Internet and Emails

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 67

Internet

1
Introduction Internet
• The Internet is a global system of interconnected computer
networks that use the standard Internet Protocol Suite
(TCP/IP) to serve billions of users worldwide.
• It is a network of networks that consists of millions of private,
public, academic, business, and government networks, of
local to global scope, that are linked by a broad array of
electronic, wireless and optical networking technologies.
• The Internet carries a vast range of information resources and
services, such as the inter-linked hypertext documents of the
World Wide Web (WWW) and the infrastructure to support
electronic mail.
Introduction cont.…..
• The internet is a worldwide public network of
computers on which people can join and use
multiple services such as sharing of information.
• The World Wide Web (WWW) is one of the major
services of the internet who hosts information of
almost about anything one might like to search for.
• Search engines are being used to browse through the
available sources of information and can make
discovering of information an easy to use
• .
Introduction cont.…..
• In addition, the internet offers communication services
where people can use to conduct friends and family
that may live in a different country. Such
communication services include Instagram, facebook
Skype and Yahoo, whatsapp messenger etc.
• Chat rooms are another way for communication
through which people have the chance to communicate
with other people that have never met before, or that
live in different countries.
• E-mails are another form for communicating with family
and friends and have now replaced the traditional
hand-written letters.
Introduction cont….
• Social networking sites are websites that offer people
the chance to create a profile for themselves,
describing likes and dislikes and the expectations of a
person from other people. The purpose of these sites
is to enable members to meet other members for
relationships, friendships or just simple social circle.
• Lastly, the internet can offer services for
downloading. Downloading on the computer might
include music, movies and programs.
Internet History
• Origins in ARPANET in 1969.
• Grew slowly at first and “exploded” in 1993 with the
adoption of the HTML standards for the World Wide
Web.
• Two protocols
– Transmission Control Protocol (TCP)
– Internet Protocol (IP)
• Most users require a relationship with an Internet
Service Provider (ISP).

6
History of the Internet cont..
• The Internet was originally developed by the
Department of Defense as a way to protect
government communications systems in the event of
a military strike.
• The original network, named ARPANet (for the
Advanced Research Projects Agency that developed
it) evolved into a communications channel among
contractors, military personnel, and university
researchers who were contributing to ARPA projects.
Who owns the Internet?
• No one, but everyone does.
• There are organizations that determine the
Internet's structure and how it works, but they
don't have any ownership over the Internet itself.
No government can lay claim to owning the
Internet, nor can any company.
• Example of this organization is Internet society
you can register as member through
www.internetsociety.org check Tanzania chapter.
Internet Growth Trends
• 1977: 111 hosts on Internet
• 1981: 213 hosts
• 1983: 562 hosts
• 1984: 1,000 hosts
• 1986: 5,000 hosts
• 1987: 10,000 hosts
• 1989: 100,000 hosts
• 1992: 1,000,000 hosts
• 2001: 150 – 175 million hosts
• 2002: over 587 million hosts
• 2017 3,885 about 51.8% of the planet is on the Internet
• 2019 4.39 billion Internet users.
• 2020 4.9 billion Internet users.
Having Internet Connectivity
• To have complete Internet connectivity you
must be able to reach all destinations on the
net.
• Your packets have to get delivered to every
destination. This is easy (default routes).
• Packets from everywhere else have to “find
you”. This is done by having your ISP(s)
advertise routes for you.
Types of Internet connection
(Internet Access)
• Different types of technologies to access
Internet
1. Dial up Access
Uses Modem and a phone call placed over the
public switched telephone network.
Connecting a device to the Internet using a
modem or public telephone network.
Different types of technologies to access Internet
Continues……..

2. Broad Band Access:


This covers a broad range of technologies can be
wires or high speed Internet connection this
technology can use fiber optic cables.
3. Wireless broadband access
Provide fixed and mobile Internet access.
Wi-FI wireless Local area network
Different types of technologies to access Internet
Continues……..

• 4. satellite Broadband
Internet access provided through
communication satellite
Intranets and Extranets
• An Intranet is an Internet like network but
access is restricted to within a business or
organization.
• Firewalls are used to control access to an
Intranet.
• An Extranet permits controlled outside access
to an Intranet like network.

14
Internet Services
• Electronic Mail – E-Mail
• World Wide Web (WWW)
• Telnet
• File Transfer Protocol (FTP)
• Chat room/online forums
• Search engine
• Social networking sites
• Other messaging application are
WhatsApp,Wechat,Viber,Telegram,Snapchat.

15
SEARCH ENGINES
• Search engines such as Google, Yahoo, MSN and
Lycos are used for searching the internet for
information or pictures.
• For example, you may need to find information
about surfing the internet safely. All you need to do
is to go to the engine and give a keyword of the topic
you are interested in finding information for.
• In our example you could type in the search bar
“internet safety” and the engine would come up with
all the information available for this topic.
COMMUNICATION – WHATSAPP, SKYPE,
YAHOO
• Messenger services provide a real breakthrough in
communication today.
• Their use has managed to minimize distances and offer the
chance to people who have friends and families living far
away from them communicate easily and cheap.
• These messenger services can be downloaded through their
respective websites and as soon as the program is on the hard
drive you can add people’s email addresses or usernames and
see them. Messenger services offer instant messaging along
with audio and video conferencing. Microphones and cameras
can be attached on the computer and people can instantly
and live conference with others for no extra cost.
CHAT ROOMS
• Chat rooms are being used from people for
communicating with individuals from all over
the world.
• Chat rooms offer the most widely used
technology for meeting people that belong to
your own network of interests.
ELECTRONIC MAIL (E-MAIL)
• Electronic mails are another form of
communication which nowadays has replaced
our traditional hand written letter.
• E-mails are letters that can be sent through
the internet and can arrive almost instantly
and without cost.
• E-mails are an essential part of every company
and every person who needs to communicate
with people that live far away from them.
SOCIAL NETWORKING SITES
• Social Networking Sites are websites through which people
can create a personal profile of themselves so that other
members of this website can contact them should they like
their profile.
• Social Networking sites are offered for creating friendships,
relationships and social circle.
• Those websites are very popular and allow you to include
pictures of yourself and other personal information.
• In addition, people can use these websites to express the view
they have for themselves and request for people that share
the same interests as them.
DOWNLOADING SERVICES
• Downloading services are offered either
through websites or through peer to peer
programs and allow people to download
music, movies or programs on to their
computer.
• Peer to peer programs have the form of a
program through which people that are
connected at the same time can share music,
video or program files that already have on
their computer.
What is a Network?
A group of three or more connected
communicating entities

22
Measuring Networks

• Latency
Time from sending a bit until it arrives
seconds (or seconds per geographic distance)
• Bandwidth
How much information can you transmit per time
unit
bits per second
Improving Latency

• Less transfer points


– Longer distances between transfer points
• Faster travel
– Hard to beat speed of light (semaphore network)
– Electrons in copper travel about 1/3rd speed of light
• Faster transfers
– Replace humans with machines
Improving Bandwidth

• Faster transmission
– Train signalers to move semaphore flags faster
– Use something less physically demanding to transmit
• Bigger pipes
– Have multiple signalers transmit every other letter at the
same time
• Better encoding

25
Internetwork
A collection of multiple networks connected
together, so messages can be transmitted
between nodes on different networks.

26
EMAIL, ITS FEATURES AND USES
Definition
• Electronic mail: (computer science) a system
of world-wide electronic communication in
which a computer user can compose a
message at one terminal that can be
regenerated at the recipient's terminal when
the recipient logs in;
Introduction to Email
• Electronic mail, (email or e-mail), is a method of
exchanging digital messages from an author to one or
more recipients.
• Modern email operates across the Internet or other
computer networks.
• Some early email systems required that the author and
the recipient both be online at the same time, in common
with instant messaging.
• Today's email systems are based on a store-and-forward
model.
– Email servers accept, forward, deliver and store messages.
Neither the users nor their computers are required to be
online simultaneously; they need connect only briefly, typically
to an email server, for as long as it takes to send or receive
messages.
Email Parts
• An email message consists of three components,
the message envelope, the message header, and
the message body.
• The message header contains control
information, including,slightly, an originator's
email address and one or more recipient
addresses.
• Usually descriptive information is also added,
such as a subject header field and a message
submission date/time stamp.
Email Origin
• Network-based email was initially exchanged on
the ARPANET in extensions to the File Transfer
Protocol (FTP), but is now carried by the Simple
Mail Transfer Protocol (SMTP), first published as
Internet standard 10 (RFC 821 Request for
comment) in 1982.
• In the process of transporting email messages
between systems, SMTP communicates delivery
parameters using a message envelope separate
from the message (header and body) itself.
EMAIL STRUCTURE
Email Systems and Uses
• What email client(s) do you use?
–Why?
–How Long?
• Multiple Mailboxes?
–How Many?
–For What?
• What Features differentiate each mail
box?
• Do you use Social Networks?
Why we need Email?
• PC Users Spend Most of Their Day in their
Email Application
– Defining “Knowledge Workers”?
– Support Staff
• Personal Information Management
– To Do (Marking up or Sending to Oneself)
– Contact Management
• Project Tracking
• Email for EVERYTHING?
Why we need Email?
• Too Much of a Good Thing
– Filters
– Folders
• Searching May Be Faster
– Time to File
– Time to Find
• Searching Not Helping to Build (Traditional)
Conceptual Model of Tasks or Messages
Email Features
• Be familiar with a number of email
features including:
–attaching documents
–creating distribution lists
–creating a signature
–strategies for managing email
–other email options
Email features cont….
• The email products are web-based and accessed
through the Web domains or Web Portals.
• An individual email is limited to a maximum size
including attachments.
• All email messages are filtered for inappropriate
content.
• All email are scanned for viruses.
• Executable files cannot be attached to an email.
Email features cont…
• Email Size
• The bigger the emails that are sent, received and/or deleted, the quicker the
email box will be filled.
• The system will inform the user when the mail box is approaching capacity.
The user will then need to clean out the sent, received and deleted boxes.
• Filtered Email
• Filtering is text based and uses an evolving dictionary to detect inappropriate
content.
• Email containing inappropriate content will not be sent; nor can an email
containing inappropriate content be received.
• Should an email to a student containing inappropriate content pass through
the filter, the student must inform a teacher immediately, for appropriate
action. The offending email should not be deleted, but rather forwarded to
the teacher prior to the student deleting it.
• Current technology cannot detect inappropriate images. If inappropriate
images are received, a teacher needs to be contacted for appropriate action.
• Virus Protection
• Email containing a virus will be deleted
Features – The Inbox
The Inbox
– New
– Delete
– Reply to
– Reply to all
– Forward
• Needs to be refreshed to display recent deliveries
• Email Security
Features – the Inbox
The standard Inbox features are:
– New – displays a new email form. Needs to have at least the email address of a
recipient, a subject and a message.
– Delete – removes email from Inbox to the Delete folder.
– Reply to – opens an email form, addressed to the sender with the text of the
original email included. A reply can then be added above the text of the original
email.
– Reply to all – opens an email form addressed to all those who received the email
originally, with the text of the email included. A reply can then be added above the
text of the original email.
– Forward – opens an email form with no addressee – this will need to be added –
but includes the text of the email. The email can then be sent, with any
attachments, to another user. Overuse of this feature is considered, by some, to be
SPAM.
– The system does not automatically update once an email has been opened. The
Inbox link needs to be clicked to refresh the Inbox window. Sent Items and Deleted
items need to be refreshed in the same way.
– Email Security
– Email security is becoming increasingly important visit
http://www.itsecurity.com/features/25-common-email-security-mistakes-022807/
Other features
• Sent items
– Records and stores email that has been sent
• Deleted Items
• Search email
– A quick way to locate specific email
• Options
– Creating a signature
– Out-of-office reply
– Customising My email
• Calendar – free and busy
Other features cont….
• Sent Items
• This window contains a list of all the email that has been sent from
the account (and that has not been deleted from this window).
• Deleted Items
• Stores email that has been deleted – provides a “second chance” to
retrieve email inadvertently deleted. Should deleted email need to
be recovered, it may be accessed (for a short time) in the Recover
Deleted Items in Options
• Search email
• This provides the ability to search for email that:
• contains a key word in either the subject line or the body of the
email
• has been sent to or received from a particular person
• This is valuable when there is a large number of email to be sifted
through.
Other features cont.….
• Creating a signature
• This option creates a “signature” that will appear at the bottom of
every email that is sent from your account. A signature is essential –
without a signature it is not always possible to fully identify the
sender of an email.
• Out-of-office reply – Outlook feature
• When this option is selected, a reply will be automatically sent
advising the sender that the message will not be opened
immediately because the user is out of the office and won’t be
looking at email. This is useful when the user is on holidays or
otherwise won’t be reviewing email for a protracted period.
• The Calendar – Outlook Feature
• can be used to record planned events
• can be used to invite other users to events. Busy and free may be
indicated for each staff user at the school.
Email and Spam
• Spam is unsolicited(given or supplied without being
requested) email that may be sent to email accounts.
• While spam seems to be all pervasive, users can take steps to
minimise their exposure to it:
1. Filters can be put in place to block spam from a user’s inbox.
However, it is unlikely that even the best, most efficient filters
will be 100% successful by themselves.
2. Users, to complement spam filters, need to ensure that their
email address is not made available on-line. Various strategies
are available to minimise the exposure to spam.
• Refer to
https://detwww.det.nsw.edu.au/directorates/itb/policy/spam/ for
more information about spam and strategies that can be used to
minimise it.
CLASS ACTIVITY
• By using your own words explain the term cyber
crime
• Explain different types of cyber crime you know
• Explain 4 cases of online crimes reported in
Tanzania
• Use Microsoft word to present your answers
This work should have 800-1000 words(5 marks)
• Use this link for further references:
https://www.unodc.org/e4j/en/tertiary/cybercri
me.html


Education for Justice(E4J) under United Nations Office on
Drags and Crime has come with University Cyber Crime
Module through below link

https://www.unodc.org/e4j/en/tertiary/cybercrime.htm
l
WHAT IS FTP?

• FTP works on the client/server principle. A client


program enables the user to interact with a server in
order to access information and services on the
server computer.

• Files that can be transferred are stored on


computers called FTP servers. To access these files,
an FTP client program is used. This is an interface
that allows the user to locate the file(s) to be
transferred and initiate the transfer process.
Objectives of FTP

The objectives of the FTP are:


• Promote sharing of files,
• Transfers data reliably and efficiently,
MODE OF TRANSFER
• There are two modes of transfer ascii (American
standard code for information Interchange ) and
binary.
• ASCII is used only for files saved in ASCII format (this
includes Postcript files)
• Binary is used for files that are formatted and saved
using a wordprocessing software like WordPerfect
(.txt), spreadsheets (.xls), images (.jpg, .gif), and
many executable programs (.exe) and videos (.avi).
BASIC STEPS TO USE FTP

• Connect to the FTP server


• Navigate the file structure to find the file you
want
• Transfer the file
• The specifics of each step will vary, depending on
the client program being used and the type of
Internet connection.
FTP Questions
• Define FTP?
File Transfer Protocol - the ability to send files from one computer to
another via the telephone network with the aid of the internet.
• What is the difference between ASCII and Binary files?
ASCII is used only for files saved in ASCII format and Binary is used for files
that are formatted and saved using a Word Processing software.
• What type of file is a file with the extension:
.exe?executable
.txt? text
.jpg? picture
.avi? video/movie
.zip? Compressed
• What safety measures should you take before downloading files from the
Internet?
Be sure to have virus detection software loaded on your computer before
downloading files to be sure you don’t infect your computer with a virus.
The World Wide Web
WWW Background

• 1989-1990 – Tim Berners-Lee invents the World Wide


Web at CERN
– Means for transferring text and graphics simultaneously
– Client/Server data transfer protocol
• Communication via application level protocol
• System ran on top of standard networking infrastructure
– Text mark up language
• Not invented by Bernes-Lee
• Simple and easy to use
• Requires a client application to render text/graphics
54
WWW History contd.
• 1994 – Mark Andreesen invents MOSAIC at National Center for
Super Computing Applications (NCSA)
– First graphical browser
– Internet’s first “killer app”
– Freely distributed
– Became Netscape Inc.
• 1995 (approx.) – Web traffic becomes dominant
– Exponential growth
– E-commerce
– Web infrastructure companies
– World Wide Web Consortium
• Reference: “Web Protocols and Practice”, Krishnamurthy and
Rexford
55
WWW Components

• Structural Components
– Clients/browsers – to dominant implementations
– Servers – run on sophisticated hardware
– Caches – many interesting implementations
– Internet – the global infrastructure which facilitates data
transfer
• Semantic Components
– Hyper Text Transfer Protocol (HTTP)
– Hyper Text Markup Language (HTML)
• eXtensible Markup Language (XML)
– Uniform Resource Identifiers (URIs)
56 CS 640
WWW Structure

• Clients use browser application to send URIs via HTTP to servers


requesting a Web page
• Web pages constructed using HTML (or other markup language)
and consist of text, graphics, sounds plus embedded files
• Servers (or caches) respond with requested Web page
– Or with error message
• Client’s browser renders Web page returned by server
– Page is written using Hyper Text Markup Language (HTML)
– Displaying text, graphics and sound in browser
– Writing data as well
• The entire system runs over standard networking protocols
(TCP/IP, DNS,…)
57
Uniform Resource Identifiers

• Web resources need names/identifiers – Uniform Resource


Identifiers (URIs)
– Resource can reside anywhere on the Internet
• URIs are a somewhat abstract notion
– A pointer to a resource to which request methods can be applied to
generate potentially different responses
• A request method is eg. fetching or changing the object
• Instance: http://www.iaa.ac.tz/index.html
– Protocol, server, resource
• Most popular form of a URI is the Uniform Resource Locator
(URL)
– Differences between URI and URL are beyond scope
– RFC 2396
58
HTTP Basics

• Protocol for client/server communication


– The heart of the Web
– Very simple request/response protocol
• Client sends request message, server replies with response message
– Stateless
– Relies on URI naming mechanism
• Three versions have been used
– 09/1.0 – very close to Berners-Lee’s original
• RFC 1945 (original RFC is now expired)
– 1.1 – developed to enhance performance, caching, compression
• RFC 2068
– 1.0 dominates today but 1.1 is catching up

59
World Wide Web Success
• World Wide Web succeeded because it was
simple!
– Didn’t attempt to maintain links, just a common
way to name things
– Uniform Resource Locators (URL)
http://www.iaa.ac.tz/index.html
Service Hostname File Path

HyperText Transfer Protocol


Implications of the Internet to
Accounting
Accounting is the process of measuring, interpreting, and
communicating financial information to support internal and
external business decision making.
• Open book management - sharing sensitive
financial information with employees and teaching
them how to understand and use financial
statements.
• Viewing financial information may help them
better understand how their work contributes to
the company’s success.
• Outsiders use financial data to evaluate
investment opportunities.
• Financing activities provide necessary funds to start
a business and expand it after it begins operating.
• Investing activities provide valuable assets required
to run a business.
• Operating activities focus on selling goods and
services, but they also consider expenses as
important elements of sound financial management.
• Public Accountants
– Provide accounting services to individuals or business
firms for a fee
• Management Accountants
– Provide timely, relevant, accurate, and concise
information that executives can use to operate their
firms
• Government and Not-for-Profit Accountants
Accounting process - set of activities involved in converting
information about transactions
into financial statements.
• Simplifies the accounting process by automating data entry and
calculations.

• Available products are customized for businesses of different sizes.


– Entrepreneurs and small businesses use: QuickBooks, Peachtree,
and BusinessWorks.

– Larger firms use larger scale software packages like: Computer


Associates, Oracle.

• Software that handles accounting information for international


businesses is another option. Offers different country
information/language.

• Some systems offer web-based packages for small and medium


businesses.

You might also like