Unit 4 Notes
Unit 4 Notes
Unit 4 Notes
WWW and Web Browsers: Basic of Computer networks; LAN, WAN; Networking Devices,
Topologies, Cables and connectors, Connecting to internet; ISP; Basics of internet connectivity related
troubleshooting, Web Browsing software, Search Engines; URL; Domain Names; IP Addressing, Wi-
Fi and Bluetooth technology overview, Internet and Intranet: architecture, various file formats,
Applications of INTERNET: Electronic mailing systems (Google Mail features): Creating and
Managing mailing accounts, folders, Document collaboration, Instant Messaging, Netiquettes; Skype
calling and Messenger services; functioning and features of smart gadgets: Smart phones, 4K smart
television gadgets, kindle, gaming-gadgets, fitness gadgets and alike.
Web Browser
A web browser (commonly referred to as a browser) is a software user agent for accessing information
on the World Wide Web. To connect to a website's server and display its pages, a user needs to have a web
browser program. This is the program that the user runs to download, format and display a web page on the
user's computer.
A web browser is a software program that allows a user to locate, access, and display web pages. In
common usage, a web browser is usually shortened to "browser." Browsers are used primarily for displaying
and accessing websites on the internet, as well as other content created using languages such as Hypertext
Markup Language (HTML) and Extensible Markup Language (XML).
Browsers translate web pages and websites delivered using Hypertext Transfer Protocol (HTTP) into
human-readable content. They also have the ability to display other protocols and prefixes, such as secure
HTTP (HTTPS), File Transfer Protocol (FTP), email handling (mailto:), and files (file:). In addition, most
browsers also support external plug-ins required to display active content, such as in-page video, audio and
game content.
A variety of web browsers are available with different features, and are designed to run on different
operating systems. Common browsers include Internet Explorer from Microsoft, Firefox from Mozilla, Google
Chrome, Safari from Apple, and Opera. All major browsers have mobile versions that are lightweight versions
for accessing the web on mobile devices.
Web browsers date back to the late 1980s when an English scientist, Tim Berners-Lee, first developed
the ideas that led to the World Wide Web (WWW). This consisted of a series of pages created using the HTML
language and joined or linked together with pointers called hyperlinks. Following this was the need for a
program that could access and display the HTML pages correctly – the browser.
Basic of Computer networks
Open system: A system which is connected to the network and is ready for communication.
Closed system: A system which is not connected to the network and can’t be communicated with.
Computer Network: It is the interconnection of multiple devices, generally termed as Hosts connected using
multiple paths for the purpose of sending/receiving data or media.
There are also multiple devices or mediums which helps in the communication between two different
devices which are known as Network devices. Ex: Router, Switch, Hub, Bridge. The layout pattern using
which devices are interconnected is called as network topology. Such as Bus, Star, Mesh, Ring, Daisy chain.
OSI: OSI stands for Open Systems Interconnection. It is a reference model that specifies standards for
communications protocols and also the functionalities of each layer.
Protocol: A protocol is the set of rules or algorithms which define the way how two entities can communicate
across the network and there exists different protocol defined at each layer of the OSI model. Few of such
protocols are TCP, IP, UDP, ARP, DHCP, FTP and so on.
UNIQUE IDENTIFIERS OF NETWORK
Host name: Each device in the network is associated with a unique device name known as Hostname.
Type “hostname” in the command prompt and press ‘Enter’, this displays the hostname of your machine.
IP Address (Internet Protocol address): Also, known as the Logical Address, is the network address of the
system across the network.To identify each device in the world-wide-web, Internet Assigned Numbers
Authority (IANA) assigns IPV4 (Version 4) address as a unique identifier for each device on the
Internet.Length of the IP address is 32-bits. (Hence we have 232 IP addresses available.)
Type “ipconfig” in the command prompt and press ‘Enter’, this gives us the IP address of the device.
MAC Address (Media Access Control address): Also known as physical address, is the unique identifier of each
host and is associated with the NIC (Network Interface Card).MAC address is assigned to the NIC at the time of
manufacturing. Length of the MAC address is : 12-nibble/ 6 bytes/ 48 bits
Type “ipconfig/all” in the command prompt and press ‘Enter’, this gives us the MAC address.
Port: Port can be referred as a logical channel through which data can be sent/received to an application. Any
host may have multiple applications running, and each of this application is identified using the port number on
which they are running. Port number is a 16-bit integer, hence we have 216 ports available which are
categorized as shown below:
PORT TYPES RANGE
Networking Devices
Different networking devices have different roles to play in a computer network. These network devices also
work at different segments of a computer network performing different works. In our new series after network
topology, we talk about different networking devices like a switch, router, hub, bridge etc.
Network Hub: Network Hub is a networking device which is used to connect multiple network hosts. A network
hub is also used to do data transfer.
Network Switch: Like a hub, a switch also works at the layer of LAN (Local Area Network) but you can say
that a switch is more intelligent than a hub. While hub just does the work of data forwarding, a switch does
'filter and forwarding' which is a more intelligent way of dealing with the data packets.
Modem: A Modem is somewhat a more interesting network device in our daily life. So if you have noticed
around, you get an internet connection through a wire (there are different types of wires) to your house. This
wire is used to carry our internet data outside to the internet world.
Network Router: A router is a network device which is responsible for routing traffic from one to another
network. These two networks could be a private company network to a public network. You can think of a
router as a traffic police who directs different network traffic to different directions.
Bridge: If a router connects two different types of networks, then a bridge connects two subnetworks as a part of
the same network. You can think of two different labs or two different floors connected by a bridge.
Repeater: A repeater is an electronic device that amplifies the signal it receives. In other terms, you can think of
repeater as a device which receives a signal and retransmits it at a higher level or higher power so that the signal
can cover longer distances.
Topologies
Network topology is the arrangement of the elements (links, nodes, etc.) of a communication
network. Network topology can be used to define or describe the arrangement of various types of
telecommunication networks, including command and control radio networks, industrial field
busses and computer networks.
Network topology is the topological structure of a network and may be depicted physically or logically.
It is an application of graph theory wherein communicating devices are modeled as nodes and the connections
between the devices are modeled as links or lines between the nodes.
Types of Network Topology
The arrangement of a network which comprises of nodes and connecting lines via sender and receiver is
referred as network topology. The various network topologies
are:
a) Mesh Topology: In mesh topology, every device is connected
to another device via particular channel.
Advantages of this topology:
1. It is robust.
2. Fault is diagnosed easily. Data is reliable because data is
transferred among the devices through dedicated
channels or links.
3. Provides security and privacy.
Problems with this topology:
1. Installation and configuration is difficult.
2. Cost of cables are high as bulk wiring is required, hence
suitable for less number of devices.
3. Cost of maintenance is high.
b) Star Topology: In star topology, all the devices are connected
to a single hub through a cable. This hub is the central node and
all others nodes are connected to the central node. The hub can be
passive in nature i.e. not intelligent hub such as broadcasting
devices, at the same time the hub can be intelligent known as
active hubs. Active hubs have repeaters in them.
Advantages of this topology:
1. If N devices are connected to each other in star topology,
then the number of cables required to connect them is N.
So, it is easy to set up.
2. Each device requires only 1 port i.e. to connect to the hub.
Problems with this topology:
1. If the concentrator (hub) on which the whole topology
relies fails, the whole system will crash down.
2. Cost of installation is high.
3. Performance is based on the single concentrator i.e.
hub.
c) Bus Topology:
Bus topology is a network type in which every computer and
network device is connected to single cable. It transmits the
data from one end to another in single direction. No bi-
directional feature is in bus topology.
Advantages of this topology:
1. If N devices are connected to each other in bus topology, then the number of cables required to connect
them is 1 which is known as backbone cable and N drop lines are required.
2. Cost of the cable is less as compared to other topology, but it is used to build small networks.
Problems with this topology:
1. If the common cable fails, then the whole system will crash
down.
2. If the network traffic is heavy, it increases collisions in the
network. To avoid this, various protocols are used in MAC layer
known as Pure Aloha, Slotted Aloha, and CSMA/CD etc.
d) Ring Topology:
In this topology, it forms a ring connecting devices with its exactly two
neighboring devices.
The following operations takes place in ring topology is:
One station is known as monitor station which takes all the
responsibility to perform the operations.
To transmit the data, station has to hold the token. After the transmission
is done, the token is to be released for other stations to use.
When no station is transmitting the data, then the token will circulate in
the ring.
There are two types of token release techniques: Early token
release releases the token just after the transmitting the data
and Delay token release releases the token after the
acknowledgement is received from the receiver.
Advantages of this topology:
1. The possibility of collision is minimum in this type of
topology.
2. Cheap to install and expand.
Problems with this topology:
1. Troubleshooting is difficult in this topology.
2. Addition of stations in between or removal of stations can
disturb the whole topology.
e) Hybrid Topology:
This topology is a collection of two or more topologies which are
described above. This is a scalable topology which can be
expanded easily. It is reliable one but at the same it is a costly
topology.
Ethernet Cabling
Now to familiarize you with more on the Ethernet and it’s
cabling we need to look at the 10’s. 10Base2, is considered the
thin Ethernet, thinnet, and thinwire which uses light coaxial
cable to create a 10 Mbps network. The cable segments in this
network can’t be over 185 meters in length. These cables
connect with the BNC connector. Also as a note these unused
connection must have a terminator, which will be a 50-ohm
terminator.
10Base5, this is considered a thicknet and is used with coaxial
cable arrangement such as the BNC connector.
10BaseT, the “T” stands for twisted as in UTP (Unshielded
Twisted Pair) and uses this for 10Mbps of transfer.
100BaseT, is considered Fast Ethernet uses STP (Shielded
Twisted Pair) reaching data transfer of 100Mbps.
10BaseF, This arrangement is a little more complicated and uses
special connectors and NIC’s along with hubs to create its
network.
An important part of designing and installing an Ethernet is
selecting the appropriate Ethernet medium. There are four major
types of media in use today: Thickwire for 10BASE5 networks,
thin coax for 10BASE2 networks, unshielded twisted pair (UTP)
for 10BASE-T networks and fiber optic for 10BASE-FL or
Fiber-Optic Inter-Repeater Link (FOIRL) networks.
Category Speed Use
1 1 Mbps Voice Only (Telephone Wire)
2 4 Mbps LocalTalk & Telephone (Rarely used)
3 16 Mbps 10BaseT Ethernet
4 20 Mbps Token Ring (Rarely used)
100 Mbps (2 pair) 100BaseT Ethernet
5
1000 Mbps (4 pair) Gigabit Ethernet
5e 1,000 Mbps Gigabit Ethernet
6 10,000 Mbps Gigabit Ethernet
Connectors –
Unshielded Twisted Pair Connector
The standard connector for unshielded twisted pair cabling is
an RJ-45 connector. This is a plastic connector that looks
like a large telephone-style connector . A slot allows the RJ-
45 to be inserted only one way. RJ stands for Registered
Jack, implying that the connector follows a standard
borrowed from the telephone industry. This standard
designates which wire goes with each pin inside the
connector.
F-Type
The F connector is a type of RF connector commonly used for cable and
universally for satellite television. They are also used for the cable TV
connection in DOCSIS cable modems, usually with RG-6 tri-shield cable. The F
connector is inexpensive, yet has good performance up to 1 GHz. One reason for
its low cost is that it uses the center wire of the coaxial cable as the pin of the
male connector. The male connector body is typically crimped onto the exposed
outer braid. Female connectors have a 3/8-32 thread. Most male connectors have
a matching threaded connecting ring, though push-on versions are also available.
ST (Straight Tip) and SC (Subscriber Connector or Standard Connector)
Fiber network segments always require two fiber cables: one for transmitting data, and one for receiving. Each
end of a fiber cable is fitted with a plug that can be inserted into a network adapter, hub, or switch. In the North
America, most cables use a square SC connector (Subscriber Connector or Standard Connector) that slides and
locks into place when inserted into a node or
connected to another fiber cable, Europeans use
a round ST connector (Straight Tip) instead.
Fiber LC (Local Connector)
These connectors are used for single-mode and multimode fiber-optic cables. FC
connectors offer extremely precise positioning of the fiber-optic cable with respect
to the transmitter's optical source emitter and the receiver's optical detector. FC
connectors feature a position locatable notch and a threaded receptacle.
Modem
Once you have your computer, you really don't need much additional hardware to
connect to the Internet. The primary piece of hardware you need is a modem.
The type of Internet access you choose will determine the type of modem you
need. Dial-up access uses a telephone modem, DSL service uses a DSL
modem, cable access uses a cable modem, and satellite service uses a satellite
adapter. Your ISP may give you a modem—often for a fee—when you sign a contract,
which helps ensure that you have the right type of modem. However, if you would
prefer to shop for a better or less expensive modem, you can choose to buy one
separately.
Router
A router is a hardware device that allows you to connect several
computers and other devices to a single Internet connection, which is known as
a home network. Many routers are wireless, which allows you to create a home
wireless network, commonly known as a Wi-Fi network.
You don't necessarily need to buy a router to connect to the Internet. It's possible to
connect your computer directly to your modem using an Ethernet cable. Also, many
modems include a built-in router, so you have the option of creating a Wi-Fi network
without buying extra hardware.
Setting up your Internet connection
Once you've chosen an ISP, most providers will send a technician to your house to turn on the connection. If
not, you should be able to use the instructions provided by your ISP—or included with the modem—to set up
your Internet connection.
After you have everything set up, you can open your web browser and begin using the Internet. If you have any
problems with your Internet connection, you can call your ISP's technical support number.
Home networking
If you have multiple computers at home and want to use all of them to access the Internet, you may want to
create a home network, also known as a Wi-Fi network. In a home network, all of your devices connect to
your router, which is connected to the modem. This means everyone in your family can use the Internet at the
same time.
Your ISP technician may be able to set up a home Wi-Fi network when installing your Internet service. If not,
you can review our lesson on How to Set Up a Wi-Fi Network to learn more.
If you want to connect a computer that does not have built-in Wi-Fi connectivity, you can purchase a Wi-Fi
adapter that plugs into your computer's USB port.
Connecting to the Internet
A device has to be connected to the Internet before you can access it. If you plan to use the Internet at home,
you'll usually need to purchase an Internet connection from an Internet service provider, which will likely be a
phone company, Cable Company, or the government. Other devices usually connect through Wi-Fi or cellular
Internet connections. Sometimes libraries, cafes, and schools offer free Wi-Fi for their patrons, customers, and
students.
Search Engines
A web search engine or Internet search engine is a software system that is designed to carry out web
search (Internet search), which means to search the World Wide Web in a systematic way for particular
information specified in a textual web search query. The search results are generally presented in a line of
results often referred to as search engine results pages (SERPs). The information may be a mix of links to web
pages, images, videos, info graphics, articles, research papers, and other types of files. Some search engines
also mine data available in databases or open directories. Unlike web directories, which are maintained only by
human editors, search engines also maintain real-time information by running an algorithm on a web crawler.
Internet content that is not capable of being searched by a web search engine is generally described as the deep
web.
Search engine is a service that allows Internet users to search for content via the World Wide Web
(WWW). A user enters keywords or key phrases into a search engine and receives a list of Web content results
in the form of websites, images, videos or other online data. The list of content returned via a search engine to a
user is known as a search engine results page (SERP).
To simplify, think of a search engine as two components. First a spider/web crawler trolls the web for
content that is added to the search engine's index. Then, when a user queries a search engine, relevant results are
returned based on the search engine's algorithm. Early search engines were based largely on page content, but as
websites learned to game the system, algorithms have become much more complex and search results returned
can be based on literally hundreds of variables.
Different Types of Search Engines: Search engines are classified into the following three categories based on
how it works.
1. Crawler based search engines
2. Human powered directories
3. Hybrid search engines
4. Other special search engines
Crawler Based Search Engines: All crawler based search engines use a crawler or bot or spider for crawling and
indexing new content to the search database. There are four basic steps, every crawler based search engines
follow before displaying any sites in the search results.
1. Crawling: Search engines crawl the whole web to fetch the web pages available.
2. Indexing: Indexing is next step after crawling which is a process of identifying the words and
expressions that best describe the page. The identified words are referred as keywords and the
page is assigned to the identified keywords.
3. Calculating Relevancy: Search engine compares the search string in the search request with the
indexed pages from the database.
4. Retrieving Results: The last step in search engines’ activity is retrieving the results. Basically, it
is simply displaying them in the browser in an order. Search engines sort the endless pages of
search results in the order of most relevant to the least relevant sites.
Examples of Crawler Based Search Engines
1. Google 4. Baidu
2. Bing 5. Yandex
3. Yahoo!
Human Powered Directories: Human powered directories also referred as open directory system depends on
human based activities for listings. Below is how the indexing in human powered directories work:
1. Site owner submits a short description of the site to the directory along with category it is to be
listed.
2. Submitted site is then manually reviewed and added in the appropriate category or rejected for
listing.
3. Keywords entered in a search box will be matched with the description of the sites. This means
the changes made to the content of a web pages are not taken into consideration as it is only the
description that matters.
4. A good site with good content is more likely to be reviewed for free compared to a site with poor
content.
Yahoo! Directory and DMOZ were perfect examples of human powered directories. Unfortunately,
automated search engines like Google, wiped out all those human powered directory style search engines out of
the web.
Hybrid Search Engines: Hybrid Search Engines use both crawler based and manual indexing for listing the sites
in search results. Most of the crawler based search engines like Google basically uses crawlers as a primary
mechanism and human powered directories as secondary mechanism. For example, Google may take the
description of a webpage from human powered directories and show in the search results. As human powered
directories are disappearing, hybrid types are becoming more and more crawler based search engines.
Other Types of Search Engines: Besides the above three major types, search engines can be classified into many
other categories depending upon the usage. Below are some of the examples:
1. Search engines have different types of bots for exclusively displaying images, videos, news,
products and local listings. For example, Google News page can be used to search only news
from different newspapers.
2. Some of the search engines like Dogpile collect Meta information of the pages from other search
engines and directories to display in the search results. This type of search engines is called
metasearch engines.
3. Semantic search engines like Swoogle provide accurate search results on specific area by
understanding the contextual meaning of the search queries.
URL
A Uniform Resource Locator (URL), a web address, is a reference to a web resource that specifies its
location on a computer network and a mechanism for retrieving it. A URL is a specific type of Uniform
Resource Identifier (URI), although many people use the two terms interchangeably. URLs occur most
commonly to reference web pages (http), but are also used for file transfer (ftp), email (mailto), database access
(JDBC), and many other applications.
Most web browsers display the URL of a web page above the page in an address bar. A typical URL
could have the form http://www.example.com/index.html, which indicates a protocol (http),
a hostname (www.example.com), and a file name (index.html).
URL is also known as a web address, a URL (Uniform Resource Locator) is a form of URI and a
standardized naming convention for addressing documents accessible over the Internet and Intranet. An
example of a URL is https://www.computerhope.com, which is the URL for the Computer Hope website.
Overview of a URL
Below is additional information about each of the sections of the http URL for this page.
http:// or https://
The "http" stands for Hypertext Transfer Protocol and is what enables the browser to know what protocol it is
going to use to access the information specified in the domain. An "https" protocol is short for "Hypertext
Transfer Protocol Secure" and indicates that information transmitted over HTTP is encrypted and secure. After
the http or https is the colon ( : ) and two forward slashes ( // ) that separate the protocol from the remainder of
the URL.
A URL is not explicit to an HTTP or HTTPS addresses; FTP, TFTP, Telnet, and other addresses are also
considered URLs and may not follow the same syntax as our example.
WWW
Next, "www" stands for World Wide Web and is used to distinguish the content. This portion of the URL is not
required and many times can be left out. For example, typing "http://computerhope.com" would still get you to
the Computer Hope website. This portion of the address can also be substituted for an important sub page
known as a subdomain.
computerhope.com
Next, "computerhope.com" is the domain name for the website. The last portion of the domain is known as the
domain suffix, or TLD, and is used to identify the type or location of the website. For example, ".com" is short
for commercial, ".org" is short for an organization, and ".co.uk" is the United Kingdom. There are dozens of
other domain suffixes available. To get a domain, you would register the name through a domain registrar.
/jargon/u/
Next, the "jargon" and "u" portions of the above URL are the directories of where on the server the web page is
located. In this example, the web page is two directories deep, so if you were trying to find the file on the
server, it would be in the /public_html/jargon/udirectory. With most servers, the public_html directory is the
default directory containing the HTML files.
url.htm
Finally, url.htm is the actual web page on the domain you're viewing. The trailing .htm is the file extension of
the web page that indicates the file is an HTML file. Other common file extensions on the Internet include
.html, .php, .asp, .cgi, .xml, .jpg, and .gif. Each of these file extensions performs a different function, like all the
different types of files on your computer.
Where is the URL located?
A URL is located at the top of the browser window in the address baror omnibox depending on your browser
window. On desktop computers and laptop, unless your browser is being displayed in fullscreen the URL is
always visible. In most smartphone and tabletbrowsers, the address bar containing the URL will disappear as
you scroll down and only show the domain when visible. When the address bar is not visible, scrolling up on
the page shows the address bar and if only the domain is shown tapping on the address bar shows the full
address.
How to open an URL
A URL can be opened by clicking on a hyperlink. For example, if you click on "hyperlink" in this paragraph it
will open a page describing hyperlinks.
If a URL is in printed material, e-mail, or other place that does not have the URL as a hyperlink it can be typed
in the browser address bar to open the page. If the URL is in an e-mail, it can also be copied and pasted into the
address bar.
What characters are not allowed in a URL?
Most people realize that a space is not allowed in a URL. However, it is also important to realize, as
documented in RFC 1738, the URL string can only contain alphanumeric characters and the !$-_+*'(),
characters. Any other characters that are needed in the URL must be encoded.
Understanding more complex URLs and parameters
When a URL points to a script that performs additional functions, such as a search engine pointing to a search
results page, additional information (parameters) is added to the end of the URL. Below is additional
information about a URL that points to the Computer Hope search page, with the search query of "example
search".
../../cgi-bin/search.cgi?q=example%20search
In this URL, the script file being pointed to is search.cgi in the cgi-bin directory. Because this file ends with
.cgi, it is assumed to be a Perlscript.
After the script file name is a ? (question mark). The question mark in a URL separates the URL from all the
parameters or variables that are being sent to the script. In the example above, the parameter being sent
is q=example%20search. The "q" is a variable name, and the "example%20search" is the value being sent to
that variable. Because no spaces are allowed in a URL, the space is encoded as %20. In many scripts, a + (plus)
is also used to represent a space.
Domain Names
A domain name is an identification string that defines an empire of administrative autonomy, authority
or control within the Internet. Domain names are used in various networking contexts and for application-
specific naming and addressing purposes. In general, a domain name identifies a network domain, or it
represents an Internet Protocol (IP) resource, such as a personal computer used to access the Internet, a server
computer hosting a web site, or the web site itself or any other service communicated via the Internet. In 2017,
330.6 million domain names had been registered.
Domain names are formed by the rules and procedures of the Domain Name System (DNS). Any name
registered in the DNS is a domain name. Domain names are organized in subordinate levels (subdomains) of
the DNS root domain, which is nameless. The first-level set of domain names are the top-level domains (TLDs),
including the generic top-level domains(gTLDs), such as the prominent domains com, info, net, edu, and org,
and the country code top-level domains (ccTLDs). Below these top-level domains in the DNS hierarchy are the
second-level and third-level domain names that are typically open for reservation by end-users who wish to
connect local area networks to the Internet, create other publicly accessible Internet resources or run web sites.
The registration of these domain names is usually administered by domain name registrars who sell their
services to the public.
A fully qualified domain name (FQDN) is a domain name that is completely specified with all labels in the
hierarchy of the DNS, having no parts omitted. Labels in the Domain Name System are case-insensitive, and
may therefore be written in any desired capitalization method, but most commonly domain names are written in
lowercase in technical contexts.
DNS AND NAME SERVERS
Without the Domain Name System (DNS), the Internet would be a much less user-friendly place. Instead of
using easily remembered names such as a2hosting.com, we would have to use a sequence of numbers like
75.98.175.166 (also known as an IP address) every time we wanted to visit a web site or access a service on the
Internet. DNS translates human-readable domain names into numeric IP addresses that computers can
understand.
IP Addresses
In addition to the domain name, there is also another address for a Web site: the IP (Internet Protocol) number.
This is the actual address computers use to connect to the site through the Internet. It is directly linked to the
domain name and is regulated by the Internet Corporation for Assigned Names and Numbers (ICANN)
The domain name and the IP address act in the same way. Each computer connected to the Internet is assigned a
unique number known as an IP address. Developed in the early 1970's, this number serves as the computer's
Internet address. An IP address can be either static (permanent) or dynamic (temporary). Most home computers
use a dynamic IP address while servers and many other computers use a static IP address. An IP address looks
like this: 12.129.147.10. If you were to enter that number in the address bar of your Web browser, you would
reach the Web site of the Washington Post.
Registering Domain Names
In order to use a domain name, it must be registered with a registry. ICANN maintains a current directory of
accredited registrars. The domain name is registered for a specified period of time. i.e. one year, up to a
maximum of ten years, and is renewable on an ongoing basis. When you purchase a domain name, it only
belongs to you for the specified time you stated, in this case, one year. As long as you continue to renew it in a
timely fashion, it will belong to you. It is important to keep track of the renewal period because if the domain
name is not renewed, it can be registered by anyone for their own use.
During the registration process you may be asked for information for different "contacts." i.e., technical,
administrative. Your domain name record will be available to the public in what is called a "who is" database (a
public database mandated by ICANN).
IP Addressing
An Internet Protocol address (IP address) is a numerical label assigned to each device connected to
a computer network that uses the Internet Protocol for communication. An IP address serves two main
functions: host or network interface identification and location addressing.
Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number, this allows for a maximum
of 4,294,967,296 (232) unique addresses. However, because of the growth of the Internet and the depletion of
available IPv4 addresses, a new version of IP (IPv6), using 128 bits for the IP address, which allows for 3.4 x
1038 (2128) unique addresses was developed in 1995, and standardized in December 1998. In July 2017, a final
definition of the protocol was published. IPv6 deployment has been ongoing since the mid-2000s.
IP addresses are usually written and displayed in human-readable notations, such as 172.16.254.1 in
IPv4, and 2001:db8:0:1234:0:567:8:1 in IPv6. The size of the routing prefix of the address is designated
in CIDR notation by suffixing the address with the number of significant bits, e.g., 192.168.1.15/24, which is
equivalent to the historically used subnet mask 255.255.255.0.
The IP address space is managed globally by the Internet Assigned Numbers Authority (IANA), and by
five regional Internet registries (RIRs) responsible in their designated territories for assignment to end users
and local Internet registries, such as Internet service providers. IPv4 addresses have been distributed by IANA
to the RIRs in blocks of approximately 16.8 million addresses each. Each ISP or private network administrator
assigns an IP address to each device connected to its network. Such assignments may be on a static (fixed or
permanent) or dynamic basis, depending on its software and practices.
SubNetworks
IP networks may be divided into subnetworks in both IPv4 and IPv6. For this purpose, an IP address is
recognized as consisting of two parts: the network prefix in the high-order bits and the remaining bits called
the rest field, host identifier, or interface identifier (IPv6),
used for host numbering within a network.[1] The subnet
mask or CIDR notation determines how the IP address is
divided into network and host parts.
The term subnet mask is only used within IPv4. Both
IP versions however use the CIDR concept and notation. In
this, the IP address is followed by a slash and the number (in
decimal) of bits used for the network part, also called
the routing prefix. For example, an IPv4 address and its
subnet mask may be 192.0.2.1 and 255.255.255.0,
respectively. The CIDR notation for the same IP address and
subnet is 192.0.2.1/24, because the first 24 bits of the IP
address indicate the network and subnet.
IPv4
An IPv4 address has a size of 32 bits, which limits the address space to 4294967296 (232) addresses. Of
this number, some addresses are reserved for special purposes such as private networks (~18 million addresses)
and multicast addressing (~270 million addresses).
IPv4 addresses are usually represented in dot-decimal notation, consisting of four decimal numbers,
each ranging from 0 to 255, separated by dots, e.g., 172.16.254.1. Each part represents a group of 8 bits
(an octet) of the address. In some cases of technical writing, [specify] IPv4 addresses may be presented in
various hexadecimal, octal, or binary representations.
Historical Classful Network Architecure
Reserved PrivateIPv4 Network Range
IPv6
In IPv6, the address size was increased from 32 bits in IPv4 to 128 bits, thus providing up to
2128 (approximately 3.403×1038) addresses. This is deemed sufficient for the foreseeable future.
The intent of the new design was not to provide just a sufficient quantity of addresses, but also redesign
routing in the Internet by allowing more efficient aggregation
of subnetwork routing prefixes. This resulted in slower
growth of routing tables in routers. The smallest possible
individual allocation is a subnet for 264 hosts, which is the
square of the size of the entire IPv4 Internet. At these levels,
actual address utilization ratios will be small on any IPv6
network segment. The new design also provides the
opportunity to separate the addressing infrastructure of a
network segment, i.e. the local administration of the
segment's available space, from the addressing prefix used to
route traffic to and from external networks. IPv6 has
facilities that automatically change the routing prefix of
entire networks, should the global connectivity or the routing
policy change, without requiring internal redesign or manual
renumbering.
The large number of IPv6 addresses allows large blocks to be assigned for specific purposes and, where
appropriate, to be aggregated for efficient routing. With a large address space, there is no need to have complex
address conservation methods as used in CIDR.
All modern desktop and enterprise server operating systems include native support for the IPv6 protocol,
but it is not yet widely deployed in other devices, such as residential networking routers, voice over IP (VoIP)
and multimedia equipment, and some networking hardware.
APPLICATIONS of INTERNET
The Internet has many important applications. Of the various services available via the Internet, the three most
important are e-mail, web browsing, and peer-to-peer services. E-mail, also known as electronic mail, is the
most widely used and successful of Internet applications. Web browsing is the application that had the greatest
influence in dramatic expansion of the Internet and its use during the 1990s. Peer-to-peer networking is the
newest of these three Internet applications, and also the most controversial, because its uses have created
problems related to the access and use of copyrighted materials.
Examples of Applications: An Internet application does something for end users. It is generally not concerned
with how data is actually transmitted between the hosts. Here are some distributed applications that require
well-defined application level protocols:
Sending and receiving email
Searching and browsing information archives
Copying files between computers
Conducting financial transactions
Navigating (in your car, smart scooter, smart bike, or other)
Playing interactive games
Video and music streaming
Chat or voice communication (direct messaging, video conferencing)
Communication Travel
Job searches Entertainment
Finding books and study material Shopping
Health and medicine Stock market updates
Research
Business use of internet: different ways by which internet can be used for business are
o Information about the product can be provided can be provided online to the customer.
o Provide market information to the business
o It help business to recruit talented people
o Help in locating suppliers of the product.
o Fast information regarding customers view about companies product
o Eliminate middle men and have a direct contact with contact with customer.
o Providing information to the investor by providing companies back ground and financial
information on web site.
In addition, there are a number of network services such as:
Name servers
Configuration servers
Mail gateways, transfer agents, relays
File and print servers
Communication
Data Transfer
Information
Electronic mailing systems (Google Mail features): Creating and Managing mailing accounts,
folders.
EMAIL
Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic
devices. Invented by Ray Tomlinson, email first entered limited use in the 1960s and by the mid-1970s had
taken the form now recognized as email. Email operates across computer networks, which today is primarily
the Internet. Some early email systems required the author and the recipient to both is online at the same time,
in common with instant messaging. Today's email systems are based on a store-and-forward model.
Email servers accept, forward, deliver, and store messages. Neither the users nor their computers are required to
be online simultaneously; they need to connect only briefly, typically to a mail server or a webmail interface for
as long as it takes to send or receive messages.
Short for electronic mail, email (or e-mail) is defined as the transmission of messages
over communications networks. Typically the messages are notes entered from the keyboard or
electronic files stored on disk. Most mainframes, minicomputers, and computer networks have an email system.
Massage Format
Internet email messages consist of two major sections, the message header and the message body, collectively
known as content. The header is structured into fields such as From, To, CC, Subject, Date, and other
information about the email. In the process of transporting email messages between systems, SMTP
communicates delivery parameters and information using message header fields. The body contains the
message, as unstructured text, sometimes containing a signature block at the end. The header is separated from
the body by a blank line.
Message header
Each email message has a header (the "header section" of the message, according to the specification),
comprising a number of fields ("header fields"). Each field has a name ("field name" or "header field name"),
which is followed by the separator character ":", and a value ("field body" or "header field body").
Each field name must start in the first character of a new line in the header section and begin with a non-
whitespace printable character. It ends with the separator character ":". The separator is then followed by the
field value (the "field body"). The value can continue onto subsequent lines if those lines have a space or tab as
their first character. Field names and, without SMTPUTF8, field bodies are restricted to 7-bit ASCII characters.
Some non-ASCII values may be represented using MIME encoded words.
Header fields
Email header fields can be multi-line, with each line recommended to be no more than 78 characters, although
the technical limit is 998 characters. In particular, this allows email addresses to use non-ASCII characters.
Such addresses are supported by Google and Microsoft products, and promoted by some governments.
The message header must include at least the following fields:
From: The email address, and optionally the name of the author(s). In many email clients not changeable
except through changing account settings.
Date: The local time and date when the message was written. Like the From: field, many email clients fill
this in automatically when sending. The recipient's client may then display the time in the format and time
zone local to them.
To: The email address(es), and optionally name(s) of the message's recipient(s). Indicates primary recipients
(multiple allowed), for secondary recipients see Cc: and Bcc: below.
Subject: A brief summary of the topic of the message. Certain abbreviations are commonly used in the
subject, including "RE:" and "FW:".
Cc: Carbon copy; Many email clients will mark email in one's inbox differently depending on whether they
are in the To: or Cc: list. (Bcc: Blind carbon copy; addresses are usually only specified during SMTP
delivery, and not usually listed in the message header.)
Content-Type: Information about how the message is to be displayed, usually a MIME type.
Precedence: commonly with values "bulk", "junk", or "list"; used to indicate that automated "vacation" or
"out of office" responses should not be returned for this mail, e.g. to prevent vacation notices from being
sent to all other subscribers of a mailing list. Sendmail uses this field to affect prioritization of queued
email, with "Precedence: special-delivery" messages delivered sooner. With modern high-bandwidth
networks, delivery priority is less of an issue than it once was. Microsoft Exchange respects a fine-grained
automatic response suppression mechanism, the X-Auto-Response-Suppress field.[42]
Message-ID: Also an automatically generated field; used to prevent multiple delivery and for reference in
In-Reply-To: (see below).
In-Reply-To: Message-ID of the message that this is a reply to. Used to link related messages together. This
field only applies for reply messages.
References: Message-ID of the message that this is a reply to, and the message-id of the message the
previous reply was a reply to, etc.
Reply-To: Address that should be used to reply to the message.
Sender: Address of the actual sender acting on behalf of the author listed in the From: field (secretary, list
manager, etc.).
Archived-At: A direct link to the archived form of an individual email message.
SMTP defines the trace information of a message, which is also saved in the header using the following two
fields:
Received: when an SMTP server accepts a message it inserts this trace record at the top of the header (last
to first).
Return-Path: when the delivery SMTP server makes the final delivery of a message, it inserts this field at
the top of the header.
Other fields that are added on top of the header by the receiving server may be called trace fields, in a broader
sense.
Authentication-Results: when a server carries out authentication checks, it can save the results in this field
for consumption by downstream agents.[45]
Received-SPF: stores results of SPF checks in more detail than Authentication-Results.[46]
Auto-Submitted: is used to mark automatically generated messages.[47]
VBR-Info: claims VBR whitelisting[48]
Message body
Content encoding
Internet email was originally designed for 7-bit ASCII. Most email software is 8-bit clean but must assume it
will communicate with 7-bit servers and mail readers. The MIME standard introduced character set specifiers
and two content transfer encodings to enable transmission of non-ASCII data: quoted printable for mostly 7-bit
content with a few characters outside that range and base64 for arbitrary binary data.
Plain text and HTML
Most modern graphic email clients allow the use of either plain text or HTML for the message body at the
option of the user. HTML email messages often include an automatically generated plain text copy as well, for
compatibility reasons. Advantages of HTML include the ability to include in-line links and images, set apart
previous messages in block quotes, wrap naturally on any display, use emphasis such as underlines and italics,
and change font styles. Disadvantages include the increased size of the email, privacy concerns about web bugs,
abuse of HTML email as a vector for phishing attacks and the spread of malicious software.
What Is Gmail?
Gmail is a free email service run by Google. It integrates with other Google services like Google Docs, Google
Drive, and YouTube. Google also offers premium services to businesses through G Suite. There is also an
HTML version of Gmail called Gmail Basic and a Gmail mobile app.
If you've never had an email account before, Gmail is a good place to start. It is reliable and free, and it comes
with 15 GB of storage space for your messages. Your email is stored online, so you can access it from any
device that can connect to the internet.
How to Get a Gmail Account: To create a new Gmail account, you must first create a new Google account.
1. Go to Gmail.com and select Create account.
2. Select For myself.
3. Enter the requested information, then select Next.
4. You may be asked to provide a phone number to verify your identity. Enter your phone number and
select Next. Google will send you a text with a code that you must enter on the following page.
5. Enter the requested information, then select Next.
6. Read Google's privacy information and select I agree.
7. Select Next.
8. Choose a layout for your viewing your messages, then select OK.
You will automatically be taken to Gmail to set up your new account. You'll see a message from Google in your
inbox, which contains important information about using Gmail.
How to Set Up Gmail
After reviewing the introductory information, you can personalize your account. For example, select Change
profile image to add a photo that will be visible to other Gmail users. If you want to change the colors and
layout of the Gmail interface, select choose a theme. If you have another email account, select Import contacts
and mail to link it to your new Gmail account.
How to Use Gmail
1. To send a new Gmail message, select Compose.
2. Select the Star beside a message to mark it as important.
3. To remove messages from your inbox, select the checkbox beside the message, then select Archive (the
folder with a down-arrow) or Trash (the trashcan).
4. Sending a message to the trash in Gmail does not automatically delete it. To permanently delete a
message, select Trash from the left pane to open your trash folder, then select Empty Trash now.
5. To sign out of Gmail, select your profile icon (or image) in the top-right corner, then select Sign out.
How to Make Labels (Folder)
Gmail labels make it easier to manage your inbox. While viewing a message, select the Label icon and choose
from the options, or select Create new to make custom labels.
How to Find Emails in Gmail
In addition to using labels, you can search for the message using the search bar above your inbox. You can also use
your Gmail contacts to find all correspondence with certain people.
Document Collaboration
One of the first real-time collaborative editor tools can be found in “The Mother of All Demos,” presented by
Douglas Engelbart in 1968. The next major milestone for document collaboration appeared in 1991 with the
release of Instant Update for the Mac OS and Microsoft Windows.
Document collaboration has grown to cover tools that enable real-time access and updates for concurrent work
across the room or around the world. This practice (of multiple people working simultaneously on a single
document) is called co-authoring. Modern tools mitigate the challenges of non-real-time and un-automated
collaboration, such as paper trails and red-lining, unwieldy email chains, or overwriting original material.
What Is a Collaborative Document?
A collaborative document is a file that multiple people edit or contribute to, with the goal of creating single final
version through collaboration. Collaborative documents may be word processing or text documents,
spreadsheets, presentations, images, PDFs, videos, or maps.
Common Uses of Document Collaboration
Few documents, presentations, reports, spreadsheets, or projects are developed by just one person. At its core,
document collaboration involves designated shared access to files for editing by groups of any size – be it two
or 2,000.
Document collaboration goals will vary for each organization, so before you choose a tool, define your needs.
For example, a group building a social media campaign may require video, graphs, and pictures as part of
brainstorming or mind mapping. By contrast, a technical build for software values document integrity through
controlled revisions, so security and access may be more important. Consider your company’s functions and
needs when adopting a document collaboration solution.
Top Document Collaboration Tools
Document collaboration tools, like any other widely adopted software platform, are always growing and
improving. Here are the most popular solutions:
1. Google
2. Microsoft Office 365
3. Quip
4. Dropbox Paper
Google offers a suite of services through Google Drive, including the following:
1. Google Docs (initially developed as Writely)
2. Google Slides
3. Google Sheets
Google’s file collaboration platform is universally available and easy to use, as is Microsoft Office 365. Both
have functions that users are already familiar with and can quickly adapt.
Collaboration tools can be more document-centric, such as Google, Quip, and Microsoft Office 365, all of
which use familiar features that use notation to track who and when edits are made. These platforms and others,
such as Dropbox and Box, offer cloud storage-centric tools that enable easy document access from multiple
devices by multiple users, as well as integration with numerous applications. When shopping for a document
collaboration tool, consider these additional features:
1. Automatic save
2. Real-time comments and messaging
3. Version review
4. User permission controls
5. Update alerts
6. Participants list
7. External and internal access
8. Mobile device access (phone, tablet, and
platform support)
9. Offline and online access
10. Compliance
11. File synchronization
12. Historical audit trail (change history)
13. Large file capability
14. Large enterprise team support for
simultaneous access
15. Language/time-zone compatibility
How to Use Document Collaboration Tools
Upon entering a real conference room, you would instantly notice many details, such as who is present and what
they are working on. However, in the new collaborative digital space, much more is immediately evident,
including past and present conversations, project timeline, and next steps. You can easily identify the people in
attendance, meeting agendas, calendars, and revision history.
Most collaborative work is done online or through a proprietary and secure server. Depending upon security
setup, it can be accessed on mobile devices, too. While you typically access and synchronize the work online,
there will be times when team members need offline syncing capabilities, such as when traveling. As with all
tools, know how your document collaboration platform will be used and what features are important — this
information will guide your solution search.
How Do You Share a Document?
Collaboration revolves around sharing documents, and your method for doing so is dependent on the file type
and the tools available in the platform. Google Drive, Dropbox, and Box all have the same general sharing
steps: upload the document to a folder within the online solution, select the Share option, and enter the email
address of the person you would like to share the document with. You also have options to set view-only or edit
permissions.
Document Collaboration for Developers
Software developers depend on accurate version control, and they know both the benefits and the perils of
document collaboration. When choosing a version control platform, development teams should value
accessibility and sharing. Tools and solutions for development collaboration are available through IBM,
Microsoft, Subversion, and Helix.
Another popular platform choice is a distributed version-control (DVC) system, which allows numerous
working copies to be reconciled with the main document. Tools from Git and Mercurial provide some of the
best open source solutions for DVC.
Instant Messaging
Instant messaging (IM) technology is a type of online chat that offers real-time text transmission over
the Internet. A LAN messenger operates in a similar way over a local area network. Short messages are
typically transmitted between two parties, when each user chooses to complete a thought and select "send".
Some IM applications can use push technology to provide real-time text, which transmits messages character by
character, as they are composed. More advanced instant messaging can add file transfer,
clickable hyperlinks, Voice over IP, or video chat.
An instant message (IM) is a real-time, text-based communication similar to chat. IM uses a shared software
client between or among two or more people using personal computers, iPhones or other devices. The
communication is done over a network, often the Internet, and may include advanced modes with live voice or
video. File transfers are also sometimes allowed but are limited in size.
Although included in the online chat category of technologies, IM differs in that the communicating parties are
selected from a known list, called a “buddy list,” “friend list” or “contact list." Users are typically alerted when
someone on their list is online. However, online chat allows communication in a multiuser environment among
users that are usually anonymous.
Some IM systems permit messages to be sent when the recipient is not online. In these cases, IM is much like
email; in fact, the message may even be sent to the recipient's email address.
Features of instant messaging
The exchange of text has long been the chief function of instant messaging, but it is now one feature of many.
The ability to insert images and emojis into messages is now standard in many clients, as are file
transfers. Facebook Messenger even enables users to send money via IM. Numerous clients now support the
escalation from IM to other modes of communication, such as group chat, voice calls or video conferencing.
Presence enables users to see the availability of their contacts -- not only whether they are online or offline, but
also whether they have indicated their status is free or busy. Some clients also enable users to set an "away
message" providing more detail about their limited or lack of availability. Within an active session between two
users, most clients can also indicate to one user in real time when the other user is typing.
Popular instant messaging software: While some IM clients are distinctly consumer services or explicitly for
enterprises, some crossovers exist. The following is a list of popular consumer, prosumer and enterprise IM
clients:
1. Apple Messages (formerly iMessage) 9. Pidgin
2. Cisco Jabber (based on Jabber) 10. Slack
3. Google Hangouts (formerly Google Talk) 11. Telegram
4. Microsoft Skype (includes Skype for 12. Trillian
Business) 13. Viber
5. Facebook Messenger 14. WeChat
6. IBM Sametime 15. WhatsApp Messenger
7. ICQ 16. Windows Live Messenger
8. Line 17. Yahoo Messenger
Netiquettes
"Netiquette" refers to Internet etiquette. This simply means the use of good manners in online communication
such as e-mail, forums, blogs, and social networking sites to name a few. It is important to use netiquette
because communication online is non-verbal. Most often online communication consists of reading something
someone else has typed. This type of communication does not allow each person to see facial expressions, body
language, or hear intonation. Because of this, messages can often be misinterpreted. By following netiquette,
online communication becomes clearer. Especially in business and career related online communications
netiquette should be used to ensure that correct spelling, grammar, and punctuation are put in place to project
professionalism. Netiquette also includes the use of emoticons (such as :) :( ;) and others) to explain an emotion.
In e-mail, netiquette means not flooding someone's inbox with forwarded messages or spam mail. Following
netiquette will help you to maintain and establish positive online relationships as well as develop a positive
online reputation.
While there is no official list of netiquette rules or guidelines, the general idea is to respect others online. Below
are ten examples of rules to follow for good netiquette:
1. Avoid posting inflammatory or offensive comments online (a.k.a flaming).
2. Respect others' privacy by not sharing personal information, photos, or videos that another person may
not want published online.
3. Never spam others by sending large amounts of unsolicited email.
4. Show good sportsmanship when playing online games, whether you win or lose.
5. Don't troll people in web forums or website comments by repeatedly nagging or annoying them.
6. Stick to the topic when posting in online forums or when commenting on photos or videos, such
as YouTube or Facebook comments.
7. Don't swear or use offensive language.
8. Avoid replying to negative comments with more negative comments. Instead, break the cycle with a
positive post.
9. If someone asks a question and you know the answer, offer to help.
10. Thank others who help you online.
Sign in to Skype
1. Double click on the Skype icon on your desktop to start Skype.
2. Enter your Skype name and password and click on “Sign me in.”
3. When you sign in for the first time, it takes you through a 2 step process of testing your microphone
and webcam and selecting a profile picture. The profile picture can be uploaded from an existing
photo on your computer or you can capture your image using the webcam. You may also skip these
steps and do them later.
You are signed in and ready to use Skype.
Adding Contacts
1. You will need to add contacts before you can actually start communicating with Skype.
2. You may click on the “Add Contact” option in the “Contact” Menu or click on the “Add a contact”
link on the lower left corner of the window.
3. You will get the screen below to add contacts. The more details you provide in the add contacts
windows, the easier it becomes to locate your friend. Once you have located your friend by providing
details, click on “Add” to continue.
4. You will get the screen below. If you want to send a personal message, type in the message box and
click on “Send request.
5. A request will be sent to your friend and when he/she accepts the request, he/she will get added to your
contact list.
6. You may click on the “Add another contact” in the request sent confirmation screen to keep
adding contacts.
Accept Contact requests
1. You may also receive contact requests from others. You have to accept contact requests sent by others
to add them to your contact list. Ask a few participants to send you a contact request and accept those
contacts.
2. When someone adds you to his/her contact list you will get a message on top of your contact list as
given below. Click on the contact request
a. You will get the following buttons which can be used for various purposes.
b. To add a contact, click the Add to Contacts button. Note: Do not accept contacts of people
whom you do not know. Add only contacts of those people who you know personally or
professionally.
c. To view the profile of the person sending the contact, click View Profile. This will show you
the information regarding the person.
d. Click Ignore to reject the contact request.
e. Click Block if you wish to reject the contact request and block the person. Note: Blocking a
person will disable the person from sending you contact requests again.
Send instant messages: By sending instant messages or chatting online using Skype you can share your business
idea description with friends.
1. In your Skype window, go to the Contacts tab and click the name of the person or the group you
wish to start the chat conversation with. You will notice a chat window with the person’s or group’s
name will appear.
2. Click to place your cursor in the chat box and type your message. Then, click Send Message, or
press Enter on your keyboard.
3. Your message along with your contact’s reply to the message will be shown in the chat transcript
window.
4. To continue chatting, repeat steps 2-3.
5. If you wish to chat with another person, go to the Contacts tab, and choose the other person’s name.
The chat window for that person will be shown. Repeat steps 2-4 to start a chat.
6. You can have multiple chat conversations at the same time. To navigate between the different chat
windows, click on the contact, whose chat window you wish to see. Typically, there will be an
orange circle next to the contact that has sent you a message. You may also receive an audio beep.
Sign out of your Skype account
Once you have finished sharing your business idea with all the group members, sign out of your Skype
account. To sign out, in your Skype window, click Skype -> Sign Out in the Menu Bar
Smart phones
A smartphone is a cellular telephone with an integrated computer and other features not
originally associated with telephones, such as an operating system, web browsing and the ability to run
software applications.
Important features
One of the most important features of a smartphone is its connection to an app store. An app store is a
centralized portal where users can search for and download software applications to run on their phones. A
typical app store offers thousands of mobile apps for productivity, gaming, word processing, note-taking,
organization, social media and more. The following are some of the other key features of a smartphone:
1. internet connectivity;
2. a mobile browser;
3. the ability to sync more than one email account to a device;
4. embedded memory;
5. a hardware or software-based QWERTY keyboard;
6. wireless synchronization with other devices, such as laptop or desktop computers;
7. the ability to download applications and run them independently;
8. support for third-party applications;
9. the ability to run multiple applications simultaneously;
10. touchscreen;
11. Wi-Fi;
12. a digital camera, typically with video capability;
13. gaming;
14. unified messaging;
15. GPS -- global positioning system.
A smartphone also has the ability to support accessories, including Bluetooth headphones, power charging
cables and extra speakers. Because of the fragile outer casing of most smartphones, users often also purchase
screen protectors and more durable cases in which to put their phones.
Popular uses
Many consumers use their smartphones to engage with friends, family and brands on social media. Social
media platforms such as Facebook, Instagram, Twitter and LinkedIn all have mobile apps that a user can
download from their phone's app store. These apps make it easier for smartphone users to post personal
updates and photos while on the go rather than at their desktop.
Another common use for smartphones is health and wellness tracking. Third-party wearable devices, such as
smart watches, can connect with a smartphone to monitor an individual's health statistics, such as heart rate,
and send information to be aggregated on the phone.
Mobile payment is another popular use for smartphones. Wallet features allow users to save credit card
information on their phones to use when purchasing items at retail stores.
Kindle
Kindle is a line of Android-powered portable e-book reader devices developed by Amazon
that enable users to shop for, download and read electronic versions of books, newspapers, magazines,
websites, blogs and more. Amazon's basic Kindle devices primarily compete with similar e-book devices like
Barnes & Noble's Nook, while the more advanced Kindle Fire competes with mobile devices like Android-
powered tablet computers and Apple's iPad.
The entry-level Kindles' primary purpose is for reading books, and the devices utilize
Electronic Ink ("E Ink") technology called E Ink Pearl to improve the reading experience. Compared to
the LCDscreens utilized by most mobile devices, the Kindle's E Ink Pearl technology and monochrome matte
screen combine to provide sharp, clear text and reduced glare for extended reading with less eye
fatigue. Kindle devices also offer built-in Wi-Fi capabilities for downloading e-books and apps, as well as
basic Web browsing, and Kindle users can take advantage of free Wi-Fi access at AT&T hotspots.
The Kindle line consists of:
1. The original Kindle device, which is now in its fourth generation
2. The Kindle Touch, Kindle that offers a touch-sensitive screen
3. The Kindle Keyboard, which includes a built-in keyboard
4. The Kindle DX, a Kindle that features larger screen than the original device
5. The Kindle Fire, a tablet computer that offers a full color display.
Key benefits and features of a Kindle:
1. Stores up to 1,400 books.
2. Special high-contrast screen allows you to read even in bright sunshine with no glare.
3. Clear text and fonts, and a sharp display – what you see resembles a book page.
4. Adjustable text size.
5. Built-in wifi or 3G connection.
6. Battery life of at least a month if wifi is turned off.
7. Page-turning function so you feel as if you’re reading a real book.
8. Integrates with Facebook and Twitter and allows searching on Wikipedia.
9. Never heats up like a laptop.
10. Books can be categorised or stored as collections.
11. Automatic archive function: you can delete books and download them another time.
12. Screen can be rotated for better viewing of pictures, diagrams, maps, etc.
13. Also able to read newspapers, magazines and web pages.
14. In-built keyboard enables searching within a book, a library or online.
15. You can add your own annotations to the text.
16. Automatic bookmark.
17. Built-in Oxford English Dictionary.
18. Password protection.
Gaming-gadgets
The Game Gadget is an open source gaming handheld that supports music and video playback, open game
development, and some e-reader features. It was available in one colour (white). It was released on April 6,
2012. Specification
1. CPU MIPS Ingenic JZ4750 @ 433Mhz
2. RAM 64MB
3. Internal Storage 2GB flash
4. Additional Storage SD/SDHC
5. Input D-Pad, 2 shoulder, 4 face, Start & Select buttons, Mic.
6. Outputs Stereo Speakers, Headphone Jack & TV-out
7. I/O Micro USB
8. Display 3.5" LCD, 320x240 resolution
9. Audio Playback MP3, WMA, APE, FLAC, RA
10. Software Support Free official SDKs Available
Popular gaming gadgets
Steelseries Wireless Controller: This has been designed to work with your PC or Mac, which is pretty
standard – but it also works with mobile devices via Bluetooth. Just hook it up to your Android or iPhone and
bam, proper gaming on the go. Fully charged, it gives you 10 hours of non-stop playing time.
Razer destructor 2: The Destructor 2 is only 2.2mm thick and is pretty much the perfect mouse pad for
gamers. Its surface is micro-textured for easy sliding and works with both laser and optical mice.
WD My Passport Portable Hard Drive: Avoid the PC gamer's dilemma and get this two-terabyte external hard
drive and you'll never need to worry about those Steam games filling up your hard drive. It's USB powered
(2.0 and 3.0 compliant) and will run with a Mac or PC.
Logitech G19s gaming keyboard: The new keyboard from Logitech features a customisable display that
allows you to track your gaming stats even if you aren't currently in game. There are also 12 programmable
keys, with 36 different functions. Its two USB ports mean you don't have to worry about not having enough
slots for other kit, either.
Mad Catz Cyborg Fly 5 Joystick: An affordable joystick that doesn't compromise on features. It has 10
buttons, a dual-throttle lever and an adjustable handle height. There's no need for batteries either; it runs off
your USB port.