RemNote Community
Community

Internet - Core Services and Applications

Understand core internet services (web, email, VoIP), data transfer and streaming basics, and remote work and social networking applications.
Summary
Read Summary
Flashcards
Save Flashcards
Quiz
Take Quiz

Quick Practice

What is the global collection of documents, images, and applications linked by hyperlinks and identified by URIs?
1 of 10

Summary

Applications and Services Over the Internet Introduction The Internet has evolved from a simple data network to a platform that enables numerous applications and services. From communication to collaboration to entertainment, Internet-based services have fundamentally transformed how people work, connect, and share information. Understanding these key applications and services is essential to grasping how the Internet impacts daily life and business operations. The World Wide Web The World Wide Web is a global collection of interconnected documents, images, multimedia files, and applications. Each resource on the web is identified by a Uniform Resource Identifier (URI) (commonly seen as a web address or URL), and documents are connected through hyperlinks. When you click a link on a webpage, you're following a connection to another resource identified by its URI. The Web is distinct from the Internet itself—the Internet is the underlying infrastructure (the network), while the Web is an application that runs on top of the Internet. You can have Internet services without the Web (like email or file transfer), but the Web requires the Internet to function. Core Internet Communication Services Email Email is an asynchronous text communication service—meaning the sender and receiver don't need to be online at the same time. Think of it like postal mail: you send a message, and the recipient retrieves it later. This makes email ideal for non-urgent communication, detailed written documentation, and record-keeping. Email works through a system of mail servers that store messages until recipients retrieve them, making it a store-and-forward system rather than a real-time communication method. Voice over Internet Protocol (VoIP) Voice over Internet Protocol (VoIP) enables telephone-style voice calls to be transmitted over the Internet and data networks, rather than through traditional circuit-switched telephone networks. VoIP has become tremendously popular because it offers several key advantages: Cost savings: Long-distance and international calls over VoIP are dramatically cheaper (or even free) compared to traditional telephone service, since they use the same data network infrastructure as your internet connection. Ease of use: Modern VoIP systems are designed to be as straightforward as traditional phones—users typically see no difference in the user experience. Flexibility: VoIP calls can be made from any device connected to the Internet, including computers, smartphones, and dedicated VoIP phones. Like email, VoIP has become a dominant technology in many markets and is transforming how organizations handle voice communications. File Transfer and Sharing File Sharing Methods Files can be shared across the Internet through several mechanisms: Email attachments: Files are sent directly to recipients as email attachments, suitable for small files and specific individuals. Web uploads and File Transfer Protocol (FTP) servers: Users upload files to a web server or dedicated FTP server that others can download from. Shared locations and file servers: Organizations use centralized file servers where authorized users can upload and download files on a shared network. For distributing popular files to many users simultaneously, two approaches are particularly effective: Mirror servers: Multiple copies of the same file are stored on different servers in different locations. Users download from whichever mirror is geographically closest or least congested, reducing overall network burden. Peer-to-peer (P2P) networks: Rather than downloading from central servers, users download file segments from multiple other users simultaneously. This distributes the load across many computers rather than concentrating it on a few servers. Security and Verification of File Transfers When files are transferred over the Internet, three security concerns are important: Access control: Files can be protected through user authentication—only authorized users with valid credentials can access the files. Confidentiality: Files can be encrypted while in transit across the Internet, ensuring that even if intercepted, the contents cannot be read without the decryption key. Authenticity: Once a file is received, you may want to verify that it is genuine and hasn't been altered. Digital signatures and message digests (like MD5) are used for this purpose. These create a unique fingerprint of the file's contents. If even one byte of the file changes, the fingerprint changes, alerting you to tampering or corruption. Streaming Media What is Streaming Media? Streaming media is the real-time delivery of digital media (typically video or audio) for immediate consumption. Unlike downloading a file (which requires waiting for the entire file to arrive before viewing), streaming allows you to begin watching or listening as data arrives, with the stream continuing to arrive as you consume it. Streaming is essential for live content like sports, news broadcasts, and video conferences, and it's also used for on-demand services like video rental platforms. Bandwidth Requirements for Video Different video qualities require different amounts of bandwidth to stream smoothly: | Video Quality | Bandwidth Requirement | |---|---| | Standard Definition (480p) | 1 Mbit/s | | High Definition (720p) | 2.5 Mbit/s | | Ultra High Definition (1080p) | 4.5 Mbit/s | These requirements represent the minimum sustained data rate needed for smooth playback without buffering. A user with a 5 Mbit/s internet connection could comfortably stream 720p video, but might experience buffering with 1080p. Video Communication Webcams enable real-time video capture, making two-way audio and video communication possible. This technology powers video chat rooms and video conferencing, allowing distributed teams to communicate face-to-face over the Internet. Internet Access Technologies To bring Internet services to end users, several access technologies provide the last-mile connection to homes and businesses: Cable networks: Use existing cable television infrastructure to provide high-speed Internet access. ADSL (Asymmetric Digital Subscriber Line): Provides Internet access over standard telephone lines, with faster download speeds than upload speeds (the "asymmetric" part). Mobile data networks: Cellular networks provide wireless Internet connectivity to mobile phones and other wireless devices. These technologies represent different trade-offs between speed, coverage, cost, and reliability. Remote Work and Collaboration Enabling Remote Work The Internet has fundamentally enabled remote work—the ability to work from any location, particularly from home. Several technologies make this possible: Groupware: Software platforms that allow teams to collaborate by sharing files, managing tasks, and coordinating work. Virtual Private Networks (VPNs): Secure encrypted connections that allow remote workers to access corporate networks as if they were physically in the office. Conference calling and videotelephony: Audio and video communication tools that replace in-person meetings. VoIP and Internet telephony: Phone systems that work over the Internet rather than traditional phone lines. Collaborative Software Collaborative software enables groups to work together effectively by providing: Communication channels (chat, video calls, comments) Shared file storage and access Real-time document editing (multiple people editing the same document simultaneously) Shared calendars and scheduling These tools are critical for distributed teams where members may be in different locations or time zones. Cloud Computing Cloud computing delivers computing resources—storage, applications, and computing power—over the Internet. For remote workers and organizations, cloud computing provides: File storage and backup accessible from anywhere Applications that run in the cloud rather than on local computers Data backup and disaster recovery This eliminates the need for powerful local computers and allows access from any device with Internet connectivity. Secure Remote Access Virtual Private Networks (VPNs) are essential for secure remote work. A VPN creates an encrypted tunnel between the remote user's computer and the corporate network, allowing secure access to: Corporate email systems Confidential data and databases Internal applications and resources The encryption ensures that even if someone intercepts the network traffic, they cannot read the sensitive information being transmitted. Social Networking Services Core Functions Social networking services are web-based platforms that enable users to: Create and maintain personal profiles with information about themselves Connect with friends, family, and colleagues Join communities around shared interests Discover and build new relationships Share content, updates, and media Major platforms include Facebook, Twitter, Instagram, LinkedIn, and others, each serving somewhat different purposes and audiences. Business Applications Organizations use social networking services for: Brand promotion: Establishing company presence and building brand awareness Customer marketing: Targeting advertising and content to specific audiences Viral content: Creating shareable content designed to spread rapidly through user sharing networks <extrainfo> Safety and Behavioral Concerns The online environment introduces unique behavioral and safety challenges. The online disinhibition effect describes a tendency for some individuals to behave more aggressively, offensively, or uninhibitedly online than they would in face-to-face interactions. This can manifest as cyberbullying, harassment, or other negative behavior. Child safety is a significant concern in social networking and online spaces. Children face dangers including: Cyberbullying from peers Contact with sexual predators Exposure to inappropriate or adult content In response, major social networking services such as Facebook and Twitter have established age restrictions, typically forbidding users under 13 years old. However, these restrictions are often circumvented when users provide false birth dates during registration, highlighting the challenge of protecting minors online. </extrainfo> <extrainfo> Collaborative Content Creation Wikis A wiki is a collaborative website where users can create and edit content together. Wikis have proven valuable for: Academic collaboration and research Grant writing and proposal development Strategic planning within organizations Public participation in civic projects and community documentation The most famous example is Wikipedia, but wikis are also widely used for internal organizational documentation and knowledge bases. </extrainfo>
Flashcards
What is the global collection of documents, images, and applications linked by hyperlinks and identified by URIs?
The World Wide Web
Which Internet service provides asynchronous text communication between users?
Electronic mail (Email)
What technology enables voice calls and telephone-style communications over data networks?
Voice over Internet Protocol (VoIP)
How do Content Delivery Networks reduce latency for end users?
By distributing content from data centers physically close to the users
Which systems are specifically used to ease bulk downloads for many users simultaneously?
Mirror servers and peer-to-peer (P2P) networks
What method is used to protect files from being read by unauthorized parties during transit?
Encryption
What is the real-time delivery of digital media for immediate consumption called?
Streaming media
What is the approximate link speed requirement for Standard-definition 480p video?
$1 \text{ Mbit/s}$
What link speed is required for High-definition 720p video?
$2.5 \text{ Mbit/s}$
What term describes the tendency for people to act more offensively online than they would in person?
Online disinhibition effect

Quiz

Which protocol is the primary protocol used to access resources on the World Wide Web?
1 of 9
Key Concepts
Internet Communication
Email
Voice over Internet Protocol (VoIP)
Social networking service
Online disinhibition effect
Web Technologies
World Wide Web
Content Delivery Network (CDN)
Streaming media
Cloud computing
Network Security and Sharing
Virtual Private Network (VPN)
Peer-to-peer (P2P) file sharing
Digital signature
Mobile broadband