SlideShare a Scribd company logo
Real-Time Communication on the Internet Communicating in Real-Time and  Exploring Wireless Networks Tutorial 6
Objectives Learn different ways to chat on the Internet. Explore different chat client programs. Find chat rooms devoted to specific topics. Explore businesses that let you create your own chat rooms. Learn about and explore virtual communities and their use in business.
Objectives Explore the history of the wireless Internet. Learn about different wireless networks. Locate wireless devices that let you access the Internet. Evaluate wireless carriers in the United States. Learn about wireless broadband networks.
What Is Chat? Chat : a general term for real-time communication that occurs over the Internet. Originally, the term  chat  described the act of users exchanging typed messages, or a  text   chat . Voice   Chat:   where participants speak to each other in real time, much like they would be using a telephone. Video   Chat:   where participants can see and speak to each other.
What Is Chat? Private Chat:   occurs between individuals who know each other and are invited to participate in the chat. Public Chat:  occurs in a public area, sometimes called a  chat   room , in which people come and go. Chats can be continuous, with participants entering and leaving ongoing discussions or they can be planned for a specific time and to last for a specific duration.
What Is Chat? Most chat tools allow users to save a transcript of the chat session for future reference. The practice of reading messages and not contributing to the discussion is called  lurking . Chatting requires participants to type quickly, therefore, chat participants often omit capitalization and do not worry about proper spelling and grammar.
Commonly Used Chat Acronyms
What Is Chat? Flaming:   when a participant insults or ridicules another participant. Spamming:   when someone or an organization sends unsolicited and irrelevant messages to a chat room. Although many chat rooms don’t enforce the rules of netiquette, as you use the Internet to communicate, you should exercise common courtesy and respect as you would when speaking in person with other people.
Internet Relay Chat Early UNIX computers included a program called  Talk  that allowed users to exchange short text messages. In 1988, Jarkko Oikarinen wrote a communications program that extended the capabilities of the Talk program to multi-user.  It was called  Internet   Relay   Chat  ( IRC ). IRC uses a client-server network model: IRC servers are connected through the internet to form an IRC network. Individual chat participants use IRC clients that connect to the servers in the network.
Internet Relay Chat The original network was  EFNet , which is still one of the largest IRC networks today.  Other major IRC networks include IRCNet, Undernet, DALnet, and NewNet. Servers in each of these IRC networks are connected to each other as part of the Internet, but IRC traffic is segregated by network.
Independent IRC Networks on the Internet New Perspectives on The Internet, Sixth Edition—Comprehensive Tutorial 6
Internet Relay Chat IRC networks organize their chats by topic. Each topic area is called a  channel , and participants who connect to an IRC network join specific channels in which they conduct their chats. Each channel has a name, or a  channel   heading , that uses the pound sign (#) to indicate the chat’s topic. When a participant creates a new channel, he becomes responsible for managing the channel and is called the  channel   operator ,  channel   op , or  IRCop .
Internet Relay Chat The  channel   operator  can change the channel’s topic and heading at any time, determines which users may participate in the channel, and can change whether the channel is public or private. Participants select  nicknames  when they log on to an IRC server.  Nicknames must be unique. A channel operator’s nickname is preceded by  @. IRC servers run automated programs, called  IRC   robots  or bots, which perform routine services on the IRC network.
Commonly Used IRC Commands
Chat in Progress Using ICQ New Perspectives on The Internet, Sixth Edition—Comprehensive Tutorial 6
Instant Messaging Software Instant messaging  software lets two users chat in real time over the Internet. Instant   messages  usually occur between people who know each other, and are especially popular with friends and families separated by geographic distances. The software has built-in tools that let you identify your friends and alert you when your friends are online.
Instant Messaging Software Instant messaging is different from e-mail in two important ways: When you send an e-mail message to a user, you do not have a way to determine if that user is online at the time you send your message. When you send an instant message, the instant messaging software identifies whether the intended recipient is online before you send the message.
Instant Messaging Software ICQ Pronounced “I seek you” One of the most popular instant messaging software programs Created by Mirabilis, an Israeli company in 1996 AOL purchased the software in 1998 and offers it as freeware AIM  ( AOL Instant Messenger ) Available to anyone, even those without an AOL account. MSN Messenger / Windows Messenger Yahoo! Messenger
Instant Messaging Software You must use the same  instant messaging software  to chat with other users. Some  instant   messaging   software  programs have options for logging on to your chat account using a Web page so you can use the software when you are away from your primary computer. All  instant   messaging   software  programs have some features that work on wireless devices, such as cell phones. All  instant   messaging   software  is free and requires an Internet connection, preferably a broadband connection.
Instant Messaging Software New Perspectives on The Internet, Sixth Edition—Comprehensive Tutorial 6 Windows Messenger
Instant Messaging Software New Perspectives on The Internet, Sixth Edition—Comprehensive Tutorial 6 Home page of Cerulean Studios, which produces Trillian instant message software. Trillian allows you to chat with people using different IM software.
Web-Based Chat Sites Web-based chat sites  offer the same features as text-based IRC chat networks and instant messaging but are often easier to use and do not require users to download and install any software. In  Web-based   chat , some users lurk and others have multiple conversations going at the same time. The chat room identifies users as they speak with their user names. Conversations are often open-ended and rarely follow the prescribed topic.
Web-Based Chat Sites Most Web-based chat sites prohibit spam messages, the use of automated programs, profane and vulgar language, and threats to individuals. Most sites require you to register before using their chat rooms. Although Web sites that provide chat rooms have rules of appropriate conduct, you might encounter conversations taking place that are offensive to you.
Web-Based Chat Sites New Perspectives on The Internet, Sixth Edition—Comprehensive Tutorial 6
Finding Web Chat Sites Use a directory that provides an organized list of chat site hyperlinks. The descriptions for each hyperlink might tell you more about the nature of the chat to which it leads. Use a Web search engine and include the word “chat” in the search expression.
Creating a Chat Room Use the features at a portal site such as Yahoo! Chat to create your own chat room. Easy, inexpensive, and usually includes tools that let you give access to only those people you want to participate in the chat that you create. Several businesses offer services that support the different situations in which an organization might need to conduct a private, moderated chat.
Sharing Information in  Virtual Communities Virtual community :  a place on the Internet where people can gather to discuss issues and share information. Types of virtual communities: online social networks online business networks online political networks
Online Social Networks Virtual communities that exist for the sole purpose of being a community. Useful tools for persons who want to make new local friends, establish acquaintances before moving to a new location, or obtain advice of various kinds. Rely on advertising to generate revenue.  Some of the sites charge, or plan in the near future to charge, a monthly membership fee.  Other sites plan to charge for specific site features.
Online Business Networks Focus on business networking. Users log on to seek jobs, find potential business partners, recruit workers, and engage in other business development activities. Users are looking for specific solutions to their problems. Online business networks tend to use categories that reflect specific interests and try to make it easy for business persons to find exactly the connections they need, quickly and efficiently.
Online Political Networks Used in the 2004 U.S. elections to rally supporters, raise funds, and get their messages out to voters. Provide a place for people interested in a candidate or an issue to communicate with each other. These sites allow people to discuss issues, plan strategies, and arrange in-person meetings called  meetups .
Evolution of Wireless Networks When you connect to your Internet service provider, you’re creating a  wired connection . A  wireless   connection  occurs when data, such as a person’s voice, is transferred to another location without the use of any wires. In 1994, carriers created digital networks, or  Personal   Communication   Service   (PCS ), where data was carried in bits at a rate of up to 14.4 Kbps.
Evolution of Wireless Networks The year 1999 saw the introduction of the first  “wireless”  connections to the Internet. Personal   digital   assistant   (PDA):   a handheld computer that can send and receive wireless telephone and fax calls, act as a personal organizer, perform calculations, store notes, and download Web pages formatted for handheld devices. The  wireless   Internet  has expanded to include different hardware devices, networks, and other options.
Evolution of Wireless Networks Cell phones were one of the first wireless connections to transfer a person’s voice.  Text messaging occurs over  second-generation   wireless   systems , or  2G   wireless . Short   Message   Service   (SMS)  lets you send text messages of up to 160 characters over a 2G wireless network to a wireless phone. SMS  is slow and you must have a network connection to receive the data.
Evolution of Wireless Networks Some handheld computers use Infrared technology to “ beam ” information from one source to another without the use of wired connections. Over 60 major U.S. markets have new  3G   wireless   systems   (third-generation wireless)  in place.  Some European countries are building and licensing 3G wireless systems. 3G   wireless   systems  offer data transfer rates of up to 2 Mbps and constant connections. Bandwidth and cost are two obstacles for getting 3G wireless systems going in the United States.
Evolution of Wireless Networks The conversion from  2G  to  3G  wireless requires the carriers to invest in technology to make the change. Many carriers have transformed and upgraded their existing networks by creating  2.5G  wireless systems. There isn’t a single network standard.  A wireless device is manufactured to work only on a  single  type of network, because different networks use different frequencies in the radio spectrum.  If you choose a wireless carrier with a 2.5G network, for example, you will not be able to receive a signal in an area with only a 2G or a 3G network because your device operates on a different frequency.
Evolution of Wireless Networks 3.5G wireless networks   use a new network protocol called Universal Mobile Telephone Service (UMTS), which is an extension of the existing W-CDMA network, to provide network connections of up to 10 Mbps. Fourth-generation wireless networks  ( 4G wireless ) also called  3G wireless and beyond networks 4G technology is expected to bring network connection speeds of up to 100 Mbps and deliver high quality audio and video to connected devices
Wireless Local Area Networking Wireless fidelity  ( Wi-Fi ):  a trademarked name of the Wireless Ethernet Compatibility Alliance (WECA) that specifies the interface between a wireless client and a base station or between two wireless clients. Wireless local area network  ( WLAN ): a network in which devices use high frequency radio waves instead of wires to communicate. Wi-Fi operates in the 2.4 GHz radio spectrum, which is the same spectrum used by cordless phones, garage door openers, microwave ovens, and other devices. because this spectrum is unlicensed, it is free  the 3G wireless spectrum needs to be licensed
Wireless Local Area Networking New Perspectives on The Internet, Sixth Edition—Comprehensive Tutorial 6 wired local area network wireless local area network
Wireless Local Area Networking Three of the most widely used standards for WLANs are 802.11a, 802.11b, and 802.11g. Transfer rate:  the speed at which data is transmitted from an access point (or base station) to the wireless device. Access   point:   a hardware device with one or more antennae that permits communication between wired and wireless networks so wireless clients can send and receive data. Range:   physical distance between the access point and the wireless device.
Wireless Local Area Networking Wi-Fi usually refers to the 802.11b specification which is the specification on which most Wi-Fi devices operate. Dual   access   point:  a new device that makes the 802.11a and 802.11b wireless standards  and the 802.11b and 802.11 g wireless standards interoperable. Wi-Fi is often used as an alternative in an office building or other area in which you might find a traditional wired local area network. It can be used where wiring cannot be installed.
Wireless Local Area Networking Laptop computers and other devices must have Wi-Fi compatible hardware installed in them to send and receive data with the network. Once you have a network interface card or other Wi-Fi compatible device, you can connect to the WLAN via that device, provided that it is physically within the area covered by the network. If you position enough access points within the appropriate range of each other, the WLAN can grow to cover an entire office complex or geographic area.
Personal Area Networking Personal area networking : refers to the wireless network that you use to connect personal devices to each other.  There are two major types of personal area networks:  Infrared and Bluetooth.
Infrared Technology The  Infrared Data Association  ( IrDA ): a group dedicated to developing low-cost, high-speed wireless connectivity solutions. Using  infrared  technology, you can wirelessly beam information from one device to another compatible device using Infrared light waves. This technology is used with PDAs, notebook computers, printers, phones, and other peripheral devices. A disadvantage is the lack of software products that can handle the transfer. The devices and the software that runs them must be compatible with each other.
Bluetooth Bluetooth : a technology that provides short-range radio links between personal computers, handheld devices, wireless phones, headsets, printers, and other electronic devices. For devices without chipsets that enable them to receive Bluetooth radio waves you can purchase an adapter to enable use with other Bluetooth devices. Bluetooth doesn’t need an access point for communication; devices communicate with each other automatically.  Bluetooth isn’t really “owned” by any specific manufacturer or group.
Bluetooth New Perspectives on The Internet, Sixth Edition—Comprehensive Tutorial 6
Bluetooth Using Bluetooth technology, you can synchronize and share data between as many as eight Bluetooth compatible devices within the specified range at a rate of up to 1 Mbps. A collection of devices connected via Bluetooth technology is called a  piconet .  A piconet can connect to eight devices at a time. You can use Bluetooth-enabled devices to transfer files, listen to music playing on a computer through a headset, print documents, or connect your notebook computer to the Internet using a wireless phone that is in your desk drawer or briefcase.
Comparing Wireless Network Standards and Bluetooth
Wireless Wide Area Networking Wireless device connections let you access the Internet on a PDA, wireless phone, or notebook computer from anywhere in the world without a wired connection. A WLAN provides a wireless connection to a network, but devices must be within the stated boundary of the WLAN. In 2.5G and 3G wireless systems,  wireless wide area networking  ( WWAN ) makes it possible to access the Internet from anywhere within the boundaries of the wireless network to which you are connected.
Creating a Wireless  Wide Area Network New Perspectives on The Internet, Sixth Edition—Comprehensive Tutorial 6
Using Wireless Devices to Access the Internet The technology and standards that dictate what you can accomplish with a wireless device change on a daily basis. New standards emerge, new hardware is created, and new ways of connectivity arrive. Select a wireless solution that has the locations in which the technology will be used in its network coverage area and that supports the features you plan to use.
Metropolitan Area Networking: WiMAX WiMAX  ( Worldwide Interoperability for Microwave Access ): uses 802.16 wireless network standard being developed for use in metropolitan areas. Metropolitan area network   ( MAN ): provides wireless broadband Internet access via radio signals in the 2 to 11 GHz and 10 to 66 GHz radio spectrum with a range of up to 31 miles and speeds of up to 70 Mbps. When multiple WiMAX towers are connected to each other, WiMAX has the potential to solve some of the geographical and speed limitations of wired networks and other wireless networks, including Wi-Fi.
Metropolitan Area Networking: WiMAX WiMAX provides broadband Internet connections at the same speed as DSL and cable, but through wireless radio connections. WiMAX works by connecting a WiMAX tower to an ISP that provides the Internet service. The WiMAX towers are connected to each other via radio signals.  WiMAX transmitters, which can be located up to 31 miles from the towers, send the signal to homes and businesses that have WiMAX receivers.  Businesses can plug the WiMAX receiver into their existing local area networks to provide high-speed Internet access to all of their connected devices.
Metropolitan Area Networking: WiMAX New Perspectives on The Internet, Sixth Edition—Comprehensive Tutorial 6
Metropolitan Area Networking: WiMAX VoIP  ( Voice over Internet Protocol ): converts audio signals to digital packets so that you can use a broadband wired or wireless Internet connection to make local and long distance telephone calls. Because WiMAX can support many types of data transmissions, it is also used for VoIP. Most experts predict that all new desktop and notebook computers and wireless devices will have built-in 802.16 cards by 2007.
Summary There are different Internet resources to chat in real time with friends and business associates There are different types of wireless networks, wireless network standards, and wireless devices. When selecting a wireless device, make sure that you understand the features of the network on which that wireless device operates. Carefully examine the network’s geographic coverage area, pricing options, and the provider’s future expansion plans before selecting the device that most closely matches the functions that you need it to perform.
Ad

More Related Content

What's hot (20)

Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
FabMinds
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
Kalpesh Kalekar
 
Agreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemoryAgreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared Memory
SHIKHA GAUTAM
 
Dbms ii mca-ch9-transaction-processing-2013
Dbms ii mca-ch9-transaction-processing-2013Dbms ii mca-ch9-transaction-processing-2013
Dbms ii mca-ch9-transaction-processing-2013
Prosanta Ghosh
 
Presentation on telnet
Presentation on telnetPresentation on telnet
Presentation on telnet
Amandeep Kaur
 
Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)
Shimona Agarwal
 
Network layer logical addressing
Network layer logical addressingNetwork layer logical addressing
Network layer logical addressing
Sri Manakula Vinayagar Engineering College
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
User Datagram protocol For Msc CS
User Datagram protocol For Msc CSUser Datagram protocol For Msc CS
User Datagram protocol For Msc CS
Thanveen
 
Network protocals
Network protocalsNetwork protocals
Network protocals
reddivarihareesh
 
Http
HttpHttp
Http
NITT, KAMK
 
Distributed Operating System
Distributed Operating SystemDistributed Operating System
Distributed Operating System
AjithaG9
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
Melvin Cabatuan
 
Message authentication
Message authenticationMessage authentication
Message authentication
CAS
 
Distance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmDistance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing Algorithm
MOHIT AGARWAL
 
Interfacing With High Level Programming Language
Interfacing With High Level Programming Language Interfacing With High Level Programming Language
Interfacing With High Level Programming Language
.AIR UNIVERSITY ISLAMABAD
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
Dulith Kasun
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
asimnawaz54
 
Compiler Design Introduction
Compiler Design IntroductionCompiler Design Introduction
Compiler Design Introduction
Kuppusamy P
 
parallel Questions & answers
parallel Questions & answersparallel Questions & answers
parallel Questions & answers
Md. Mashiur Rahman
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
FabMinds
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
Kalpesh Kalekar
 
Agreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemoryAgreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared Memory
SHIKHA GAUTAM
 
Dbms ii mca-ch9-transaction-processing-2013
Dbms ii mca-ch9-transaction-processing-2013Dbms ii mca-ch9-transaction-processing-2013
Dbms ii mca-ch9-transaction-processing-2013
Prosanta Ghosh
 
Presentation on telnet
Presentation on telnetPresentation on telnet
Presentation on telnet
Amandeep Kaur
 
Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)
Shimona Agarwal
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
User Datagram protocol For Msc CS
User Datagram protocol For Msc CSUser Datagram protocol For Msc CS
User Datagram protocol For Msc CS
Thanveen
 
Distributed Operating System
Distributed Operating SystemDistributed Operating System
Distributed Operating System
AjithaG9
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
Melvin Cabatuan
 
Message authentication
Message authenticationMessage authentication
Message authentication
CAS
 
Distance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmDistance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing Algorithm
MOHIT AGARWAL
 
Interfacing With High Level Programming Language
Interfacing With High Level Programming Language Interfacing With High Level Programming Language
Interfacing With High Level Programming Language
.AIR UNIVERSITY ISLAMABAD
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
Dulith Kasun
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
asimnawaz54
 
Compiler Design Introduction
Compiler Design IntroductionCompiler Design Introduction
Compiler Design Introduction
Kuppusamy P
 
parallel Questions & answers
parallel Questions & answersparallel Questions & answers
parallel Questions & answers
Md. Mashiur Rahman
 

Viewers also liked (20)

Risks of internet communication IV - research report (brief version)
Risks of internet communication IV - research report (brief version)Risks of internet communication IV - research report (brief version)
Risks of internet communication IV - research report (brief version)
Kamil Kopecky
 
Internet communication
Internet communicationInternet communication
Internet communication
Karwan Jacksi
 
Tutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: EmailTutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: Email
dpd
 
Internet As Communication Tools, Lifelong Learning
Internet As Communication Tools, Lifelong LearningInternet As Communication Tools, Lifelong Learning
Internet As Communication Tools, Lifelong Learning
asmajuhan
 
Cultural Studies Virtual Library: Information and Communication on the Internet
Cultural Studies Virtual Library: Information and Communication on the InternetCultural Studies Virtual Library: Information and Communication on the Internet
Cultural Studies Virtual Library: Information and Communication on the Internet
inscit2006
 
Tutorial 6 - User-Generated Content on the Internet
Tutorial 6 - User-Generated Content on the InternetTutorial 6 - User-Generated Content on the Internet
Tutorial 6 - User-Generated Content on the Internet
dpd
 
Web security
Web securityWeb security
Web security
Subhash Basistha
 
Data Communication and Internet
Data Communication and InternetData Communication and Internet
Data Communication and Internet
Anuradha Udunuwara
 
It101 lec1
It101 lec1It101 lec1
It101 lec1
Д. Сүх-Очир
 
Boletin 6
Boletin 6Boletin 6
Boletin 6
profetercero
 
La Medalla Fields & Stanislav Smirnov
La Medalla Fields & Stanislav SmirnovLa Medalla Fields & Stanislav Smirnov
La Medalla Fields & Stanislav Smirnov
javierbecerrilg
 
R3: Ruta Entrerrías Vilaboa-Pontevedra - bicicleando.es
R3: Ruta Entrerrías Vilaboa-Pontevedra - bicicleando.esR3: Ruta Entrerrías Vilaboa-Pontevedra - bicicleando.es
R3: Ruta Entrerrías Vilaboa-Pontevedra - bicicleando.es
Bicicleando
 
Delft climate kic 070212 part 1
Delft climate kic 070212 part 1Delft climate kic 070212 part 1
Delft climate kic 070212 part 1
Stanford University
 
Jugend 2011. Polen - Berlin 2012
Jugend 2011. Polen - Berlin 2012Jugend 2011. Polen - Berlin 2012
Jugend 2011. Polen - Berlin 2012
Piotr Arak
 
Employee energy measurement and energy vs. engagement
Employee energy measurement and energy vs. engagement Employee energy measurement and energy vs. engagement
Employee energy measurement and energy vs. engagement
The University of Alabama
 
Diagramas de Fase, Mecanica de Materiales
Diagramas de Fase, Mecanica de MaterialesDiagramas de Fase, Mecanica de Materiales
Diagramas de Fase, Mecanica de Materiales
Noble Drilling
 
Application optimization with POWER 7
Application optimization with POWER 7Application optimization with POWER 7
Application optimization with POWER 7
COMMON Europe
 
Broschuere Italienisch Sprachschule Italien 2010
Broschuere Italienisch Sprachschule Italien 2010Broschuere Italienisch Sprachschule Italien 2010
Broschuere Italienisch Sprachschule Italien 2010
Piccola Università Italiana
 
1000 1200 _stained_glass
1000 1200 _stained_glass1000 1200 _stained_glass
1000 1200 _stained_glass
Stefanie Pender
 
Las Generaciones En El Tiempo
Las Generaciones En El TiempoLas Generaciones En El Tiempo
Las Generaciones En El Tiempo
guestfee961a
 
Risks of internet communication IV - research report (brief version)
Risks of internet communication IV - research report (brief version)Risks of internet communication IV - research report (brief version)
Risks of internet communication IV - research report (brief version)
Kamil Kopecky
 
Internet communication
Internet communicationInternet communication
Internet communication
Karwan Jacksi
 
Tutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: EmailTutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: Email
dpd
 
Internet As Communication Tools, Lifelong Learning
Internet As Communication Tools, Lifelong LearningInternet As Communication Tools, Lifelong Learning
Internet As Communication Tools, Lifelong Learning
asmajuhan
 
Cultural Studies Virtual Library: Information and Communication on the Internet
Cultural Studies Virtual Library: Information and Communication on the InternetCultural Studies Virtual Library: Information and Communication on the Internet
Cultural Studies Virtual Library: Information and Communication on the Internet
inscit2006
 
Tutorial 6 - User-Generated Content on the Internet
Tutorial 6 - User-Generated Content on the InternetTutorial 6 - User-Generated Content on the Internet
Tutorial 6 - User-Generated Content on the Internet
dpd
 
Data Communication and Internet
Data Communication and InternetData Communication and Internet
Data Communication and Internet
Anuradha Udunuwara
 
La Medalla Fields & Stanislav Smirnov
La Medalla Fields & Stanislav SmirnovLa Medalla Fields & Stanislav Smirnov
La Medalla Fields & Stanislav Smirnov
javierbecerrilg
 
R3: Ruta Entrerrías Vilaboa-Pontevedra - bicicleando.es
R3: Ruta Entrerrías Vilaboa-Pontevedra - bicicleando.esR3: Ruta Entrerrías Vilaboa-Pontevedra - bicicleando.es
R3: Ruta Entrerrías Vilaboa-Pontevedra - bicicleando.es
Bicicleando
 
Jugend 2011. Polen - Berlin 2012
Jugend 2011. Polen - Berlin 2012Jugend 2011. Polen - Berlin 2012
Jugend 2011. Polen - Berlin 2012
Piotr Arak
 
Employee energy measurement and energy vs. engagement
Employee energy measurement and energy vs. engagement Employee energy measurement and energy vs. engagement
Employee energy measurement and energy vs. engagement
The University of Alabama
 
Diagramas de Fase, Mecanica de Materiales
Diagramas de Fase, Mecanica de MaterialesDiagramas de Fase, Mecanica de Materiales
Diagramas de Fase, Mecanica de Materiales
Noble Drilling
 
Application optimization with POWER 7
Application optimization with POWER 7Application optimization with POWER 7
Application optimization with POWER 7
COMMON Europe
 
1000 1200 _stained_glass
1000 1200 _stained_glass1000 1200 _stained_glass
1000 1200 _stained_glass
Stefanie Pender
 
Las Generaciones En El Tiempo
Las Generaciones En El TiempoLas Generaciones En El Tiempo
Las Generaciones En El Tiempo
guestfee961a
 
Ad

Similar to Tutorial 06 - Real-Time Communication on the Internet (20)

Report on online chatting
Report on online chattingReport on online chatting
Report on online chatting
Amandeep Kaur
 
how google search works submit an individual url to google.pdf
how google search works submit an individual url to google.pdfhow google search works submit an individual url to google.pdf
how google search works submit an individual url to google.pdf
Kamal Acharya
 
Internet chat
Internet chatInternet chat
Internet chat
Raja Kumar Ranjan
 
Internet relay chat (irc)
Internet relay chat (irc)Internet relay chat (irc)
Internet relay chat (irc)
Ryon Whyte
 
13134001.ppt
13134001.ppt13134001.ppt
13134001.ppt
Yani Ball
 
13. internet services
13. internet services13. internet services
13. internet services
Zambales National High School
 
Internet
InternetInternet
Internet
Harjot Singh
 
Internt.pptx
Internt.pptxInternt.pptx
Internt.pptx
musketeer2
 
Fa13 7718-ch3-kim
Fa13 7718-ch3-kimFa13 7718-ch3-kim
Fa13 7718-ch3-kim
Mary-Jo Apigo
 
Web service assignment
Web service assignmentWeb service assignment
Web service assignment
ancymary1996
 
Online Free Communication Tools
Online Free Communication ToolsOnline Free Communication Tools
Online Free Communication Tools
houbinfang
 
INTERNET SERVICES.pptx
INTERNET SERVICES.pptxINTERNET SERVICES.pptx
INTERNET SERVICES.pptx
DeepanjotSingh1
 
CHAPTER 6 Introduction to Information Technology
CHAPTER 6 Introduction to Information TechnologyCHAPTER 6 Introduction to Information Technology
CHAPTER 6 Introduction to Information Technology
jadepcuadra
 
File sharing technlogies
File sharing technlogiesFile sharing technlogies
File sharing technlogies
Mary May Porto
 
website, browser,Domain name, Email, Social networks,Ecommerce
website, browser,Domain name, Email, Social networks,Ecommercewebsite, browser,Domain name, Email, Social networks,Ecommerce
website, browser,Domain name, Email, Social networks,Ecommerce
Sumbal Noureen
 
INTRODUCTION TO THE INTERNET
INTRODUCTION TO THE INTERNETINTRODUCTION TO THE INTERNET
INTRODUCTION TO THE INTERNET
Arvin Dey
 
บริการอินเตอรเน็ต
บริการอินเตอรเน็ตบริการอินเตอรเน็ต
บริการอินเตอรเน็ต
atibodee
 
Ch 2 internet aplications1
Ch 2 internet aplications1Ch 2 internet aplications1
Ch 2 internet aplications1
CANOSSAMAHIM
 
Ch04
Ch04Ch04
Ch04
kelasapa
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
PunithRaj49
 
Report on online chatting
Report on online chattingReport on online chatting
Report on online chatting
Amandeep Kaur
 
how google search works submit an individual url to google.pdf
how google search works submit an individual url to google.pdfhow google search works submit an individual url to google.pdf
how google search works submit an individual url to google.pdf
Kamal Acharya
 
Internet relay chat (irc)
Internet relay chat (irc)Internet relay chat (irc)
Internet relay chat (irc)
Ryon Whyte
 
13134001.ppt
13134001.ppt13134001.ppt
13134001.ppt
Yani Ball
 
Web service assignment
Web service assignmentWeb service assignment
Web service assignment
ancymary1996
 
Online Free Communication Tools
Online Free Communication ToolsOnline Free Communication Tools
Online Free Communication Tools
houbinfang
 
CHAPTER 6 Introduction to Information Technology
CHAPTER 6 Introduction to Information TechnologyCHAPTER 6 Introduction to Information Technology
CHAPTER 6 Introduction to Information Technology
jadepcuadra
 
File sharing technlogies
File sharing technlogiesFile sharing technlogies
File sharing technlogies
Mary May Porto
 
website, browser,Domain name, Email, Social networks,Ecommerce
website, browser,Domain name, Email, Social networks,Ecommercewebsite, browser,Domain name, Email, Social networks,Ecommerce
website, browser,Domain name, Email, Social networks,Ecommerce
Sumbal Noureen
 
INTRODUCTION TO THE INTERNET
INTRODUCTION TO THE INTERNETINTRODUCTION TO THE INTERNET
INTRODUCTION TO THE INTERNET
Arvin Dey
 
บริการอินเตอรเน็ต
บริการอินเตอรเน็ตบริการอินเตอรเน็ต
บริการอินเตอรเน็ต
atibodee
 
Ch 2 internet aplications1
Ch 2 internet aplications1Ch 2 internet aplications1
Ch 2 internet aplications1
CANOSSAMAHIM
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
PunithRaj49
 
Ad

More from dpd (20)

CCC PT Faculty Unemployment Benefits
CCC PT Faculty Unemployment BenefitsCCC PT Faculty Unemployment Benefits
CCC PT Faculty Unemployment Benefits
dpd
 
CSCI 16 ~ Tutorial 01
CSCI 16 ~ Tutorial 01CSCI 16 ~ Tutorial 01
CSCI 16 ~ Tutorial 01
dpd
 
BA 65 Hour 6 ~ Business Operations and Practice
BA 65 Hour 6 ~ Business Operations and PracticeBA 65 Hour 6 ~ Business Operations and Practice
BA 65 Hour 6 ~ Business Operations and Practice
dpd
 
BA 65 Hour 5 ~ Creating an Ecommerce Site
BA 65 Hour 5 ~ Creating an Ecommerce SiteBA 65 Hour 5 ~ Creating an Ecommerce Site
BA 65 Hour 5 ~ Creating an Ecommerce Site
dpd
 
BA 65 Hour 4 ~ Promoting Your Site
BA 65 Hour 4 ~ Promoting Your SiteBA 65 Hour 4 ~ Promoting Your Site
BA 65 Hour 4 ~ Promoting Your Site
dpd
 
test
testtest
test
dpd
 
Chapter 14 - Operations, Quality, and Productivity
Chapter 14 - Operations, Quality, and ProductivityChapter 14 - Operations, Quality, and Productivity
Chapter 14 - Operations, Quality, and Productivity
dpd
 
Tutorial 10 - Electronic Commerce
Tutorial 10 - Electronic CommerceTutorial 10 - Electronic Commerce
Tutorial 10 - Electronic Commerce
dpd
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
dpd
 
Tutorial 8 - Creating Effective Web Pages
Tutorial 8 - Creating Effective Web PagesTutorial 8 - Creating Effective Web Pages
Tutorial 8 - Creating Effective Web Pages
dpd
 
Chapter 13 - Control Systems: Financial and Human
Chapter 13 - Control Systems: Financial and HumanChapter 13 - Control Systems: Financial and Human
Chapter 13 - Control Systems: Financial and Human
dpd
 
Chapter 12 - Team Leadership
Chapter 12 - Team LeadershipChapter 12 - Team Leadership
Chapter 12 - Team Leadership
dpd
 
Chapter 11 - Motivating for High Performance
Chapter 11 - Motivating for High PerformanceChapter 11 - Motivating for High Performance
Chapter 11 - Motivating for High Performance
dpd
 
Chapter 10 - Communicating and Informatiion Technology
Chapter 10 - Communicating and Informatiion TechnologyChapter 10 - Communicating and Informatiion Technology
Chapter 10 - Communicating and Informatiion Technology
dpd
 
Chapter 9 - Leading with Influence
Chapter 9 - Leading with InfluenceChapter 9 - Leading with Influence
Chapter 9 - Leading with Influence
dpd
 
Chapter 8 - Organizational Behavior: Power, Politics, Conflict, and Stress
Chapter 8 - Organizational Behavior: Power, Politics, Conflict, and StressChapter 8 - Organizational Behavior: Power, Politics, Conflict, and Stress
Chapter 8 - Organizational Behavior: Power, Politics, Conflict, and Stress
dpd
 
Chapter 7 - Human Resource Management
Chapter 7 - Human Resource ManagementChapter 7 - Human Resource Management
Chapter 7 - Human Resource Management
dpd
 
Tutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and SecurityTutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and Security
dpd
 
Hour 7
Hour 7Hour 7
Hour 7
dpd
 
Hour 6
Hour 6Hour 6
Hour 6
dpd
 
CCC PT Faculty Unemployment Benefits
CCC PT Faculty Unemployment BenefitsCCC PT Faculty Unemployment Benefits
CCC PT Faculty Unemployment Benefits
dpd
 
CSCI 16 ~ Tutorial 01
CSCI 16 ~ Tutorial 01CSCI 16 ~ Tutorial 01
CSCI 16 ~ Tutorial 01
dpd
 
BA 65 Hour 6 ~ Business Operations and Practice
BA 65 Hour 6 ~ Business Operations and PracticeBA 65 Hour 6 ~ Business Operations and Practice
BA 65 Hour 6 ~ Business Operations and Practice
dpd
 
BA 65 Hour 5 ~ Creating an Ecommerce Site
BA 65 Hour 5 ~ Creating an Ecommerce SiteBA 65 Hour 5 ~ Creating an Ecommerce Site
BA 65 Hour 5 ~ Creating an Ecommerce Site
dpd
 
BA 65 Hour 4 ~ Promoting Your Site
BA 65 Hour 4 ~ Promoting Your SiteBA 65 Hour 4 ~ Promoting Your Site
BA 65 Hour 4 ~ Promoting Your Site
dpd
 
test
testtest
test
dpd
 
Chapter 14 - Operations, Quality, and Productivity
Chapter 14 - Operations, Quality, and ProductivityChapter 14 - Operations, Quality, and Productivity
Chapter 14 - Operations, Quality, and Productivity
dpd
 
Tutorial 10 - Electronic Commerce
Tutorial 10 - Electronic CommerceTutorial 10 - Electronic Commerce
Tutorial 10 - Electronic Commerce
dpd
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
dpd
 
Tutorial 8 - Creating Effective Web Pages
Tutorial 8 - Creating Effective Web PagesTutorial 8 - Creating Effective Web Pages
Tutorial 8 - Creating Effective Web Pages
dpd
 
Chapter 13 - Control Systems: Financial and Human
Chapter 13 - Control Systems: Financial and HumanChapter 13 - Control Systems: Financial and Human
Chapter 13 - Control Systems: Financial and Human
dpd
 
Chapter 12 - Team Leadership
Chapter 12 - Team LeadershipChapter 12 - Team Leadership
Chapter 12 - Team Leadership
dpd
 
Chapter 11 - Motivating for High Performance
Chapter 11 - Motivating for High PerformanceChapter 11 - Motivating for High Performance
Chapter 11 - Motivating for High Performance
dpd
 
Chapter 10 - Communicating and Informatiion Technology
Chapter 10 - Communicating and Informatiion TechnologyChapter 10 - Communicating and Informatiion Technology
Chapter 10 - Communicating and Informatiion Technology
dpd
 
Chapter 9 - Leading with Influence
Chapter 9 - Leading with InfluenceChapter 9 - Leading with Influence
Chapter 9 - Leading with Influence
dpd
 
Chapter 8 - Organizational Behavior: Power, Politics, Conflict, and Stress
Chapter 8 - Organizational Behavior: Power, Politics, Conflict, and StressChapter 8 - Organizational Behavior: Power, Politics, Conflict, and Stress
Chapter 8 - Organizational Behavior: Power, Politics, Conflict, and Stress
dpd
 
Chapter 7 - Human Resource Management
Chapter 7 - Human Resource ManagementChapter 7 - Human Resource Management
Chapter 7 - Human Resource Management
dpd
 
Tutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and SecurityTutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and Security
dpd
 
Hour 7
Hour 7Hour 7
Hour 7
dpd
 
Hour 6
Hour 6Hour 6
Hour 6
dpd
 

Recently uploaded (20)

Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Web and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in RajpuraWeb and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in Rajpura
Erginous Technology
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
MINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PRMINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PR
MIND CTI
 
Vaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without HallucinationsVaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without Hallucinations
john409870
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Social Media App Development Company-EmizenTech
Social Media App Development Company-EmizenTechSocial Media App Development Company-EmizenTech
Social Media App Development Company-EmizenTech
Steve Jonas
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Top 10 IT Help Desk Outsourcing Services
Top 10 IT Help Desk Outsourcing ServicesTop 10 IT Help Desk Outsourcing Services
Top 10 IT Help Desk Outsourcing Services
Infrassist Technologies Pvt. Ltd.
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Web and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in RajpuraWeb and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in Rajpura
Erginous Technology
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
MINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PRMINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PR
MIND CTI
 
Vaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without HallucinationsVaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without Hallucinations
john409870
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Social Media App Development Company-EmizenTech
Social Media App Development Company-EmizenTechSocial Media App Development Company-EmizenTech
Social Media App Development Company-EmizenTech
Steve Jonas
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 

Tutorial 06 - Real-Time Communication on the Internet

  • 1. Real-Time Communication on the Internet Communicating in Real-Time and Exploring Wireless Networks Tutorial 6
  • 2. Objectives Learn different ways to chat on the Internet. Explore different chat client programs. Find chat rooms devoted to specific topics. Explore businesses that let you create your own chat rooms. Learn about and explore virtual communities and their use in business.
  • 3. Objectives Explore the history of the wireless Internet. Learn about different wireless networks. Locate wireless devices that let you access the Internet. Evaluate wireless carriers in the United States. Learn about wireless broadband networks.
  • 4. What Is Chat? Chat : a general term for real-time communication that occurs over the Internet. Originally, the term chat described the act of users exchanging typed messages, or a text chat . Voice Chat: where participants speak to each other in real time, much like they would be using a telephone. Video Chat: where participants can see and speak to each other.
  • 5. What Is Chat? Private Chat: occurs between individuals who know each other and are invited to participate in the chat. Public Chat: occurs in a public area, sometimes called a chat room , in which people come and go. Chats can be continuous, with participants entering and leaving ongoing discussions or they can be planned for a specific time and to last for a specific duration.
  • 6. What Is Chat? Most chat tools allow users to save a transcript of the chat session for future reference. The practice of reading messages and not contributing to the discussion is called lurking . Chatting requires participants to type quickly, therefore, chat participants often omit capitalization and do not worry about proper spelling and grammar.
  • 8. What Is Chat? Flaming: when a participant insults or ridicules another participant. Spamming: when someone or an organization sends unsolicited and irrelevant messages to a chat room. Although many chat rooms don’t enforce the rules of netiquette, as you use the Internet to communicate, you should exercise common courtesy and respect as you would when speaking in person with other people.
  • 9. Internet Relay Chat Early UNIX computers included a program called Talk that allowed users to exchange short text messages. In 1988, Jarkko Oikarinen wrote a communications program that extended the capabilities of the Talk program to multi-user. It was called Internet Relay Chat ( IRC ). IRC uses a client-server network model: IRC servers are connected through the internet to form an IRC network. Individual chat participants use IRC clients that connect to the servers in the network.
  • 10. Internet Relay Chat The original network was EFNet , which is still one of the largest IRC networks today. Other major IRC networks include IRCNet, Undernet, DALnet, and NewNet. Servers in each of these IRC networks are connected to each other as part of the Internet, but IRC traffic is segregated by network.
  • 11. Independent IRC Networks on the Internet New Perspectives on The Internet, Sixth Edition—Comprehensive Tutorial 6
  • 12. Internet Relay Chat IRC networks organize their chats by topic. Each topic area is called a channel , and participants who connect to an IRC network join specific channels in which they conduct their chats. Each channel has a name, or a channel heading , that uses the pound sign (#) to indicate the chat’s topic. When a participant creates a new channel, he becomes responsible for managing the channel and is called the channel operator , channel op , or IRCop .
  • 13. Internet Relay Chat The channel operator can change the channel’s topic and heading at any time, determines which users may participate in the channel, and can change whether the channel is public or private. Participants select nicknames when they log on to an IRC server. Nicknames must be unique. A channel operator’s nickname is preceded by @. IRC servers run automated programs, called IRC robots or bots, which perform routine services on the IRC network.
  • 14. Commonly Used IRC Commands
  • 15. Chat in Progress Using ICQ New Perspectives on The Internet, Sixth Edition—Comprehensive Tutorial 6
  • 16. Instant Messaging Software Instant messaging software lets two users chat in real time over the Internet. Instant messages usually occur between people who know each other, and are especially popular with friends and families separated by geographic distances. The software has built-in tools that let you identify your friends and alert you when your friends are online.
  • 17. Instant Messaging Software Instant messaging is different from e-mail in two important ways: When you send an e-mail message to a user, you do not have a way to determine if that user is online at the time you send your message. When you send an instant message, the instant messaging software identifies whether the intended recipient is online before you send the message.
  • 18. Instant Messaging Software ICQ Pronounced “I seek you” One of the most popular instant messaging software programs Created by Mirabilis, an Israeli company in 1996 AOL purchased the software in 1998 and offers it as freeware AIM ( AOL Instant Messenger ) Available to anyone, even those without an AOL account. MSN Messenger / Windows Messenger Yahoo! Messenger
  • 19. Instant Messaging Software You must use the same instant messaging software to chat with other users. Some instant messaging software programs have options for logging on to your chat account using a Web page so you can use the software when you are away from your primary computer. All instant messaging software programs have some features that work on wireless devices, such as cell phones. All instant messaging software is free and requires an Internet connection, preferably a broadband connection.
  • 20. Instant Messaging Software New Perspectives on The Internet, Sixth Edition—Comprehensive Tutorial 6 Windows Messenger
  • 21. Instant Messaging Software New Perspectives on The Internet, Sixth Edition—Comprehensive Tutorial 6 Home page of Cerulean Studios, which produces Trillian instant message software. Trillian allows you to chat with people using different IM software.
  • 22. Web-Based Chat Sites Web-based chat sites offer the same features as text-based IRC chat networks and instant messaging but are often easier to use and do not require users to download and install any software. In Web-based chat , some users lurk and others have multiple conversations going at the same time. The chat room identifies users as they speak with their user names. Conversations are often open-ended and rarely follow the prescribed topic.
  • 23. Web-Based Chat Sites Most Web-based chat sites prohibit spam messages, the use of automated programs, profane and vulgar language, and threats to individuals. Most sites require you to register before using their chat rooms. Although Web sites that provide chat rooms have rules of appropriate conduct, you might encounter conversations taking place that are offensive to you.
  • 24. Web-Based Chat Sites New Perspectives on The Internet, Sixth Edition—Comprehensive Tutorial 6
  • 25. Finding Web Chat Sites Use a directory that provides an organized list of chat site hyperlinks. The descriptions for each hyperlink might tell you more about the nature of the chat to which it leads. Use a Web search engine and include the word “chat” in the search expression.
  • 26. Creating a Chat Room Use the features at a portal site such as Yahoo! Chat to create your own chat room. Easy, inexpensive, and usually includes tools that let you give access to only those people you want to participate in the chat that you create. Several businesses offer services that support the different situations in which an organization might need to conduct a private, moderated chat.
  • 27. Sharing Information in Virtual Communities Virtual community : a place on the Internet where people can gather to discuss issues and share information. Types of virtual communities: online social networks online business networks online political networks
  • 28. Online Social Networks Virtual communities that exist for the sole purpose of being a community. Useful tools for persons who want to make new local friends, establish acquaintances before moving to a new location, or obtain advice of various kinds. Rely on advertising to generate revenue. Some of the sites charge, or plan in the near future to charge, a monthly membership fee. Other sites plan to charge for specific site features.
  • 29. Online Business Networks Focus on business networking. Users log on to seek jobs, find potential business partners, recruit workers, and engage in other business development activities. Users are looking for specific solutions to their problems. Online business networks tend to use categories that reflect specific interests and try to make it easy for business persons to find exactly the connections they need, quickly and efficiently.
  • 30. Online Political Networks Used in the 2004 U.S. elections to rally supporters, raise funds, and get their messages out to voters. Provide a place for people interested in a candidate or an issue to communicate with each other. These sites allow people to discuss issues, plan strategies, and arrange in-person meetings called meetups .
  • 31. Evolution of Wireless Networks When you connect to your Internet service provider, you’re creating a wired connection . A wireless connection occurs when data, such as a person’s voice, is transferred to another location without the use of any wires. In 1994, carriers created digital networks, or Personal Communication Service (PCS ), where data was carried in bits at a rate of up to 14.4 Kbps.
  • 32. Evolution of Wireless Networks The year 1999 saw the introduction of the first “wireless” connections to the Internet. Personal digital assistant (PDA): a handheld computer that can send and receive wireless telephone and fax calls, act as a personal organizer, perform calculations, store notes, and download Web pages formatted for handheld devices. The wireless Internet has expanded to include different hardware devices, networks, and other options.
  • 33. Evolution of Wireless Networks Cell phones were one of the first wireless connections to transfer a person’s voice. Text messaging occurs over second-generation wireless systems , or 2G wireless . Short Message Service (SMS) lets you send text messages of up to 160 characters over a 2G wireless network to a wireless phone. SMS is slow and you must have a network connection to receive the data.
  • 34. Evolution of Wireless Networks Some handheld computers use Infrared technology to “ beam ” information from one source to another without the use of wired connections. Over 60 major U.S. markets have new 3G wireless systems (third-generation wireless) in place. Some European countries are building and licensing 3G wireless systems. 3G wireless systems offer data transfer rates of up to 2 Mbps and constant connections. Bandwidth and cost are two obstacles for getting 3G wireless systems going in the United States.
  • 35. Evolution of Wireless Networks The conversion from 2G to 3G wireless requires the carriers to invest in technology to make the change. Many carriers have transformed and upgraded their existing networks by creating 2.5G wireless systems. There isn’t a single network standard. A wireless device is manufactured to work only on a single type of network, because different networks use different frequencies in the radio spectrum. If you choose a wireless carrier with a 2.5G network, for example, you will not be able to receive a signal in an area with only a 2G or a 3G network because your device operates on a different frequency.
  • 36. Evolution of Wireless Networks 3.5G wireless networks use a new network protocol called Universal Mobile Telephone Service (UMTS), which is an extension of the existing W-CDMA network, to provide network connections of up to 10 Mbps. Fourth-generation wireless networks ( 4G wireless ) also called 3G wireless and beyond networks 4G technology is expected to bring network connection speeds of up to 100 Mbps and deliver high quality audio and video to connected devices
  • 37. Wireless Local Area Networking Wireless fidelity ( Wi-Fi ): a trademarked name of the Wireless Ethernet Compatibility Alliance (WECA) that specifies the interface between a wireless client and a base station or between two wireless clients. Wireless local area network ( WLAN ): a network in which devices use high frequency radio waves instead of wires to communicate. Wi-Fi operates in the 2.4 GHz radio spectrum, which is the same spectrum used by cordless phones, garage door openers, microwave ovens, and other devices. because this spectrum is unlicensed, it is free the 3G wireless spectrum needs to be licensed
  • 38. Wireless Local Area Networking New Perspectives on The Internet, Sixth Edition—Comprehensive Tutorial 6 wired local area network wireless local area network
  • 39. Wireless Local Area Networking Three of the most widely used standards for WLANs are 802.11a, 802.11b, and 802.11g. Transfer rate: the speed at which data is transmitted from an access point (or base station) to the wireless device. Access point: a hardware device with one or more antennae that permits communication between wired and wireless networks so wireless clients can send and receive data. Range: physical distance between the access point and the wireless device.
  • 40. Wireless Local Area Networking Wi-Fi usually refers to the 802.11b specification which is the specification on which most Wi-Fi devices operate. Dual access point: a new device that makes the 802.11a and 802.11b wireless standards and the 802.11b and 802.11 g wireless standards interoperable. Wi-Fi is often used as an alternative in an office building or other area in which you might find a traditional wired local area network. It can be used where wiring cannot be installed.
  • 41. Wireless Local Area Networking Laptop computers and other devices must have Wi-Fi compatible hardware installed in them to send and receive data with the network. Once you have a network interface card or other Wi-Fi compatible device, you can connect to the WLAN via that device, provided that it is physically within the area covered by the network. If you position enough access points within the appropriate range of each other, the WLAN can grow to cover an entire office complex or geographic area.
  • 42. Personal Area Networking Personal area networking : refers to the wireless network that you use to connect personal devices to each other. There are two major types of personal area networks: Infrared and Bluetooth.
  • 43. Infrared Technology The Infrared Data Association ( IrDA ): a group dedicated to developing low-cost, high-speed wireless connectivity solutions. Using infrared technology, you can wirelessly beam information from one device to another compatible device using Infrared light waves. This technology is used with PDAs, notebook computers, printers, phones, and other peripheral devices. A disadvantage is the lack of software products that can handle the transfer. The devices and the software that runs them must be compatible with each other.
  • 44. Bluetooth Bluetooth : a technology that provides short-range radio links between personal computers, handheld devices, wireless phones, headsets, printers, and other electronic devices. For devices without chipsets that enable them to receive Bluetooth radio waves you can purchase an adapter to enable use with other Bluetooth devices. Bluetooth doesn’t need an access point for communication; devices communicate with each other automatically. Bluetooth isn’t really “owned” by any specific manufacturer or group.
  • 45. Bluetooth New Perspectives on The Internet, Sixth Edition—Comprehensive Tutorial 6
  • 46. Bluetooth Using Bluetooth technology, you can synchronize and share data between as many as eight Bluetooth compatible devices within the specified range at a rate of up to 1 Mbps. A collection of devices connected via Bluetooth technology is called a piconet . A piconet can connect to eight devices at a time. You can use Bluetooth-enabled devices to transfer files, listen to music playing on a computer through a headset, print documents, or connect your notebook computer to the Internet using a wireless phone that is in your desk drawer or briefcase.
  • 47. Comparing Wireless Network Standards and Bluetooth
  • 48. Wireless Wide Area Networking Wireless device connections let you access the Internet on a PDA, wireless phone, or notebook computer from anywhere in the world without a wired connection. A WLAN provides a wireless connection to a network, but devices must be within the stated boundary of the WLAN. In 2.5G and 3G wireless systems, wireless wide area networking ( WWAN ) makes it possible to access the Internet from anywhere within the boundaries of the wireless network to which you are connected.
  • 49. Creating a Wireless Wide Area Network New Perspectives on The Internet, Sixth Edition—Comprehensive Tutorial 6
  • 50. Using Wireless Devices to Access the Internet The technology and standards that dictate what you can accomplish with a wireless device change on a daily basis. New standards emerge, new hardware is created, and new ways of connectivity arrive. Select a wireless solution that has the locations in which the technology will be used in its network coverage area and that supports the features you plan to use.
  • 51. Metropolitan Area Networking: WiMAX WiMAX ( Worldwide Interoperability for Microwave Access ): uses 802.16 wireless network standard being developed for use in metropolitan areas. Metropolitan area network ( MAN ): provides wireless broadband Internet access via radio signals in the 2 to 11 GHz and 10 to 66 GHz radio spectrum with a range of up to 31 miles and speeds of up to 70 Mbps. When multiple WiMAX towers are connected to each other, WiMAX has the potential to solve some of the geographical and speed limitations of wired networks and other wireless networks, including Wi-Fi.
  • 52. Metropolitan Area Networking: WiMAX WiMAX provides broadband Internet connections at the same speed as DSL and cable, but through wireless radio connections. WiMAX works by connecting a WiMAX tower to an ISP that provides the Internet service. The WiMAX towers are connected to each other via radio signals. WiMAX transmitters, which can be located up to 31 miles from the towers, send the signal to homes and businesses that have WiMAX receivers. Businesses can plug the WiMAX receiver into their existing local area networks to provide high-speed Internet access to all of their connected devices.
  • 53. Metropolitan Area Networking: WiMAX New Perspectives on The Internet, Sixth Edition—Comprehensive Tutorial 6
  • 54. Metropolitan Area Networking: WiMAX VoIP ( Voice over Internet Protocol ): converts audio signals to digital packets so that you can use a broadband wired or wireless Internet connection to make local and long distance telephone calls. Because WiMAX can support many types of data transmissions, it is also used for VoIP. Most experts predict that all new desktop and notebook computers and wireless devices will have built-in 802.16 cards by 2007.
  • 55. Summary There are different Internet resources to chat in real time with friends and business associates There are different types of wireless networks, wireless network standards, and wireless devices. When selecting a wireless device, make sure that you understand the features of the network on which that wireless device operates. Carefully examine the network’s geographic coverage area, pricing options, and the provider’s future expansion plans before selecting the device that most closely matches the functions that you need it to perform.