0% found this document useful (0 votes)
16 views

internet tech

The document provides a comprehensive overview of the Internet, detailing its definition, historical innovations, and the evolution of key technologies such as TCP/IP and DNS. It distinguishes between the Internet and the World Wide Web, discusses the advantages and disadvantages of Internet usage, and outlines various Internet protocols including TCP, IP, and HTTP. Additionally, it highlights significant milestones in the development of the Internet from its inception to the present day.

Uploaded by

nneelu132005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

internet tech

The document provides a comprehensive overview of the Internet, detailing its definition, historical innovations, and the evolution of key technologies such as TCP/IP and DNS. It distinguishes between the Internet and the World Wide Web, discusses the advantages and disadvantages of Internet usage, and outlines various Internet protocols including TCP, IP, and HTTP. Additionally, it highlights significant milestones in the development of the Internet from its inception to the present day.

Uploaded by

nneelu132005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

INTERNET

Internet is defined as an Information super Highway, to access information over the web. However, It can
be defined in many ways as follows:

 Internet is a world-wide global system of interconnected computer networks.

 Internet uses the standard Internet Protocol (TCP/IP).

 Every computer in internet is identified by a unique IP address.

 IP Address is a unique set of numbers (such as 110.22.33.114) which identifies a computer


location.

 A special computer DNS (Domain Name Server) is used to give name to the IP Address so that
user can locate a computer by a name.

 For example, a DNS server will resolve a name http://www.tutorialspoint.com to a particular IP


address to uniquely identify the computer on which this website is hosted.

 Internet is accessible to every user all over the world.


Difference between Internet and Web!!

The terms "Internet" and "World Wide Web" are often used interchangeably; however, the
Internet and World Wide Web are not one and the same. The Internet, linking your computer to other
computers around the world, is a way of transporting content. The Web is software that lets you use that
content or contribute your own.

Early Innovations

The creation of the Internet is dependent on mankind’s earlier innovations.

1836: Telegraph by Cooke and Wheatstone

• Revolutionized human (tele) communications.

• Morse code a series of dots and dashes are used to communicate between humans. This is similar
to how computers communicate via (binary 0/1) data today. Although it is much slower!!

1858 -1866: Transatlantic cable. This allowed direct and instantaneous communication across the
Atlantic. Today, cables connect all continents and are still a main hub of Telecommunications.

1876: Telephone by Alexander Graham Bell

• Telephones exchanges provide the backbone of Internet connections today.

• Modems provide Digital to Audio conversions to allow computers to connect over the telephone
network.

ARPANET

1957 - US form the Advanced Research Projects Agency (ARPA) within the Department of
Defense (DoD) to establish US lead in science and technology for military applications.

1962 - Dr. J.C.R. Licklider was chosen to head ARPA's research in improving the military's use
of computer technology. Licklider was a visionary who sought to make the government's use of
computers more interactive. He moved ARPA's contracts from private sectors to universities and
laid the foundations for what would become the ARPANET.
Packet-Switching is Key!!

1962-1968: Packet-switching (PS) networks developed. The Internet relies on packets to transfer
data. Data is split into tiny packets that may take different routes to a destination. The origin is
military, that is, for utmost security in transferring information over networks. There is no single
route available for passing information so that the information is not easily tracked. As more than
one route is available, if one route goes down another may be followed. Also the networks could
withstand large scale destruction like nuclear attack as this was the time of the Cold War.

1969: ARPANET was commissioned by DoD for research into networking.

The Team included:

Bob Taylor, a psychoacoustician, was director of the computer research program at the
Department of Defense's Advanced Research Projects Agency in 1966 when he hit upon the idea
of lining computers together. He was awarded $1 Million to develop the network.

Larry Roberts, a pioneer in computer networking at MIT's Lincoln Laboratory. He designed the
original four-node network, which was to be based on packet-switching, as opposed to circuit-
switching.

The Birth of the Internet:

1973 - Global Networking becomes a reality. First international connections to the ARPANET:
University College of London (England) and Royal Radar Establishment (Norway).

1974 - Packets became mode of transfer. Transmission Control Program (TCP) is specified.
Packet network Intercommunication forms the basis of Internet Communication. Telenet, a
commercial version of ARPANET, opened the first public packet data service.

1976 - Networking comes to many.

1977 - E-mail takes off, Internet becomes a reality. The number of hosts breaks 100.
THEORYNET provides electronic mail to over 100 researchers in computer science (using a
locally developed E-mail system and TELENET for access to server)

1982 - TCP/IP defines future communication •DCA and ARPA establishes the Transmission
Control Protocol (TCP) and Internet Protocol (IP), as the protocol suite, commonly known as
TCP/IP, for ARPANET. Also leads to one of the first definitions of an Internet as a connected set
of networks, specifically those using TCP/IP.

1983 - Internet gets larger and Name servers were developed. Since there is such a large number
of nodes that it’s hard to remember exact paths. So meaningful names should be used instead.

1984 - Growth of Internet Continues and the number of hosts breaks 1,000.Domain Name Server
(DNS) introduced. Instead of 123.456.789.10 it is easier to remember something like
www.myuniversity.mydept.mynetwork.mycountry (e.g. www.cs.cf.ac.uk).
1986 - Power of Internet realized, ie 5000 Hosts and 241 News groups.

NSFNET created when NSF establishes 5 super-computing centers to provide high-computing


power for all -- This allows an explosion of connections, especially from universities.

1987 – Internet is Commercialized and the number of hosts turns to be around 28,000.

1988 Internet Relay Chat (IRC) developed

1989 - Large growth in Internet and number of hosts breaks 100,000. First relays between a
commercial electronic mail carrier and the Internet happened.

1989- World.std.com becomes the first commercial provider of dial-up access to the Internet.
World.std.com is an Internet service provider headquartered in Boston

1990- Tim Berners-Lee, a scientist at CERN, the European Organization for Nuclear Research,
developed a new language, Hyper Text Markup Language (HTML). This technology continues to
have a large impact on how we navigate and view the Internet today.

1991- CERN (Tim Berners-Lee) introduces the World Wide Web to the public. CERN, the
European Organization for Nuclear Research, is one of the world's largest and most respected
centers for scientific research.

1992- The first audio and video are distributed over the Internet. The phrase “surfing the Internet”
is popularized.

1993-The number of websites reaches 600 and the White House and United Nations go online.
Marc Andresen develops the Mosaic Web browser at the University of Illinois, Champaign-
Urbana. The number of computers connected to NSFNET grows from 2,000 in 1985 to more than
2 million in 1993. The National Science Foundation leads an effort to outline a new Internet
architecture that would support the growing commercial use of the network.

1995- CompuServe, America Online begins to provide Internet access. Amazon.com, Craigslist
and eBay go live. The original NSFNET backbone is withdrawn as the Internet’s transformation
to a commercial enterprise is largely completed. CompuServe was the first major commercial
online service in the United States.

1996- The browser war, primarily between the two major players Microsoft and Netscape, heats
up. CNET buys tv.com for $15,000.

A browser war is competition for dominance in the usage share of web browsers. The first
browser war was Microsoft's Internet Explorer against Netscape's Navigator during the late
1990s. Browser wars continued with the decline of Internet Explorer's market share since 2003
and the increasing popularity of browsers including Mozilla Firefox, Google Chrome, Safari, and
Opera.
1997- PC makers can remove or hide Microsoft’s Internet software on new versions of Windows
95, thanks to a settlement with the Justice Department. Netscape announces that its browser will
be free.

1998-The Google search engine is born, changing the way users engage with the Internet.

1999- AOL (America Online) buys Netscape. Peer-to-peer file sharing becomes a reality as
Napster arrives on the Internet, much to the displeasure of the music industry.

2000- The dot-com bubble bursts.

Web sites such as Yahoo! and eBay are hit by a large-scale denial of service attack, highlighting
the vulnerability of the Internet.

2001- A federal judge shuts down Napster, ruling that it must find a way to stop users from
sharing copyrighted material before it can go back online.

2003- The SQL Slammer worm spread worldwide in just 10 minutes. MySpace, Skype and the
Safari Web browser debut.

SQL Slammer is a computer worm that caused a denial of service on some Internet hosts and
dramatically slowed down general Internet traffic, starting at 05:30 UTC on January 25, 2003. It
spread rapidly, infecting most of its 75,000 victims within ten minutes.

2004- Facebook goes online and the era of social networking begins. Mozilla reveals the Mozilla
Firefox browser.

2005- YouTube.com launches.

2006- AOL changes its business model, offering most services for free and relying on advertising
to generate revenue. The Internet Governance Forum meets for the first time.AOL is an American
multinational mass media corporation based in New York City that develops, grows, and invests
in brands and web sites.

2009- The Internet marks its 40th anniversary.

2010- Facebook reaches 400 million active users.

2011-Twitter and Facebook play a large role in the Middle East revolts.
Advantages

Internet covers almost every aspect of life, one can think of. Here, we will discuss some of the
advantages of Internet:

Internet allows us to communicate with the people sitting at remote locations. There are various
apps available on the wed that uses Internet as a medium for communication. One can find
various social networking sites such as:

Facebook

Twitter

Yahoo

Google+

Flickr

Orkut

One can surf for any kind of information over the internet. Information regarding various topics
such as Technology, Health & Science, Social Studies, Geographical Information, Information
Technology, Products etc can be surfed with help of a search engine.

Apart from communication and source of information, internet also serves a medium for
entertainment. Following are the various modes for entertainment over internet.

Online Television

Online Games
Songs

Videos

Social Networking Apps

Internet allows us to use many services like:

Internet Banking

Matrimonial Services

Online Shopping

Online Ticket Booking

Online Bill Payment

Data Sharing

E-mail

Internet provides concept of electronic commerce, that allows the business deals to be conducted
on electronic systems

Disadvantages

However, Internet has proved to be a powerful source of information in almost every field, yet
there exists many disadvantages discussed below:

There are always chances to loose personal information such as name, address, credit card
number. Therefore, one should be very careful while sharing such information. One should use
credit cards only through authenticated sites.

Another disadvantage is the Spamming. Spamming corresponds to the unwanted e-mails in bulk.
These e-mails serve no purpose and lead to obstruction of entire system.
Virus can easily be spread to the computers connected to internet. Such virus attacks may cause
your system to crash or your important data may get deleted.

Also a biggest threat on internet is pornography. There are many pornographic sites that can be
found, letting your children to use internet which indirectly affects the children healthy mental
life.

There are various websites that do not provide the authenticated information. This leads to
misconception among many people.

Internet Addressing

An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g.,
computer, printer) participating in a computer network that uses the Internet Protocol for
communication. An IP address serves two principal functions: host or network interface
identification and location addressing. An IP address is a 32-bit number that uniquely identifies a host
(computer or other device, such as a printer or router) on a TCP/IP network. IP addresses are normally
expressed in dotted-decimal format, with four numbers separated by periods, such as
192.168.123.132. To understand how subnet masks are used to distinguish between hosts, networks,
and sub networks, examine an IP address in binary notation.
For example, the dotted-decimal IP address 192.168.123.132 is (in binary notation) the 32 bit
number 110000000101000111101110000100. This number may be hard to make sense of, so divide it
into four parts of eight binary digits.
These eight bit sections are known as octets. The example IP address, then, becomes
11000000.10101000.01111011.10000100. This number only makes a little more sense, so for most
uses; convert the binary address into dotted-decimal format (192.168.123.132). The decimal numbers
separated by periods are the octets converted from binary to decimal notation.

Internet Protocols

Transmission Control Protocol (TCP)

TCP is a connection oriented protocol and offers end-to-end packet delivery. It acts as back bone for
connection. It exhibits the following key features:

 Transmission Control Protocol (TCP) corresponds to the Transport Layer of OSI Model.

 TCP is a reliable and connection oriented protocol.

 TCP offers:

o Stream Data Transfer.

o Reliability.
o Efficient Flow Control

o Full-duplex operation.

o Multiplexing.

 TCP offers connection oriented end-to-end packet delivery.

 TCP ensures reliability by sequencing bytes with a forwarding acknowledgement number that
indicates to the destination the next byte the source expect to receive.

 It retransmits the bytes not acknowledged with in specified time period.

TCP Services

TCP offers following services to the processes at the application layer:

 Stream Delivery Service

 Sending and Receiving Buffers

 Bytes and Segments

 Full Duplex Service

 Connection Oriented Service

 Reliable Service

STREAM DELIVER SERVICE

TCP protocol is stream oriented because it allows the sending process to send data as stream of bytes and
the receiving process to obtain data as stream of bytes.

SENDING AND RECEIVING BUFFERS

It may not be possible for sending and receiving process to produce and obtain data at same speed,
therefore, TCP needs buffers for storage at sending and receiving ends.

BYTES AND SEGMENTS

The Transmission Control Protocol (TCP), at transport layer groups the bytes into a packet. This packet is
called segment. Before transmission of these packets, these segments are encapsulated into an IP
datagram.

FULL DUPLEX SERVICE

Transmitting the data in duplex mode means flow of data in both the directions at the same time.
CONNECTION ORIENTED SERVICE

TCP offers connection oriented service in the following manner:

1. TCP of process-1 informs TCP of process – 2 and gets its approval.

2. TCP of process – 1 and TCP of process – 2 and exchange data in both the two directions.

3. After completing the data exchange, when buffers on both sides are empty, the two TCP’s destroy
their buffers.

RELIABLE SERVICE

For sake of reliability, TCP uses acknowledgement mechanism.

Internet Protocol (IP)

Internet Protocol is connectionless and unreliable protocol. It ensures no guarantee of successfully


transmission of data.

In order to make it reliable, it must be paired with reliable protocol such as TCP at the transport layer.

Internet protocol transmits the data in form of a datagram as shown in the following diagram:

Points to remember:

 The length of datagram is variable.

 The Datagram is divided into two parts: header and data.


 The length of header is 20 to 60 bytes.

 The header contains information for routing and delivery of the packet.

User Datagram Protocol (UDP)

Like IP, UDP is connectionless and unreliable protocol. It doesn’t require making a connection with the
host to exchange data. Since UDP is unreliable protocol, there is no mechanism for ensuring that data sent
is received.

UDP transmits the data in form of a datagram. The UDP datagram consists of five parts as shown in the
following diagram:

Points to remember:

 UDP is used by the application that typically transmit small amount of data at one time.

 UDP provides protocol port used i.e. UDP message contains both source and destination port
number, that makes it possible for UDP software at the destination to deliver the message to
correct application program.

Hyper Text Transfer Protocol (HTTP)

HTTP is a communication protocol. It defines mechanism for communication between browser and the
web server. It is also called request and response protocol because the communication between browser
and server takes place in request and response pairs.

HTTP Request

HTTP request comprises of lines which contains:

 Request line

 Header Fields

 Message body

Key Points

 The first line i.e. the Request line specifies the request method i.e. Get or Post.
 The second line specifies the header which indicates the domain name of the server from where
index.htm is retrieved.

HTTP Response

Like HTTP request, HTTP response also has certain structure. HTTP response contains:

 Status line

 Headers

 Message body

Intranet
Intranet is defined as private network of computers within an organization with its own server and
firewall. Moreover we can define Intranet as:

 Intranet is system in which multiple PCs are networked to be connected to each other. PCs in
intranet are not available to the world outside of the intranet.

 Usually each company or organization has their own Intranet network and members/employees
of that company can access the computers in their intranet.

 Every computer in internet is identified by a unique IP address.

 Each computer in Intranet is also identified by a IP Address, which is unique among the
computers in that Intranet.

Benefits
Intranet is very efficient and reliable network system for any organization. It is beneficial in every aspect
such as collaboration, cost-effectiveness, security, productivity and much more.
Communication
Intranet offers easy and cheap communication within an organization. Employees can communicate
using chat, e-mail or blogs.

Time Saving
Information on Intranet is shared in real time.

Collaboration
Information is distributed among the employees as according to requirement and it can be accessed by
the authorized users, resulting in enhanced teamwork.

Platform Independency
Intranet can connect computers and other devices with different architecture.

Cost Effective
Employees can see the data and other documents using browser rather than printing them and
distributing duplicate copies among the employees, which certainly decreases the cost.

Workforce Productivity
Data is available at every time and can be accessed using company workstation. This helps the
employees work faster.

Business Management
It is also possible to deploy applications that support business operations.

Security
Since information shared on intranet can only be accessed within an organization, therefore there is
almost no chance of being theft.
Specific Users
Intranet targets only specific users within an organization therefore, once can exactly know whom he is
interacting.

Immediate Updates
Any changes made to information are reflected immediately to all the users.

Issues
Apart from several benefits of Intranet, there also exist some issues.. These issues are shown in the
following diagram:

Applications
Intranet applications are same as that of Internet applications. Intranet applications are also accessed
through a web browser. The only difference is that, Intranet applications reside on local server while
Internet applications reside on remote server. Here, we've discussed some of these applications:
Document publication applications
Document publication applications allow publishing documents such as manuals, software guide,
employee profits etc without use of paper.

Electronic resources applications


It offers electronic resources such as software applications, templates and tools, to be shared across the
network.

Interactive Communication applications


Like on internet, we have e-mail and chat like applications for Intranet, hence offering an interactive
communication among employees.

Support for Internet Applications


Intranet offers an environment to deploy and test applications before placing them on Internet.

Internet vs. Intranet


Apart from similarities there are some differences between the two. Following are the differences
between Internet and Intranet:

Intranet Internet

Localized Network. Worldwide Network

Doesn't have access to Intranet Have access to Internet.

More Expensive Less Expensive

More Safe Less Safe

More Reliability Less Reliability


Extranet

Extranet refers to network within an organization, using internet to connect to the outsiders in
controlled manner. It helps to connect businesses with their customers and suppliers and therefore
allows working in a collaborative manner.

Domain Naming System

When DNS was not into existence, one had to download a Host filecontaining host names
and their corresponding IP address. But with increase in number of hosts of internet, the size of
host file also increased. This resulted in increased traffic on downloading this file. To solve this
problem the DNS system was introduced.

Domain Name System helps to resolve the host name to an address. It uses a hierarchical naming
scheme and distributed database of IP addresses and associated names

IP Address

IP address is a unique logical address assigned to a machine over the network. An IP address
exhibits the following properties:

 IP address is the unique address assigned to each host present on Internet.

 IP address is 32 bits (4 bytes) long.

 IP address consists of two components: network component and host component.

 Each of the 4 bytes is represented by a number from 0 to 255, separated with dots. For example
137.170.4.124

IP address is 32-bit number while on the other hand domain names are easy to remember names.
For example, when we enter an email address we always enter a symbolic string such as
webmaster@tutorialspoint.com.
Uniform Resource Locator (URL)

Uniform Resource Locator (URL) refers to a web address which uniquely identifies a document
over the internet.

This document can be a web page, image, audio, video or anything else present on the web.

For example, www.tutorialspoint.com/internet_technology/index.htmlis an URL to the index.html


which is stored on tutorialspoint web server under internet_technology directory.

URL Types

There are two forms of URL as listed below:

 Absolute URL

 Relative URL

ABSOLUTE URL

Absolute URL is a complete address of a resource on the web. This completed address comprises
of protocol used, server name, path name and file name.

For example http:// www.tutorialspoint.com / internet_technology /index.htm. where:

 http is the protocol.

 tutorialspoint.com is the server name.

 index.htm is the file name.

The protocol part tells the web browser how to handle the file. Similarly we have some other
protocols also that can be used to create URL are:

 FTP

 https

 Gopher

 mailto

 news

RELATIVE URL

Relative URL is a partial address of a webpage. Unlike absolute URL, the protocol and server
part are omitted from relative URL.

Relative URLs are used for internal links i.e. to create links to file that are part of same website as
the WebPages on which you are placing the link.
For example, to link an image on
tutorialspoint.com/internet_technology/internet_referemce_models, we can use the relative URL
which can take the form like /internet_technologies/internet-osi_model.jpg.

Difference between Absolute and Relative URL

Absolute URL Relative URL

Used to link web pages on different Used to link web pages within the same
websites website.

Difficult to manage. Easy to Manage

Changes when the server name or Remains same even of we change the server
directory name changes name or directory name.

Take time to access Comparatively faster to access.

Domain Name System Architecture

The Domain name system comprises of Domain Names, Domain Name Space, Name Server that
have been described below:

Domain Names

Domain Name is a symbolic string associated with an IP address. There are several domain
names available; some of them are generic such as com, edu, gov, net etc, while some country
level domain names such as au, in, za, usetc.

The following table shows the Generic Top-Level Domain names:

Domain Name Meaning

Com Commercial business

Edu Education

Gov U.S. government agency


Int International entity

Mil U.S. military

Net Networking organization

Org Non profit organization

The following table shows the Country top-level domain names:

Domain Name Meaning

au Australia

in India

cl Chile

fr France

us United States

za South Africa

uk United Kingdom

jp Japan

es Spain

de Germany

ca Canada
ee Estonia

hk Hong Kong

Domain Name Space

The domain name space refers a hierarchy in the internet naming structure. This hierarchy has
multiple levels (from 0 to 127), with a root at the top. The following diagram shows the domain
name space hierarchy:

In the above diagram each subtree represents a domain. Each domain can be partitioned into sub
domains and these can be further partitioned and so on.

Name Server

Name server contains the DNS database. This database comprises of various names and their
corresponding IP addresses. Since it is not possible for a single server to maintain entire DNS
database, therefore, the information is distributed among many DNS servers.

 Hierarchy of server is same as hierarchy of names.

 The entire name space is divided into the zones

Zones

Zone is collection of nodes (sub domains) under the main domain. The server maintains a
database called zone file for every zone.
If the domain is not further divided into sub domains then domain and zone refers to the same
thing.

The information about the nodes in the sub domain is stored in the servers at the lower levels
however; the original server keeps reference to these lower levels of servers.

TYPES OF NAME SERVERS

Following are the three categories of Name Servers that manages the entire Domain Name
System:

 Root Server

 Primary Server

 Secondary Server

ROOT SERVER

Root Server is the top level server which consists of the entire DNS tree. It does not contain the
information about domains but delegates the authority to the other server

PRIMARY SERVERS

Primary Server stores a file about its zone. It has authority to create, maintain, and update the
zone file.

SECONDARY SERVER

Secondary Server transfers complete information about a zone from another server which may be
primary or secondary server. The secondary server does not have authority to create or update a
zone file.
DNS Working

DNS translates the domain name into IP address automatically. Following steps will take you
through the steps included in domain resolution process:

 When we type www.tutorialspoint.com into the browser, it asks the local DNS Server for its IP
address.

Here the local DNS is at ISP end.

 When the local DNS does not find the IP address of requested domain name, it forwards the
request to the root DNS server and again enquires about IP address of it.

 The root DNS server replies with delegation that I do not know the IP address of
www.tutorialspoint.com but know the IP address of DNS Server.

 The local DNS server then asks the com DNS Server the same question.

 The com DNS Server replies the same that it does not know the IP address of
www.tutorialspont.com but knows the address of tutorialspoint.com.

 Then the local DNS asks the tutorialspoint.com DNS server the same question.

 Then tutorialspoint.com DNS server replies with IP address of www.tutorialspoint.com.

 Now, the local DNS sends the IP address of www.tutorialspoint.com to the computer that sends
the request.
Unit II

Internet Applications
Email

Email, e-mail or electronic mail is the transmission of messages (emails or email messages) over
electronic networks like the internet.

Eg: Zoho Mail, Yandex.Mail, Outlook.com, Gmail, Inbox by Gmail, AimMail, Icloud Mail, Yahoo!
Mail, Mail.com & GMX Mail, Inbox.com

E-Mail Address

Each user of email is assigned a unique name for his email account. This name is known as E-mail
address. Different users can send and receive messages according to the e-mail address.

E-mail is generally of the form username@domainname. For example, webmaster@tutorialspoint.com is


an e-mail address where webmaster is username and tutorialspoint.com is domain name.

 The username and the domain name are separated by @ (at) symbol.

 E-mail addresses are not case sensitive.

 Spaces are not allowed in e-mail address.

E-mail Message Components

E-mail message comprises of different components: E-mail Header, Greeting, Text, and Signature. These
components are described in the following diagram:
E-mail Header

The first five lines of an E-mail message is called E-mail header. The header part comprises of following
fields:

 From

 Date

 To

 Subject

 CC

 BCC

FROM

The From field indicates the sender’s address i.e. who sent the e-mail.

DATE

The Date field indicates the date when the e-mail was sent.

TO

The To field indicates the recipient’s address i.e. to whom the e-mail is sent.

SUBJECT

The Subject field indicates the purpose of e-mail. It should be precise and to the point.

CC

CC stands for Carbon copy. It includes those recipient addresses whom we want to keep informed but not
exactly the intended recipient.

BCC

BCC stands for Black Carbon Copy. It is used when we do not want one or more of the recipients to
know that someone else was copied on the message.

GREETING

Greeting is the opening of the actual message. Eg. Hi Sir or Hi Guys etc.

TEXT

It represents the actual content of the message.


SIGNATURE

This is the final part of an e-mail message. It includes Name of Sender, Address, and Contact Number.

Advantages

E-mail has prooved to be powerful and reliable medium of commmunication. Here are the benefits of E-
mail:

 Reliable

 Convenience

 Speed

 Inexpensive

 Printable

 Global

 Generality

Reliable

Many of the mail systems notify the sender if e-mail message was undeliverable.

Convenience

There is no requirement of stationary and stamps. One does not have to go to post office. But all these
things are not required for sending or receiving an mail.

Speed

E-mail is very fast. However, the speed also depends upon the underlying network.

Inexpensive

The cost of sending e-mail is very low.

Printable

It is easy to obtain a hardcopy of an e-mail. Also an electronic copy of an e-mail can also be saved for
records.

Global

E-mail can be sent and received by a person sitting across the globe.

Generality

It is also possible to send graphics, programs and sounds with an e-mail.


Disadvantages

Apart from several benefits of E-mail, there also exists some disadvantages as discussed below:

 Forgery

 Overload

 Misdirection

 Junk

 No response

Forgery

E-mail doesn’t prevent from forgery, that is, someone impersonating the sender, since sender is usually
not authenticated in any way.

Overload

Convenience of E-mail may result in a flood of mail.

Misdirection

It is possible that you may send e-mail to an unintended recipient.

Junk

Junk emails are undesirable and inappropriate emails. Junk emails are sometimes referred to as spam.

No Response

It may be frustrating when the recipient does not read the e-mail and respond on a regular basis.

Newsletters

Newsletters are a shortened form of newspaper and informational letter. Generally used to
describe a periodic publication distributed by e-mail to an opt-in list of subscribers. Newsletters
are normally used by organizations or owners of a Website to communicate with their readers.

Some companies may sell targeted ads within their newsletters. Bear in mind, if you are going to
send a Newsletter to subscribers then balance your newsletter content to be 90% educational
and 10% promotional.
Regardless of the possibility that your supporters agree to your messages, there's no assurance
that they will open your messages, once they get them in their inbox. Numerous advertisers have
a go at it, so as to expand the recognition with their supporters by keeping the headline same
every day, week, or month that they send it.

Be that as it may, let's be honest; headlines get old for endorsers − and quick. Why? Since there's
no motivation from the headline to tap on that particular email right now. A superior
methodology would be to attempt to have an alternate, inventive, drawing in the title for every
Newsletter you send.

Promotional Newsletters

Be cautious with uncommon offer messages. This is the sort of stuff that is almost
ensured to wind up in the "Promotional tab" in Gmail. When you send an exceptional offer, make
sure you segment your lists first. You would prefer not to send a discount code to somebody who
simply paid the maximum yesterday.

At this point, I need to share a promotional email from CrashPlan.


The copy in this email is all about giving, not getting. Special offers are often seasonal and
CrashPlan did something interesting with this holiday email. If you give CrashPlan to someone
else, you get two free months for yourself

Search Engine

A search engine is a web-based tool that enables users to locate information on the World Wide
Web. Popular examples of search engines are Google, Yahoo!, and MSN Search. Search engines utilize
automated software applications (referred to as robots, bots, or spiders) that travel along the Web,
following links from page to page, site to site. The information gathered by the spiders is used to create a
searchable index of the Web.
Top 10 Search Engines

1. Google

2. Bing

3. Yahoo

4. Ask.com

5. AOL.com

6. Blekko.com

7. Wolframalpha

8. DuckDuckGo

9. WayBackMachine – archive.org

10. ChaCha.com

• What is the use of a search engine?

A search engine is really a general class of programs, however, the term is often used to
specifically describe systems like Google, Bing and Yahoo! Search that enable users
to search for documents on the World Wide Web.

• What is a search engine on the Internet?

A web search engine is a software system that is designed to search for information on
the World Wide Web. The search results are generally presented in a line of results often
referred to as search engine results pages (SERPs). The information may be a mix
of web pages, images, and other types of files.

Applications of internet

The internet is treated as one of the biggest invention. It has a large number of uses.

1. Communication:

It is used for sending and receiving message from one and other through internet by using
electronic mail. Some of the web sites providing this service are yahoomail.com Hotmail.com
rediffmail.com etc

Individual to Group Communication – Group Conferencing, Tele meeting services,

Information Transfer and Delivery services – Text based Email, Multimedia email, Interface
email, digital (packet) a/v communication
Information Databases – virtual libraries, remote login, file transfer, resource discovery service,
news gathering agents

Information Processing Services - OR Tool, Statistics, Simulation, Visualization tool.

Resource Sharing Services – Access to printers, Fax machines and other processing Services.

Email to Fax - The ability to send faxes through an email account (fax from email) and receive
faxes as PDF attachments (fax to email) in an email inbox. Sending or receiving a fax by email typically
requires a service plan with an email fax company, but there is also some free fax by email options
available.

Collaboration via Bulletin Boards – It is an Internet site where users can post comments about a
particular issue or topic and reply to other users' postings.Information Publishing and Databases

2. Job searches: getting information regarding availability of job in different sectors and areas. You can
publish your resume in online for prospective job. Some of the web sites providing this service are
naukri.com, monster.com, summerjob.com, recuritmentindia.com etc.

3. Finding books and study material: books and other study material stored around the world can be
easily located through internet. Latest encyclopedias are available online.

4. Health and medicine: Internet provides information and knowledge about field of health medicine
people can have information about various disease and can receive help .patient can be taken to virtual
check room where they can meet doctors.

5. Travel: one can use internet to gather information about various tourist place. it can be used for
booking Holiday tours , hotels, train and flights. Some of the web sites providing this service
areindiatravelog.com, rajtravel.com, makemytrip.com.

6. Entertainment one can download jokes, songs movies, latest sports updates through internet Some of
the web sites providing this service arecricinfo.com, movies.com espn.com

7. Shopping: internet is also used for online shopping. By just giving accounts details you can perform
the transaction. You can even pay your bills and perform bank related transaction.

8. Stock market updates: you can sell or buy shares while sitting on computer through internet. Several
websites like ndtvprofit.com, moneypore.com, provide information regarding investment

9. Research: a large number of people are using internet for research purposes you can download any
kind information by using internet

10. Business use of internet: different ways by which internet can be used for business are:
a. Information about the product can be provided can be provided online to the customer.
b. Provide market information to the business.
c. It helps business to recruit talented people
d. Help in locating suppliers of the product.
e. Fast information regarding customers view about companies’ product.

f. Eliminate middle men and have a direct contact with contact with customer.
g. Providing information to the investor by providing companies back ground and financial Information
on web site.

11. Search engine: It can be used to search anything and everything. Most popular search
engines are Google and yahoo searches.

12. Shopping: Shopping has become easier with the advent of internet. You can buy or sell
online.

13. Hobbies: Those who are having certain hobbies can try to improve on it by reading up on
many aspects of their hobby.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy