Internet and Emails
Internet and Emails
1
Introduction Internet
• The Internet is a global system of interconnected computer
networks that use the standard Internet Protocol Suite
(TCP/IP) to serve billions of users worldwide.
• It is a network of networks that consists of millions of private,
public, academic, business, and government networks, of
local to global scope, that are linked by a broad array of
electronic, wireless and optical networking technologies.
• The Internet carries a vast range of information resources and
services, such as the inter-linked hypertext documents of the
World Wide Web (WWW) and the infrastructure to support
electronic mail.
Introduction cont.…..
• The internet is a worldwide public network of
computers on which people can join and use
multiple services such as sharing of information.
• The World Wide Web (WWW) is one of the major
services of the internet who hosts information of
almost about anything one might like to search for.
• Search engines are being used to browse through the
available sources of information and can make
discovering of information an easy to use
• .
Introduction cont.…..
• In addition, the internet offers communication services
where people can use to conduct friends and family
that may live in a different country. Such
communication services include Instagram, facebook
Skype and Yahoo, whatsapp messenger etc.
• Chat rooms are another way for communication
through which people have the chance to communicate
with other people that have never met before, or that
live in different countries.
• E-mails are another form for communicating with family
and friends and have now replaced the traditional
hand-written letters.
Introduction cont….
• Social networking sites are websites that offer people
the chance to create a profile for themselves,
describing likes and dislikes and the expectations of a
person from other people. The purpose of these sites
is to enable members to meet other members for
relationships, friendships or just simple social circle.
• Lastly, the internet can offer services for
downloading. Downloading on the computer might
include music, movies and programs.
Internet History
• Origins in ARPANET in 1969.
• Grew slowly at first and “exploded” in 1993 with the
adoption of the HTML standards for the World Wide
Web.
• Two protocols
– Transmission Control Protocol (TCP)
– Internet Protocol (IP)
• Most users require a relationship with an Internet
Service Provider (ISP).
6
History of the Internet cont..
• The Internet was originally developed by the
Department of Defense as a way to protect
government communications systems in the event of
a military strike.
• The original network, named ARPANet (for the
Advanced Research Projects Agency that developed
it) evolved into a communications channel among
contractors, military personnel, and university
researchers who were contributing to ARPA projects.
Who owns the Internet?
• No one, but everyone does.
• There are organizations that determine the
Internet's structure and how it works, but they
don't have any ownership over the Internet itself.
No government can lay claim to owning the
Internet, nor can any company.
• Example of this organization is Internet society
you can register as member through
www.internetsociety.org check Tanzania chapter.
Internet Growth Trends
• 1977: 111 hosts on Internet
• 1981: 213 hosts
• 1983: 562 hosts
• 1984: 1,000 hosts
• 1986: 5,000 hosts
• 1987: 10,000 hosts
• 1989: 100,000 hosts
• 1992: 1,000,000 hosts
• 2001: 150 – 175 million hosts
• 2002: over 587 million hosts
• 2017 3,885 about 51.8% of the planet is on the Internet
• 2019 4.39 billion Internet users.
• 2020 4.9 billion Internet users.
Having Internet Connectivity
• To have complete Internet connectivity you
must be able to reach all destinations on the
net.
• Your packets have to get delivered to every
destination. This is easy (default routes).
• Packets from everywhere else have to “find
you”. This is done by having your ISP(s)
advertise routes for you.
Types of Internet connection
(Internet Access)
• Different types of technologies to access
Internet
1. Dial up Access
Uses Modem and a phone call placed over the
public switched telephone network.
Connecting a device to the Internet using a
modem or public telephone network.
Different types of technologies to access Internet
Continues……..
• 4. satellite Broadband
Internet access provided through
communication satellite
Intranets and Extranets
• An Intranet is an Internet like network but
access is restricted to within a business or
organization.
• Firewalls are used to control access to an
Intranet.
• An Extranet permits controlled outside access
to an Intranet like network.
14
Internet Services
• Electronic Mail – E-Mail
• World Wide Web (WWW)
• Telnet
• File Transfer Protocol (FTP)
• Chat room/online forums
• Search engine
• Social networking sites
• Other messaging application are
WhatsApp,Wechat,Viber,Telegram,Snapchat.
15
SEARCH ENGINES
• Search engines such as Google, Yahoo, MSN and
Lycos are used for searching the internet for
information or pictures.
• For example, you may need to find information
about surfing the internet safely. All you need to do
is to go to the engine and give a keyword of the topic
you are interested in finding information for.
• In our example you could type in the search bar
“internet safety” and the engine would come up with
all the information available for this topic.
COMMUNICATION – WHATSAPP, SKYPE,
YAHOO
• Messenger services provide a real breakthrough in
communication today.
• Their use has managed to minimize distances and offer the
chance to people who have friends and families living far
away from them communicate easily and cheap.
• These messenger services can be downloaded through their
respective websites and as soon as the program is on the hard
drive you can add people’s email addresses or usernames and
see them. Messenger services offer instant messaging along
with audio and video conferencing. Microphones and cameras
can be attached on the computer and people can instantly
and live conference with others for no extra cost.
CHAT ROOMS
• Chat rooms are being used from people for
communicating with individuals from all over
the world.
• Chat rooms offer the most widely used
technology for meeting people that belong to
your own network of interests.
ELECTRONIC MAIL (E-MAIL)
• Electronic mails are another form of
communication which nowadays has replaced
our traditional hand written letter.
• E-mails are letters that can be sent through
the internet and can arrive almost instantly
and without cost.
• E-mails are an essential part of every company
and every person who needs to communicate
with people that live far away from them.
SOCIAL NETWORKING SITES
• Social Networking Sites are websites through which people
can create a personal profile of themselves so that other
members of this website can contact them should they like
their profile.
• Social Networking sites are offered for creating friendships,
relationships and social circle.
• Those websites are very popular and allow you to include
pictures of yourself and other personal information.
• In addition, people can use these websites to express the view
they have for themselves and request for people that share
the same interests as them.
DOWNLOADING SERVICES
• Downloading services are offered either
through websites or through peer to peer
programs and allow people to download
music, movies or programs on to their
computer.
• Peer to peer programs have the form of a
program through which people that are
connected at the same time can share music,
video or program files that already have on
their computer.
What is a Network?
A group of three or more connected
communicating entities
22
Measuring Networks
• Latency
Time from sending a bit until it arrives
seconds (or seconds per geographic distance)
• Bandwidth
How much information can you transmit per time
unit
bits per second
Improving Latency
• Faster transmission
– Train signalers to move semaphore flags faster
– Use something less physically demanding to transmit
• Bigger pipes
– Have multiple signalers transmit every other letter at the
same time
• Better encoding
25
Internetwork
A collection of multiple networks connected
together, so messages can be transmitted
between nodes on different networks.
26
EMAIL, ITS FEATURES AND USES
Definition
• Electronic mail: (computer science) a system
of world-wide electronic communication in
which a computer user can compose a
message at one terminal that can be
regenerated at the recipient's terminal when
the recipient logs in;
Introduction to Email
• Electronic mail, (email or e-mail), is a method of
exchanging digital messages from an author to one or
more recipients.
• Modern email operates across the Internet or other
computer networks.
• Some early email systems required that the author and
the recipient both be online at the same time, in common
with instant messaging.
• Today's email systems are based on a store-and-forward
model.
– Email servers accept, forward, deliver and store messages.
Neither the users nor their computers are required to be
online simultaneously; they need connect only briefly, typically
to an email server, for as long as it takes to send or receive
messages.
Email Parts
• An email message consists of three components,
the message envelope, the message header, and
the message body.
• The message header contains control
information, including,slightly, an originator's
email address and one or more recipient
addresses.
• Usually descriptive information is also added,
such as a subject header field and a message
submission date/time stamp.
Email Origin
• Network-based email was initially exchanged on
the ARPANET in extensions to the File Transfer
Protocol (FTP), but is now carried by the Simple
Mail Transfer Protocol (SMTP), first published as
Internet standard 10 (RFC 821 Request for
comment) in 1982.
• In the process of transporting email messages
between systems, SMTP communicates delivery
parameters using a message envelope separate
from the message (header and body) itself.
EMAIL STRUCTURE
Email Systems and Uses
• What email client(s) do you use?
–Why?
–How Long?
• Multiple Mailboxes?
–How Many?
–For What?
• What Features differentiate each mail
box?
• Do you use Social Networks?
Why we need Email?
• PC Users Spend Most of Their Day in their
Email Application
– Defining “Knowledge Workers”?
– Support Staff
• Personal Information Management
– To Do (Marking up or Sending to Oneself)
– Contact Management
• Project Tracking
• Email for EVERYTHING?
Why we need Email?
• Too Much of a Good Thing
– Filters
– Folders
• Searching May Be Faster
– Time to File
– Time to Find
• Searching Not Helping to Build (Traditional)
Conceptual Model of Tasks or Messages
Email Features
• Be familiar with a number of email
features including:
–attaching documents
–creating distribution lists
–creating a signature
–strategies for managing email
–other email options
Email features cont….
• The email products are web-based and accessed
through the Web domains or Web Portals.
• An individual email is limited to a maximum size
including attachments.
• All email messages are filtered for inappropriate
content.
• All email are scanned for viruses.
• Executable files cannot be attached to an email.
Email features cont…
• Email Size
• The bigger the emails that are sent, received and/or deleted, the quicker the
email box will be filled.
• The system will inform the user when the mail box is approaching capacity.
The user will then need to clean out the sent, received and deleted boxes.
• Filtered Email
• Filtering is text based and uses an evolving dictionary to detect inappropriate
content.
• Email containing inappropriate content will not be sent; nor can an email
containing inappropriate content be received.
• Should an email to a student containing inappropriate content pass through
the filter, the student must inform a teacher immediately, for appropriate
action. The offending email should not be deleted, but rather forwarded to
the teacher prior to the student deleting it.
• Current technology cannot detect inappropriate images. If inappropriate
images are received, a teacher needs to be contacted for appropriate action.
• Virus Protection
• Email containing a virus will be deleted
Features – The Inbox
The Inbox
– New
– Delete
– Reply to
– Reply to all
– Forward
• Needs to be refreshed to display recent deliveries
• Email Security
Features – the Inbox
The standard Inbox features are:
– New – displays a new email form. Needs to have at least the email address of a
recipient, a subject and a message.
– Delete – removes email from Inbox to the Delete folder.
– Reply to – opens an email form, addressed to the sender with the text of the
original email included. A reply can then be added above the text of the original
email.
– Reply to all – opens an email form addressed to all those who received the email
originally, with the text of the email included. A reply can then be added above the
text of the original email.
– Forward – opens an email form with no addressee – this will need to be added –
but includes the text of the email. The email can then be sent, with any
attachments, to another user. Overuse of this feature is considered, by some, to be
SPAM.
– The system does not automatically update once an email has been opened. The
Inbox link needs to be clicked to refresh the Inbox window. Sent Items and Deleted
items need to be refreshed in the same way.
– Email Security
– Email security is becoming increasingly important visit
http://www.itsecurity.com/features/25-common-email-security-mistakes-022807/
Other features
• Sent items
– Records and stores email that has been sent
• Deleted Items
• Search email
– A quick way to locate specific email
• Options
– Creating a signature
– Out-of-office reply
– Customising My email
• Calendar – free and busy
Other features cont….
• Sent Items
• This window contains a list of all the email that has been sent from
the account (and that has not been deleted from this window).
• Deleted Items
• Stores email that has been deleted – provides a “second chance” to
retrieve email inadvertently deleted. Should deleted email need to
be recovered, it may be accessed (for a short time) in the Recover
Deleted Items in Options
• Search email
• This provides the ability to search for email that:
• contains a key word in either the subject line or the body of the
email
• has been sent to or received from a particular person
• This is valuable when there is a large number of email to be sifted
through.
Other features cont.….
• Creating a signature
• This option creates a “signature” that will appear at the bottom of
every email that is sent from your account. A signature is essential –
without a signature it is not always possible to fully identify the
sender of an email.
• Out-of-office reply – Outlook feature
• When this option is selected, a reply will be automatically sent
advising the sender that the message will not be opened
immediately because the user is out of the office and won’t be
looking at email. This is useful when the user is on holidays or
otherwise won’t be reviewing email for a protracted period.
• The Calendar – Outlook Feature
• can be used to record planned events
• can be used to invite other users to events. Busy and free may be
indicated for each staff user at the school.
Email and Spam
• Spam is unsolicited(given or supplied without being
requested) email that may be sent to email accounts.
• While spam seems to be all pervasive, users can take steps to
minimise their exposure to it:
1. Filters can be put in place to block spam from a user’s inbox.
However, it is unlikely that even the best, most efficient filters
will be 100% successful by themselves.
2. Users, to complement spam filters, need to ensure that their
email address is not made available on-line. Various strategies
are available to minimise the exposure to spam.
• Refer to
https://detwww.det.nsw.edu.au/directorates/itb/policy/spam/ for
more information about spam and strategies that can be used to
minimise it.
CLASS ACTIVITY
• By using your own words explain the term cyber
crime
• Explain different types of cyber crime you know
• Explain 4 cases of online crimes reported in
Tanzania
• Use Microsoft word to present your answers
This work should have 800-1000 words(5 marks)
• Use this link for further references:
https://www.unodc.org/e4j/en/tertiary/cybercri
me.html
•
Education for Justice(E4J) under United Nations Office on
Drags and Crime has come with University Cyber Crime
Module through below link
https://www.unodc.org/e4j/en/tertiary/cybercrime.htm
l
WHAT IS FTP?
• Structural Components
– Clients/browsers – to dominant implementations
– Servers – run on sophisticated hardware
– Caches – many interesting implementations
– Internet – the global infrastructure which facilitates data
transfer
• Semantic Components
– Hyper Text Transfer Protocol (HTTP)
– Hyper Text Markup Language (HTML)
• eXtensible Markup Language (XML)
– Uniform Resource Identifiers (URIs)
56 CS 640
WWW Structure
59
World Wide Web Success
• World Wide Web succeeded because it was
simple!
– Didn’t attempt to maintain links, just a common
way to name things
– Uniform Resource Locators (URL)
http://www.iaa.ac.tz/index.html
Service Hostname File Path