Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Unit 4 Notes

Download as pdf or txt
Download as pdf or txt
You are on page 1of 37

Unit IV: Computers and Communication

WWW and Web Browsers: Basic of Computer networks; LAN, WAN; Networking Devices,
Topologies, Cables and connectors, Connecting to internet; ISP; Basics of internet connectivity related
troubleshooting, Web Browsing software, Search Engines; URL; Domain Names; IP Addressing, Wi-
Fi and Bluetooth technology overview, Internet and Intranet: architecture, various file formats,
Applications of INTERNET: Electronic mailing systems (Google Mail features): Creating and
Managing mailing accounts, folders, Document collaboration, Instant Messaging, Netiquettes; Skype
calling and Messenger services; functioning and features of smart gadgets: Smart phones, 4K smart
television gadgets, kindle, gaming-gadgets, fitness gadgets and alike.

WWW and Web Browsers


WWW
"The World Wide Web is the universe of network-accessible information, an embodiment of human
knowledge." Or Information retrieval service of the Internet (the worldwide computer network). The World
Wide Web is most often referred to simply as "the Web."
The World Wide Web (WWW) is a network of online content that is formatted in HTML and accessed
via HTTP. The term refers to all the interlinked HTML pages that can be accessed over the Internet. The
development of the World Wide Web was begun in 1989 by Tim Berners-Lee and his colleagues at CERN, an
international scientific organization based in Geneva, Switzerland. They created a protocol, HyperText Transfer
Protocol (HTTP), which standardized communication between servers and clients. Their text-based Web
browser was made available for general release in January 1992.
The World Wide Web is what most people think of as the Internet. It is all the Web pages, pictures,
videos and other online content that can be accessed via a Web browser. The Internet, in contrast, is the
underlying network connection that allows us to send email and access the World Wide Web. The early Web
was a collection of text-based sites hosted by organizations that were technically gifted enough to set up a Web
server and learn HTML. It has continued to evolve since the original design, and it now includes interactive
(social) media and user-generated content that requires little to no technical skills.

Web Browser
A web browser (commonly referred to as a browser) is a software user agent for accessing information
on the World Wide Web. To connect to a website's server and display its pages, a user needs to have a web
browser program. This is the program that the user runs to download, format and display a web page on the
user's computer.
A web browser is a software program that allows a user to locate, access, and display web pages. In
common usage, a web browser is usually shortened to "browser." Browsers are used primarily for displaying
and accessing websites on the internet, as well as other content created using languages such as Hypertext
Markup Language (HTML) and Extensible Markup Language (XML).
Browsers translate web pages and websites delivered using Hypertext Transfer Protocol (HTTP) into
human-readable content. They also have the ability to display other protocols and prefixes, such as secure
HTTP (HTTPS), File Transfer Protocol (FTP), email handling (mailto:), and files (file:). In addition, most
browsers also support external plug-ins required to display active content, such as in-page video, audio and
game content.
A variety of web browsers are available with different features, and are designed to run on different
operating systems. Common browsers include Internet Explorer from Microsoft, Firefox from Mozilla, Google
Chrome, Safari from Apple, and Opera. All major browsers have mobile versions that are lightweight versions
for accessing the web on mobile devices.
Web browsers date back to the late 1980s when an English scientist, Tim Berners-Lee, first developed
the ideas that led to the World Wide Web (WWW). This consisted of a series of pages created using the HTML
language and joined or linked together with pointers called hyperlinks. Following this was the need for a
program that could access and display the HTML pages correctly – the browser.
Basic of Computer networks
Open system: A system which is connected to the network and is ready for communication.
Closed system: A system which is not connected to the network and can’t be communicated with.
Computer Network: It is the interconnection of multiple devices, generally termed as Hosts connected using
multiple paths for the purpose of sending/receiving data or media.
There are also multiple devices or mediums which helps in the communication between two different
devices which are known as Network devices. Ex: Router, Switch, Hub, Bridge. The layout pattern using
which devices are interconnected is called as network topology. Such as Bus, Star, Mesh, Ring, Daisy chain.
OSI: OSI stands for Open Systems Interconnection. It is a reference model that specifies standards for
communications protocols and also the functionalities of each layer.
Protocol: A protocol is the set of rules or algorithms which define the way how two entities can communicate
across the network and there exists different protocol defined at each layer of the OSI model. Few of such
protocols are TCP, IP, UDP, ARP, DHCP, FTP and so on.
UNIQUE IDENTIFIERS OF NETWORK
Host name: Each device in the network is associated with a unique device name known as Hostname.
Type “hostname” in the command prompt and press ‘Enter’, this displays the hostname of your machine.
IP Address (Internet Protocol address): Also, known as the Logical Address, is the network address of the
system across the network.To identify each device in the world-wide-web, Internet Assigned Numbers
Authority (IANA) assigns IPV4 (Version 4) address as a unique identifier for each device on the
Internet.Length of the IP address is 32-bits. (Hence we have 232 IP addresses available.)
Type “ipconfig” in the command prompt and press ‘Enter’, this gives us the IP address of the device.
MAC Address (Media Access Control address): Also known as physical address, is the unique identifier of each
host and is associated with the NIC (Network Interface Card).MAC address is assigned to the NIC at the time of
manufacturing. Length of the MAC address is : 12-nibble/ 6 bytes/ 48 bits
Type “ipconfig/all” in the command prompt and press ‘Enter’, this gives us the MAC address.
Port: Port can be referred as a logical channel through which data can be sent/received to an application. Any
host may have multiple applications running, and each of this application is identified using the port number on
which they are running. Port number is a 16-bit integer, hence we have 216 ports available which are
categorized as shown below:
PORT TYPES RANGE

Well known Ports 0 – 1023

Registered Ports 1024 – 49151

Ephemeral Ports 49152 – 65535


Number of ports: 65,536, Range: 0 – 65535, Type “netstat -a” in the command prompt and press ‘Enter’, this
lists all the ports being used.
Socket: The unique combination of IP address and Port number together are termed as Socket.
Few more concepts
DNS Server: DNS stands for Domain Name system. DNS is basically a server which translates web addresses
or URL (ex: www.google.com) into their corresponding IP addresses. We don’t have to remember all the IP
addresses of each and every website.
The command ‘nslookup’ gives you the IP address of the domain you are looking for. This also provides the
information of our DNS Server.
ARP: ARP stands for Address Resolution Protocol. It is used to convert the IP address to its corresponding
Physical Address (i.e.MAC Address).ARP is used by the Data Link Layer to identify the MAC address of the
Receiver’s machine.
RARP: RARP stands for Reverse Address Resolution Protocol. As the name suggests, it provides the IP
address of the device given a physical address as input. But RARP has become obsolete since the time DHCP
has come into the picture.
LAN
A local area network (LAN) is a computer network that interconnects computers within a limited area
such as a residence, school, laboratory, university campus or office building. Ethernet and Wi-Fi are the two
most common technologies in use for local area networks. Historical technologies include ARCNET, Token
ring, and AppleTalk.
LANs are capable of transmitting data at very fast rates, much faster than data can be transmitted over a
telephone line; but the distances are limited and there is also a limit on the number of computers that can be
attached to a single LAN.
MAN
A metropolitan area network (MAN) is a network that interconnects users with computer resources in a
geographic area or region larger than that covered by even a large local area network (LAN) but smaller than
the area covered by a wide area network (WAN). The term is applied to the interconnection of networks in a
city into a single larger network (which may then also offer efficient connection to a wide area network). It is
also used to mean the interconnection of several local area networks by bridging them with backbone lines. The
latter usage is also sometimes referred to as a campus network.
Examples of metropolitan area networks of various sizes can be found in the metropolitan areas of
London, England; Lodz, Poland; and Geneva, Switzerland. Large universities also sometimes use the term to
describe their networks. A recent trend is the installation of wireless MANs.
WAN
A wide area network (WAN) not only covers a larger geographic distance, but also generally
involves leased telecommunication circuits. A wide area network (WAN) is a telecommunications network that
extends over a large geographical area for the primary purpose of computer networking. Wide area networks are
often established with leased telecommunication circuits.
A wide area network (WAN) is a network that exists over a large-scale geographical area. A WAN
connects different smaller networks, including local area networks (LANs) and metro area networks (MANs).
This ensures that computers and users in one location can communicate with computers and users in other
locations. WAN implementation can be done either with the help of the public transmission system or a private
network. A WAN works in a similar fashion to a LAN, just on a larger scale. Typically, TCP/IP is the protocol
used for a WAN in combination with devices such as routers, switches, firewalls and modems.

Networking Devices
Different networking devices have different roles to play in a computer network. These network devices also
work at different segments of a computer network performing different works. In our new series after network
topology, we talk about different networking devices like a switch, router, hub, bridge etc.
Network Hub: Network Hub is a networking device which is used to connect multiple network hosts. A network
hub is also used to do data transfer.
Network Switch: Like a hub, a switch also works at the layer of LAN (Local Area Network) but you can say
that a switch is more intelligent than a hub. While hub just does the work of data forwarding, a switch does
'filter and forwarding' which is a more intelligent way of dealing with the data packets.
Modem: A Modem is somewhat a more interesting network device in our daily life. So if you have noticed
around, you get an internet connection through a wire (there are different types of wires) to your house. This
wire is used to carry our internet data outside to the internet world.
Network Router: A router is a network device which is responsible for routing traffic from one to another
network. These two networks could be a private company network to a public network. You can think of a
router as a traffic police who directs different network traffic to different directions.
Bridge: If a router connects two different types of networks, then a bridge connects two subnetworks as a part of
the same network. You can think of two different labs or two different floors connected by a bridge.
Repeater: A repeater is an electronic device that amplifies the signal it receives. In other terms, you can think of
repeater as a device which receives a signal and retransmits it at a higher level or higher power so that the signal
can cover longer distances.
Topologies
Network topology is the arrangement of the elements (links, nodes, etc.) of a communication
network. Network topology can be used to define or describe the arrangement of various types of
telecommunication networks, including command and control radio networks, industrial field
busses and computer networks.
Network topology is the topological structure of a network and may be depicted physically or logically.
It is an application of graph theory wherein communicating devices are modeled as nodes and the connections
between the devices are modeled as links or lines between the nodes.
Types of Network Topology
The arrangement of a network which comprises of nodes and connecting lines via sender and receiver is
referred as network topology. The various network topologies
are:
a) Mesh Topology: In mesh topology, every device is connected
to another device via particular channel.
Advantages of this topology:
1. It is robust.
2. Fault is diagnosed easily. Data is reliable because data is
transferred among the devices through dedicated
channels or links.
3. Provides security and privacy.
Problems with this topology:
1. Installation and configuration is difficult.
2. Cost of cables are high as bulk wiring is required, hence
suitable for less number of devices.
3. Cost of maintenance is high.
b) Star Topology: In star topology, all the devices are connected
to a single hub through a cable. This hub is the central node and
all others nodes are connected to the central node. The hub can be
passive in nature i.e. not intelligent hub such as broadcasting
devices, at the same time the hub can be intelligent known as
active hubs. Active hubs have repeaters in them.
Advantages of this topology:
1. If N devices are connected to each other in star topology,
then the number of cables required to connect them is N.
So, it is easy to set up.
2. Each device requires only 1 port i.e. to connect to the hub.
Problems with this topology:
1. If the concentrator (hub) on which the whole topology
relies fails, the whole system will crash down.
2. Cost of installation is high.
3. Performance is based on the single concentrator i.e.
hub.
c) Bus Topology:
Bus topology is a network type in which every computer and
network device is connected to single cable. It transmits the
data from one end to another in single direction. No bi-
directional feature is in bus topology.
Advantages of this topology:
1. If N devices are connected to each other in bus topology, then the number of cables required to connect
them is 1 which is known as backbone cable and N drop lines are required.
2. Cost of the cable is less as compared to other topology, but it is used to build small networks.
Problems with this topology:
1. If the common cable fails, then the whole system will crash
down.
2. If the network traffic is heavy, it increases collisions in the
network. To avoid this, various protocols are used in MAC layer
known as Pure Aloha, Slotted Aloha, and CSMA/CD etc.
d) Ring Topology:
In this topology, it forms a ring connecting devices with its exactly two
neighboring devices.
The following operations takes place in ring topology is:
One station is known as monitor station which takes all the
responsibility to perform the operations.
To transmit the data, station has to hold the token. After the transmission
is done, the token is to be released for other stations to use.
When no station is transmitting the data, then the token will circulate in
the ring.
There are two types of token release techniques: Early token
release releases the token just after the transmitting the data
and Delay token release releases the token after the
acknowledgement is received from the receiver.
Advantages of this topology:
1. The possibility of collision is minimum in this type of
topology.
2. Cheap to install and expand.
Problems with this topology:
1. Troubleshooting is difficult in this topology.
2. Addition of stations in between or removal of stations can
disturb the whole topology.
e) Hybrid Topology:
This topology is a collection of two or more topologies which are
described above. This is a scalable topology which can be
expanded easily. It is reliable one but at the same it is a costly
topology.

Cables and connectors


Networking cables are networking hardware used to connect one network device to other network devices or to
connect two or more computers to share printers, scanners etc. Different types of network cables, such
as coaxial cable, optical fiber cable, and twisted pair cables, are used depending on the network's physical
layer, topology, and size. The devices can be separated by a few meters (e.g. via Ethernet) or nearly unlimited
distances (e.g. via the interconnections of the Internet).
Cables-
Thick Coaxial Cable
This type cable is usually yellow in color and used in what is called thicknets, and has two conductors. This
coax can be used in 500-meter lengths. The cable itself is made up of a solid center wire with a braided metal
shield and plastic sheathing protecting the rest of the wire.
Thin Coaxial Cable
As with the thick coaxial cable is used in thicknets the thin version is used in thinnets. This type cable is also
used called or referred to as RG-58. The cable is really just a cheaper version of the thick cable.
Fiber Optic Cable
Fiber optics are pretty darn cool and not cheap. This cable is smaller and can carry a vast amount of information
fast and over long distances.
Fiber optic cabling consists of a center glass core surrounded by several layers of protective materials. It
transmits light rather than electronic signals eliminating the problem of electrical interference. This makes it
ideal for certain environments that contain a large amount of electrical interference. It has also made it the
standard for connecting networks between buildings, due to its immunity to the effects of moisture and lighting.
Fiber optic cable has the ability to transmit signals over much longer distances than coaxial and twisted pair. It
also has the capability to carry information at vastly greater speeds. This capacity broadens communication
possibilities to include services such as video conferencing and interactive services. The cost of fiber optic
cabling is comparable to copper cabling; however, it is more difficult to install and modify. 10BaseF refers to
the specifications for fiber optic cable carrying Ethernet signals.
There are two common types of fiber cables — single mode and multimode. Multimode cable has a larger
diameter; however, both cables provide high bandwidth at high speeds. Single mode can provide more distance,
but it is more expensive.
Specification Cable Type
10BaseT Unshielded Twisted Pair
10Base2 Thin Coaxial
10Base5 Thick Coaxial
100BaseT Unshielded Twisted Pair
100BaseFX Fiber Optic
100BaseBX Single mode Fiber
100BaseSX Multimode Fiber
1000BaseT Unshielded Twisted Pair
1000BaseFX Fiber Optic
1000BaseBX Single mode Fiber
1000BaseSX Multimode Fiber
Twisted Pair Cables
These come in two flavors of unshielded and shielded.
Shielded Twisted Pair (STP)
Is more common in high-speed networks. The biggest difference you will
see in the UTP and STP is that the STP use’s metallic shield wrapping to
protect the wire from interference.
Something else to note about these cables is that they are defined in
numbers also. The bigger the number the better the protection from
interference. Most networks should go with no less than a CAT 3 and
CAT 5 is most recommended.

Unshielded Twisted Pair (UTP)


This is the most popular form of cables in the network and the cheapest
form that you can go with. The UTP has four pairs of wires and all inside
plastic sheathing. The biggest reason that we call it Twisted Pair is to
protect the wires from interference from themselves. Each wire
is only protected with a thin plastic sheath.

Ethernet Cabling
Now to familiarize you with more on the Ethernet and it’s
cabling we need to look at the 10’s. 10Base2, is considered the
thin Ethernet, thinnet, and thinwire which uses light coaxial
cable to create a 10 Mbps network. The cable segments in this
network can’t be over 185 meters in length. These cables
connect with the BNC connector. Also as a note these unused
connection must have a terminator, which will be a 50-ohm
terminator.
10Base5, this is considered a thicknet and is used with coaxial
cable arrangement such as the BNC connector.
10BaseT, the “T” stands for twisted as in UTP (Unshielded
Twisted Pair) and uses this for 10Mbps of transfer.
100BaseT, is considered Fast Ethernet uses STP (Shielded
Twisted Pair) reaching data transfer of 100Mbps.
10BaseF, This arrangement is a little more complicated and uses
special connectors and NIC’s along with hubs to create its
network.
An important part of designing and installing an Ethernet is
selecting the appropriate Ethernet medium. There are four major
types of media in use today: Thickwire for 10BASE5 networks,
thin coax for 10BASE2 networks, unshielded twisted pair (UTP)
for 10BASE-T networks and fiber optic for 10BASE-FL or
Fiber-Optic Inter-Repeater Link (FOIRL) networks.
Category Speed Use
1 1 Mbps Voice Only (Telephone Wire)
2 4 Mbps LocalTalk & Telephone (Rarely used)
3 16 Mbps 10BaseT Ethernet
4 20 Mbps Token Ring (Rarely used)
100 Mbps (2 pair) 100BaseT Ethernet
5
1000 Mbps (4 pair) Gigabit Ethernet
5e 1,000 Mbps Gigabit Ethernet
6 10,000 Mbps Gigabit Ethernet

Connectors –
Unshielded Twisted Pair Connector
The standard connector for unshielded twisted pair cabling is
an RJ-45 connector. This is a plastic connector that looks
like a large telephone-style connector . A slot allows the RJ-
45 to be inserted only one way. RJ stands for Registered
Jack, implying that the connector follows a standard
borrowed from the telephone industry. This standard
designates which wire goes with each pin inside the
connector.

Coaxial Cable Connectors


The most common type of connector used with coaxial cables is
the Bayone-Neill-Concelman (BNC) connector. Different types
of adapters are available for BNC connectors, including a T-
connector, barrel connector, and terminator. Connectors on the
cable are the weakest points in any network. To help avoid
problems with your network, always use the BNC connectors
that crimp, rather screw, onto the cable.
USB (Universal Serial Bus)
Universal Serial Bus, or USB, is a computer standard designed to eliminate the
guesswork in connecting peripherals to a PC. It is expected to replace serial
and parallel ports. A single USB port can be used to connect up to 127
peripheral devices, such as mice, modems, keyboards, digital camera's,
printers, scanners, MP3 players and many more. USB also supports Plug-and-
Play installation and hot plugging.
1. USB 1.1 standard supports data transfer rates of 12 Mbps.
2. USB 2.0 (Also referred to as Hi-Speed USB) specification defines a
new High-speed transfer rate of 480 Mb/sec.

RJ-11 (Registered Jack)


Standard telephone cable connectors, RJ-11 has 4 wires (and RJ-12 has 6
wires). RJ-11 is the acronym for Registered Jack-11, a four- or six-wire connector
primarily used to connect telephone equipment.

RJ-11 Pin with signal name


1. VCC (5 Voltage Regulated
2. Power Ground
3. One wire data
4. One wire ground
RJ 45 (Registered Jack)
The acronym for Registered Jack-45 is RJ-45. The RJ-45 connector is an
eight-wire connector that is commonly used to connect computers to a local
area network (LAN), particularly Ethernet LANs. Although they are slightly
larger than the more commonly used RJ-11 connectors, RJ-45s can be used to
connect some types of telephone equipment.

F-Type
The F connector is a type of RF connector commonly used for cable and
universally for satellite television. They are also used for the cable TV
connection in DOCSIS cable modems, usually with RG-6 tri-shield cable. The F
connector is inexpensive, yet has good performance up to 1 GHz. One reason for
its low cost is that it uses the center wire of the coaxial cable as the pin of the
male connector. The male connector body is typically crimped onto the exposed
outer braid. Female connectors have a 3/8-32 thread. Most male connectors have
a matching threaded connecting ring, though push-on versions are also available.
ST (Straight Tip) and SC (Subscriber Connector or Standard Connector)
Fiber network segments always require two fiber cables: one for transmitting data, and one for receiving. Each
end of a fiber cable is fitted with a plug that can be inserted into a network adapter, hub, or switch. In the North
America, most cables use a square SC connector (Subscriber Connector or Standard Connector) that slides and
locks into place when inserted into a node or
connected to another fiber cable, Europeans use
a round ST connector (Straight Tip) instead.
Fiber LC (Local Connector)
These connectors are used for single-mode and multimode fiber-optic cables. FC
connectors offer extremely precise positioning of the fiber-optic cable with respect
to the transmitter's optical source emitter and the receiver's optical detector. FC
connectors feature a position locatable notch and a threaded receptacle.

MT-RJ (Mechanical Transfer Registered Jack)


MT-RJ connectors are used with single-mode and multimode fiber-optic cables.
The MT-RJ connectors are constructed with a plastic housing and provide for accurate
alignment via their metal guide pins and plastic ferrules.
Used for Gigabit Ethernet. To connect to modules with MT-RJinterfaces, use multimode
fiber-optic cables.

Connecting to internet: ISP (Internet Service Provider)


Once you've set up your computer, you may want to purchase home Internet access so you can send and
receive email, browse the Web, stream videos, and more. You may even want to set up a home wireless
network, commonly known as Wi-Fi, so you can connect multiple devices to the Internet at the same time.
Types of Internet service
The type of Internet service you choose will largely depend on which Internet service providers (ISPs) serve
your area, along with the types of service they offer. Here are some common types of Internet service.
 Dial-up: This is generally the slowest type of Internet connection, and you should probably
avoid it unless it is the only service available in your area. Dial-up Internet uses your phone
line, so unless you have multiple phone lines you will not be able to use your landline and the
Internet at the same time.
 DSL: DSL service uses a broadband connection, which makes it much faster than dial-up.
DSL connects to the Internet via a phone line but does not require you to have a landline at
home. And unlike dial-up, you'll be able to use the Internet and your phone line at the same
time.
 Cable: Cable service connects to the Internet via cable TV, although you do not necessarily
need to have cable TV in order to get it. It uses a broadband connection and can be faster than
both dial-up and DSL service; however, it is only available where cable TV is available.
 Satellite: A satellite connection uses broadband but does not require cable or phone lines; it
connects to the Internet through satellites orbiting the Earth. As a result, it can be used almost
anywhere in the world, but the connection may be affected by weather patterns. Satellite
connections are also usually slower than DSL or cable.
 3G and 4G: 3G and 4G service is most commonly used with mobile phones, and it
connects wirelessly through your ISP's network. However, these types of connections aren't
always as fast as DSL or cable. They will also limit the amount of data you can use each
month, which isn't the case with most broadband plans.
Choosing an Internet service provider
Now that you know about the different types of Internet service, you can do some research to find out what ISPs
are available in your area. If you're having trouble getting started, we recommend talking to friends, family
members, and neighbors about the ISPs they use. This will usually give you a good idea of the types of Internet
service available in your area.
Most ISPs offer several tiers of service with different Internet speeds, usually measured in Mbps (short
for megabits per second). If you mainly want to use the Internet for email and social networking, a slower
connection (around 2 to 5 Mbps) might be all you need. However, if you want to download music or stream
videos, you'll want a faster connection (at least 5 Mbps or higher).
You'll also want to consider the cost of the service, including installation charges and monthly fees. Generally
speaking, the faster the connection, the more expensive it will be per month.
Although dial-up has traditionally been the least expensive option, many ISPs have raised dial-up prices to be
the same as broadband. This is intended to encourage people to switch to broadband. We do not recommend
dial-up Internet unless it's your only option.
Hardware needed

Modem
Once you have your computer, you really don't need much additional hardware to
connect to the Internet. The primary piece of hardware you need is a modem.
The type of Internet access you choose will determine the type of modem you
need. Dial-up access uses a telephone modem, DSL service uses a DSL
modem, cable access uses a cable modem, and satellite service uses a satellite
adapter. Your ISP may give you a modem—often for a fee—when you sign a contract,
which helps ensure that you have the right type of modem. However, if you would
prefer to shop for a better or less expensive modem, you can choose to buy one
separately.
Router
A router is a hardware device that allows you to connect several
computers and other devices to a single Internet connection, which is known as
a home network. Many routers are wireless, which allows you to create a home
wireless network, commonly known as a Wi-Fi network.
You don't necessarily need to buy a router to connect to the Internet. It's possible to
connect your computer directly to your modem using an Ethernet cable. Also, many
modems include a built-in router, so you have the option of creating a Wi-Fi network
without buying extra hardware.
Setting up your Internet connection
Once you've chosen an ISP, most providers will send a technician to your house to turn on the connection. If
not, you should be able to use the instructions provided by your ISP—or included with the modem—to set up
your Internet connection.
After you have everything set up, you can open your web browser and begin using the Internet. If you have any
problems with your Internet connection, you can call your ISP's technical support number.
Home networking
If you have multiple computers at home and want to use all of them to access the Internet, you may want to
create a home network, also known as a Wi-Fi network. In a home network, all of your devices connect to
your router, which is connected to the modem. This means everyone in your family can use the Internet at the
same time.
Your ISP technician may be able to set up a home Wi-Fi network when installing your Internet service. If not,
you can review our lesson on How to Set Up a Wi-Fi Network to learn more.
If you want to connect a computer that does not have built-in Wi-Fi connectivity, you can purchase a Wi-Fi
adapter that plugs into your computer's USB port.
Connecting to the Internet
A device has to be connected to the Internet before you can access it. If you plan to use the Internet at home,
you'll usually need to purchase an Internet connection from an Internet service provider, which will likely be a
phone company, Cable Company, or the government. Other devices usually connect through Wi-Fi or cellular
Internet connections. Sometimes libraries, cafes, and schools offer free Wi-Fi for their patrons, customers, and
students.

Basics of internet connectivity related troubleshooting


Troubleshooting Access Problems
There is No Internet Access
The following steps assume there is NO Internet access. Specific websites and ISPs can have outages that have
nothing to do with your computer or its settings. Troubleshooting Steps. Try the following series of steps, in
order, to see if this fixes your problem. You can stop when you resolve the issue(s) you are having.
1. Check the network icon (or wireless connection settings) to see if you have Internet access. Ensure that
your network adapter is not turned off.
2. Check for changes to proxy settings.
3. Check the network cables if your computer is wired to the router.
4. Reset your router.
5. Check your firewall or security software. There are specific troubleshooting steps for ZoneAlarm issues.
6. Check your browser access issues or email problems.
The next few sections will expand these steps into a series of instructions. Where Linux is indicated, I've based
these on Linux Mint, the version I'm currently working with.
Check the Network
Check the network connection on your computer. This connects other computers in your network as well as
providing access to the Internet via your ISP. Depending upon your operating system and your settings, there
may be a network icon at the top or bottom of the screen or it may be hidden. Your Internet connection can
include either or both wired and wireless connections (see terminology).
Whichever you're using, there is likely a router involved, whether it is your home network or a public network
such as at a coffee shop or a business network, or a community wireless network). If you're not using your own
network, you'll need to speak to the person responsible for that network for details on how to fix any issues.
Check the Wireless Settings
If you're connected wirelessly you'll see a listing of available wireless networks. The wireless network you're
currently logged into (if any) should be indicated. Most networks are protected by a security protocol and a
password.
 You'll need to verify that your connection is strong enough and that the settings don't indicate any
problems.
 If you're having difficulties connecting or if there is a problem with the connection, you'll need to
diagnose it.
 If you don't control the network, you'll need to ask for the password and may need additional help
diagnosing the problems.
 Some public networks are heavily used and can be very slow regardless of whether everything is
working fine.
Check the Wired Settings
If you're connected via CAT5 or CAT6 network cables, you should check the following:
 Check the cables to ensure that they aren't unplugged or damaged.
 Be sure that the network adapter isn't disabled.
 You may need to reset the router then reboot your computer.
Network Settings by Operating System
The following are specific to each operating system. If you're isn't listed, look for your computer or device
documentation.
Windows 7
Windows 7 users can click the network icon (you may need to click the little pyramid icon beside the clock to
see all the settings). The Windows 7 icon changes colour according to the condition of your network access:
 White is normal but you may only have access to the network (but not the Internet).
 Red indicates that there is no access to either the network or the Internet.
 Yellow indicates a problem.
Click on Open the Network and Sharing Center which should open a new window.
At the top is a diagram of your network. There should be solid lines between your computer, the network and
the Internet:
Check the Proxy Settings
Most users should not touch the proxy settings, leaving them at the default which is System Settings. However,
changing the proxy settings can disable Internet access and is something that many unwanted infections do to
maintain control of your computer.
Browser Proxy Settings: Each browser has proxy settings but most make the changes in the System settings.
System Proxy Settings: If you're in an office where your computer is provided by your employer you'll want to
verify the settings with whoever is responsible for the network).
It is generally not recommended that users change these, but it is possible your Internet connection isn't working
because something else changed the proxy settings such as malware or a program installed by a scammer (more
here…).
 Windows users will find these in the Internet Options. Click on the Connections tab then click the LAN
Settings button. Only Automatically detect settings should be checked. Uncheck Use a proxy server for
your LAN then verify that you have Internet access.
Check the Cables
The troubleshooter may prompt you to check the router settings, but first you'll need to ensure that the network
cables are firmly attached and that your modem is connected to either the cable outlet or the phone line
(depending upon which ISP's service you're using) and that the cables are not damaged.
 Check the connections at both ends of all the wires. This may sound silly, but things get pulled or
simply break.
 Check the connection to the cable jack or phone line as well as the CAT5 or CAT6 network cables
between the modem and/or router as well as the computers.
 On most systems there should be a green LED lit if the network cable connection is working.
Try replacing the cables. If the connector retainer (a small, springy plastic that holds the cable firmly in place) is
broken or has lost its ability to retain a firm connection then the connection may be weak or intermittent.
Reset the Router
If instructed by the network troubleshooter (or if you've completed the steps above) you'll need to ensure that
the problem isn't with your router.
Recycling Power to Your Router
Start by recycling the power to your router (and modem if they are separate):
1. Turn off the power to the modem (then the router), and wait for two minutes.
2. Turn the modem on and wait for the lights to settle (you should see a steady light on the modem) then
turn on the router.
3. Wait 30 seconds.
4. Turn your computer on.
This process will force a new IP lease from your ISP and everything should now work.
Recycling the power is necessary because your ISP (Shaw, Rogers, Telus, etc.) changes dynamic IP addresses
every so often, disabling those that have been running for too long.
Try Without the Router
If you continue to have problems and you have a separate modem you can try your modem without the router. If
the Internet is accessible, try to run it with the router again. If that fails, proceed to the next step in resetting and
setting up your router.
Resetting Your Router
If you continue to have problems, you should try resetting the router.
 Factory settings are the defaults that came with your router. Resetting your router will remove any
customized settings.
 Make a note of any existing settings before resetting your router (if possible). Many provide a method
of saving settings to your computer.
 Most have a recessed reset button. To restore factory settings, hold down the button for a minute or two
with the tip of a ball point pen or paper clip.
Configuring the Router
You will then have to configure your router to set up your network and connect to your ISP.
 Ensure that your computer is connected to the router with a network cableduring the setup process.
 Never alter your router settings while connected through a wireless connection — you will lose access to
the router when it reboots during the setup process.
You may wish to have some professional help to ensure you retain the maximum security and correct settings
for your network.
At the very least you should read the manual provided with your router so you understand the process and what
each of the settings will change.
 You can obtain the instructions for your particular router from the manufacturer's website or from the
documentation that came with your router.
 Never retain default settings as this compromises your network security.
 Change the default settings (especially the password) to protect your network from malicious attacks.

Web browsing software


A web browser (commonly referred to as a browser) is a software application for accessing information
on the World Wide Web. Each individual web page, image, and video is identified by a distinct Uniform
Resource Locator (URL), enabling browsers to retrieve these resources from a web server and display them on
a user's device.
A browser, short for web browser, is the software application (a program) that you're using right now to
search for, reach and explore websites. Whereas Excel is a program for spreadsheets and Word a program for
writing documents, a browser is a program for Internet exploring (which is where that name came from).
Browsers don't get talked about much. A lot of people simply click on the "icon" on our computers that
take us to the Internet—and that's as far as it goes. And in a way, that's enough. Most of us simply get in a car
and turn the key...we don't know what kind of engine we have or what features it has...it takes us where we want
to go. That's why when it comes to computers:
1. There are some computer users that can't name more than one or two browsers
2. Many of them don't know they can switch to another browser for free
3. There are some who go to Google's webpage to "Google" a topic and think that Google is their browser.
So for some basic browser education sake, let's cover a few points:
1. Know your browser. Look at the very far-upper-left corner of your screen. You'll see the name of your
browser.
2. Get the latest version. Browsers get updates and updated regularly, usually because computers and
technology change fast also. You can check what version of your browser you're currently using by
going to whatbrowser.org.
3. Try a different browser. You can switch to another browser at any time. It won't affect your computer
and it will give you an idea of how they are different.
4. Read browser reviews. You can compare features of the different browsers on websites like
http://internet-browser-review.toptenreviews.com.
The leading Internet Browsers are:
1. Google Chrome 5. Microsoft Edge
2. Mozilla Firefox 6. Opera
3. Apple Safari 7. Maxthon
4. Microsoft Internet Explorer
Features
The most popular browsers have a number of features in common. They allow users to set bookmarks and
browse in a private mode. They also can be customized with extensions, and some of them provide a sync
service. Most browsers have these user interface features:
1. Allow the user to open multiple pages at the same time, either in different browser windows or in
different tabs of the same window.
2. Back and forward buttons to go back to the previous page visited or forward to the next one.
3. A refresh or reload button to reload the current page.
4. A stop button to cancel loading the page. (In some browsers, the stop button is merged with the reload
button.)
5. A home button to return to the user's home page.
6. An address bar to input the URL of a page and display it.
7. A search bar to input terms into a search engine. (In some browsers, the search bar is merged with the
address bar.)
Security
Web browsers are popular targets for hackers, who exploit security holes to steal information,
destroy files, and other malicious activity. Browser vendors regularly patch these security holes, so users are
strongly encouraged to keep their browser software updated. Other protection measures are antivirus
software and avoiding known-malicious websites.

Search Engines
A web search engine or Internet search engine is a software system that is designed to carry out web
search (Internet search), which means to search the World Wide Web in a systematic way for particular
information specified in a textual web search query. The search results are generally presented in a line of
results often referred to as search engine results pages (SERPs). The information may be a mix of links to web
pages, images, videos, info graphics, articles, research papers, and other types of files. Some search engines
also mine data available in databases or open directories. Unlike web directories, which are maintained only by
human editors, search engines also maintain real-time information by running an algorithm on a web crawler.
Internet content that is not capable of being searched by a web search engine is generally described as the deep
web.
Search engine is a service that allows Internet users to search for content via the World Wide Web
(WWW). A user enters keywords or key phrases into a search engine and receives a list of Web content results
in the form of websites, images, videos or other online data. The list of content returned via a search engine to a
user is known as a search engine results page (SERP).
To simplify, think of a search engine as two components. First a spider/web crawler trolls the web for
content that is added to the search engine's index. Then, when a user queries a search engine, relevant results are
returned based on the search engine's algorithm. Early search engines were based largely on page content, but as
websites learned to game the system, algorithms have become much more complex and search results returned
can be based on literally hundreds of variables.
Different Types of Search Engines: Search engines are classified into the following three categories based on
how it works.
1. Crawler based search engines
2. Human powered directories
3. Hybrid search engines
4. Other special search engines
Crawler Based Search Engines: All crawler based search engines use a crawler or bot or spider for crawling and
indexing new content to the search database. There are four basic steps, every crawler based search engines
follow before displaying any sites in the search results.
1. Crawling: Search engines crawl the whole web to fetch the web pages available.
2. Indexing: Indexing is next step after crawling which is a process of identifying the words and
expressions that best describe the page. The identified words are referred as keywords and the
page is assigned to the identified keywords.
3. Calculating Relevancy: Search engine compares the search string in the search request with the
indexed pages from the database.
4. Retrieving Results: The last step in search engines’ activity is retrieving the results. Basically, it
is simply displaying them in the browser in an order. Search engines sort the endless pages of
search results in the order of most relevant to the least relevant sites.
Examples of Crawler Based Search Engines
1. Google 4. Baidu
2. Bing 5. Yandex
3. Yahoo!
Human Powered Directories: Human powered directories also referred as open directory system depends on
human based activities for listings. Below is how the indexing in human powered directories work:
1. Site owner submits a short description of the site to the directory along with category it is to be
listed.
2. Submitted site is then manually reviewed and added in the appropriate category or rejected for
listing.
3. Keywords entered in a search box will be matched with the description of the sites. This means
the changes made to the content of a web pages are not taken into consideration as it is only the
description that matters.
4. A good site with good content is more likely to be reviewed for free compared to a site with poor
content.
Yahoo! Directory and DMOZ were perfect examples of human powered directories. Unfortunately,
automated search engines like Google, wiped out all those human powered directory style search engines out of
the web.
Hybrid Search Engines: Hybrid Search Engines use both crawler based and manual indexing for listing the sites
in search results. Most of the crawler based search engines like Google basically uses crawlers as a primary
mechanism and human powered directories as secondary mechanism. For example, Google may take the
description of a webpage from human powered directories and show in the search results. As human powered
directories are disappearing, hybrid types are becoming more and more crawler based search engines.
Other Types of Search Engines: Besides the above three major types, search engines can be classified into many
other categories depending upon the usage. Below are some of the examples:
1. Search engines have different types of bots for exclusively displaying images, videos, news,
products and local listings. For example, Google News page can be used to search only news
from different newspapers.
2. Some of the search engines like Dogpile collect Meta information of the pages from other search
engines and directories to display in the search results. This type of search engines is called
metasearch engines.
3. Semantic search engines like Swoogle provide accurate search results on specific area by
understanding the contextual meaning of the search queries.

URL
A Uniform Resource Locator (URL), a web address, is a reference to a web resource that specifies its
location on a computer network and a mechanism for retrieving it. A URL is a specific type of Uniform
Resource Identifier (URI), although many people use the two terms interchangeably. URLs occur most
commonly to reference web pages (http), but are also used for file transfer (ftp), email (mailto), database access
(JDBC), and many other applications.
Most web browsers display the URL of a web page above the page in an address bar. A typical URL
could have the form http://www.example.com/index.html, which indicates a protocol (http),
a hostname (www.example.com), and a file name (index.html).
URL is also known as a web address, a URL (Uniform Resource Locator) is a form of URI and a
standardized naming convention for addressing documents accessible over the Internet and Intranet. An
example of a URL is https://www.computerhope.com, which is the URL for the Computer Hope website.
Overview of a URL
Below is additional information about each of the sections of the http URL for this page.

http:// or https://
The "http" stands for Hypertext Transfer Protocol and is what enables the browser to know what protocol it is
going to use to access the information specified in the domain. An "https" protocol is short for "Hypertext
Transfer Protocol Secure" and indicates that information transmitted over HTTP is encrypted and secure. After
the http or https is the colon ( : ) and two forward slashes ( // ) that separate the protocol from the remainder of
the URL.
A URL is not explicit to an HTTP or HTTPS addresses; FTP, TFTP, Telnet, and other addresses are also
considered URLs and may not follow the same syntax as our example.
WWW
Next, "www" stands for World Wide Web and is used to distinguish the content. This portion of the URL is not
required and many times can be left out. For example, typing "http://computerhope.com" would still get you to
the Computer Hope website. This portion of the address can also be substituted for an important sub page
known as a subdomain.
computerhope.com
Next, "computerhope.com" is the domain name for the website. The last portion of the domain is known as the
domain suffix, or TLD, and is used to identify the type or location of the website. For example, ".com" is short
for commercial, ".org" is short for an organization, and ".co.uk" is the United Kingdom. There are dozens of
other domain suffixes available. To get a domain, you would register the name through a domain registrar.
/jargon/u/
Next, the "jargon" and "u" portions of the above URL are the directories of where on the server the web page is
located. In this example, the web page is two directories deep, so if you were trying to find the file on the
server, it would be in the /public_html/jargon/udirectory. With most servers, the public_html directory is the
default directory containing the HTML files.
url.htm
Finally, url.htm is the actual web page on the domain you're viewing. The trailing .htm is the file extension of
the web page that indicates the file is an HTML file. Other common file extensions on the Internet include
.html, .php, .asp, .cgi, .xml, .jpg, and .gif. Each of these file extensions performs a different function, like all the
different types of files on your computer.
Where is the URL located?
A URL is located at the top of the browser window in the address baror omnibox depending on your browser
window. On desktop computers and laptop, unless your browser is being displayed in fullscreen the URL is
always visible. In most smartphone and tabletbrowsers, the address bar containing the URL will disappear as
you scroll down and only show the domain when visible. When the address bar is not visible, scrolling up on
the page shows the address bar and if only the domain is shown tapping on the address bar shows the full
address.
How to open an URL
A URL can be opened by clicking on a hyperlink. For example, if you click on "hyperlink" in this paragraph it
will open a page describing hyperlinks.
If a URL is in printed material, e-mail, or other place that does not have the URL as a hyperlink it can be typed
in the browser address bar to open the page. If the URL is in an e-mail, it can also be copied and pasted into the
address bar.
What characters are not allowed in a URL?
Most people realize that a space is not allowed in a URL. However, it is also important to realize, as
documented in RFC 1738, the URL string can only contain alphanumeric characters and the !$-_+*'(),
characters. Any other characters that are needed in the URL must be encoded.
Understanding more complex URLs and parameters
When a URL points to a script that performs additional functions, such as a search engine pointing to a search
results page, additional information (parameters) is added to the end of the URL. Below is additional
information about a URL that points to the Computer Hope search page, with the search query of "example
search".
../../cgi-bin/search.cgi?q=example%20search
In this URL, the script file being pointed to is search.cgi in the cgi-bin directory. Because this file ends with
.cgi, it is assumed to be a Perlscript.
After the script file name is a ? (question mark). The question mark in a URL separates the URL from all the
parameters or variables that are being sent to the script. In the example above, the parameter being sent
is q=example%20search. The "q" is a variable name, and the "example%20search" is the value being sent to
that variable. Because no spaces are allowed in a URL, the space is encoded as %20. In many scripts, a + (plus)
is also used to represent a space.

Domain Names
A domain name is an identification string that defines an empire of administrative autonomy, authority
or control within the Internet. Domain names are used in various networking contexts and for application-
specific naming and addressing purposes. In general, a domain name identifies a network domain, or it
represents an Internet Protocol (IP) resource, such as a personal computer used to access the Internet, a server
computer hosting a web site, or the web site itself or any other service communicated via the Internet. In 2017,
330.6 million domain names had been registered.
Domain names are formed by the rules and procedures of the Domain Name System (DNS). Any name
registered in the DNS is a domain name. Domain names are organized in subordinate levels (subdomains) of
the DNS root domain, which is nameless. The first-level set of domain names are the top-level domains (TLDs),
including the generic top-level domains(gTLDs), such as the prominent domains com, info, net, edu, and org,
and the country code top-level domains (ccTLDs). Below these top-level domains in the DNS hierarchy are the
second-level and third-level domain names that are typically open for reservation by end-users who wish to
connect local area networks to the Internet, create other publicly accessible Internet resources or run web sites.
The registration of these domain names is usually administered by domain name registrars who sell their
services to the public.
A fully qualified domain name (FQDN) is a domain name that is completely specified with all labels in the
hierarchy of the DNS, having no parts omitted. Labels in the Domain Name System are case-insensitive, and
may therefore be written in any desired capitalization method, but most commonly domain names are written in
lowercase in technical contexts.
DNS AND NAME SERVERS
Without the Domain Name System (DNS), the Internet would be a much less user-friendly place. Instead of
using easily remembered names such as a2hosting.com, we would have to use a sequence of numbers like
75.98.175.166 (also known as an IP address) every time we wanted to visit a web site or access a service on the
Internet. DNS translates human-readable domain names into numeric IP addresses that computers can
understand.
IP Addresses
In addition to the domain name, there is also another address for a Web site: the IP (Internet Protocol) number.
This is the actual address computers use to connect to the site through the Internet. It is directly linked to the
domain name and is regulated by the Internet Corporation for Assigned Names and Numbers (ICANN)
The domain name and the IP address act in the same way. Each computer connected to the Internet is assigned a
unique number known as an IP address. Developed in the early 1970's, this number serves as the computer's
Internet address. An IP address can be either static (permanent) or dynamic (temporary). Most home computers
use a dynamic IP address while servers and many other computers use a static IP address. An IP address looks
like this: 12.129.147.10. If you were to enter that number in the address bar of your Web browser, you would
reach the Web site of the Washington Post.
Registering Domain Names
In order to use a domain name, it must be registered with a registry. ICANN maintains a current directory of
accredited registrars. The domain name is registered for a specified period of time. i.e. one year, up to a
maximum of ten years, and is renewable on an ongoing basis. When you purchase a domain name, it only
belongs to you for the specified time you stated, in this case, one year. As long as you continue to renew it in a
timely fashion, it will belong to you. It is important to keep track of the renewal period because if the domain
name is not renewed, it can be registered by anyone for their own use.
During the registration process you may be asked for information for different "contacts." i.e., technical,
administrative. Your domain name record will be available to the public in what is called a "who is" database (a
public database mandated by ICANN).
IP Addressing
An Internet Protocol address (IP address) is a numerical label assigned to each device connected to
a computer network that uses the Internet Protocol for communication. An IP address serves two main
functions: host or network interface identification and location addressing.
Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number, this allows for a maximum
of 4,294,967,296 (232) unique addresses. However, because of the growth of the Internet and the depletion of
available IPv4 addresses, a new version of IP (IPv6), using 128 bits for the IP address, which allows for 3.4 x
1038 (2128) unique addresses was developed in 1995, and standardized in December 1998. In July 2017, a final
definition of the protocol was published. IPv6 deployment has been ongoing since the mid-2000s.
IP addresses are usually written and displayed in human-readable notations, such as 172.16.254.1 in
IPv4, and 2001:db8:0:1234:0:567:8:1 in IPv6. The size of the routing prefix of the address is designated
in CIDR notation by suffixing the address with the number of significant bits, e.g., 192.168.1.15/24, which is
equivalent to the historically used subnet mask 255.255.255.0.
The IP address space is managed globally by the Internet Assigned Numbers Authority (IANA), and by
five regional Internet registries (RIRs) responsible in their designated territories for assignment to end users
and local Internet registries, such as Internet service providers. IPv4 addresses have been distributed by IANA
to the RIRs in blocks of approximately 16.8 million addresses each. Each ISP or private network administrator
assigns an IP address to each device connected to its network. Such assignments may be on a static (fixed or
permanent) or dynamic basis, depending on its software and practices.
SubNetworks
IP networks may be divided into subnetworks in both IPv4 and IPv6. For this purpose, an IP address is
recognized as consisting of two parts: the network prefix in the high-order bits and the remaining bits called
the rest field, host identifier, or interface identifier (IPv6),
used for host numbering within a network.[1] The subnet
mask or CIDR notation determines how the IP address is
divided into network and host parts.
The term subnet mask is only used within IPv4. Both
IP versions however use the CIDR concept and notation. In
this, the IP address is followed by a slash and the number (in
decimal) of bits used for the network part, also called
the routing prefix. For example, an IPv4 address and its
subnet mask may be 192.0.2.1 and 255.255.255.0,
respectively. The CIDR notation for the same IP address and
subnet is 192.0.2.1/24, because the first 24 bits of the IP
address indicate the network and subnet.
IPv4
An IPv4 address has a size of 32 bits, which limits the address space to 4294967296 (232) addresses. Of
this number, some addresses are reserved for special purposes such as private networks (~18 million addresses)
and multicast addressing (~270 million addresses).
IPv4 addresses are usually represented in dot-decimal notation, consisting of four decimal numbers,
each ranging from 0 to 255, separated by dots, e.g., 172.16.254.1. Each part represents a group of 8 bits
(an octet) of the address. In some cases of technical writing, [specify] IPv4 addresses may be presented in
various hexadecimal, octal, or binary representations.
Historical Classful Network Architecure
Reserved PrivateIPv4 Network Range

IPv6
In IPv6, the address size was increased from 32 bits in IPv4 to 128 bits, thus providing up to
2128 (approximately 3.403×1038) addresses. This is deemed sufficient for the foreseeable future.
The intent of the new design was not to provide just a sufficient quantity of addresses, but also redesign
routing in the Internet by allowing more efficient aggregation
of subnetwork routing prefixes. This resulted in slower
growth of routing tables in routers. The smallest possible
individual allocation is a subnet for 264 hosts, which is the
square of the size of the entire IPv4 Internet. At these levels,
actual address utilization ratios will be small on any IPv6
network segment. The new design also provides the
opportunity to separate the addressing infrastructure of a
network segment, i.e. the local administration of the
segment's available space, from the addressing prefix used to
route traffic to and from external networks. IPv6 has
facilities that automatically change the routing prefix of
entire networks, should the global connectivity or the routing
policy change, without requiring internal redesign or manual
renumbering.
The large number of IPv6 addresses allows large blocks to be assigned for specific purposes and, where
appropriate, to be aggregated for efficient routing. With a large address space, there is no need to have complex
address conservation methods as used in CIDR.
All modern desktop and enterprise server operating systems include native support for the IPv6 protocol,
but it is not yet widely deployed in other devices, such as residential networking routers, voice over IP (VoIP)
and multimedia equipment, and some networking hardware.

Wi-Fi and Bluetooth technology overview


Wi-Fi
Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless
high-speed Internet and network connections. A common misconception is that the term Wi-Fi is short for
"wireless fidelity," however this is not the case. Wi-Fi is simply a trademarked phrase that means IEEE
802.11x.
How Wi-Fi Networks Works
Wi-Fi networks have no physical wired connection between sender and receiver by using radio
frequency (RF) technology -- a frequency within the electromagnetic spectrum associated with radio wave
propagation. When an RF current is supplied to an antenna, an electromagnetic field is created that then is able
to propagate through space.
The cornerstone of any wireless network is an access point (AP). The primary job of an access point is
to broadcast a wireless signal that computers can detect and "tune" into. In order to connect to an access point
and join a wireless network, computers and devices must be equipped with wireless network adapters.
The Wi-Fi Alliance
The Wi-Fi Alliance, the organization that owns the Wi-Fi registered trademark term specifically defines
Wi-Fi as any "wireless local area network (WLAN) products that are based on the Institute of Electrical and
Electronics Engineers' (IEEE) 802.11 standards."
Initially, Wi-Fi was used in place of only the 2.4GHz 802.11b standard, however the Wi-Fi Alliance has
expanded the generic use of the Wi-Fi term to include any type of network or WLAN product based on any of
the 802.11 standards, including 802.11b, 802.11a, dual-band and so on, in an attempt to stop confusion about
wireless LAN interoperability.
Wi-Fi Support in Applications and Devices
Wi-Fi is supported by many applications and devices including video game consoles,
home networks, PDAs, mobile phones, major operating systems, and other types of consumer electronics. Any
products that are tested and approved as "Wi-Fi Certified" (a registered trademark) by the Wi-Fi Alliance are
certified as interoperable with each other, even if they are from different manufacturers. For example, a user
with a Wi-Fi Certified product can use any brand of access point with any other brand of client hardware that
also is also "Wi-Fi Certified".
Products that pass this certification are required to carry an identifying seal on their packaging that states
"Wi-Fi Certified" and indicates the radio frequency band used (2.5GHz for 802.11b, 802.11g, or 802.11n, and
5GHz for 802.11a).
Bluetooth
Bluetooth is a wireless technology standard for exchanging data between fixed and mobile devices over
short distances using short-wavelength UHF radio waves in the industrial, scientific and medical radio bands,
from 2.400 to 2.485 GHz, and building personal area networks (PANs). It was originally conceived as a
wireless alternative to RS-232 data cables.
Bluetooth is managed by the Bluetooth Special Interest Group (SIG), which has more than 35,000
member companies in the areas of telecommunication, computing, networking, and consumer electronics.
The IEEE standardized Bluetooth as IEEE 802.15.1, but no longer maintains the standard. The Bluetooth SIG
oversees development of the specification, manages the qualification program, and protects the trademarks. A
manufacturer must meet Bluetooth SIG standards to market it as a Bluetooth device. A network of patents apply
to the technology, which are licensed to individual qualifying devices.
List of applications
1. Wireless control and communication between a mobile phone and a hands free headset.
2. Wireless control of and communication between a mobile phone and a Bluetooth compatible car
stereo system.
3. Wireless control of and communication with iOS and Android device phones, tablets and
portable wireless speakers.
4. Wireless Bluetooth headset and Intercom.
5. Wireless streaming of audio to headphones with or without communication capabilities.
6. Wireless streaming of data collected by Bluetooth-enabled fitness devices to phone or PC.
7. Wireless networking between PCs in a confined space and where little bandwidth is required.
8. Wireless communication with PC input and output devices, the most common being
the mouse, keyboard and printer.
9. Transfer of files, contact details, calendar appointments, and reminders between devices
with OBEX.
10. For controls where infrared was often used.
11. Sending small advertisements from Bluetooth-enabled advertising hoardings to other,
discoverable, Bluetooth devices.
12. Wireless bridge between two Industrial Ethernet (e.g., PROFINET) networks.

Bluetooth vs Wi-Fi (IEEE 802.11)


Bluetooth and Wi-Fi (Wi-Fi is the brand name for products using IEEE 802.11 standards) have some
similar applications: setting up networks, printing, or transferring files. Wi-Fi is intended as a replacement for
high-speed cabling for general local area network access in work areas or home. This category of applications is
sometimes called wireless local area networks(WLAN). Bluetooth was intended for portable equipment and its
applications. The category of applications is outlined as the wireless personal area network (WPAN). Bluetooth
is a replacement for cabling in a variety of personally carried applications in any setting, and also works for
fixed location applications such as smart energy functionality in the home (thermostats, etc.).
Wi-Fi and Bluetooth are to some extent complementary in their applications and usage. Wi-Fi is usually
access point-centered, with an asymmetrical client-server connection with all traffic routed through the access
point, while Bluetooth is usually symmetrical, between two Bluetooth devices. Bluetooth serves well in simple
applications where two devices need to connect with a minimal configuration like a button press, as in headsets
and remote controls, while Wi-Fi suits better in applications where some degree of client configuration is
possible and high speeds are required, especially for network access through an access node.
Versions of Bluetooth
Bluetooth 1.0 and 1.0B: Versions 1.0 and 1.0B had many problems, and manufacturers had difficulty making
their products interoperable.
Bluetooth 1.1: Ratified as IEEE Standard 802.15.1–2002[57]
Bluetooth 1.2: Major enhancements include: Faster Connection and Discovery
Bluetooth 2.0 + EDR: This version of the Bluetooth Core Specification was released before 2005. The main
difference is the introduction of an Enhanced Data Rate (EDR) for faster data transfer. The bit rate of EDR is
3 Mbit/s, although the maximum data transfer rate (allowing for inter-packet time and acknowledgements) is
2.1 Mbit/s.
Bluetooth 2.1 + EDR: Bluetooth Core Specification Version 2.1 + EDR was adopted by the Bluetooth SIG on
26 July 2007.
Bluetooth 3.0 + HS: Version 3.0 + HS of the Bluetooth Core Specification was adopted by the Bluetooth SIG
on 21 April 2009. Bluetooth] v3.0 + HS provides theoretical data transfer speeds of up to 24 Mbit/s, though not
over the Bluetooth link itself.
Bluetooth 4.0: Bluetooth SIG completed the Bluetooth Core Specification version 4.0 (called Bluetooth Smart)
and has been adopted as of 30 June 2010. It includes Classic Bluetooth, Bluetooth high speed and Bluetooth
Low Energy (BLE) protocols. Bluetooth high speed is based on Wi-Fi, and Classic Bluetooth consists of legacy
Bluetooth protocols.
Bluetooth 4.1: The Bluetooth SIG announced formal adoption of the Bluetooth v4.1 specification on 4
December 2013. This specification is an incremental software update to Bluetooth Specification v4.0, and not a
hardware update.
Bluetooth 4.2: Released on December 2, 2014, it introduces features for the Internet of Things.
Bluetooth 5: The Bluetooth SIG presented Bluetooth 5 on 16 June 2016. Its new features are mainly focused on
new Internet of Things technology. The Samsung Galaxy S8 launched with Bluetooth 5 support in April 2017.

Internet and Intranet: architecture and various file formats


Intranet
An intranet is a private network accessible only to an organization's staff. Often, a wide range of
information and services are available on an organization's internal intranet that are unavailable to the public,
unlike the Internet. A company-wide intranet can constitute an important focal point of internal communication
and collaboration, and provide a single starting point to access internal and external resources. In its simplest
form, an intranet is established with the technologies for local area networks (LANs) and wide area
networks (WANs). Many modern intranets have search engines, user profiles, blogs, mobile apps with
notifications, and events planning within their infrastructure.
An intranet is a private network contained within an enterprise that is used to securely share company
information and computing resources among employees. An intranet can also be used to facilitate working in
groups and teleconferences.
Intranets increase communication within an organization by allowing employees to easily access
important information, links, applications and forms as well as databases that can provide company records.
Security can also be increased within the intranet by establishing a database that maintains all of the usernames
of people who are allowed access to the network.
Uses of the intranet: Potential uses of an intranet include:
1. Streamlining everyday activities by making repeated tasks more feasible.
2. Centralizing and managing important information and company data in a single database.
3. Making collaboration easier since information can be shared across the entire network.
4. Providing personalized content to employees based on their role within the company.
5. Improving internal communication by making employee directories, company news and
organization charts readily available.
6. Providing fast and easy access to information about company policies, benefits and updates.
How the intranet works
A secure and reliable intranet requires a web server that is responsible for managing all requests for files
hosted on the server, finding the requested file and delivering it to the appropriate computer. A content
management system (CMS) should also be set up to control the creation, publication and management of
content on the intranet.
An intranet may also consist of many interlinked local area networks (LANs) as well as leased lines in
the wide area network (WAN). It uses TCP/IP, HTTP, and other Internet protocols (IP). Typically, an intranet
includes connections through one or more gateway computers to the outside Internet.
An employee who wants to access the intranet must have a special network password and be connected
to the LAN. However, an employee working remotely can gain access to the intranet through a virtual private
network (VPN). The VPN allows users who are not actually connected to the required LAN to sign into the
intranet and access all the same information and functions that would be available had they been connected to
the LAN.
The intranet generally looks like a private version of the Internet. With tunneling, companies can send
private messages through the public network while using special encryption/decryption and other security
safeguards to connect one part of their intranet to
another.
Intranet Architecture and Application: Diagram
Benefits and challenges of the intranet: Some potential
benefits of using an intranet include:
1. Improved communication, information
sharing and collaboration within a
business.
2. An increased return on investment (ROI)
due to the low implementation and
operating costs.
3. The ability for human resources to
manage employee records and for
customer service representatives to track
help requests.
4. The use of the intranet as a testing
environment for new ideas before they are
implemented on the company's Internet
webpage.
5. An improved corporate culture within a
business through the use of a social
intranet that is built around people and
focused on enabling widespread
participation and interaction.
6. Workforce productivity: Intranets can
help users to locate and view information
faster and use applications relevant to
their roles and responsibilities.
7. Time: Intranets allow organizations to
distribute information to employees on
an as-needed basis.
8. Communication: Intranets can serve as powerful tools for communication within an organization,
vertically strategic initiatives that have a global reach throughout the organization.
9. Business operations and management: Intranets are also being used as a platform for developing
and deploying applications to support business operations and decisions across the
internetworked enterprise.
10. Workflow - a collective term that reduces delay, such as automating meeting scheduling and
vacation is planning.
11. Cost-effective: Users can view information and data via web-browser rather than maintaining
physical documents such as procedure manuals, internal phone list and requisition forms.
12. Enhance collaboration: Information is easily accessible by all authorised users, which enables
teamwork..
13. Cross-platform capability: Standards-compliant web browsers are available for Windows, Mac,
and UNIX.
14. Built for one audience: Many companies dictate computer specifications which, in turn, may
allow Intranet developers to write applications that only have to work on one browser (no cross-
browser compatibility issues).
15. Promote common corporate culture: Every user has the ability to view the same information
within the intranet.
16. Immediate updates: When dealing with the public in any capacity, laws, specifications, and
parameters can change. Intranets make it possible to provide your audience with "live" changes
so they are kept up-to-date, which can limit a company's liability.
17. Supports a distributed computing architecture: The intranet can also be linked to a company’s
management information system, for example a time keeping system.
18. Employee Engagement: Since "involvement in decision making" is one of the main drivers of
employee engagement, offering tools (like forums or surveys) that foster peer-to-peer
collaboration and employee participation can make employees feel more valued and involved.
Some challenges faced when using an intranet include:
1. A lack of intranet users and therefore a lack of the content, communications and documents that
is necessary to make the intranet beneficial.
2. A loss of interest amongst users after the initial excitement and novelty of the intranet has worn
off, also resulting in a lack of content.
3. Limited user support due to the high cost of adding a support team to the payroll. As a result,
when the inevitable software bugs or other issues arise, there is no one to resolve the problems.
4. Continuous examinations and maintenance checks are required to ensure the network is running
properly and does not become outdated with old and irrelevant content.
5. A lack of proper ownership or ownership being distributed amongst various departments. This
complicates the network and makes it difficult to place responsibility in one place.
Differences between the Internet and intranet
The biggest difference between the Internet and intranet is that the Internet can be accessed by anyone
from anywhere, whereas the intranet can only be accessed by a specific group of people who possess an
authenticated login and are connected to the required LAN or VPN. Beyond that, there are several more simple
distinctions, such as:
1. The Internet works on a public network while the intranet works on a private network.
2. The public Internet is not as safe as the private intranet.
3. The Internet can have unlimited users while the intranet has a limited amount.
4. Information on the Internet is unlimited and available to anyone while information on an intranet
is limited and only available to users with authorized access to the intranet network.
Internet
The Internet (interconnected network) is the global system of interconnected computer networks that use
the Internet protocol suite (TCP/IP) to link devices worldwide. It is a network of networks that consists of
private, public, academic, business, and government networks of local to global scope, linked by a broad array
of electronic, wireless, and optical networking technologies. The
Internet carries a vast range of information resources and services,
such as the inter-linked hypertext documents and applications of
the World Wide Web (WWW), electronic mail, telephony, and file
sharing.
The terms internet and World Wide Web are often used
interchangeably, but they are not exactly the same thing; the internet
refers to the global communication system, including hardware and
infrastructure, while the web is one of the services communicated over
the internet.
As computing advanced, peer-to-peer (P2P) communication
was gradually delivered and enhanced. Since the 1990s, the internet
has greatly influenced and upgraded networking to global standards.
Billions of internet users rely on multiple application and networking
technologies, including:
Internet Protocol (IP): The internet’s primary component and
communications backbone. Because the internet is comprised of
hardware and software layers, the IP communication standard is used
to address schemes and identify unique connected devices. Prominent IP versions used for communications
include Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6).
Internet basics
1. The Internet and the WWW are not the same.
2. The Internet is explored using a browser and the act of browsing the Internet is commonly referred to
as surfing.
3. Users browse websites and web pages by following hyperlinks that point to an address more commonly
referred to as a URL.
4. Finding information on the Internet is achieved by using a search engine.
5. Files, pictures, songs, and video can be shared by downloading (receiving) and uploading (sending).
6. The Internet utilizes the TCP/IP protocol and is accessed using a computer modem, broadband, 3G, 4G,
or network that is connected through an ISP.
7. With broadband, many computers and devices use Wi-Fi to connect to a router and share an Internet
connection.
8. The computer you're using to view this web page is considered a host and it's connected to our server to
view this page.
Communications: The internet is the most cost-effective communications method in the world, in which the
following services are instantly available:
1. Email 4. Social networking
2. Instant messaging 5. Online shopping
3. Internet forums 6. Financial services
7. Data transfer/file-sharing, often through File Transfer Protocol (FTP)
8. Web-enabled audio/video conferencing services
9. Online movies and gaming

Various file formats


In a computer, a file format is the layout of a file in terms of how the data within the file is organized. A
program that uses the data in a file must be able to recognize and possibly access data within the file. For
example, the program that we call a Web browser is able to process and display a file in the HTML file format
so that it appears as a Web page, but it cannot display a file in a format designed for Microsoft's Excel program.
A particular file format is often indicated as part of a file's name by a file name extension (suffix).
Conventionally, the extension is separated by a period from the name and contains three or four letters that
identify the format. A program that uses or recognizes a particular file format may or may not care whether the
file has the appropriate extension name since it can actually examine the bits in the file to see whether the
format (layout) is one it recognizes. There are as many different file formats as there are different programs to
process the files. A few of the more common file formats are:
1. Word documents (.doc)
2. Web text pages (.htm or .html)
3. Web page images (.gif and .jpg) Graphics Interchange Format AND Joint Photographic Experts Group
4. Adobe Postcript files (.ps) 9. TIFF - Tagged Image File
5. Adobe Acrobat files (.pdf) 10. EPS - Encapsulated Postscript
6. Executable programs (.exe) 11. AI - Adobe Illustrator Document
7. Multimedia files (.mp3 and others) 12. INDD - Adobe Indesign Document
8. PNG - Portable Network Graphics 13. RAW - Raw Image Formats

APPLICATIONS of INTERNET
The Internet has many important applications. Of the various services available via the Internet, the three most
important are e-mail, web browsing, and peer-to-peer services. E-mail, also known as electronic mail, is the
most widely used and successful of Internet applications. Web browsing is the application that had the greatest
influence in dramatic expansion of the Internet and its use during the 1990s. Peer-to-peer networking is the
newest of these three Internet applications, and also the most controversial, because its uses have created
problems related to the access and use of copyrighted materials.
Examples of Applications: An Internet application does something for end users. It is generally not concerned
with how data is actually transmitted between the hosts. Here are some distributed applications that require
well-defined application level protocols:
 Sending and receiving email
 Searching and browsing information archives
 Copying files between computers
 Conducting financial transactions
 Navigating (in your car, smart scooter, smart bike, or other)
 Playing interactive games
 Video and music streaming
 Chat or voice communication (direct messaging, video conferencing)
 Communication  Travel
 Job searches  Entertainment
 Finding books and study material  Shopping
 Health and medicine  Stock market updates
 Research
 Business use of internet: different ways by which internet can be used for business are
o Information about the product can be provided can be provided online to the customer.
o Provide market information to the business
o It help business to recruit talented people
o Help in locating suppliers of the product.
o Fast information regarding customers view about companies product
o Eliminate middle men and have a direct contact with contact with customer.
o Providing information to the investor by providing companies back ground and financial
information on web site.
In addition, there are a number of network services such as:
 Name servers
 Configuration servers
 Mail gateways, transfer agents, relays
 File and print servers
 Communication
 Data Transfer
 Information
Electronic mailing systems (Google Mail features): Creating and Managing mailing accounts,
folders.

EMAIL
Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic
devices. Invented by Ray Tomlinson, email first entered limited use in the 1960s and by the mid-1970s had
taken the form now recognized as email. Email operates across computer networks, which today is primarily
the Internet. Some early email systems required the author and the recipient to both is online at the same time,
in common with instant messaging. Today's email systems are based on a store-and-forward model.
Email servers accept, forward, deliver, and store messages. Neither the users nor their computers are required to
be online simultaneously; they need to connect only briefly, typically to a mail server or a webmail interface for
as long as it takes to send or receive messages.
Short for electronic mail, email (or e-mail) is defined as the transmission of messages
over communications networks. Typically the messages are notes entered from the keyboard or
electronic files stored on disk. Most mainframes, minicomputers, and computer networks have an email system.

Massage Format
Internet email messages consist of two major sections, the message header and the message body, collectively
known as content. The header is structured into fields such as From, To, CC, Subject, Date, and other
information about the email. In the process of transporting email messages between systems, SMTP
communicates delivery parameters and information using message header fields. The body contains the
message, as unstructured text, sometimes containing a signature block at the end. The header is separated from
the body by a blank line.
Message header
Each email message has a header (the "header section" of the message, according to the specification),
comprising a number of fields ("header fields"). Each field has a name ("field name" or "header field name"),
which is followed by the separator character ":", and a value ("field body" or "header field body").
Each field name must start in the first character of a new line in the header section and begin with a non-
whitespace printable character. It ends with the separator character ":". The separator is then followed by the
field value (the "field body"). The value can continue onto subsequent lines if those lines have a space or tab as
their first character. Field names and, without SMTPUTF8, field bodies are restricted to 7-bit ASCII characters.
Some non-ASCII values may be represented using MIME encoded words.
Header fields
Email header fields can be multi-line, with each line recommended to be no more than 78 characters, although
the technical limit is 998 characters. In particular, this allows email addresses to use non-ASCII characters.
Such addresses are supported by Google and Microsoft products, and promoted by some governments.
The message header must include at least the following fields:
 From: The email address, and optionally the name of the author(s). In many email clients not changeable
except through changing account settings.
 Date: The local time and date when the message was written. Like the From: field, many email clients fill
this in automatically when sending. The recipient's client may then display the time in the format and time
zone local to them.
 To: The email address(es), and optionally name(s) of the message's recipient(s). Indicates primary recipients
(multiple allowed), for secondary recipients see Cc: and Bcc: below.
 Subject: A brief summary of the topic of the message. Certain abbreviations are commonly used in the
subject, including "RE:" and "FW:".
 Cc: Carbon copy; Many email clients will mark email in one's inbox differently depending on whether they
are in the To: or Cc: list. (Bcc: Blind carbon copy; addresses are usually only specified during SMTP
delivery, and not usually listed in the message header.)
 Content-Type: Information about how the message is to be displayed, usually a MIME type.
 Precedence: commonly with values "bulk", "junk", or "list"; used to indicate that automated "vacation" or
"out of office" responses should not be returned for this mail, e.g. to prevent vacation notices from being
sent to all other subscribers of a mailing list. Sendmail uses this field to affect prioritization of queued
email, with "Precedence: special-delivery" messages delivered sooner. With modern high-bandwidth
networks, delivery priority is less of an issue than it once was. Microsoft Exchange respects a fine-grained
automatic response suppression mechanism, the X-Auto-Response-Suppress field.[42]
 Message-ID: Also an automatically generated field; used to prevent multiple delivery and for reference in
In-Reply-To: (see below).
 In-Reply-To: Message-ID of the message that this is a reply to. Used to link related messages together. This
field only applies for reply messages.
 References: Message-ID of the message that this is a reply to, and the message-id of the message the
previous reply was a reply to, etc.
 Reply-To: Address that should be used to reply to the message.
 Sender: Address of the actual sender acting on behalf of the author listed in the From: field (secretary, list
manager, etc.).
 Archived-At: A direct link to the archived form of an individual email message.
SMTP defines the trace information of a message, which is also saved in the header using the following two
fields:
 Received: when an SMTP server accepts a message it inserts this trace record at the top of the header (last
to first).
 Return-Path: when the delivery SMTP server makes the final delivery of a message, it inserts this field at
the top of the header.
Other fields that are added on top of the header by the receiving server may be called trace fields, in a broader
sense.
 Authentication-Results: when a server carries out authentication checks, it can save the results in this field
for consumption by downstream agents.[45]
 Received-SPF: stores results of SPF checks in more detail than Authentication-Results.[46]
 Auto-Submitted: is used to mark automatically generated messages.[47]
 VBR-Info: claims VBR whitelisting[48]
Message body
Content encoding
Internet email was originally designed for 7-bit ASCII. Most email software is 8-bit clean but must assume it
will communicate with 7-bit servers and mail readers. The MIME standard introduced character set specifiers
and two content transfer encodings to enable transmission of non-ASCII data: quoted printable for mostly 7-bit
content with a few characters outside that range and base64 for arbitrary binary data.
Plain text and HTML
Most modern graphic email clients allow the use of either plain text or HTML for the message body at the
option of the user. HTML email messages often include an automatically generated plain text copy as well, for
compatibility reasons. Advantages of HTML include the ability to include in-line links and images, set apart
previous messages in block quotes, wrap naturally on any display, use emphasis such as underlines and italics,
and change font styles. Disadvantages include the increased size of the email, privacy concerns about web bugs,
abuse of HTML email as a vector for phishing attacks and the spread of malicious software.

What Is Gmail?
Gmail is a free email service run by Google. It integrates with other Google services like Google Docs, Google
Drive, and YouTube. Google also offers premium services to businesses through G Suite. There is also an
HTML version of Gmail called Gmail Basic and a Gmail mobile app.
If you've never had an email account before, Gmail is a good place to start. It is reliable and free, and it comes
with 15 GB of storage space for your messages. Your email is stored online, so you can access it from any
device that can connect to the internet.
How to Get a Gmail Account: To create a new Gmail account, you must first create a new Google account.
1. Go to Gmail.com and select Create account.
2. Select For myself.
3. Enter the requested information, then select Next.
4. You may be asked to provide a phone number to verify your identity. Enter your phone number and
select Next. Google will send you a text with a code that you must enter on the following page.
5. Enter the requested information, then select Next.
6. Read Google's privacy information and select I agree.
7. Select Next.
8. Choose a layout for your viewing your messages, then select OK.
You will automatically be taken to Gmail to set up your new account. You'll see a message from Google in your
inbox, which contains important information about using Gmail.
How to Set Up Gmail
After reviewing the introductory information, you can personalize your account. For example, select Change
profile image to add a photo that will be visible to other Gmail users. If you want to change the colors and
layout of the Gmail interface, select choose a theme. If you have another email account, select Import contacts
and mail to link it to your new Gmail account.
How to Use Gmail
1. To send a new Gmail message, select Compose.
2. Select the Star beside a message to mark it as important.
3. To remove messages from your inbox, select the checkbox beside the message, then select Archive (the
folder with a down-arrow) or Trash (the trashcan).
4. Sending a message to the trash in Gmail does not automatically delete it. To permanently delete a
message, select Trash from the left pane to open your trash folder, then select Empty Trash now.
5. To sign out of Gmail, select your profile icon (or image) in the top-right corner, then select Sign out.
How to Make Labels (Folder)
Gmail labels make it easier to manage your inbox. While viewing a message, select the Label icon and choose
from the options, or select Create new to make custom labels.
How to Find Emails in Gmail
In addition to using labels, you can search for the message using the search bar above your inbox. You can also use
your Gmail contacts to find all correspondence with certain people.

Document Collaboration
One of the first real-time collaborative editor tools can be found in “The Mother of All Demos,” presented by
Douglas Engelbart in 1968. The next major milestone for document collaboration appeared in 1991 with the
release of Instant Update for the Mac OS and Microsoft Windows.
Document collaboration has grown to cover tools that enable real-time access and updates for concurrent work
across the room or around the world. This practice (of multiple people working simultaneously on a single
document) is called co-authoring. Modern tools mitigate the challenges of non-real-time and un-automated
collaboration, such as paper trails and red-lining, unwieldy email chains, or overwriting original material.
What Is a Collaborative Document?
A collaborative document is a file that multiple people edit or contribute to, with the goal of creating single final
version through collaboration. Collaborative documents may be word processing or text documents,
spreadsheets, presentations, images, PDFs, videos, or maps.
Common Uses of Document Collaboration
Few documents, presentations, reports, spreadsheets, or projects are developed by just one person. At its core,
document collaboration involves designated shared access to files for editing by groups of any size – be it two
or 2,000.
Document collaboration goals will vary for each organization, so before you choose a tool, define your needs.
For example, a group building a social media campaign may require video, graphs, and pictures as part of
brainstorming or mind mapping. By contrast, a technical build for software values document integrity through
controlled revisions, so security and access may be more important. Consider your company’s functions and
needs when adopting a document collaboration solution.
Top Document Collaboration Tools
Document collaboration tools, like any other widely adopted software platform, are always growing and
improving. Here are the most popular solutions:
1. Google
2. Microsoft Office 365
3. Quip
4. Dropbox Paper
Google offers a suite of services through Google Drive, including the following:
1. Google Docs (initially developed as Writely)
2. Google Slides
3. Google Sheets
Google’s file collaboration platform is universally available and easy to use, as is Microsoft Office 365. Both
have functions that users are already familiar with and can quickly adapt.

Collaboration tools can be more document-centric, such as Google, Quip, and Microsoft Office 365, all of
which use familiar features that use notation to track who and when edits are made. These platforms and others,
such as Dropbox and Box, offer cloud storage-centric tools that enable easy document access from multiple
devices by multiple users, as well as integration with numerous applications. When shopping for a document
collaboration tool, consider these additional features:
1. Automatic save
2. Real-time comments and messaging
3. Version review
4. User permission controls
5. Update alerts
6. Participants list
7. External and internal access
8. Mobile device access (phone, tablet, and
platform support)
9. Offline and online access
10. Compliance
11. File synchronization
12. Historical audit trail (change history)
13. Large file capability
14. Large enterprise team support for
simultaneous access
15. Language/time-zone compatibility
How to Use Document Collaboration Tools
Upon entering a real conference room, you would instantly notice many details, such as who is present and what
they are working on. However, in the new collaborative digital space, much more is immediately evident,
including past and present conversations, project timeline, and next steps. You can easily identify the people in
attendance, meeting agendas, calendars, and revision history.
Most collaborative work is done online or through a proprietary and secure server. Depending upon security
setup, it can be accessed on mobile devices, too. While you typically access and synchronize the work online,
there will be times when team members need offline syncing capabilities, such as when traveling. As with all
tools, know how your document collaboration platform will be used and what features are important — this
information will guide your solution search.
How Do You Share a Document?
Collaboration revolves around sharing documents, and your method for doing so is dependent on the file type
and the tools available in the platform. Google Drive, Dropbox, and Box all have the same general sharing
steps: upload the document to a folder within the online solution, select the Share option, and enter the email
address of the person you would like to share the document with. You also have options to set view-only or edit
permissions.
Document Collaboration for Developers
Software developers depend on accurate version control, and they know both the benefits and the perils of
document collaboration. When choosing a version control platform, development teams should value
accessibility and sharing. Tools and solutions for development collaboration are available through IBM,
Microsoft, Subversion, and Helix.
Another popular platform choice is a distributed version-control (DVC) system, which allows numerous
working copies to be reconciled with the main document. Tools from Git and Mercurial provide some of the
best open source solutions for DVC.

Instant Messaging
Instant messaging (IM) technology is a type of online chat that offers real-time text transmission over
the Internet. A LAN messenger operates in a similar way over a local area network. Short messages are
typically transmitted between two parties, when each user chooses to complete a thought and select "send".
Some IM applications can use push technology to provide real-time text, which transmits messages character by
character, as they are composed. More advanced instant messaging can add file transfer,
clickable hyperlinks, Voice over IP, or video chat.
An instant message (IM) is a real-time, text-based communication similar to chat. IM uses a shared software
client between or among two or more people using personal computers, iPhones or other devices. The
communication is done over a network, often the Internet, and may include advanced modes with live voice or
video. File transfers are also sometimes allowed but are limited in size.
Although included in the online chat category of technologies, IM differs in that the communicating parties are
selected from a known list, called a “buddy list,” “friend list” or “contact list." Users are typically alerted when
someone on their list is online. However, online chat allows communication in a multiuser environment among
users that are usually anonymous.
Some IM systems permit messages to be sent when the recipient is not online. In these cases, IM is much like
email; in fact, the message may even be sent to the recipient's email address.
Features of instant messaging
The exchange of text has long been the chief function of instant messaging, but it is now one feature of many.
The ability to insert images and emojis into messages is now standard in many clients, as are file
transfers. Facebook Messenger even enables users to send money via IM. Numerous clients now support the
escalation from IM to other modes of communication, such as group chat, voice calls or video conferencing.
Presence enables users to see the availability of their contacts -- not only whether they are online or offline, but
also whether they have indicated their status is free or busy. Some clients also enable users to set an "away
message" providing more detail about their limited or lack of availability. Within an active session between two
users, most clients can also indicate to one user in real time when the other user is typing.
Popular instant messaging software: While some IM clients are distinctly consumer services or explicitly for
enterprises, some crossovers exist. The following is a list of popular consumer, prosumer and enterprise IM
clients:
1. Apple Messages (formerly iMessage) 9. Pidgin
2. Cisco Jabber (based on Jabber) 10. Slack
3. Google Hangouts (formerly Google Talk) 11. Telegram
4. Microsoft Skype (includes Skype for 12. Trillian
Business) 13. Viber
5. Facebook Messenger 14. WeChat
6. IBM Sametime 15. WhatsApp Messenger
7. ICQ 16. Windows Live Messenger
8. Line 17. Yahoo Messenger

Netiquettes
"Netiquette" refers to Internet etiquette. This simply means the use of good manners in online communication
such as e-mail, forums, blogs, and social networking sites to name a few. It is important to use netiquette
because communication online is non-verbal. Most often online communication consists of reading something
someone else has typed. This type of communication does not allow each person to see facial expressions, body
language, or hear intonation. Because of this, messages can often be misinterpreted. By following netiquette,
online communication becomes clearer. Especially in business and career related online communications
netiquette should be used to ensure that correct spelling, grammar, and punctuation are put in place to project
professionalism. Netiquette also includes the use of emoticons (such as :) :( ;) and others) to explain an emotion.
In e-mail, netiquette means not flooding someone's inbox with forwarded messages or spam mail. Following
netiquette will help you to maintain and establish positive online relationships as well as develop a positive
online reputation.
While there is no official list of netiquette rules or guidelines, the general idea is to respect others online. Below
are ten examples of rules to follow for good netiquette:
1. Avoid posting inflammatory or offensive comments online (a.k.a flaming).
2. Respect others' privacy by not sharing personal information, photos, or videos that another person may
not want published online.
3. Never spam others by sending large amounts of unsolicited email.
4. Show good sportsmanship when playing online games, whether you win or lose.
5. Don't troll people in web forums or website comments by repeatedly nagging or annoying them.
6. Stick to the topic when posting in online forums or when commenting on photos or videos, such
as YouTube or Facebook comments.
7. Don't swear or use offensive language.
8. Avoid replying to negative comments with more negative comments. Instead, break the cycle with a
positive post.
9. If someone asks a question and you know the answer, offer to help.
10. Thank others who help you online.

Skype calling and Messenger services


There are different ways of communicating and sharing through the Internet. Other than e- mail, the
Internet has many applications which allow instant communication with friends, family, business associates,
and co-workers. One such method is the use of Chat Messenger applications. You may also want to share your
documents and discuss your plans, publicity material, sales trends, and details of stock in hand with your
colleagues at different locations. This will help you make quick decisions based on sound information.
You can do it by using Skype for voice or video calling on the Internet. You can send your files to
your colleagues or share your screen so that they can see the files and participate in discussions. Skype is free
downloadable software. It is used for chatting, sharing information etc. on the Internet. While many services
in Skype are free, subscriptions need to be paid for a few. Advantages of using Skype:
 You can call across the world at very economical rates.
 You can work more flexibly with instant messaging and share large files at the click of a button.
 Customers can call your Online Number from anywhere in the world and you answer the call on
Skype.
 You can keep your travel and communication costs low, allows focus on growing business.
What you will require for these?
 Skype application downloaded and installed on your computer.
 A Skype ID and password.
 Skype ID of the other person with whom you want to communicate.
 Internet connectivity.
 External or built-in web cameras for video calls
How to create and use Skype
1. Download and install Skype.
2. You must download and install Skype if it is not already installed on your computer.
3. Start the web browser. (See, Help Guide, Web Technologies Skill 1.1 or 3.1)
4. Click to place your cursor in the Address or Location bar. Type http://www.skype.com
5. Press the Enter key on your keyboard or click the Go button. Then, wait as the web page loads on
your computer.
6. Search for the link “Download Now” on the page that appears.
7. Download the Skype Free application (SkypeSetup.exe) and save it at an appropriate location on
your computer.
8. Double click on the SkypeSetup.exe file and install Skype.

To create a Skype account


1. Double click on the Skype icon on your desktop to start Skype.
2. Click on “Create a new Account” which will take you to the registration page of Skype’s web site.
3. Enter the details required in the Registration form. First you should enter your name and e-mail
address.
4. Then enter your profile information e.g., Birth Date, Gender, Country, City, Language, and Mobile
Phone Number. These details would be helpful for your friends to locate you on Skype.
5. Next enter the purpose of using Skype. If you select “Mostly business conversations,” you
should provide company details.
6. Next Enter your Skype Name and Password. The Skype Name should be unique as you will be
recognized on Skype by this name. The web site suggests few unique names for you. You may select
one of them or choose to type one for yourself
7. Next enter the security words displayed in the box. This is just to verify that you’re a real person. Then,
click on “I agree – Continue.”
8. Your Skype account is created and it opens a page to introduce you to Skype credits which you need to
purchase if you wish to use the paid services only e.g.,
9. Video conferencing. Click on “No Thanks” and then “Continue

Sign in to Skype
1. Double click on the Skype icon on your desktop to start Skype.
2. Enter your Skype name and password and click on “Sign me in.”
3. When you sign in for the first time, it takes you through a 2 step process of testing your microphone
and webcam and selecting a profile picture. The profile picture can be uploaded from an existing
photo on your computer or you can capture your image using the webcam. You may also skip these
steps and do them later.
You are signed in and ready to use Skype.
Adding Contacts
1. You will need to add contacts before you can actually start communicating with Skype.
2. You may click on the “Add Contact” option in the “Contact” Menu or click on the “Add a contact”
link on the lower left corner of the window.
3. You will get the screen below to add contacts. The more details you provide in the add contacts
windows, the easier it becomes to locate your friend. Once you have located your friend by providing
details, click on “Add” to continue.
4. You will get the screen below. If you want to send a personal message, type in the message box and
click on “Send request.
5. A request will be sent to your friend and when he/she accepts the request, he/she will get added to your
contact list.
6. You may click on the “Add another contact” in the request sent confirmation screen to keep
adding contacts.
Accept Contact requests
1. You may also receive contact requests from others. You have to accept contact requests sent by others
to add them to your contact list. Ask a few participants to send you a contact request and accept those
contacts.
2. When someone adds you to his/her contact list you will get a message on top of your contact list as
given below. Click on the contact request
a. You will get the following buttons which can be used for various purposes.
b. To add a contact, click the Add to Contacts button. Note: Do not accept contacts of people
whom you do not know. Add only contacts of those people who you know personally or
professionally.
c. To view the profile of the person sending the contact, click View Profile. This will show you
the information regarding the person.
d. Click Ignore to reject the contact request.
e. Click Block if you wish to reject the contact request and block the person. Note: Blocking a
person will disable the person from sending you contact requests again.
Send instant messages: By sending instant messages or chatting online using Skype you can share your business
idea description with friends.
1. In your Skype window, go to the Contacts tab and click the name of the person or the group you
wish to start the chat conversation with. You will notice a chat window with the person’s or group’s
name will appear.
2. Click to place your cursor in the chat box and type your message. Then, click Send Message, or
press Enter on your keyboard.
3. Your message along with your contact’s reply to the message will be shown in the chat transcript
window.
4. To continue chatting, repeat steps 2-3.
5. If you wish to chat with another person, go to the Contacts tab, and choose the other person’s name.
The chat window for that person will be shown. Repeat steps 2-4 to start a chat.
6. You can have multiple chat conversations at the same time. To navigate between the different chat
windows, click on the contact, whose chat window you wish to see. Typically, there will be an
orange circle next to the contact that has sent you a message. You may also receive an audio beep.
Sign out of your Skype account
Once you have finished sharing your business idea with all the group members, sign out of your Skype
account. To sign out, in your Skype window, click Skype -> Sign Out in the Menu Bar

Functioning and features of smart gadgets


The gadget is a small electronics and technology based device that performs some specific
functions. A phone that is used to make calls, a watch that shows time is the gadgets. People move from one
place to another, wants to stay updated with everything that is happening in the whole world, so this is not
possible with an ordinary gadget. Now in a technical era, gadgets have become so advanced with the updated
technology and are called Smart Gadgets. Smart Gadgets are Smartphone, smart watches, smart TV and many
other smart devices. In today’s modern era, everybody from any age group has their own smart gadget either
it is a smartphone or smart watch or smart TV. These smart gadgets have made the human life much easier as
compared to before.
Smart Phone
Phone with an advanced mobile operating system is a smartphone. All the computer based
functions can also be done on this pocket-size device. It has many built-in applications and many paid and
free applications. Paid and free applications are available on a device’s respective app store. A smartphone
user can connect with a person who is in another country within seconds. Nothing much is required to do so.
Only internet connection is the primary need of the smartphone if you want to use it effectively. Built in apps
are calendar camera, phone book, email, weather, music player, etc. Countless applications are on Google
play store that can be downloaded easily. Application for any purpose is available but the condition is you
have to download that application.
Smart Watch
Smart watch is a wearable computerized wristwatch. While in the starting, some basic
functions were supported by these type of watches. Now, smart watch runs many apps using a mobile-based
operating system. It is like having a small smartphone on your wrist. You can connect your smart watch with
your smartphone, and then you will get all notifications on your smart watch that arrives on a
smartphone. Advantages of having smart watch are -getting directions while driving, connects with your
phone, voice search is also enabled on a smart watch, get alerts about what happening around the world. It
also measures how many steps you have followed in a day. Now, a smart watch is also acted like a
smartphone because, in the market, smart watches with sim card slot are also available.
Smart TV
TVs are better and advanced than ever. And now they are cheaper to use. TVs have become
so smart using the android based operating system. The smart remote control allows us to connect with the
internet and no extra boxes required to add with TV because Wi-Fi enabled system is built-in. Now, you can
enjoy the multiple apps that run on your smart TV. High-quality sound, HDMI ports, USB ports, ECO sensor
and Anynet+ technology are other features of the smart TV.

Smart phones
A smartphone is a cellular telephone with an integrated computer and other features not
originally associated with telephones, such as an operating system, web browsing and the ability to run
software applications.
Important features
One of the most important features of a smartphone is its connection to an app store. An app store is a
centralized portal where users can search for and download software applications to run on their phones. A
typical app store offers thousands of mobile apps for productivity, gaming, word processing, note-taking,
organization, social media and more. The following are some of the other key features of a smartphone:
1. internet connectivity;
2. a mobile browser;
3. the ability to sync more than one email account to a device;
4. embedded memory;
5. a hardware or software-based QWERTY keyboard;
6. wireless synchronization with other devices, such as laptop or desktop computers;
7. the ability to download applications and run them independently;
8. support for third-party applications;
9. the ability to run multiple applications simultaneously;
10. touchscreen;
11. Wi-Fi;
12. a digital camera, typically with video capability;
13. gaming;
14. unified messaging;
15. GPS -- global positioning system.
A smartphone also has the ability to support accessories, including Bluetooth headphones, power charging
cables and extra speakers. Because of the fragile outer casing of most smartphones, users often also purchase
screen protectors and more durable cases in which to put their phones.
Popular uses
Many consumers use their smartphones to engage with friends, family and brands on social media. Social
media platforms such as Facebook, Instagram, Twitter and LinkedIn all have mobile apps that a user can
download from their phone's app store. These apps make it easier for smartphone users to post personal
updates and photos while on the go rather than at their desktop.
Another common use for smartphones is health and wellness tracking. Third-party wearable devices, such as
smart watches, can connect with a smartphone to monitor an individual's health statistics, such as heart rate,
and send information to be aggregated on the phone.
Mobile payment is another popular use for smartphones. Wallet features allow users to save credit card
information on their phones to use when purchasing items at retail stores.

4K smart television gadgets


A smart TV, also known as a connected TV (CTV), is a traditional television set with integrated Internet and
interactive "Web 2.0" features which allows users to stream music and videos, browse the internet, and view
photos. Smart TV is a technological convergence of computers, television sets and set-top boxes. Besides the
traditional functions of television sets and set-top boxes provided through traditional broadcasting media,
these devices can also provide Internet TV, online interactive media, over-the-top content (OTT), as well
as on-demand streaming media, and home networking access.
Smart TV should not be confused with Internet TV, IPTV or Web television. Internet TV refers to receiving
television content over the Internet instead of traditional systems (terrestrial, cable and satellite) (although
Internet itself is received by these methods). IPTV is one of the Internet television technology standards for
use by television broadcasters. Web television is a term used for programs created by a wide variety of
companies and individuals for broadcast on Internet TV.
In smart TVs, the operating system is preloaded or is available through the set-top box. The software
applications or "apps" can be preloaded into the device, or updated or installed on demand via an app store or
marketplace, in a similar manner to how the apps are integrated in modern smartphones.
Features
Smart TV devices also provide access to user-generated content to interactive services and Internet
applications, such as YouTube, many using HTTP Live streaming adaptive streaming. Services offer users a
means to track and receive reminders about shows or sporting events, as well as the ability to change channels
for immediate viewing. Some devices feature additional interactive organic user interface / natural user
interface technologies for navigation controls and other human interaction with a Smart TV, with such
as second screen companion devices, spatial gestures input like with Xbox Kinect, and even for speech
recognition for natural language user interface. Smart TV develops new features to satisfy consumers and
companies, such as new payment processes.
Use
Social networking some smart TV platforms come prepackaged, or can be optionally extended, with social
networking technology capabilities. The addition of social networking synchronization to smart TV and
HTPC platforms may provide an interaction with both on-screen content and other viewers than is currently
available to most televisions, while simultaneously providing a much more cinematic experience of the
content than is currently available with most computers.
Advertising: Some smart TV platforms also support interactive advertising, addressable advertising with local
advertising insertion and targeted advertising and other advanced advertising features such as ad
telescoping[39] using VOD and DVR, enhanced TV for consumer call-to-action and audience
measurement solutions for ad campaign effectiveness.
Security: There is evidence that a smart TV is vulnerable to attacks. Some serious security bugs have been
discovered, and some successful attempts to run malicious code to get unauthorized access were documented
on video. There is evidence that it is possible to gain root access to the device, install malicious software,
access and modify configuration information for a remote control, remotely access and modify files on TV
and attached USB drives, access camera and microphone.
Restriction of access: Internet websites can block smart TV access to content at will, or tailor the content that
will be received by each platform.[50]Google TV-enabled devices were blocked by NBC, ABC, CBS,
and Hulu from accessing their Web content since the launch of Google TV in October 2010. Google TV
devices were also blocked from accessing any programs offered by Viacom’s subsidiaries.
Reliability: High-end Samsung Smart TVs stopped working for at least seven days after a software
update. Application providers are rarely upgrading Smart TV apps to the latest version; for example, Netflix
does not support older TV versions with new Netflix upgrades.

Kindle
Kindle is a line of Android-powered portable e-book reader devices developed by Amazon
that enable users to shop for, download and read electronic versions of books, newspapers, magazines,
websites, blogs and more. Amazon's basic Kindle devices primarily compete with similar e-book devices like
Barnes & Noble's Nook, while the more advanced Kindle Fire competes with mobile devices like Android-
powered tablet computers and Apple's iPad.
The entry-level Kindles' primary purpose is for reading books, and the devices utilize
Electronic Ink ("E Ink") technology called E Ink Pearl to improve the reading experience. Compared to
the LCDscreens utilized by most mobile devices, the Kindle's E Ink Pearl technology and monochrome matte
screen combine to provide sharp, clear text and reduced glare for extended reading with less eye
fatigue. Kindle devices also offer built-in Wi-Fi capabilities for downloading e-books and apps, as well as
basic Web browsing, and Kindle users can take advantage of free Wi-Fi access at AT&T hotspots.
The Kindle line consists of:
1. The original Kindle device, which is now in its fourth generation
2. The Kindle Touch, Kindle that offers a touch-sensitive screen
3. The Kindle Keyboard, which includes a built-in keyboard
4. The Kindle DX, a Kindle that features larger screen than the original device
5. The Kindle Fire, a tablet computer that offers a full color display.
Key benefits and features of a Kindle:
1. Stores up to 1,400 books.
2. Special high-contrast screen allows you to read even in bright sunshine with no glare.
3. Clear text and fonts, and a sharp display – what you see resembles a book page.
4. Adjustable text size.
5. Built-in wifi or 3G connection.
6. Battery life of at least a month if wifi is turned off.
7. Page-turning function so you feel as if you’re reading a real book.
8. Integrates with Facebook and Twitter and allows searching on Wikipedia.
9. Never heats up like a laptop.
10. Books can be categorised or stored as collections.
11. Automatic archive function: you can delete books and download them another time.
12. Screen can be rotated for better viewing of pictures, diagrams, maps, etc.
13. Also able to read newspapers, magazines and web pages.
14. In-built keyboard enables searching within a book, a library or online.
15. You can add your own annotations to the text.
16. Automatic bookmark.
17. Built-in Oxford English Dictionary.
18. Password protection.

Gaming-gadgets
The Game Gadget is an open source gaming handheld that supports music and video playback, open game
development, and some e-reader features. It was available in one colour (white). It was released on April 6,
2012. Specification
1. CPU MIPS Ingenic JZ4750 @ 433Mhz
2. RAM 64MB
3. Internal Storage 2GB flash
4. Additional Storage SD/SDHC
5. Input D-Pad, 2 shoulder, 4 face, Start & Select buttons, Mic.
6. Outputs Stereo Speakers, Headphone Jack & TV-out
7. I/O Micro USB
8. Display 3.5" LCD, 320x240 resolution
9. Audio Playback MP3, WMA, APE, FLAC, RA
10. Software Support Free official SDKs Available
Popular gaming gadgets
Steelseries Wireless Controller: This has been designed to work with your PC or Mac, which is pretty
standard – but it also works with mobile devices via Bluetooth. Just hook it up to your Android or iPhone and
bam, proper gaming on the go. Fully charged, it gives you 10 hours of non-stop playing time.
Razer destructor 2: The Destructor 2 is only 2.2mm thick and is pretty much the perfect mouse pad for
gamers. Its surface is micro-textured for easy sliding and works with both laser and optical mice.
WD My Passport Portable Hard Drive: Avoid the PC gamer's dilemma and get this two-terabyte external hard
drive and you'll never need to worry about those Steam games filling up your hard drive. It's USB powered
(2.0 and 3.0 compliant) and will run with a Mac or PC.
Logitech G19s gaming keyboard: The new keyboard from Logitech features a customisable display that
allows you to track your gaming stats even if you aren't currently in game. There are also 12 programmable
keys, with 36 different functions. Its two USB ports mean you don't have to worry about not having enough
slots for other kit, either.
Mad Catz Cyborg Fly 5 Joystick: An affordable joystick that doesn't compromise on features. It has 10
buttons, a dual-throttle lever and an adjustable handle height. There's no need for batteries either; it runs off
your USB port.

Fitness Gadgets and alike.


An activity tracker, also known as a fitness tracker, is a device or application for monitoring and
tracking fitness-related metrics such as distance walked or run, calorie consumption, and in some cases
heartbeat.
An activity tracker, also known as a fitness tracker, is a device or application for monitoring and
tracking fitness-related metrics such as distance walked or run, calorie consumption, and in some cases
heartbeat. It is a type of wearable computer. The term is now primarily used for smartwatches that are synced,
in many cases wirelessly, to a computer or smartphone for long-term data tracking. There are also
independent mobile and Facebook apps. Some evidence has found that the use of these types of devices
results in less weight loss rather than more. Sleep tracker devices have a tendency to under
detect wakefulness.
The advanced fitness technology we have now will allow you to analyze every aspect of your workout
performance and your body, allowing you to stabilize your strengths and improve upon your weaknesses. It
can be a pain trying to keep up with your fitness goals, especially when you factor in optimizing aspects like
hydration, heart rate, calorie intake, and other data to help you complete your objectives. Smart fitness
gadgets will help you crush your goals, maintain your health, and achieve your desired level of athleticism. If
you are a serious athlete or health nut, our list of carefully selected smart fitness gadgets will get you to the
next level and beyond. Most Common Features of a Fitness Band
1. Distance Tracker
2. Calorie Tracker
3. Sleep Monitor
4. Smartphone Integration
5. Heart Rate Monitor
6. BP Checker
7. Exercise Recognition
8. GPS Tracking

You might also like