web addresses, prepares on
index of it and stores in a
database.
SEARCH ALGORITHM
It assembles a web page displaying
the matching results as hyperlinks.
Mobile Technologies
Technologythat is portable and can be used in various locations, including
phones, tablets, and other devices that connect wirelessly to the internet.
It is a kind of technology which is utilized maximum in cellular communication
and other relating facts.
51.
SMS and MMS
Stands for “Short Messaging
Service”.
It is commonly referred to as a
“text message”.
Real SMS messages are limited in
length. A single SMS is 160
characters long.
Most cell phones support this type
of text messaging.
It stands for Multimedia Messaging
Service.
It is a standard way to send
messages that include multimedia
content (pictures,video, audio,
etc) to and from mobilephones.
MMS messages can be up to 1600
characters in length.
52.
Mobile Communication System
Generations.
Every Generation contains different data rates, wireless technologies,
capacities and characteristics better then earlier generations.
1G- First Generation
2G- Second Generation
3G- Third Generation
4G- Third Generation
5G-Fifth Generation
53.
Mobile Communication SystemGenerations
1G- First Generation
Started in 1980
Analog Technology
Voice Calls Only
Limited Coverage and Sound Quality
Expensive and Large Devices
No Roaming Support
Max Speed was 2.4 Kbps
2G- Second Generation
introduced in the 1990s
Digital Technology
GSM and Other Standards
Data Services:
Improved Voice Quality
Text Messaging
Picture Messaging
Max speed is 64 Kbps
54.
Mobile Communication System
Generations
3G – Third Generation
Initiated in 2001
Multimedia Capabilities
Smartphone technology
Max speed of 3G is said to be
2mbps.
4G – Fourth Generation
Support for VoLTE
Wide Range of Applications
Max speed of 4G is known as 1
Gbps.
55.
Mobile Communication System
Generations
5G – Fifth Generation
building upon previous standards to offer significantly faster speeds, lower
latency, and increased capacity. It achieves this by using higher frequencies
and advanced antenna technology, enabling more devices to connect
simultaneously and transmitting data more efficiently.