Internet - Core Services and Applications
Understand core internet services (web, email, VoIP), data transfer and streaming basics, and remote work and social networking applications.
Summary
Read Summary
Flashcards
Save Flashcards
Quiz
Take Quiz
Quick Practice
What is the global collection of documents, images, and applications linked by hyperlinks and identified by URIs?
1 of 10
Summary
Applications and Services Over the Internet
Introduction
The Internet has evolved from a simple data network to a platform that enables numerous applications and services. From communication to collaboration to entertainment, Internet-based services have fundamentally transformed how people work, connect, and share information. Understanding these key applications and services is essential to grasping how the Internet impacts daily life and business operations.
The World Wide Web
The World Wide Web is a global collection of interconnected documents, images, multimedia files, and applications. Each resource on the web is identified by a Uniform Resource Identifier (URI) (commonly seen as a web address or URL), and documents are connected through hyperlinks. When you click a link on a webpage, you're following a connection to another resource identified by its URI.
The Web is distinct from the Internet itself—the Internet is the underlying infrastructure (the network), while the Web is an application that runs on top of the Internet. You can have Internet services without the Web (like email or file transfer), but the Web requires the Internet to function.
Core Internet Communication Services
Email
Email is an asynchronous text communication service—meaning the sender and receiver don't need to be online at the same time. Think of it like postal mail: you send a message, and the recipient retrieves it later. This makes email ideal for non-urgent communication, detailed written documentation, and record-keeping.
Email works through a system of mail servers that store messages until recipients retrieve them, making it a store-and-forward system rather than a real-time communication method.
Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP) enables telephone-style voice calls to be transmitted over the Internet and data networks, rather than through traditional circuit-switched telephone networks. VoIP has become tremendously popular because it offers several key advantages:
Cost savings: Long-distance and international calls over VoIP are dramatically cheaper (or even free) compared to traditional telephone service, since they use the same data network infrastructure as your internet connection.
Ease of use: Modern VoIP systems are designed to be as straightforward as traditional phones—users typically see no difference in the user experience.
Flexibility: VoIP calls can be made from any device connected to the Internet, including computers, smartphones, and dedicated VoIP phones.
Like email, VoIP has become a dominant technology in many markets and is transforming how organizations handle voice communications.
File Transfer and Sharing
File Sharing Methods
Files can be shared across the Internet through several mechanisms:
Email attachments: Files are sent directly to recipients as email attachments, suitable for small files and specific individuals.
Web uploads and File Transfer Protocol (FTP) servers: Users upload files to a web server or dedicated FTP server that others can download from.
Shared locations and file servers: Organizations use centralized file servers where authorized users can upload and download files on a shared network.
For distributing popular files to many users simultaneously, two approaches are particularly effective:
Mirror servers: Multiple copies of the same file are stored on different servers in different locations. Users download from whichever mirror is geographically closest or least congested, reducing overall network burden.
Peer-to-peer (P2P) networks: Rather than downloading from central servers, users download file segments from multiple other users simultaneously. This distributes the load across many computers rather than concentrating it on a few servers.
Security and Verification of File Transfers
When files are transferred over the Internet, three security concerns are important:
Access control: Files can be protected through user authentication—only authorized users with valid credentials can access the files.
Confidentiality: Files can be encrypted while in transit across the Internet, ensuring that even if intercepted, the contents cannot be read without the decryption key.
Authenticity: Once a file is received, you may want to verify that it is genuine and hasn't been altered. Digital signatures and message digests (like MD5) are used for this purpose. These create a unique fingerprint of the file's contents. If even one byte of the file changes, the fingerprint changes, alerting you to tampering or corruption.
Streaming Media
What is Streaming Media?
Streaming media is the real-time delivery of digital media (typically video or audio) for immediate consumption. Unlike downloading a file (which requires waiting for the entire file to arrive before viewing), streaming allows you to begin watching or listening as data arrives, with the stream continuing to arrive as you consume it.
Streaming is essential for live content like sports, news broadcasts, and video conferences, and it's also used for on-demand services like video rental platforms.
Bandwidth Requirements for Video
Different video qualities require different amounts of bandwidth to stream smoothly:
| Video Quality | Bandwidth Requirement |
|---|---|
| Standard Definition (480p) | 1 Mbit/s |
| High Definition (720p) | 2.5 Mbit/s |
| Ultra High Definition (1080p) | 4.5 Mbit/s |
These requirements represent the minimum sustained data rate needed for smooth playback without buffering. A user with a 5 Mbit/s internet connection could comfortably stream 720p video, but might experience buffering with 1080p.
Video Communication
Webcams enable real-time video capture, making two-way audio and video communication possible. This technology powers video chat rooms and video conferencing, allowing distributed teams to communicate face-to-face over the Internet.
Internet Access Technologies
To bring Internet services to end users, several access technologies provide the last-mile connection to homes and businesses:
Cable networks: Use existing cable television infrastructure to provide high-speed Internet access.
ADSL (Asymmetric Digital Subscriber Line): Provides Internet access over standard telephone lines, with faster download speeds than upload speeds (the "asymmetric" part).
Mobile data networks: Cellular networks provide wireless Internet connectivity to mobile phones and other wireless devices.
These technologies represent different trade-offs between speed, coverage, cost, and reliability.
Remote Work and Collaboration
Enabling Remote Work
The Internet has fundamentally enabled remote work—the ability to work from any location, particularly from home. Several technologies make this possible:
Groupware: Software platforms that allow teams to collaborate by sharing files, managing tasks, and coordinating work.
Virtual Private Networks (VPNs): Secure encrypted connections that allow remote workers to access corporate networks as if they were physically in the office.
Conference calling and videotelephony: Audio and video communication tools that replace in-person meetings.
VoIP and Internet telephony: Phone systems that work over the Internet rather than traditional phone lines.
Collaborative Software
Collaborative software enables groups to work together effectively by providing:
Communication channels (chat, video calls, comments)
Shared file storage and access
Real-time document editing (multiple people editing the same document simultaneously)
Shared calendars and scheduling
These tools are critical for distributed teams where members may be in different locations or time zones.
Cloud Computing
Cloud computing delivers computing resources—storage, applications, and computing power—over the Internet. For remote workers and organizations, cloud computing provides:
File storage and backup accessible from anywhere
Applications that run in the cloud rather than on local computers
Data backup and disaster recovery
This eliminates the need for powerful local computers and allows access from any device with Internet connectivity.
Secure Remote Access
Virtual Private Networks (VPNs) are essential for secure remote work. A VPN creates an encrypted tunnel between the remote user's computer and the corporate network, allowing secure access to:
Corporate email systems
Confidential data and databases
Internal applications and resources
The encryption ensures that even if someone intercepts the network traffic, they cannot read the sensitive information being transmitted.
Social Networking Services
Core Functions
Social networking services are web-based platforms that enable users to:
Create and maintain personal profiles with information about themselves
Connect with friends, family, and colleagues
Join communities around shared interests
Discover and build new relationships
Share content, updates, and media
Major platforms include Facebook, Twitter, Instagram, LinkedIn, and others, each serving somewhat different purposes and audiences.
Business Applications
Organizations use social networking services for:
Brand promotion: Establishing company presence and building brand awareness
Customer marketing: Targeting advertising and content to specific audiences
Viral content: Creating shareable content designed to spread rapidly through user sharing networks
<extrainfo>
Safety and Behavioral Concerns
The online environment introduces unique behavioral and safety challenges. The online disinhibition effect describes a tendency for some individuals to behave more aggressively, offensively, or uninhibitedly online than they would in face-to-face interactions. This can manifest as cyberbullying, harassment, or other negative behavior.
Child safety is a significant concern in social networking and online spaces. Children face dangers including:
Cyberbullying from peers
Contact with sexual predators
Exposure to inappropriate or adult content
In response, major social networking services such as Facebook and Twitter have established age restrictions, typically forbidding users under 13 years old. However, these restrictions are often circumvented when users provide false birth dates during registration, highlighting the challenge of protecting minors online.
</extrainfo>
<extrainfo>
Collaborative Content Creation
Wikis
A wiki is a collaborative website where users can create and edit content together. Wikis have proven valuable for:
Academic collaboration and research
Grant writing and proposal development
Strategic planning within organizations
Public participation in civic projects and community documentation
The most famous example is Wikipedia, but wikis are also widely used for internal organizational documentation and knowledge bases.
</extrainfo>
Flashcards
What is the global collection of documents, images, and applications linked by hyperlinks and identified by URIs?
The World Wide Web
Which Internet service provides asynchronous text communication between users?
Electronic mail (Email)
What technology enables voice calls and telephone-style communications over data networks?
Voice over Internet Protocol (VoIP)
How do Content Delivery Networks reduce latency for end users?
By distributing content from data centers physically close to the users
Which systems are specifically used to ease bulk downloads for many users simultaneously?
Mirror servers and peer-to-peer (P2P) networks
What method is used to protect files from being read by unauthorized parties during transit?
Encryption
What is the real-time delivery of digital media for immediate consumption called?
Streaming media
What is the approximate link speed requirement for Standard-definition 480p video?
$1 \text{ Mbit/s}$
What link speed is required for High-definition 720p video?
$2.5 \text{ Mbit/s}$
What term describes the tendency for people to act more offensively online than they would in person?
Online disinhibition effect
Quiz
Internet - Core Services and Applications Quiz Question 1: Which protocol is the primary protocol used to access resources on the World Wide Web?
- Hypertext Transfer Protocol (HTTP) (correct)
- File Transfer Protocol (FTP)
- Simple Mail Transfer Protocol (SMTP)
- Secure Shell (SSH)
Internet - Core Services and Applications Quiz Question 2: Which technology enables employees to work from any location by providing secure access to corporate networks?
- Virtual private networks (VPNs) (correct)
- Content Delivery Networks (CDNs)
- Peer‑to‑peer file sharing
- Simple Mail Transfer Protocol (SMTP)
Internet - Core Services and Applications Quiz Question 3: What is the primary purpose of a Content Delivery Network (CDN)?
- To reduce latency by delivering content from nearby data centers (correct)
- To encrypt user data during transmission
- To provide virtual private network access for remote employees
- To manage email routing between servers
Internet - Core Services and Applications Quiz Question 4: Compared to traditional long‑distance telephone calls, VoIP most notably provides what advantage?
- Significant cost savings (correct)
- Higher bandwidth requirements
- Improved video quality
- Reduced connection security
Internet - Core Services and Applications Quiz Question 5: Approximately how much bandwidth is needed for streaming standard‑definition 480p video?
- Around 1 Mbit/s (correct)
- Around 0.2 Mbit/s
- Around 5 Mbit/s
- Around 10 Mbit/s
Internet - Core Services and Applications Quiz Question 6: What does Voice over Internet Protocol (VoIP) use to transmit telephone‑style voice communications?
- The Internet (correct)
- Traditional telephone lines
- Satellite links
- Bluetooth connections
Internet - Core Services and Applications Quiz Question 7: When a user watches a video on a website without downloading the file first, what type of media delivery are they using?
- Streaming media (correct)
- File transfer
- Broadcast television
- Email attachment
Internet - Core Services and Applications Quiz Question 8: Which of the following is NOT a typical feature of collaborative software?
- Hardware diagnostics (correct)
- Simultaneous document editing
- File sharing among team members
- Shared calendars for scheduling
Internet - Core Services and Applications Quiz Question 9: What is the minimum age requirement for users of major social networking services such as Facebook and Twitter?
- 13 years old (correct)
- 16 years old
- 18 years old
- 21 years old
Which protocol is the primary protocol used to access resources on the World Wide Web?
1 of 9
Key Concepts
Internet Communication
Email
Voice over Internet Protocol (VoIP)
Social networking service
Online disinhibition effect
Web Technologies
World Wide Web
Content Delivery Network (CDN)
Streaming media
Cloud computing
Network Security and Sharing
Virtual Private Network (VPN)
Peer-to-peer (P2P) file sharing
Digital signature
Mobile broadband
Definitions
World Wide Web
A global collection of documents, images, and applications linked by hyperlinks and identified by URIs.
Email
An Internet service that sends electronic text messages between users.
Voice over Internet Protocol (VoIP)
Technology that transmits voice communications over IP networks.
Content Delivery Network (CDN)
Distributed servers that deliver web content to users based on geographic proximity to reduce latency.
Peer-to-peer (P2P) file sharing
Decentralized method of distributing files directly between users’ computers.
Streaming media
Real‑time delivery of audio or video content over the Internet for immediate playback.
Virtual Private Network (VPN)
Encrypted tunnel that provides secure remote access to a private network over the Internet.
Cloud computing
Delivery of computing resources, storage, and applications over the Internet on demand.
Social networking service
Online platforms that enable users to create profiles, connect with others, and share content.
Online disinhibition effect
Tendency for individuals to behave more openly or aggressively online than in person.
Digital signature
Cryptographic technique used to verify the authenticity and integrity of digital messages or files.
Mobile broadband
Wireless Internet access provided via cellular networks, data cards, or mobile devices.