SlideShare une entreprise Scribd logo
1  sur  37
“BUISNESS
     COMMUNICATION”



         TOPIC:-
    MEANS & MODES OF
     COMMUNICATION




1
INDEX:-
INTRODUCTION

MOBILE PHONES
• HISTORY
• OVERVIEW
• APLICATIONS

TELEPHONES
• HISTORY
• BASCI PRINCILPES
• USEAGE

INTERNET
•   HISTORY
•   INTERNET PROTOCOLS
•   INTERNET ACCESS
•   INTRA NET
•   EXTRA NET

E MEAILS
• ADVANTAGE
• DIS ADVANTAGE


2
I NTRODUCTION:-
      Once you and your team have produced your list of people
for your communication plan, gotten everyone's phone number
and email, and listed their role, there is one more thing that needs
to be done. Add each person's preferred mode of communication
to the list. This is one of the most crucial, but commonly
overlooked, elements of a good communication plan. Different
people have different ways they like to communicate and the
more you respect that, the better off you and your project are
going to be.

Some people are at their computers all day and constantly check
their email, others travel a lot and you can catch them only on
their cell phone, others prefer office phone calls, and still others
only respond if you talk with them face-to-face. Not using a
person’s preferred mode of communication means you may not
get the information or feedback you need when you need it. This
can prevent you from being able to effectively make a required
quick decision or stave off an impending crisis.
In today's workplace, adequate communication is difficult
because many times not all the people in your communications
loop work in the same building or city or state, and some don’t
even work the same hours. Once you know how you need to
communicate to the people identified on your communications
plan, you then need to identify which of the many available
communications tool are best suited for your team/company and
how they work.


3
Mobile (Cell) Phones:-
       Another way to communicate in India is through Mobile or Cell
phones. If you have a mobile phone with the tri-band technology, you can
easily use it here. You don’t need to use the service provider of your own
country. There are number of service providers in India to keep you
connected. You can buy a prepaid sim card from any service provider. You
only need to make payment for it and give a photocopy of your any Identity
proof (like your passport). Get it recharged and enjoy free mobility. Mobile
phone
he mobile phone (also called a wireless phone or cellular phone)[1] is a
short-range, portable electronic device used for mobile voice or data
communication over a network of specialized base stations known as cell
sites. In addition to the standard voice function of a telephone, current
mobile phones may support many additional services, and accessories, such
as SMS for text messaging, email, packet switching for access to the Internet,
gaming, bluetooth, infrared, camera with video recorder and MMS for
sending and receiving photos and video. Most current mobile phones
connect to a cellular network of base stations (cell sites), which is in turn
interconnected to the public switched telephone network (PSTN) (the
exception is satellite phones


                             OLDEST CELL PHONE




                            History:-
4
In 1908, U.S. Patent 887,357 for a wireless telephone was issued in to
Nathan B. Stubblefield of Murray, Kentucky. He applied this patent to "cave
radio" telephones and not directly to cellular telephony as the term is
currently understood.Cells for mobile phone base stations were invented in
1947 by Bell Labs engineers at AT&T and further developed by Bell Labs
during the 1960s. Radiophones have a long and varied history going back to
Reginald Fessenden's invention and shore-to-ship demonstration of radio
telephony, through the Second World War with military use of radio
telephony links and civil services in the 1950s, while hand-held cellular
radio devices have been available since 1973. Due to their low establishment
costs and rapid deployment, mobile phone networks have since spread
rapidly throughout the world, outstripping the growth of fixed telephony




Overview:-
        According to internal memos, American Telephone & Telegraph
discussed developing a wireless phone in 1915, but were afraid deployment
of the technology could undermine its monopoly on wired service in the
U.S.[2]

      The first commercial mobile phone service was launched in Japan by
NTT in 1978. By November 2007, the total number of mobile phone
subscriptions in the world had reached 3.3 billion, or half of the human
population (although some users have multiple subscriptions, or inactive
subscriptions), which also makes the mobile phone the most widely spread
technology and the most common electronic device in the world.[3]

       The first mobile phone to enable internet connectivity and wireless
email, the Nokia Communicator, was released in 1996, creating a new
category of expensive phones called smartphones. In 1999 the first mobile
internet service was launched by NTT DoCoMo in Japan under the i-Mode
service. By 2007 over 798 million people around the world accessed the
internet or equivalent mobile internet services such as WAP and i-Mode at
least occasionally using a mobile phone rather than a personal computer.


5
Applications:-
       The most commonly used data application on mobile phones is SMS
text messaging, with 74% of all mobile phone users as active users (over 2.4
billion out of 3.3 billion total subscribers at the end of 2007). SMS text
messaging was worth over 100 billion dollars in annual revenues in 2007
and the worldwide average of messaging use is 2.6 SMS sent per day per
person across the whole mobile phone subscriber base. (source Informa
2007). The first SMS text message was sent from a computer to a mobile
phone in 1992 in the UK, while the first person-to-person SMS from phone
to phone was sent in Finland in 1993.

       The other non-SMS data services used by mobile phones were worth
31 Billion dollars in 2007, and were led by mobile music, downloadable
logos and pictures, gaming, gambling, adult entertainment and advertising
(source: Informa 2007). The first downloadable mobile content was sold to a
mobile phone in Finland in 1998, when Radiolinja (now Elisa) introduced
the downloadable ringing tone service. In 1999 Japanese mobile operator


6
NTT DoCoMo introduced its mobile internet service, i-Mode, which today is
the world's largest mobile internet service and roughly the same size as
Google in annual revenues.

       The first mobile news service, delivered via SMS, was launched in
Finland in 2000. Mobile news services are expanding with many
organizations providing "on-demand" news services by SMS. Some also
provide "instant" news pushed out by SMS. Mobile telephony also facilitates
activism and public journalism being explored by Reuters and Yahoo![5] and
small independent news companies such as Jasmine News in Sri Lanka.

       he mobile phone became a mass media channel in 1998 when the first
ringing tones were sold to mobile phones by Radiolinja in Finland. Soon
other media content appeared such as news, videogames, jokes, horoscopes,
TV content and advertising. In 2006 the total value of mobile phone paid
media content exceeded internet paid media content and was worth 31
Billion dollars (source Informa 2007). The value of music on phones was
worth 9.3 Billion dollars in 2007 and gaming was worth over 5 billion dollars
in 2007 (source Netsize Guide 2008 [1]).

       The mobile phone is often called the Fourth Screen (if counting
cinema, TV and PC screens as the first three) or Third Screen (counting only
TV and PC screens). It is also called the Seventh of the Mass Media (with
Print, Recordings, Cinema, Radio, TV and Internet the first six). Most early
content for mobile tended to be copies of legacy media, such as the banner
advertisement or the TV news highlight video clip. Recently unique content
for mobile has been emerging, from the ringing tones and ringback tones in
music to "mobisodes," video content that has been produced exclusively for
mobile phones.

     The advent of media on the mobile phone has also produced the
opportunity to identify and track Alpha Users or Hubs, the most influential
members of any social




7
community. AMF Ventures measured in 2007 the relative accuracy of three
   mass media, and found that audience measures on mobile were nine times
   more accurate than on the internet and 90 times more accurate than on TV.




         Telephones:-
   India has a highly developed network of telephone lines. Almost every road
   in India has one phone booth, which offers public calls, STD calls and ISD
   calls. The ISD code of India is 91. In order to make an international call, dial
   00 (international access code from India) followed by code of the country
   you are calling followed by the area code and then local number.

LATEST
    History:-
TECHNOLOGIES
         Credit for inventing the electric telephone remains in dispute. As with
   other great inventions such as radio, television, light bulb, and computer,
   there were several inventors who did pioneer experimental work on voice
   transmission over a wire and improved on each other's ideas. Innocenzo
   Manzetti, Antonio Meucci, Johann Philipp Reis, Elisha Gray, Alexander
   Graham Bell, and Thomas Edison, among others, have all been credited with
   pioneer work on the telephone.

          The early history of the telephone is a confusing morass of claim and
   counterclaim, which was not clarified by the huge mass of lawsuits which
   hoped to resolve the patent claims of individuals. The Bell and Edison
   patents, however, were                                             forensically
   victorious and commercially                                        decisive.




   8
An 1896 Telephone from
Sweden.


 Who invented telephone?
 Alexander Graham Bell invented the telephone in 1876. The first words he
 spoke on his telephone were, "Watson, come here. I need you." Watson was
 his assistant's name.

 That happened in 1875-76. However Antonio Meucci had a working
 telephone since 1848 in Havana and a perfected model by 1871. On that year
 Meucci filed for and obtained a patent (caveat #3335) for the telephone. To
 say that Bell invented the telephone is erroneous. Meucci invented it. The
 unfortunate thing about Meucci is that he did not renew the caveat 3335 for
 lack of money. Had he renewed it, Bell would not have been granted a
 patent. Bell knowing the facts applied and was granted a patent. Bell is not
 the inventor. He simply commercialized what had been invented by Meucci
 and made a fortune whereas Meucci died poor and destitute..

 t depends on who you believe. Alexander Graham Bell got a patent for the
 telephone. Reisling in Germany had a patent, but wasn't able to make it
 actually work. Bell actually used his plans and made something that almost
 worked. There are numerous other claims and Bell's patent request arrived
 in the Patent office mere hours before another claim arrived.
 Meucci set up a form of voice communication link in his Staten Island home
 that connected the basement with the first floor, but was unable to raise
 sufficient funds to pay for the patent application. He filed a patent caveat in
 1871, which was forced to expire in 1874. In 1876, Alexander Graham Bell
 patented the electro-magnetic transmission of vocal sound by undulatory
 electric current.




 9
Use-age:-
    By the end of 2006, there were a total of nearly 4 billion mobile and fixed
    line subscribers and over 1 billion Internet users worldwide. This included
    1.27 billion fixed line subscribers and 2.68 billion mobile subscribers.




LATEST TECHNOLOGIES




    10
Internet:-
India is connected to the world through the Internet also. Almost every
urban household has access to high speed Internet. Now-a-days, Internet
has also reached rural India and people living at the grassroot level are
learning how to communicate and move with the world. You can send and
receive emails and surf the net in those many "cyber cafes" that have sprung
up at every nook and corner in all cities, which offer Internet services at
minimal costs.




11
History of the Internet:-
       Prior to the widespread inter-networking that led to the Internet, most
communication networks were limited by their nature to only allow
communications between the stations on the network, and the prevalent
computer networking method was based on the central mainframe method.
In the 1960s, computer researchers, Levi C. Finch and Robert W. Taylor
pioneered calls for a joined-up global network to address interoperability
problems. Concurrently, several research programs began to research
principles of networking between separate physical networks, and this led
to the development of Packet switching. These included Donald Davies
(NPL), Paul Baran (RAND Corporation), and Leonard Kleinrock's MIT and
UCLA research programs.

       This led to the development of several packet switched networking
solutions in the late 1960s and 1970s, including ARPANET, and X.25.
Additionally, public access and hobbyist networking systems grew in
popularity, including UUCP. They were however still disjointed separate
networks, served only by limited gateways between networks. This led to
the application of packet switching to develop a protocol for inter-
networking, where multiple different networks could be joined together into
a super-framework of networks. By defining a simple common network
system, the Internet protocol suite, the concept of the network could be
separated from its physical implementation. This spread of inter-network
began to form into the idea of a global inter-network that would be called
'The Internet', and this began to quickly spread as existing networks were
converted to become compatible with this. This spread quickly across the
advanced telecommunication networks of the western world, and then
began to penetrate into the rest of the world as it became the de-facto
international standard and global network. However, the disparity of
growth led to a digital divide that is still a concern today.

      Following commercialization and introduction of privately run
Internet Service Providers in the 1980s, and its expansion into popular use in



12
the 1990s, the Internet has had a drastic impact on culture and commerce.
This includes the rise of near instant communication by e-mail, text based
discussion forums, the World Wide Web. Investor speculation in new
markets provided by these innovations would also lead to the inflation and
collapse of the Dot-com bubble, a major market collapse. But despite this,
Internet continues to grow.




Before the Internet:-
       In the 1950s and early 1960s, prior to the widespread inter-networking
that led to the Internet, most communication networks were limited by their
nature to only allow communications between the stations on the network.
Some networks had gateways or bridges between them, but these bridges
were often limited or built specifically for a single use. One prevalent
computer networking method was based on the central mainframe method,
simply allowing its terminals to be connected via long leased lines. This
method was used in the 1950s by Project RAND to support researchers such
as Herbert Simon, in Pittsburgh, Pennsylvania, when collaborating across
the continent with researchers in Sullivan, Illinois, on automated theorem
proving and artificial intelligence.

       the telephone (from the Greek words tele (τηλέ) = far and phone
(φωνή) = voice) is a telecommunications device that is used to transmit and
receive sound (most commonly speech), usually two people conversing but
occasionally three or more. It is one of the most common household
appliances in the world today. Most telephones operate through
transmission of electric signals over a complex telephone network which
allows almost any phone user to communicate with almost anyone.A
traditional landline telephone system, also known as "plain old telephone
service" (POTS), commonly handles both signaling and audio information
on the same twisted pair of insulated wires: the telephone line. Although
originally designed for voice communication, the system has been adapted
for data communication such as Telex, Fax and Internet communication. The
signaling equipment consists of a bell, beeper, light or other device to alert


13
the user to incoming calls, and number buttons or a rotary dial to enter a
telephone number for outgoing calls. A twisted pair line is preferred as it is
more effective at rejecting electromagnetic interference (EMI) and crosstalk
than an untwisted pair.A calling party wishing to speak to another party
will pick up the telephone's handset, thus operating a button switch or
"switchhook", which puts the telephone into an active state or "off hook" by
connecting the transmitter (microphone), receiver (speaker) and related
audio components to the line. This circuitry has a low resistance (less than
300 Ohms) which causes DC current (48 volts, nominal) from the telephone
exchange to flow through the line. The exchange detects this DC current,
attaches a digit receiver circuit to the line, and sends a dial tone to indicate
readiness. On a modern telephone, the calling party then presses the
number buttons in a sequence corresponding to the telephone number of the
called party. The buttons are connected to a tone generator that produces
DTMF tones which are sent to the exchange. A rotary dial telephone
employs pulse dialing, sending electrical pulses corresponding to the
telephone number to the exchange. When a landline phone is inactive or "on
hook", its alerting device is connected across the line through a capacitor,
which prevents DC current from flowing through the line. The circuitry at
the telephone exchange detects the absence of DC current flow and thus that
the phone is on hook with only the alerting device electrically connected to
the line. When a party initiates a call to this line, the ringing signal
transmitted by the telephone exchange activates the alerting device on the
line. When the called party picks up the handset, the switch hook
disconnects the alerting device and connects the audio circuitry to the line.




14
Internet protocols:-
       The complex communications infrastructure of the Internet consists of
its hardware components and a system of software layers that control
various aspects of the architecture. While the hardware can often be used to
support other software systems, it is the design and the rigorous
standardization process of the software architecture that characterizes the
Internet.

       The responsibility for the architectural design of the Internet software
systems has been delegated to the Internet Engineering Task Force (IETF).[7]
The IETF conducts standard-setting work groups, open to any individual,
about the various aspects of Internet architecture. Resulting discussions and
final standards are published in Request for Comments (RFCs), freely
available on the IETF web site.

       The principal methods of networking that enable the Internet are
contained in a series of RFCs that constitute the Internet Standards. These
standards describe a system known as the Internet Protocol Suite. This is a
model architecture that divides methods into a layered system of protocols
(RFC 1122, RFC 1123). The layers correspond to the environment or scope in
which their services operate. At the top is the space (Application Layer) of
the software application, e.g., a web browser application, and just below it is
the Transport Layer which connects applications on different hosts via the
network (e.g., client-server model). The underlying network consists of two
layers: the Internet Layer which enables computers to connect to one-
another via intermediate (transit) networks and thus is the layer that
establishes internetworking and the Internet, and lastly, at the bottom, is a
software layer that provides connectivity between hosts on the same local
link (therefor called Link Layer), e.g., a local area network (LAN) or a dial-
up connection. This model is also known as the TCP/IP model of
networking. While other models have been developed, such as the Open
Systems Interconnection (OSI) model, they are not compatible in the details
of description, nor implementation.




15
The most prominent component of the Internet model is the Internet
Protocol (IP) which provides addressing systems for computers on the
Internet and facilitates the internetworking of networks. IP Version 4 (IPv4)
is the initial version used on the first generation of the today's Internet and
is still in dominant use. It was designed to address up to ~4.3 billion (109)
Internet hosts. However, the explosive growth of the Internet has led to IPv4
address exhaustion. A new protocol version, IPv6, was developed which
provides vastly larger addressing capabilities and more efficient routing of
data traffic. IPv6 is currently in commercial deployment phase around the
world.

      IPv6 is not interoperable with IPv4. It essentially establishes a
"parallel" version of the Internet not accessible with IPv4 software. This
means software upgrades are necessary for every networking device that
needs to communicate on the IPv6 Internet. Most modern computer
operating systems are already converted to operate with both version of the
Internet Protocol. Network infrastructures, however, are still lagging in this
development.




      Internet access:-
     Common methods of home access include dial-up, landline
broadband (over coaxial cable, fiber optic or copper wires), Wi-Fi, satellite
and 3G technology cell phones.

        Public places to use the Internet include libraries and Internet cafes,
where computers with Internet connections are available. There are also
Internet access points in many public places such as airport halls and coffee
shops, in some cases just for brief use while standing. Various terms are
used, such as "public Internet kiosk", "public access terminal", and "Web
payphone". Many hotels now also have public terminals, though these are
usually fee-based. These terminals are widely accessed for various usage
like ticket booking, bank deposit, online payment etc. Wi-Fi provides
wireless access to computer networks, and therefore can do so to the

16
Internet itself. Hotspots providing such access include Wi-Fi cafes, where
would-be users need to bring their own wireless-enabled devices such as a
laptop or PDA. These services may be free to all, free to customers only, or
fee-based. A hotspot need not be limited to a confined location. A whole
campus or park, or even an entire city can be enabled. Grassroots efforts
have led to wireless community networks. Commercial Wi-Fi services
covering large city areas are in place in London, Vienna, Toronto, San
Francisco, Philadelphia, Chicago and Pittsburgh. The Internet can then be
accessed from such places as a park bench.[9]

      Apart from Wi-Fi, there have been experiments with proprietary
mobile wireless networks like Ricochet, various high-speed data services
over cellular phone networks, and fixed wireless services.

       High-end mobile phones such as smart phones generally come with
Internet access through the phone network. Web browsers such as Opera are
available on these advanced handsets, which can also run a wide variety of
other Internet software. More mobile phones have Internet access than PCs,
though this is not as widely used. An Internet access provider and protocol
matrix differentiates the methods used to get online.




17
Intranet:-
      An intranet is a private computer network that uses Internet protocols
and network connectivity to securely share part of an organization's
information or operations with its employees. Sometimes the term refers
only to the organization's internal website. The same concepts and
technologies of the Internet such as clients and servers running on the
Internet protocol suite are used to build an intranet. HTTP and other
Internet protocols are commonly used as well, such as FTP. There is often an
attempt to use Internet technologies to provide new interfaces with
corporate "legacy" data and information systems.

       Briefly, an intranet can be understood as "a private version of the
Internet," or as a version of the Internet confined to an organization. The
term first appeared in print on April 19, 1995, in Digital News & Review in an
article authored by technical editor Stephen Lawton [1].An IntranetSite
differs from a website in the fact that websites are oriented to public web
browsers that do not need be authenticated in order to view the content. The
IntranetSite content is private and does require authentication for each web
viewer. Some websites require a subscription to access some or all of their
content and be cause of the authentication requirement it makes them an
IntranetSites or ExtranetSites.




Advantages of
intranets:-

18
•   Workforce productivity: Intranets can help users to locate and view
         information faster and use applications relevant to their roles and
         responsibilities. With the help of a web browser interface, users can
         access data held in any database the organization wants to make
         available, anytime and - subject to security provisions - from
         anywhere within the company workstations, increasing employees'
         ability to perform their jobs faster, more accurately, and with
         confidence that they have the right information. It also helps to
         improve the services provided to the users.
     •   Time: With intranets, organizations can make more information
         available to employees on a "pull" basis (ie: employees can link to
         relevant information at a time which suits them) rather than being
         deluged indiscriminately by emails.
     •   Communication: Intranets can serve as powerful tools for
         communication within an organization, vertically and horizontally.
         From a communications standpoint, intranets are useful to
         communicate strategic initiatives that have a global reach throughout
         the organization. The type of information that can easily be conveyed
         is the purpose of the initiative and what the initiative is aiming to
         achieve, who is driving the initiative, results achieved to date, and
         who to speak to for more information. By providing this information
         on the intranet, staff have the opportunity to keep up-to-date with the
         strategic focus of the organization.
     •   Web publishing allows 'cumbersome' corporate knowledge to be
         maintained and easily accessed throughout the company using
         hypermedia and Web technologies. Examples include: employee
         manuals, benefits documents, company policies, business standards,
         newsfeeds, and even training, can be accessed using common Internet
         standards (Acrobat files, Flash files, CGI applications). Because each
         business unit can update the online copy of a document, the most
         recent version is always available to employees using the intranet.
     •   Business operations and management: Intranets are also being used as
         a platform for developing and deploying applications to support
         business operations and decisions across the internetworked
         enterprise.




19
• Cost-effective: Users can view information and data via web-browser
       rather than maintaining physical documents such as procedure
       manuals, internal phone list and requisition forms.
     • Promote common corporate culture: Every user is viewing the same
       information within the Intranet.
     • Enhance Collaboration: With information easily accessible by all
       authorised users, teamwork is enabled.
     • Cross-platform Capability: Standards-compliant web browsers are
       available for Windows, Mac, and UNIX.




Extranet:-
       An extranet is a private network that uses Internet protocols, network
connectivity, and possibly the public telecommunication system to securely
share part of an organization's information or operations with suppliers,
vendors, partners, customers or other businesses. An extranet can be viewed
as part of a company's Intranet that is extended to users outside the
company (e.g.: normally over the Internet). It has also been described as a
"state of mind" in which the Internet is perceived as a way to do business
with a reproved set of other companies business-to-business (B2B), in
isolation from all other Internet users. In contrast, business-to-consumer
(B2C) involves known server(s) of one or more companies, communicating
with previously unknown consumer users.

      Briefly, an extranet can be understood as a private intranet mapped
onto the Internet or some other transmission system not accessible to the
general public, but is managed by more than one company's
administrator(s). For example, military networks of different security levels



20
may map onto a common military radio transmission system that never
connects to the Internet. Any private network mapped onto a public one is a
virtual private network (VPN). In contrast, an intranet is a VPN under the
control of a single company's administrator(s).

       An argument has been made that "extranet" is just a buzzword for
describing what institutions have been doing for decades, that is,
interconnecting to each other to create private networks for sharing
information. One of the differences that characterized an extranet, however,
is that its interconnections are over a shared network rather than through
dedicated physical lines. With respect to Internet Protocol networks, RFC
4364 states "If all the sites in a VPN are owned by the same enterprise, the
VPN is a corporate intranet. If the various sites in a VPN are owned by
different enterprises, the VPN is an extranet. A site can be in more than one
VPN; e.g., in an intranet and several extranets. We regard both intranets and
extranets as VPNs. In general, when we use the term VPN we will not be
distinguishing between intranets and extranets. Even if this argument is
valid, the term "extranet" is still applied and can be used to eliminate the use
of the above description."[1]




ADVANTAGES:-
     • Exchange large volumes of data using Electronic Data Interchange
       (EDI)
     • Share product catalogs exclusively with wholesalers or those "in the
       trade"
     • Collaborate with other companies on joint development efforts



21
• Jointly develop and use training programs with other companies
     • Provide or access services provided by one company to a group of
       other companies, such as an online banking application managed by
       one company on behalf of affiliated banks
     • Share news of common interest exclusively




    DISADVANTAGES:-
• Extranets can be expensive to implement and maintain within an
  organization (e.g.: hardware, software, employee training costs) — if
  hosted internally instead of via an ASP.
• Security of extranets can be a big concern when dealing with valuable
  information. System access needs to be carefully controlled to avoid
  sensitive information falling into the wrong hands.
• Extranets can reduce personal contact (face-to-face meetings) with
  customers and business partners. This could cause a lack of connections
  made between people and a company, which hurts the business when it
  comes to loyalty of its business partners and customers.




22
EMAILS
             E mails history:-
      Email is much older than Arpanet or the Internet. It was never
invented; it evolved from very simple beginnings.

Early email was just a small advance on what we know these days as a file
directory - it just put a message in another user's directory in a spot where
they could see it when they logged in. Simple as that. Just like leaving a note
on someone's desk.

Probably the first email system of this type was MAILBOX, used at
Massachusetts Institute of Technology from 1965. Another early program to
send messages on the same computer was called SNDMSG.

Some of the mainframe computers of this era might have had up to one
hundred users -often they used what are called "dumb terminals" to access
the mainframe from their work desks. Dumb terminals just connected to the
mainframe - they had no storage or memory of their own, they did all their
work on the remote mainframe computer.

Before internetworking began, therefore, email could only be used to send
messages to various users of the same computer. Once computers began to
talk to each other over networks, however, the problem became a little more
complex - We needed to be able to put a message in an envelope and
address it. To do this, we needed a means to indicate to whom letters should
go that the electronic posties understood - just like the postal system, we


23
needed a way to indicate an address.

This is why Ray Tomlinson is credited with inventing email in 1972. Like
many of the Internet inventors, Tomlinson worked for Bolt Beranek and
Newman as an ARPANET contractor. He picked the @ symbol from the
computer keyboard to denote sending messages from one computer to
another. So then, for anyone using Internet standards, it was simply a matter
of nominating name-of-the-user@name-of-the-computer. Internet pioneer
Jon Postel, who we will hear more of later, was one of the first users of the
new system, and is credited with describing it as a "nice hack". It certainly
was, and it has lasted to this day.




24
Emails:-
     With the growing popularity of the Internet
more and more people are communicating via
email. This fast and efficient method of
communication is perhaps the preferred method of
online communication at the present with
thousands upon thousands of emails being sent
each day. The many uses of email are what make it
so appealing and so versatile. Whether you are
sending a greeting to a grandparent or sending files
to a coworker, you can easily utilize email to do so.

     Email has come quite a long way since its
introduction, yet it is still used for many of the same
reasons. Basic electronic communication has
essentially evolved into a more resourceful tool as
one has the ability to do much more now then they
once could. Along with the usual sending of files
and text messages through email, one can send
greeting cards, manage their emails by assigning
them to folders or classifying them as junk and even
organize and manage their daily tasks on some
email servers.


25
Advantages:-
•    Email is effective in providing quick answers to yes and no, type
     questions. e.g. Do you do international delivery?
•    Email is effective in finding the right person in an organization or
     company to answer your question.
•    Email is good to make appointments for busy people.
•    Email can distribute information quickly to many people for the time it
     takes to email one person.
•    . Global reach: No matter where you are or whom you need to reach,
     targeted emails pave the way. Borders are no obstacles in email
     marketing.
•    2. Lower cost: Costs incurred in designing, executing, testing, sending
     and receiving an email is up to 78% less for a run of 5000 over paper-
     based direct mail version. When you add e-mail to your marketing mix,
     you spend less time, money and resources than with traditional
     marketing vehicles like direct mail or print advertising.
•    3. Interactive: You can innovatively initiate campaigns using graphics,
     videos, music, quiz, game or whatever that will be of interest to your
     prospect, to grab his attention and interest immediately.
•    4. Highly personalized: Email enables you to personalize and greet every
     person you target. This helps in creating a special bond with the
     prospects.
•    5. Round the clock marketing: With an email the audience can
     understand your offering even when you are out of office.
•    Faster response: Time to receive responses through e-mail is one to three
     days, where you will get maximum responses on day one itself, while a
     direct mail campaign would take minimum 7 to 12 days to generate any
     responses. Further, responding to a direct mail is more cumbersome,
     while a person can respond to an email immediately.
•    10. Simplest: Executing an email campaign is simple and you can do it
     sitting at home without any extensive resources.




26
• Managing Email is Easy
  You can manage all your correspondence on screen and so can your
  customers. Your proposal can be answered, revised, stored, and
  sent to others, all without reams of paper involved.
• Email is Fast
  Mail is delivered instantly...from your office to anywhere in
  the world. No other method of delivery can provide this service.
  Timely buying and selling decisions can be made in a heartbeat.
• Email is Easy to Filter
  The subject line on an Email makes it easy to prioritize
  messages. The reader can identify ritical correspondence
  quickly and dealt with it immediately. Unlike regular mail
  which needs to be opened and reviewed, or voice mail which
  requires you to either listen to or scan all your messages
  for those that require immediate attention.
• Transmission is Secure and Reliable
  The level of security in transmitting Email messages is very
  high, and the industry continues to strive to develop even
  tighter security levels. Email is private. Often telephone and
  fax messages are not. If the address information is correct,
  rarely does an Email go astray. Fax machines can be out of
  order or out of paper and this prevents an important message
  from being delivered in a timely manner.




    MAIL BOX



27
DIS ADVANTAGES:-
•    Email can become time consuming for answering complicated questions
     and misunderstandings can arise because cultural differences in the
     interpretation of certain words. The telephone is much better for
     providing detailed answers or if you feel that the question is not
     absolutely clear.
•    Email can compromise the security of an organization because sensitive
     information can be easily distributed accidentally or deliberately. Email
     should be entrusted to well trained and trusted staff members.
•    Email can become impersonal or misunderstood.
•    This wonderful tool is not without its downside however. Some people
     choose to send worms and viruses via email and in the process infect and
     damage quite a lot of computers. A virus email can often be very difficult
     to detect, especially to someone with very little knowledge of computer
     viruses and how they work. If you notice that you have an anonymous
     email or an email with a name foreign to you then you may not want to
     open this email as may likely be a viruses and the mere act of opening
     the email makes your computer susceptible to infection.
•    Along with the abovementioned problems privacy has also become an
     issue with email activity. Virtually every email that you send has to go
     through a number of computers before it reaches the inbox of the
     intended receiver and along the way there exists a distinct possibility that
     an individual could hack into your email and read it. Thus it is
     imperative that you have a bullet proof password.
•    Email attachments can contain viruses.
•    You cannot send physical objects.
•    Messages can only be sent to other email users.
•    Unwanted junk email may be sent to you in large amounts.
•    There is some cost involved in email marketing. Primarily this is the costs
     associated with writing the advertisements and creating any graphics
     which will accompany the email advertisements. This will require hiring
     a writer to write the copy for the advertisement and a designer to create
     and implements the graphics. The cost of these services will vary pretty


28
widely but in general you will pay more for writers and designers with
     more experience. This is because these writers and designers are
     expected to be able to produce a higher quality of work than those with
     less experience could produce.
     The most obvious disadvantage to email marketing is the possibility of
     having your email marketing viewed as spam. This is a very important
     problem because it could prove to be quite costly in terms of the profit
     margin for your business. Each day Internet users are bombarded with
     unsolicited emails serving as advertisements. This problem has reached
     epic proportions and the abundance of spam infiltrating the email boxes
     of innocent Internet users has to be cautious and suspicious about any
     email they receive which is unsolicited and appears to be promoting a
     particular product or service.


VIRUSES THAT COME THROUGH E MAILS




Computers:-
29
History
       It is difficult to identify any one device as the earliest computer, partly
because the term "computer" has been subject to varying interpretations
over time. Originally, the term "computer" referred to a person who
performed numerical calculations (a human computer), often with the aid of
a mechanical calculating device.

      The history of the modern computer begins with two separate
technologies - that of automated calculation and that of programmability.

       Examples of early mechanical calculating devices included the abacus,
the slide rule and arguably the astrolabe and the Antikythera mechanism
(which dates from about 150-100 BC). The end of the Middle Ages saw a re-
invigoration of European mathematics and engineering, and Wilhelm
Schickard's 1623 device was the first of a number of mechanical calculators
constructed by European engineers. However, none of those devices fit the
modern definition of a computer because they could not be programmed.

       Hero of Alexandria (c. 10 – 70 AD) built a mechanical theater which
performed a play lasting 10 minutes and was operated by a complex system
of ropes and drums that might be considered to be a means of deciding
which parts of the mechanism performed which actions - and when.[3] This
is the essence of programmability. In 1801, Joseph Marie Jacquard made an
improvement to the textile loom that used a series of punched paper cards
as a template to allow his loom to weave intricate patterns automatically.
The resulting Jacquard loom was an important step in the development of
computers because the use of punched cards to define woven patterns can
be viewed as an early, albeit limited, form of programmability.

       It was the fusion of automatic calculation with programmability that
produced the first recognizable computers. In 1837, Charles Babbage was
the first to conceptualize and design a fully programmable mechanical


30
computer that he called "The Analytical Engine".Due to limited finances,
and an inability to resist tinkering with the design, Babbage never actually
built his Analytical Engine.

       Large-scale automated data processing of punched cards was
performed for the U.S. Census in 1890 by tabulating machines designed by
Herman Hollerith and manufactured by the Computing Tabulating
Recording Corporation, which later became IBM. By the end of the 19th
century a number of technologies that would later prove useful in the
realization of practical computers had begun to appear: the punched card,
Boolean algebra, the vacuum tube (thermionic valve) and the teleprinter.




                                 The Jacquard loom
                                 was one of the first
                                 programmable
                                 devices.




       During the first half of the 20th century, many scientific computing
needs were met by increasingly sophisticated analog computers, which used
a direct mechanical or electrical model of the problem as a basis for
computation. However, these were not programmable and generally lacked
the versatility and accuracy of modern digital computers.




31
Several developers of ENIAC, came up with a far more flexible and
elegant design, which came to be known as the "stored program
architecture" or von Neumann architecture. This design was first formally
described by John von Neumann in the paper First Draft of a Report on the
EDVAC, distributed in 1945. A number of projects to develop computers
based on the stored-program architecture commenced around this time, the
first of these being completed in Great Britain. The first to be demonstrated
working was the Manchester Small-Scale Experimental Machine (SSEM or
"Baby"), while the EDSAC, completed a year after SSEM, was the first
practical implementation of the stored program design. Shortly thereafter,
the machine originally described by von Neumann's paper—EDVAC—was
completed but did not see full-time use for an additional two years.

       Nearly all modern computers implement some form of the stored-
program architecture, making it the single trait by which the word
"computer" is now defined. While the technologies used in computers have
changed dramatically since the first electronic, general-purpose computers
of the 1940s, most still use the von Neumann architecture.

                          EDSAC was one of the first
                          computers to implement the
                          stored program (von Neumann)
                          architecture


                                Computers that used vacuum tubes as their
                         electronic elements were in use throughout the 1950s.
                         Vacuum tube electronics were largely replaced in the
1960s by transistor-based electronics, which are smaller, faster, cheaper to
produce, require less power, and are more reliable. In the 1970s, integrated
circuit technology and the subsequent creation of microprocessors, such as
the Intel 4004, further decreased size and cost and further increased speed
and reliability of computers. By the 1980s, computers became sufficiently
small and cheap to replace simple mechanical controls in domestic
appliances such as washing machines. The 1980s also witnessed home
computers and the now ubiquitous personal computer. With the evolution




32
of the Internet, personal computers are becoming as common as the
 television and the telephone in the household.




Microprocessors are miniaturized devices that
often implement stored program CPUs.




 33
ADVANTAGES OF COMPUTER:-
Sharing devices such as printers saves money. Files can easily be shared
between users. Network users can communicate by email. Security is good -
users cannot see other users' files unlike on stand-alone machines. A file
server is easy to back up as all the data is stored in one place. A computer
allows a person to manipulate data easily and quickly, create text
documents, edit them, print them, manipulate images, print them, send text
and images over the Internet, download information over the Internet,
interact with other people easily from home, keep records of transactions,
activities, plan trips, and generally do far more than a person without a
computer. Computers are very useful to make everyday life a lot easier. You
can check the weather, email, search items, buy things type papers and
much much more. You can also play games and post blogs and other stuff.
People use computers in many ways. Can be used in business, inventions
and scanners.

Computers help children to be in control of their experience, to set their own
pace, and to select the level of challenge with which they feel comfortable.
Computers help children to use all of their senses to extract information.
Computers fascinate kids and can draw their full attention, which often
results in a deeper focus and concentration. Computers enable children to
learn through creating, just as they gain hands-on knowledge and
understanding when they build forts, make up stories, and paint, increase
their skills. Good educational software enables children to develop and
practice a broad range skill. It can help them learn, for example, about
letters, numbers, shapes, colours, and rhythm. Good software can also help
children develop their understanding of cause and effect, higher order
problem solving, procedural thinking, and creative expression. Today, the
wide range of multimedia available for kids in India is really amazing.
Computers are helpful because they offer a wide range of functions and
services that are not available anywhere else. There are four main uses:
word processing, internet/communications, digital video/audio
composition, and desktop publishing.




34
Disadvantages of computer:-
One of the worst disadvantages of a computer is a
computer virus
History:-
The Creeper virus was first detected on ARPANET, the forerunner of the
Internet in the early 1970s.[1] It propagated via the TENEX operating system
and could make use of any connected modem to dial out to remote
computers and infect them. It would display the message "I'M THE
CREEPER : CATCH ME IF YOU CAN.". It is rumored that the Reaper
program, which appeared shortly after and sought out copies of the Creeper
and deleted them, may have been written by the creator of the Creeper in a
fit of regret.

A common misconception is that a program called "Rother J" was the first
computer virus to appear "in the wild" — that is, outside the single
computer or lab where it was created, but that claim is false. See the
Timeline of notable computer viruses and worms for other earlier viruses. It
was however the first virus to infect computers "in the home". Written in
1982 by Richard Skrenta, it attached itself to the Apple DOS 3.3 operating
system and spread by floppy disk.This virus was originally a joke, created
by a high school student and put onto a game on floppy disk. On its 50th
use the Elk Cloner virus would be activated, infecting the computer and
displaying a short poem beginning "Elk Cloner: The program with a
personality".

The first PC virus in the wild was a boot sector virus called Brain, created in
1986 by the Farooq Alvi Brothers, operating out of Lahore, Pakistan. The
brothers reportedly created the virus to deter pirated copies of software they
had written. However, analysts have claimed that the Ashar virus, a variant
of Brain, possibly predated it based on code within the virus




35
A computer virus is a computer program that can copy itself and infect a
computer without permission or knowledge of the user. The term "virus" is
also commonly used, albeit erroneously, to refer to many different types of
malware and adware programs. The original virus may modify the copies,
or the copies may modify themselves, as occurs in a metamorphic virus. A
virus can only spread from one computer to another when its host is taken
to the uninfected computer, for instance by a user sending it over a network
or the Internet, or by carrying it on a removable medium such as a floppy
disk, CD, or USB drive. Meanwhile viruses can spread to other computers
by infecting files on a network file system or a file system that is accessed by
another computer. Viruses are sometimes confused with computer worms
and Trojan horses. A worm can spread itself to other computers without
needing to be transferred as part of a host, and a Trojan horse is a file that
appears harmless. Worms and Trojans may cause harm to either a computer
system's hosted data, functional performance, or networking throughput,
when executed. In general, a worm does not actually harm either the
system's hardware or software, while at least in theory, a Trojan's payload
may be capable of almost any type of harm if executed. Some can't be seen
when the program is not running, but as soon as the infected code is run, the
Trojan horse kicks in. That is why it is so hard for people to find viruses and
other malware themselves and why they have to use spyware programs and
registry processors.

Most personal computers are now connected to the Internet and to local area
networks, facilitating the spread of malicious code. Today's viruses may also
take advantage of network services such as the World Wide Web, e-mail,
Instant Messaging and file sharing systems to spread, blurring the line
between viruses and worms. Furthermore, some sources use an alternative
terminology in which a virus is any form of self-replicating malware.

Some malware is programmed to damage the computer by damaging
programs, deleting files, or reformatting the hard disk. Other malware
programs are not designed to do any damage, but simply replicate
themselves and perhaps make their presence known by presenting text,
video, or audio messages. Even these less sinister malware programs can
create problems for the computer user. They typically take up computer
memory used by legitimate programs. As a result, they often cause erratic



36
behavior and can result in system crashes. In addition, much malware is
bug-ridden, and these bugs may lead to system crashes and data loss. Many
CiD programs are programs that have been downloaded by the user and
pop up every so often. This results in slowing down of the computer, but it
is also very difficult to find and stop the problem.


Other disadvantages of computer are:-
The teenagers of today's society have changed dramatically due to the
Computer. Nowadays, the majority of teenagers have a PC and it has played
a key role in their lives. Teenagers need to be equipped with knowledge of
computer technology, as most things in life require the use of computers.
One disadvantage of owning a computer is the information that students
can access from the Internet. The Internet has also made the youth of today
quite lazy, especially in terms of their education. If a student needs to
research information for school, they merely access a relevant site and
download the information, rarely paying attention to what is written.
Purchasing the network cabling and file servers can be expensive. If the file
server breaks down the files on the file server become inaccessible. Viruses
can spread to other computers throughout a computer network. There is a
danger of hacking, particularly with wide area networks.

Computers are very engaging on children as well as adults. Kids with access
to software that is not age appropriate may be exposed to such negative
influences as violence, strong language, and over-stimulation from fast-
action graphics.




      Latest technology

                                        Laptop


37

Contenu connexe

Tendances

Oral communication
Oral communicationOral communication
Oral communicationbandages
 
7 cs of effective communication
7 cs of effective communication 7 cs of effective communication
7 cs of effective communication Sunipa Bera
 
Uses of technology in business communication
Uses of technology in business communicationUses of technology in business communication
Uses of technology in business communicationMushfiq Rayan
 
Essentials of effective communication
Essentials of effective communicationEssentials of effective communication
Essentials of effective communicationDr Shafayat Malik
 
Business letter
Business letterBusiness letter
Business letter India
 
Mass Communication 01 - Basic Concepts
Mass Communication 01 - Basic ConceptsMass Communication 01 - Basic Concepts
Mass Communication 01 - Basic ConceptsSatrio Arismunandar
 
internal and external communication
internal and external communicationinternal and external communication
internal and external communicationUtkarsh Bisht
 
Introduction to business communication
Introduction to business communicationIntroduction to business communication
Introduction to business communicationJitin Kollamkudy
 
Business communication presentation
Business communication presentationBusiness communication presentation
Business communication presentationTanzid Hossain
 
Nature of Communication
Nature of CommunicationNature of Communication
Nature of Communicationjivcodera21
 
7cs of communication
7cs of communication7cs of communication
7cs of communicationTaha Khan
 
Introducing communication
Introducing communicationIntroducing communication
Introducing communicationYuvraj Gupta
 
Fundamental principles of writing business letter, 7 c’s
Fundamental principles of writing business letter, 7 c’sFundamental principles of writing business letter, 7 c’s
Fundamental principles of writing business letter, 7 c’sTamur Iqbal
 
Written communication
Written communication Written communication
Written communication Deep Narayan
 
Essentials Of Effective Communication
Essentials Of Effective CommunicationEssentials Of Effective Communication
Essentials Of Effective CommunicationNamita Singh
 
Business Communication (as per DAVV syllabus)
Business Communication (as per DAVV syllabus)Business Communication (as per DAVV syllabus)
Business Communication (as per DAVV syllabus)Sarabjeet Singh
 
Communication and types of communication
Communication and types of communicationCommunication and types of communication
Communication and types of communicationsatyendraahirwar
 
Definition and process of communication
Definition and process of communicationDefinition and process of communication
Definition and process of communicationBurhanuddin Kapadia
 

Tendances (20)

Oral communication
Oral communicationOral communication
Oral communication
 
7 cs of effective communication
7 cs of effective communication 7 cs of effective communication
7 cs of effective communication
 
Uses of technology in business communication
Uses of technology in business communicationUses of technology in business communication
Uses of technology in business communication
 
Essentials of effective communication
Essentials of effective communicationEssentials of effective communication
Essentials of effective communication
 
Business letter
Business letterBusiness letter
Business letter
 
Mass Communication 01 - Basic Concepts
Mass Communication 01 - Basic ConceptsMass Communication 01 - Basic Concepts
Mass Communication 01 - Basic Concepts
 
internal and external communication
internal and external communicationinternal and external communication
internal and external communication
 
Introduction to business communication
Introduction to business communicationIntroduction to business communication
Introduction to business communication
 
Business communication presentation
Business communication presentationBusiness communication presentation
Business communication presentation
 
Nature of Communication
Nature of CommunicationNature of Communication
Nature of Communication
 
7cs of communication
7cs of communication7cs of communication
7cs of communication
 
Introducing communication
Introducing communicationIntroducing communication
Introducing communication
 
Fundamental principles of writing business letter, 7 c’s
Fundamental principles of writing business letter, 7 c’sFundamental principles of writing business letter, 7 c’s
Fundamental principles of writing business letter, 7 c’s
 
Personal communication skills
Personal communication skillsPersonal communication skills
Personal communication skills
 
Written communication
Written communication Written communication
Written communication
 
Essentials Of Effective Communication
Essentials Of Effective CommunicationEssentials Of Effective Communication
Essentials Of Effective Communication
 
Business Communication (as per DAVV syllabus)
Business Communication (as per DAVV syllabus)Business Communication (as per DAVV syllabus)
Business Communication (as per DAVV syllabus)
 
Communication and types of communication
Communication and types of communicationCommunication and types of communication
Communication and types of communication
 
Definition and process of communication
Definition and process of communicationDefinition and process of communication
Definition and process of communication
 
Business Writing
Business WritingBusiness Writing
Business Writing
 

En vedette

Media and types of communication
Media and types of communicationMedia and types of communication
Media and types of communicationAnuj STha
 
Communication media
Communication mediaCommunication media
Communication medialijomoljose
 
Types of media
Types of mediaTypes of media
Types of mediasevianj
 
Communication ppt
Communication pptCommunication ppt
Communication pptTirtha Mal
 
COMMUNICATION PROCESS,TYPES,MODES,BARRIERS
COMMUNICATION PROCESS,TYPES,MODES,BARRIERSCOMMUNICATION PROCESS,TYPES,MODES,BARRIERS
COMMUNICATION PROCESS,TYPES,MODES,BARRIERSSruthi Balaji
 
COMMUNICATION POWERPOINT
COMMUNICATION POWERPOINTCOMMUNICATION POWERPOINT
COMMUNICATION POWERPOINTAndrew Schwartz
 
Media Powerpoint Presentation
Media Powerpoint PresentationMedia Powerpoint Presentation
Media Powerpoint PresentationGazza Otim
 
selecting topic and purpose for public speaking
selecting topic and purpose for public speakingselecting topic and purpose for public speaking
selecting topic and purpose for public speakingSyaie Syaieda
 
ACTFL Modes of Communication #wlclassroom
ACTFL Modes of Communication #wlclassroomACTFL Modes of Communication #wlclassroom
ACTFL Modes of Communication #wlclassroomJoshua Cabral
 
Media & modes of communication
Media & modes of communicationMedia & modes of communication
Media & modes of communicationAnkit Porwal
 
Modes of Communication by Cumulations | CuTech Talks
Modes of Communication by Cumulations | CuTech TalksModes of Communication by Cumulations | CuTech Talks
Modes of Communication by Cumulations | CuTech TalksCumulations Technologies
 
Modes of communication. The components of oral discourse.
 Modes of communication. The components of oral discourse.  Modes of communication. The components of oral discourse.
Modes of communication. The components of oral discourse. EDUTIC_aulas_digitales
 
Communication medium
Communication mediumCommunication medium
Communication mediumkayathri02
 
Influence of media on society ppt
Influence  of media  on  society pptInfluence  of media  on  society ppt
Influence of media on society pptsharmi88
 
Communication - Process & Definition Power Point Presentation
Communication - Process & Definition Power Point PresentationCommunication - Process & Definition Power Point Presentation
Communication - Process & Definition Power Point PresentationSatyaki Chowdhury
 

En vedette (20)

Modes and Media Communication.
Modes and Media Communication.Modes and Media Communication.
Modes and Media Communication.
 
Media and types of communication
Media and types of communicationMedia and types of communication
Media and types of communication
 
Modes of Communication
Modes of CommunicationModes of Communication
Modes of Communication
 
Communication media
Communication mediaCommunication media
Communication media
 
Types of media
Types of mediaTypes of media
Types of media
 
Communication ppt
Communication pptCommunication ppt
Communication ppt
 
COMMUNICATION PROCESS,TYPES,MODES,BARRIERS
COMMUNICATION PROCESS,TYPES,MODES,BARRIERSCOMMUNICATION PROCESS,TYPES,MODES,BARRIERS
COMMUNICATION PROCESS,TYPES,MODES,BARRIERS
 
COMMUNICATION POWERPOINT
COMMUNICATION POWERPOINTCOMMUNICATION POWERPOINT
COMMUNICATION POWERPOINT
 
Media Powerpoint Presentation
Media Powerpoint PresentationMedia Powerpoint Presentation
Media Powerpoint Presentation
 
selecting topic and purpose for public speaking
selecting topic and purpose for public speakingselecting topic and purpose for public speaking
selecting topic and purpose for public speaking
 
ACTFL Modes of Communication #wlclassroom
ACTFL Modes of Communication #wlclassroomACTFL Modes of Communication #wlclassroom
ACTFL Modes of Communication #wlclassroom
 
Media types
Media typesMedia types
Media types
 
Media & modes of communication
Media & modes of communicationMedia & modes of communication
Media & modes of communication
 
Modes of Communication by Cumulations | CuTech Talks
Modes of Communication by Cumulations | CuTech TalksModes of Communication by Cumulations | CuTech Talks
Modes of Communication by Cumulations | CuTech Talks
 
Modes of communication. The components of oral discourse.
 Modes of communication. The components of oral discourse.  Modes of communication. The components of oral discourse.
Modes of communication. The components of oral discourse.
 
Communication medium
Communication mediumCommunication medium
Communication medium
 
Types of media
Types  of mediaTypes  of media
Types of media
 
Mass media
Mass mediaMass media
Mass media
 
Influence of media on society ppt
Influence  of media  on  society pptInfluence  of media  on  society ppt
Influence of media on society ppt
 
Communication - Process & Definition Power Point Presentation
Communication - Process & Definition Power Point PresentationCommunication - Process & Definition Power Point Presentation
Communication - Process & Definition Power Point Presentation
 

Similaire à Media And Mode Of Communications

Running head Cell phone technology health, behavior, & relations.docx
Running head Cell phone technology health, behavior, & relations.docxRunning head Cell phone technology health, behavior, & relations.docx
Running head Cell phone technology health, behavior, & relations.docxhealdkathaleen
 
SMART PHONES Technical report V2 .pdf
SMART PHONES Technical report V2 .pdfSMART PHONES Technical report V2 .pdf
SMART PHONES Technical report V2 .pdfMohamed Sewailam
 
Mobile uses in colleges
Mobile uses in collegesMobile uses in colleges
Mobile uses in collegesREELA_MALA
 
Mobile culture in 21st century
Mobile culture in 21st centuryMobile culture in 21st century
Mobile culture in 21st centuryTarana Tarana
 
Mobile Samir
Mobile SamirMobile Samir
Mobile Samirvikasisms
 
Chaitali Deb - Project - 2013
Chaitali Deb - Project - 2013Chaitali Deb - Project - 2013
Chaitali Deb - Project - 2013Chaitali Deb
 
Mobile phone: Evolution to Revolution
Mobile phone: Evolution to RevolutionMobile phone: Evolution to Revolution
Mobile phone: Evolution to RevolutionAmanShaikh45
 
A project report on brand preference of mobile phones
A project report on brand preference of mobile phonesA project report on brand preference of mobile phones
A project report on brand preference of mobile phonesProjects Kart
 
Cell phone Technology
Cell phone TechnologyCell phone Technology
Cell phone Technologykay2
 
Mobile communication intro
Mobile communication introMobile communication intro
Mobile communication introTHANDAIAH PRABU
 
History of new media - Imran Farooq
History of new media - Imran FarooqHistory of new media - Imran Farooq
History of new media - Imran FarooqImran Farooq
 
The evolution of the mobile phone
The evolution of the mobile phoneThe evolution of the mobile phone
The evolution of the mobile phoneJonathan Peters
 
Evolution of communication technology
Evolution  of  communication  technologyEvolution  of  communication  technology
Evolution of communication technologysushruth kamarushi
 
Media Literacy (Information Era)
Media Literacy (Information Era)Media Literacy (Information Era)
Media Literacy (Information Era)Pauline Sharry
 
Customer perceptions of south African cellular network operators.
Customer perceptions of south African cellular network operators.Customer perceptions of south African cellular network operators.
Customer perceptions of south African cellular network operators.8hearingpta
 
Radiotelephony History
Radiotelephony HistoryRadiotelephony History
Radiotelephony HistoryDivya Watson
 
section-101020034905-phpapp02.pdf
section-101020034905-phpapp02.pdfsection-101020034905-phpapp02.pdf
section-101020034905-phpapp02.pdfScarlet Rojas
 

Similaire à Media And Mode Of Communications (20)

Running head Cell phone technology health, behavior, & relations.docx
Running head Cell phone technology health, behavior, & relations.docxRunning head Cell phone technology health, behavior, & relations.docx
Running head Cell phone technology health, behavior, & relations.docx
 
SMART PHONES Technical report V2 .pdf
SMART PHONES Technical report V2 .pdfSMART PHONES Technical report V2 .pdf
SMART PHONES Technical report V2 .pdf
 
cellphones
cellphonescellphones
cellphones
 
Mobile uses in colleges
Mobile uses in collegesMobile uses in colleges
Mobile uses in colleges
 
Mobile culture in 21st century
Mobile culture in 21st centuryMobile culture in 21st century
Mobile culture in 21st century
 
Mobile Samir
Mobile SamirMobile Samir
Mobile Samir
 
Chaitali Deb - Project - 2013
Chaitali Deb - Project - 2013Chaitali Deb - Project - 2013
Chaitali Deb - Project - 2013
 
Mobile phone: Evolution to Revolution
Mobile phone: Evolution to RevolutionMobile phone: Evolution to Revolution
Mobile phone: Evolution to Revolution
 
A project report on brand preference of mobile phones
A project report on brand preference of mobile phonesA project report on brand preference of mobile phones
A project report on brand preference of mobile phones
 
Sikai He 5946
Sikai He 5946Sikai He 5946
Sikai He 5946
 
Cell phone Technology
Cell phone TechnologyCell phone Technology
Cell phone Technology
 
Mobile communication intro
Mobile communication introMobile communication intro
Mobile communication intro
 
History of new media - Imran Farooq
History of new media - Imran FarooqHistory of new media - Imran Farooq
History of new media - Imran Farooq
 
The evolution of the mobile phone
The evolution of the mobile phoneThe evolution of the mobile phone
The evolution of the mobile phone
 
Evolution of communication technology
Evolution  of  communication  technologyEvolution  of  communication  technology
Evolution of communication technology
 
Media Literacy (Information Era)
Media Literacy (Information Era)Media Literacy (Information Era)
Media Literacy (Information Era)
 
Customer perceptions of south African cellular network operators.
Customer perceptions of south African cellular network operators.Customer perceptions of south African cellular network operators.
Customer perceptions of south African cellular network operators.
 
Radiotelephony History
Radiotelephony HistoryRadiotelephony History
Radiotelephony History
 
section-101020034905-phpapp02.pdf
section-101020034905-phpapp02.pdfsection-101020034905-phpapp02.pdf
section-101020034905-phpapp02.pdf
 
Cellular olano
Cellular olanoCellular olano
Cellular olano
 

Plus de Nishit Mehta

Understanding the emotional association between cadbury & youth of Mumbai.
Understanding the emotional association between cadbury & youth of Mumbai.Understanding the emotional association between cadbury & youth of Mumbai.
Understanding the emotional association between cadbury & youth of Mumbai.Nishit Mehta
 
Brand prism ~cadbury~
Brand prism ~cadbury~Brand prism ~cadbury~
Brand prism ~cadbury~Nishit Mehta
 
Cadbury, Chocolate
Cadbury, ChocolateCadbury, Chocolate
Cadbury, ChocolateNishit Mehta
 
Targeting And Positioning In Rural Market
Targeting And Positioning In Rural MarketTargeting And Positioning In Rural Market
Targeting And Positioning In Rural MarketNishit Mehta
 
Payment Of Wages Act, 1936
Payment Of Wages Act, 1936Payment Of Wages Act, 1936
Payment Of Wages Act, 1936Nishit Mehta
 
Material Management
Material ManagementMaterial Management
Material ManagementNishit Mehta
 
Material Management.2003
Material Management.2003Material Management.2003
Material Management.2003Nishit Mehta
 
Starting a new Business
Starting a new BusinessStarting a new Business
Starting a new BusinessNishit Mehta
 
Learning Ability Ppt
Learning Ability PptLearning Ability Ppt
Learning Ability PptNishit Mehta
 
Computer Project Doc
Computer Project DocComputer Project Doc
Computer Project DocNishit Mehta
 
Sales Of Goods Act Doc
Sales Of Goods Act DocSales Of Goods Act Doc
Sales Of Goods Act DocNishit Mehta
 

Plus de Nishit Mehta (20)

Understanding the emotional association between cadbury & youth of Mumbai.
Understanding the emotional association between cadbury & youth of Mumbai.Understanding the emotional association between cadbury & youth of Mumbai.
Understanding the emotional association between cadbury & youth of Mumbai.
 
Resume
ResumeResume
Resume
 
Brand prism ~cadbury~
Brand prism ~cadbury~Brand prism ~cadbury~
Brand prism ~cadbury~
 
Cadbury
CadburyCadbury
Cadbury
 
Cadbury, Chocolate
Cadbury, ChocolateCadbury, Chocolate
Cadbury, Chocolate
 
Targeting And Positioning In Rural Market
Targeting And Positioning In Rural MarketTargeting And Positioning In Rural Market
Targeting And Positioning In Rural Market
 
Micro Finance
Micro FinanceMicro Finance
Micro Finance
 
Restaurants
RestaurantsRestaurants
Restaurants
 
Restaurants
RestaurantsRestaurants
Restaurants
 
Payment Of Wages Act, 1936
Payment Of Wages Act, 1936Payment Of Wages Act, 1936
Payment Of Wages Act, 1936
 
Material Management
Material ManagementMaterial Management
Material Management
 
Material Management.2003
Material Management.2003Material Management.2003
Material Management.2003
 
Starting a new Business
Starting a new BusinessStarting a new Business
Starting a new Business
 
Garment Waste
Garment WasteGarment Waste
Garment Waste
 
Garment Waste
Garment WasteGarment Waste
Garment Waste
 
Learning Ability
Learning AbilityLearning Ability
Learning Ability
 
Learning Ability Ppt
Learning Ability PptLearning Ability Ppt
Learning Ability Ppt
 
Histogram
HistogramHistogram
Histogram
 
Computer Project Doc
Computer Project DocComputer Project Doc
Computer Project Doc
 
Sales Of Goods Act Doc
Sales Of Goods Act DocSales Of Goods Act Doc
Sales Of Goods Act Doc
 

Media And Mode Of Communications

  • 1. “BUISNESS COMMUNICATION” TOPIC:- MEANS & MODES OF COMMUNICATION 1
  • 2. INDEX:- INTRODUCTION MOBILE PHONES • HISTORY • OVERVIEW • APLICATIONS TELEPHONES • HISTORY • BASCI PRINCILPES • USEAGE INTERNET • HISTORY • INTERNET PROTOCOLS • INTERNET ACCESS • INTRA NET • EXTRA NET E MEAILS • ADVANTAGE • DIS ADVANTAGE 2
  • 3. I NTRODUCTION:- Once you and your team have produced your list of people for your communication plan, gotten everyone's phone number and email, and listed their role, there is one more thing that needs to be done. Add each person's preferred mode of communication to the list. This is one of the most crucial, but commonly overlooked, elements of a good communication plan. Different people have different ways they like to communicate and the more you respect that, the better off you and your project are going to be. Some people are at their computers all day and constantly check their email, others travel a lot and you can catch them only on their cell phone, others prefer office phone calls, and still others only respond if you talk with them face-to-face. Not using a person’s preferred mode of communication means you may not get the information or feedback you need when you need it. This can prevent you from being able to effectively make a required quick decision or stave off an impending crisis. In today's workplace, adequate communication is difficult because many times not all the people in your communications loop work in the same building or city or state, and some don’t even work the same hours. Once you know how you need to communicate to the people identified on your communications plan, you then need to identify which of the many available communications tool are best suited for your team/company and how they work. 3
  • 4. Mobile (Cell) Phones:- Another way to communicate in India is through Mobile or Cell phones. If you have a mobile phone with the tri-band technology, you can easily use it here. You don’t need to use the service provider of your own country. There are number of service providers in India to keep you connected. You can buy a prepaid sim card from any service provider. You only need to make payment for it and give a photocopy of your any Identity proof (like your passport). Get it recharged and enjoy free mobility. Mobile phone he mobile phone (also called a wireless phone or cellular phone)[1] is a short-range, portable electronic device used for mobile voice or data communication over a network of specialized base stations known as cell sites. In addition to the standard voice function of a telephone, current mobile phones may support many additional services, and accessories, such as SMS for text messaging, email, packet switching for access to the Internet, gaming, bluetooth, infrared, camera with video recorder and MMS for sending and receiving photos and video. Most current mobile phones connect to a cellular network of base stations (cell sites), which is in turn interconnected to the public switched telephone network (PSTN) (the exception is satellite phones OLDEST CELL PHONE History:- 4
  • 5. In 1908, U.S. Patent 887,357 for a wireless telephone was issued in to Nathan B. Stubblefield of Murray, Kentucky. He applied this patent to "cave radio" telephones and not directly to cellular telephony as the term is currently understood.Cells for mobile phone base stations were invented in 1947 by Bell Labs engineers at AT&T and further developed by Bell Labs during the 1960s. Radiophones have a long and varied history going back to Reginald Fessenden's invention and shore-to-ship demonstration of radio telephony, through the Second World War with military use of radio telephony links and civil services in the 1950s, while hand-held cellular radio devices have been available since 1973. Due to their low establishment costs and rapid deployment, mobile phone networks have since spread rapidly throughout the world, outstripping the growth of fixed telephony Overview:- According to internal memos, American Telephone & Telegraph discussed developing a wireless phone in 1915, but were afraid deployment of the technology could undermine its monopoly on wired service in the U.S.[2] The first commercial mobile phone service was launched in Japan by NTT in 1978. By November 2007, the total number of mobile phone subscriptions in the world had reached 3.3 billion, or half of the human population (although some users have multiple subscriptions, or inactive subscriptions), which also makes the mobile phone the most widely spread technology and the most common electronic device in the world.[3] The first mobile phone to enable internet connectivity and wireless email, the Nokia Communicator, was released in 1996, creating a new category of expensive phones called smartphones. In 1999 the first mobile internet service was launched by NTT DoCoMo in Japan under the i-Mode service. By 2007 over 798 million people around the world accessed the internet or equivalent mobile internet services such as WAP and i-Mode at least occasionally using a mobile phone rather than a personal computer. 5
  • 6. Applications:- The most commonly used data application on mobile phones is SMS text messaging, with 74% of all mobile phone users as active users (over 2.4 billion out of 3.3 billion total subscribers at the end of 2007). SMS text messaging was worth over 100 billion dollars in annual revenues in 2007 and the worldwide average of messaging use is 2.6 SMS sent per day per person across the whole mobile phone subscriber base. (source Informa 2007). The first SMS text message was sent from a computer to a mobile phone in 1992 in the UK, while the first person-to-person SMS from phone to phone was sent in Finland in 1993. The other non-SMS data services used by mobile phones were worth 31 Billion dollars in 2007, and were led by mobile music, downloadable logos and pictures, gaming, gambling, adult entertainment and advertising (source: Informa 2007). The first downloadable mobile content was sold to a mobile phone in Finland in 1998, when Radiolinja (now Elisa) introduced the downloadable ringing tone service. In 1999 Japanese mobile operator 6
  • 7. NTT DoCoMo introduced its mobile internet service, i-Mode, which today is the world's largest mobile internet service and roughly the same size as Google in annual revenues. The first mobile news service, delivered via SMS, was launched in Finland in 2000. Mobile news services are expanding with many organizations providing "on-demand" news services by SMS. Some also provide "instant" news pushed out by SMS. Mobile telephony also facilitates activism and public journalism being explored by Reuters and Yahoo![5] and small independent news companies such as Jasmine News in Sri Lanka. he mobile phone became a mass media channel in 1998 when the first ringing tones were sold to mobile phones by Radiolinja in Finland. Soon other media content appeared such as news, videogames, jokes, horoscopes, TV content and advertising. In 2006 the total value of mobile phone paid media content exceeded internet paid media content and was worth 31 Billion dollars (source Informa 2007). The value of music on phones was worth 9.3 Billion dollars in 2007 and gaming was worth over 5 billion dollars in 2007 (source Netsize Guide 2008 [1]). The mobile phone is often called the Fourth Screen (if counting cinema, TV and PC screens as the first three) or Third Screen (counting only TV and PC screens). It is also called the Seventh of the Mass Media (with Print, Recordings, Cinema, Radio, TV and Internet the first six). Most early content for mobile tended to be copies of legacy media, such as the banner advertisement or the TV news highlight video clip. Recently unique content for mobile has been emerging, from the ringing tones and ringback tones in music to "mobisodes," video content that has been produced exclusively for mobile phones. The advent of media on the mobile phone has also produced the opportunity to identify and track Alpha Users or Hubs, the most influential members of any social 7
  • 8. community. AMF Ventures measured in 2007 the relative accuracy of three mass media, and found that audience measures on mobile were nine times more accurate than on the internet and 90 times more accurate than on TV. Telephones:- India has a highly developed network of telephone lines. Almost every road in India has one phone booth, which offers public calls, STD calls and ISD calls. The ISD code of India is 91. In order to make an international call, dial 00 (international access code from India) followed by code of the country you are calling followed by the area code and then local number. LATEST History:- TECHNOLOGIES Credit for inventing the electric telephone remains in dispute. As with other great inventions such as radio, television, light bulb, and computer, there were several inventors who did pioneer experimental work on voice transmission over a wire and improved on each other's ideas. Innocenzo Manzetti, Antonio Meucci, Johann Philipp Reis, Elisha Gray, Alexander Graham Bell, and Thomas Edison, among others, have all been credited with pioneer work on the telephone. The early history of the telephone is a confusing morass of claim and counterclaim, which was not clarified by the huge mass of lawsuits which hoped to resolve the patent claims of individuals. The Bell and Edison patents, however, were forensically victorious and commercially decisive. 8
  • 9. An 1896 Telephone from Sweden. Who invented telephone? Alexander Graham Bell invented the telephone in 1876. The first words he spoke on his telephone were, "Watson, come here. I need you." Watson was his assistant's name. That happened in 1875-76. However Antonio Meucci had a working telephone since 1848 in Havana and a perfected model by 1871. On that year Meucci filed for and obtained a patent (caveat #3335) for the telephone. To say that Bell invented the telephone is erroneous. Meucci invented it. The unfortunate thing about Meucci is that he did not renew the caveat 3335 for lack of money. Had he renewed it, Bell would not have been granted a patent. Bell knowing the facts applied and was granted a patent. Bell is not the inventor. He simply commercialized what had been invented by Meucci and made a fortune whereas Meucci died poor and destitute.. t depends on who you believe. Alexander Graham Bell got a patent for the telephone. Reisling in Germany had a patent, but wasn't able to make it actually work. Bell actually used his plans and made something that almost worked. There are numerous other claims and Bell's patent request arrived in the Patent office mere hours before another claim arrived. Meucci set up a form of voice communication link in his Staten Island home that connected the basement with the first floor, but was unable to raise sufficient funds to pay for the patent application. He filed a patent caveat in 1871, which was forced to expire in 1874. In 1876, Alexander Graham Bell patented the electro-magnetic transmission of vocal sound by undulatory electric current. 9
  • 10. Use-age:- By the end of 2006, there were a total of nearly 4 billion mobile and fixed line subscribers and over 1 billion Internet users worldwide. This included 1.27 billion fixed line subscribers and 2.68 billion mobile subscribers. LATEST TECHNOLOGIES 10
  • 11. Internet:- India is connected to the world through the Internet also. Almost every urban household has access to high speed Internet. Now-a-days, Internet has also reached rural India and people living at the grassroot level are learning how to communicate and move with the world. You can send and receive emails and surf the net in those many "cyber cafes" that have sprung up at every nook and corner in all cities, which offer Internet services at minimal costs. 11
  • 12. History of the Internet:- Prior to the widespread inter-networking that led to the Internet, most communication networks were limited by their nature to only allow communications between the stations on the network, and the prevalent computer networking method was based on the central mainframe method. In the 1960s, computer researchers, Levi C. Finch and Robert W. Taylor pioneered calls for a joined-up global network to address interoperability problems. Concurrently, several research programs began to research principles of networking between separate physical networks, and this led to the development of Packet switching. These included Donald Davies (NPL), Paul Baran (RAND Corporation), and Leonard Kleinrock's MIT and UCLA research programs. This led to the development of several packet switched networking solutions in the late 1960s and 1970s, including ARPANET, and X.25. Additionally, public access and hobbyist networking systems grew in popularity, including UUCP. They were however still disjointed separate networks, served only by limited gateways between networks. This led to the application of packet switching to develop a protocol for inter- networking, where multiple different networks could be joined together into a super-framework of networks. By defining a simple common network system, the Internet protocol suite, the concept of the network could be separated from its physical implementation. This spread of inter-network began to form into the idea of a global inter-network that would be called 'The Internet', and this began to quickly spread as existing networks were converted to become compatible with this. This spread quickly across the advanced telecommunication networks of the western world, and then began to penetrate into the rest of the world as it became the de-facto international standard and global network. However, the disparity of growth led to a digital divide that is still a concern today. Following commercialization and introduction of privately run Internet Service Providers in the 1980s, and its expansion into popular use in 12
  • 13. the 1990s, the Internet has had a drastic impact on culture and commerce. This includes the rise of near instant communication by e-mail, text based discussion forums, the World Wide Web. Investor speculation in new markets provided by these innovations would also lead to the inflation and collapse of the Dot-com bubble, a major market collapse. But despite this, Internet continues to grow. Before the Internet:- In the 1950s and early 1960s, prior to the widespread inter-networking that led to the Internet, most communication networks were limited by their nature to only allow communications between the stations on the network. Some networks had gateways or bridges between them, but these bridges were often limited or built specifically for a single use. One prevalent computer networking method was based on the central mainframe method, simply allowing its terminals to be connected via long leased lines. This method was used in the 1950s by Project RAND to support researchers such as Herbert Simon, in Pittsburgh, Pennsylvania, when collaborating across the continent with researchers in Sullivan, Illinois, on automated theorem proving and artificial intelligence. the telephone (from the Greek words tele (τηλέ) = far and phone (φωνή) = voice) is a telecommunications device that is used to transmit and receive sound (most commonly speech), usually two people conversing but occasionally three or more. It is one of the most common household appliances in the world today. Most telephones operate through transmission of electric signals over a complex telephone network which allows almost any phone user to communicate with almost anyone.A traditional landline telephone system, also known as "plain old telephone service" (POTS), commonly handles both signaling and audio information on the same twisted pair of insulated wires: the telephone line. Although originally designed for voice communication, the system has been adapted for data communication such as Telex, Fax and Internet communication. The signaling equipment consists of a bell, beeper, light or other device to alert 13
  • 14. the user to incoming calls, and number buttons or a rotary dial to enter a telephone number for outgoing calls. A twisted pair line is preferred as it is more effective at rejecting electromagnetic interference (EMI) and crosstalk than an untwisted pair.A calling party wishing to speak to another party will pick up the telephone's handset, thus operating a button switch or "switchhook", which puts the telephone into an active state or "off hook" by connecting the transmitter (microphone), receiver (speaker) and related audio components to the line. This circuitry has a low resistance (less than 300 Ohms) which causes DC current (48 volts, nominal) from the telephone exchange to flow through the line. The exchange detects this DC current, attaches a digit receiver circuit to the line, and sends a dial tone to indicate readiness. On a modern telephone, the calling party then presses the number buttons in a sequence corresponding to the telephone number of the called party. The buttons are connected to a tone generator that produces DTMF tones which are sent to the exchange. A rotary dial telephone employs pulse dialing, sending electrical pulses corresponding to the telephone number to the exchange. When a landline phone is inactive or "on hook", its alerting device is connected across the line through a capacitor, which prevents DC current from flowing through the line. The circuitry at the telephone exchange detects the absence of DC current flow and thus that the phone is on hook with only the alerting device electrically connected to the line. When a party initiates a call to this line, the ringing signal transmitted by the telephone exchange activates the alerting device on the line. When the called party picks up the handset, the switch hook disconnects the alerting device and connects the audio circuitry to the line. 14
  • 15. Internet protocols:- The complex communications infrastructure of the Internet consists of its hardware components and a system of software layers that control various aspects of the architecture. While the hardware can often be used to support other software systems, it is the design and the rigorous standardization process of the software architecture that characterizes the Internet. The responsibility for the architectural design of the Internet software systems has been delegated to the Internet Engineering Task Force (IETF).[7] The IETF conducts standard-setting work groups, open to any individual, about the various aspects of Internet architecture. Resulting discussions and final standards are published in Request for Comments (RFCs), freely available on the IETF web site. The principal methods of networking that enable the Internet are contained in a series of RFCs that constitute the Internet Standards. These standards describe a system known as the Internet Protocol Suite. This is a model architecture that divides methods into a layered system of protocols (RFC 1122, RFC 1123). The layers correspond to the environment or scope in which their services operate. At the top is the space (Application Layer) of the software application, e.g., a web browser application, and just below it is the Transport Layer which connects applications on different hosts via the network (e.g., client-server model). The underlying network consists of two layers: the Internet Layer which enables computers to connect to one- another via intermediate (transit) networks and thus is the layer that establishes internetworking and the Internet, and lastly, at the bottom, is a software layer that provides connectivity between hosts on the same local link (therefor called Link Layer), e.g., a local area network (LAN) or a dial- up connection. This model is also known as the TCP/IP model of networking. While other models have been developed, such as the Open Systems Interconnection (OSI) model, they are not compatible in the details of description, nor implementation. 15
  • 16. The most prominent component of the Internet model is the Internet Protocol (IP) which provides addressing systems for computers on the Internet and facilitates the internetworking of networks. IP Version 4 (IPv4) is the initial version used on the first generation of the today's Internet and is still in dominant use. It was designed to address up to ~4.3 billion (109) Internet hosts. However, the explosive growth of the Internet has led to IPv4 address exhaustion. A new protocol version, IPv6, was developed which provides vastly larger addressing capabilities and more efficient routing of data traffic. IPv6 is currently in commercial deployment phase around the world. IPv6 is not interoperable with IPv4. It essentially establishes a "parallel" version of the Internet not accessible with IPv4 software. This means software upgrades are necessary for every networking device that needs to communicate on the IPv6 Internet. Most modern computer operating systems are already converted to operate with both version of the Internet Protocol. Network infrastructures, however, are still lagging in this development. Internet access:- Common methods of home access include dial-up, landline broadband (over coaxial cable, fiber optic or copper wires), Wi-Fi, satellite and 3G technology cell phones. Public places to use the Internet include libraries and Internet cafes, where computers with Internet connections are available. There are also Internet access points in many public places such as airport halls and coffee shops, in some cases just for brief use while standing. Various terms are used, such as "public Internet kiosk", "public access terminal", and "Web payphone". Many hotels now also have public terminals, though these are usually fee-based. These terminals are widely accessed for various usage like ticket booking, bank deposit, online payment etc. Wi-Fi provides wireless access to computer networks, and therefore can do so to the 16
  • 17. Internet itself. Hotspots providing such access include Wi-Fi cafes, where would-be users need to bring their own wireless-enabled devices such as a laptop or PDA. These services may be free to all, free to customers only, or fee-based. A hotspot need not be limited to a confined location. A whole campus or park, or even an entire city can be enabled. Grassroots efforts have led to wireless community networks. Commercial Wi-Fi services covering large city areas are in place in London, Vienna, Toronto, San Francisco, Philadelphia, Chicago and Pittsburgh. The Internet can then be accessed from such places as a park bench.[9] Apart from Wi-Fi, there have been experiments with proprietary mobile wireless networks like Ricochet, various high-speed data services over cellular phone networks, and fixed wireless services. High-end mobile phones such as smart phones generally come with Internet access through the phone network. Web browsers such as Opera are available on these advanced handsets, which can also run a wide variety of other Internet software. More mobile phones have Internet access than PCs, though this is not as widely used. An Internet access provider and protocol matrix differentiates the methods used to get online. 17
  • 18. Intranet:- An intranet is a private computer network that uses Internet protocols and network connectivity to securely share part of an organization's information or operations with its employees. Sometimes the term refers only to the organization's internal website. The same concepts and technologies of the Internet such as clients and servers running on the Internet protocol suite are used to build an intranet. HTTP and other Internet protocols are commonly used as well, such as FTP. There is often an attempt to use Internet technologies to provide new interfaces with corporate "legacy" data and information systems. Briefly, an intranet can be understood as "a private version of the Internet," or as a version of the Internet confined to an organization. The term first appeared in print on April 19, 1995, in Digital News & Review in an article authored by technical editor Stephen Lawton [1].An IntranetSite differs from a website in the fact that websites are oriented to public web browsers that do not need be authenticated in order to view the content. The IntranetSite content is private and does require authentication for each web viewer. Some websites require a subscription to access some or all of their content and be cause of the authentication requirement it makes them an IntranetSites or ExtranetSites. Advantages of intranets:- 18
  • 19. Workforce productivity: Intranets can help users to locate and view information faster and use applications relevant to their roles and responsibilities. With the help of a web browser interface, users can access data held in any database the organization wants to make available, anytime and - subject to security provisions - from anywhere within the company workstations, increasing employees' ability to perform their jobs faster, more accurately, and with confidence that they have the right information. It also helps to improve the services provided to the users. • Time: With intranets, organizations can make more information available to employees on a "pull" basis (ie: employees can link to relevant information at a time which suits them) rather than being deluged indiscriminately by emails. • Communication: Intranets can serve as powerful tools for communication within an organization, vertically and horizontally. From a communications standpoint, intranets are useful to communicate strategic initiatives that have a global reach throughout the organization. The type of information that can easily be conveyed is the purpose of the initiative and what the initiative is aiming to achieve, who is driving the initiative, results achieved to date, and who to speak to for more information. By providing this information on the intranet, staff have the opportunity to keep up-to-date with the strategic focus of the organization. • Web publishing allows 'cumbersome' corporate knowledge to be maintained and easily accessed throughout the company using hypermedia and Web technologies. Examples include: employee manuals, benefits documents, company policies, business standards, newsfeeds, and even training, can be accessed using common Internet standards (Acrobat files, Flash files, CGI applications). Because each business unit can update the online copy of a document, the most recent version is always available to employees using the intranet. • Business operations and management: Intranets are also being used as a platform for developing and deploying applications to support business operations and decisions across the internetworked enterprise. 19
  • 20. • Cost-effective: Users can view information and data via web-browser rather than maintaining physical documents such as procedure manuals, internal phone list and requisition forms. • Promote common corporate culture: Every user is viewing the same information within the Intranet. • Enhance Collaboration: With information easily accessible by all authorised users, teamwork is enabled. • Cross-platform Capability: Standards-compliant web browsers are available for Windows, Mac, and UNIX. Extranet:- An extranet is a private network that uses Internet protocols, network connectivity, and possibly the public telecommunication system to securely share part of an organization's information or operations with suppliers, vendors, partners, customers or other businesses. An extranet can be viewed as part of a company's Intranet that is extended to users outside the company (e.g.: normally over the Internet). It has also been described as a "state of mind" in which the Internet is perceived as a way to do business with a reproved set of other companies business-to-business (B2B), in isolation from all other Internet users. In contrast, business-to-consumer (B2C) involves known server(s) of one or more companies, communicating with previously unknown consumer users. Briefly, an extranet can be understood as a private intranet mapped onto the Internet or some other transmission system not accessible to the general public, but is managed by more than one company's administrator(s). For example, military networks of different security levels 20
  • 21. may map onto a common military radio transmission system that never connects to the Internet. Any private network mapped onto a public one is a virtual private network (VPN). In contrast, an intranet is a VPN under the control of a single company's administrator(s). An argument has been made that "extranet" is just a buzzword for describing what institutions have been doing for decades, that is, interconnecting to each other to create private networks for sharing information. One of the differences that characterized an extranet, however, is that its interconnections are over a shared network rather than through dedicated physical lines. With respect to Internet Protocol networks, RFC 4364 states "If all the sites in a VPN are owned by the same enterprise, the VPN is a corporate intranet. If the various sites in a VPN are owned by different enterprises, the VPN is an extranet. A site can be in more than one VPN; e.g., in an intranet and several extranets. We regard both intranets and extranets as VPNs. In general, when we use the term VPN we will not be distinguishing between intranets and extranets. Even if this argument is valid, the term "extranet" is still applied and can be used to eliminate the use of the above description."[1] ADVANTAGES:- • Exchange large volumes of data using Electronic Data Interchange (EDI) • Share product catalogs exclusively with wholesalers or those "in the trade" • Collaborate with other companies on joint development efforts 21
  • 22. • Jointly develop and use training programs with other companies • Provide or access services provided by one company to a group of other companies, such as an online banking application managed by one company on behalf of affiliated banks • Share news of common interest exclusively DISADVANTAGES:- • Extranets can be expensive to implement and maintain within an organization (e.g.: hardware, software, employee training costs) — if hosted internally instead of via an ASP. • Security of extranets can be a big concern when dealing with valuable information. System access needs to be carefully controlled to avoid sensitive information falling into the wrong hands. • Extranets can reduce personal contact (face-to-face meetings) with customers and business partners. This could cause a lack of connections made between people and a company, which hurts the business when it comes to loyalty of its business partners and customers. 22
  • 23. EMAILS E mails history:- Email is much older than Arpanet or the Internet. It was never invented; it evolved from very simple beginnings. Early email was just a small advance on what we know these days as a file directory - it just put a message in another user's directory in a spot where they could see it when they logged in. Simple as that. Just like leaving a note on someone's desk. Probably the first email system of this type was MAILBOX, used at Massachusetts Institute of Technology from 1965. Another early program to send messages on the same computer was called SNDMSG. Some of the mainframe computers of this era might have had up to one hundred users -often they used what are called "dumb terminals" to access the mainframe from their work desks. Dumb terminals just connected to the mainframe - they had no storage or memory of their own, they did all their work on the remote mainframe computer. Before internetworking began, therefore, email could only be used to send messages to various users of the same computer. Once computers began to talk to each other over networks, however, the problem became a little more complex - We needed to be able to put a message in an envelope and address it. To do this, we needed a means to indicate to whom letters should go that the electronic posties understood - just like the postal system, we 23
  • 24. needed a way to indicate an address. This is why Ray Tomlinson is credited with inventing email in 1972. Like many of the Internet inventors, Tomlinson worked for Bolt Beranek and Newman as an ARPANET contractor. He picked the @ symbol from the computer keyboard to denote sending messages from one computer to another. So then, for anyone using Internet standards, it was simply a matter of nominating name-of-the-user@name-of-the-computer. Internet pioneer Jon Postel, who we will hear more of later, was one of the first users of the new system, and is credited with describing it as a "nice hack". It certainly was, and it has lasted to this day. 24
  • 25. Emails:- With the growing popularity of the Internet more and more people are communicating via email. This fast and efficient method of communication is perhaps the preferred method of online communication at the present with thousands upon thousands of emails being sent each day. The many uses of email are what make it so appealing and so versatile. Whether you are sending a greeting to a grandparent or sending files to a coworker, you can easily utilize email to do so. Email has come quite a long way since its introduction, yet it is still used for many of the same reasons. Basic electronic communication has essentially evolved into a more resourceful tool as one has the ability to do much more now then they once could. Along with the usual sending of files and text messages through email, one can send greeting cards, manage their emails by assigning them to folders or classifying them as junk and even organize and manage their daily tasks on some email servers. 25
  • 26. Advantages:- • Email is effective in providing quick answers to yes and no, type questions. e.g. Do you do international delivery? • Email is effective in finding the right person in an organization or company to answer your question. • Email is good to make appointments for busy people. • Email can distribute information quickly to many people for the time it takes to email one person. • . Global reach: No matter where you are or whom you need to reach, targeted emails pave the way. Borders are no obstacles in email marketing. • 2. Lower cost: Costs incurred in designing, executing, testing, sending and receiving an email is up to 78% less for a run of 5000 over paper- based direct mail version. When you add e-mail to your marketing mix, you spend less time, money and resources than with traditional marketing vehicles like direct mail or print advertising. • 3. Interactive: You can innovatively initiate campaigns using graphics, videos, music, quiz, game or whatever that will be of interest to your prospect, to grab his attention and interest immediately. • 4. Highly personalized: Email enables you to personalize and greet every person you target. This helps in creating a special bond with the prospects. • 5. Round the clock marketing: With an email the audience can understand your offering even when you are out of office. • Faster response: Time to receive responses through e-mail is one to three days, where you will get maximum responses on day one itself, while a direct mail campaign would take minimum 7 to 12 days to generate any responses. Further, responding to a direct mail is more cumbersome, while a person can respond to an email immediately. • 10. Simplest: Executing an email campaign is simple and you can do it sitting at home without any extensive resources. 26
  • 27. • Managing Email is Easy You can manage all your correspondence on screen and so can your customers. Your proposal can be answered, revised, stored, and sent to others, all without reams of paper involved. • Email is Fast Mail is delivered instantly...from your office to anywhere in the world. No other method of delivery can provide this service. Timely buying and selling decisions can be made in a heartbeat. • Email is Easy to Filter The subject line on an Email makes it easy to prioritize messages. The reader can identify ritical correspondence quickly and dealt with it immediately. Unlike regular mail which needs to be opened and reviewed, or voice mail which requires you to either listen to or scan all your messages for those that require immediate attention. • Transmission is Secure and Reliable The level of security in transmitting Email messages is very high, and the industry continues to strive to develop even tighter security levels. Email is private. Often telephone and fax messages are not. If the address information is correct, rarely does an Email go astray. Fax machines can be out of order or out of paper and this prevents an important message from being delivered in a timely manner. MAIL BOX 27
  • 28. DIS ADVANTAGES:- • Email can become time consuming for answering complicated questions and misunderstandings can arise because cultural differences in the interpretation of certain words. The telephone is much better for providing detailed answers or if you feel that the question is not absolutely clear. • Email can compromise the security of an organization because sensitive information can be easily distributed accidentally or deliberately. Email should be entrusted to well trained and trusted staff members. • Email can become impersonal or misunderstood. • This wonderful tool is not without its downside however. Some people choose to send worms and viruses via email and in the process infect and damage quite a lot of computers. A virus email can often be very difficult to detect, especially to someone with very little knowledge of computer viruses and how they work. If you notice that you have an anonymous email or an email with a name foreign to you then you may not want to open this email as may likely be a viruses and the mere act of opening the email makes your computer susceptible to infection. • Along with the abovementioned problems privacy has also become an issue with email activity. Virtually every email that you send has to go through a number of computers before it reaches the inbox of the intended receiver and along the way there exists a distinct possibility that an individual could hack into your email and read it. Thus it is imperative that you have a bullet proof password. • Email attachments can contain viruses. • You cannot send physical objects. • Messages can only be sent to other email users. • Unwanted junk email may be sent to you in large amounts. • There is some cost involved in email marketing. Primarily this is the costs associated with writing the advertisements and creating any graphics which will accompany the email advertisements. This will require hiring a writer to write the copy for the advertisement and a designer to create and implements the graphics. The cost of these services will vary pretty 28
  • 29. widely but in general you will pay more for writers and designers with more experience. This is because these writers and designers are expected to be able to produce a higher quality of work than those with less experience could produce. The most obvious disadvantage to email marketing is the possibility of having your email marketing viewed as spam. This is a very important problem because it could prove to be quite costly in terms of the profit margin for your business. Each day Internet users are bombarded with unsolicited emails serving as advertisements. This problem has reached epic proportions and the abundance of spam infiltrating the email boxes of innocent Internet users has to be cautious and suspicious about any email they receive which is unsolicited and appears to be promoting a particular product or service. VIRUSES THAT COME THROUGH E MAILS Computers:- 29
  • 30. History It is difficult to identify any one device as the earliest computer, partly because the term "computer" has been subject to varying interpretations over time. Originally, the term "computer" referred to a person who performed numerical calculations (a human computer), often with the aid of a mechanical calculating device. The history of the modern computer begins with two separate technologies - that of automated calculation and that of programmability. Examples of early mechanical calculating devices included the abacus, the slide rule and arguably the astrolabe and the Antikythera mechanism (which dates from about 150-100 BC). The end of the Middle Ages saw a re- invigoration of European mathematics and engineering, and Wilhelm Schickard's 1623 device was the first of a number of mechanical calculators constructed by European engineers. However, none of those devices fit the modern definition of a computer because they could not be programmed. Hero of Alexandria (c. 10 – 70 AD) built a mechanical theater which performed a play lasting 10 minutes and was operated by a complex system of ropes and drums that might be considered to be a means of deciding which parts of the mechanism performed which actions - and when.[3] This is the essence of programmability. In 1801, Joseph Marie Jacquard made an improvement to the textile loom that used a series of punched paper cards as a template to allow his loom to weave intricate patterns automatically. The resulting Jacquard loom was an important step in the development of computers because the use of punched cards to define woven patterns can be viewed as an early, albeit limited, form of programmability. It was the fusion of automatic calculation with programmability that produced the first recognizable computers. In 1837, Charles Babbage was the first to conceptualize and design a fully programmable mechanical 30
  • 31. computer that he called "The Analytical Engine".Due to limited finances, and an inability to resist tinkering with the design, Babbage never actually built his Analytical Engine. Large-scale automated data processing of punched cards was performed for the U.S. Census in 1890 by tabulating machines designed by Herman Hollerith and manufactured by the Computing Tabulating Recording Corporation, which later became IBM. By the end of the 19th century a number of technologies that would later prove useful in the realization of practical computers had begun to appear: the punched card, Boolean algebra, the vacuum tube (thermionic valve) and the teleprinter. The Jacquard loom was one of the first programmable devices. During the first half of the 20th century, many scientific computing needs were met by increasingly sophisticated analog computers, which used a direct mechanical or electrical model of the problem as a basis for computation. However, these were not programmable and generally lacked the versatility and accuracy of modern digital computers. 31
  • 32. Several developers of ENIAC, came up with a far more flexible and elegant design, which came to be known as the "stored program architecture" or von Neumann architecture. This design was first formally described by John von Neumann in the paper First Draft of a Report on the EDVAC, distributed in 1945. A number of projects to develop computers based on the stored-program architecture commenced around this time, the first of these being completed in Great Britain. The first to be demonstrated working was the Manchester Small-Scale Experimental Machine (SSEM or "Baby"), while the EDSAC, completed a year after SSEM, was the first practical implementation of the stored program design. Shortly thereafter, the machine originally described by von Neumann's paper—EDVAC—was completed but did not see full-time use for an additional two years. Nearly all modern computers implement some form of the stored- program architecture, making it the single trait by which the word "computer" is now defined. While the technologies used in computers have changed dramatically since the first electronic, general-purpose computers of the 1940s, most still use the von Neumann architecture. EDSAC was one of the first computers to implement the stored program (von Neumann) architecture Computers that used vacuum tubes as their electronic elements were in use throughout the 1950s. Vacuum tube electronics were largely replaced in the 1960s by transistor-based electronics, which are smaller, faster, cheaper to produce, require less power, and are more reliable. In the 1970s, integrated circuit technology and the subsequent creation of microprocessors, such as the Intel 4004, further decreased size and cost and further increased speed and reliability of computers. By the 1980s, computers became sufficiently small and cheap to replace simple mechanical controls in domestic appliances such as washing machines. The 1980s also witnessed home computers and the now ubiquitous personal computer. With the evolution 32
  • 33. of the Internet, personal computers are becoming as common as the television and the telephone in the household. Microprocessors are miniaturized devices that often implement stored program CPUs. 33
  • 34. ADVANTAGES OF COMPUTER:- Sharing devices such as printers saves money. Files can easily be shared between users. Network users can communicate by email. Security is good - users cannot see other users' files unlike on stand-alone machines. A file server is easy to back up as all the data is stored in one place. A computer allows a person to manipulate data easily and quickly, create text documents, edit them, print them, manipulate images, print them, send text and images over the Internet, download information over the Internet, interact with other people easily from home, keep records of transactions, activities, plan trips, and generally do far more than a person without a computer. Computers are very useful to make everyday life a lot easier. You can check the weather, email, search items, buy things type papers and much much more. You can also play games and post blogs and other stuff. People use computers in many ways. Can be used in business, inventions and scanners. Computers help children to be in control of their experience, to set their own pace, and to select the level of challenge with which they feel comfortable. Computers help children to use all of their senses to extract information. Computers fascinate kids and can draw their full attention, which often results in a deeper focus and concentration. Computers enable children to learn through creating, just as they gain hands-on knowledge and understanding when they build forts, make up stories, and paint, increase their skills. Good educational software enables children to develop and practice a broad range skill. It can help them learn, for example, about letters, numbers, shapes, colours, and rhythm. Good software can also help children develop their understanding of cause and effect, higher order problem solving, procedural thinking, and creative expression. Today, the wide range of multimedia available for kids in India is really amazing. Computers are helpful because they offer a wide range of functions and services that are not available anywhere else. There are four main uses: word processing, internet/communications, digital video/audio composition, and desktop publishing. 34
  • 35. Disadvantages of computer:- One of the worst disadvantages of a computer is a computer virus History:- The Creeper virus was first detected on ARPANET, the forerunner of the Internet in the early 1970s.[1] It propagated via the TENEX operating system and could make use of any connected modem to dial out to remote computers and infect them. It would display the message "I'M THE CREEPER : CATCH ME IF YOU CAN.". It is rumored that the Reaper program, which appeared shortly after and sought out copies of the Creeper and deleted them, may have been written by the creator of the Creeper in a fit of regret. A common misconception is that a program called "Rother J" was the first computer virus to appear "in the wild" — that is, outside the single computer or lab where it was created, but that claim is false. See the Timeline of notable computer viruses and worms for other earlier viruses. It was however the first virus to infect computers "in the home". Written in 1982 by Richard Skrenta, it attached itself to the Apple DOS 3.3 operating system and spread by floppy disk.This virus was originally a joke, created by a high school student and put onto a game on floppy disk. On its 50th use the Elk Cloner virus would be activated, infecting the computer and displaying a short poem beginning "Elk Cloner: The program with a personality". The first PC virus in the wild was a boot sector virus called Brain, created in 1986 by the Farooq Alvi Brothers, operating out of Lahore, Pakistan. The brothers reportedly created the virus to deter pirated copies of software they had written. However, analysts have claimed that the Ashar virus, a variant of Brain, possibly predated it based on code within the virus 35
  • 36. A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The term "virus" is also commonly used, albeit erroneously, to refer to many different types of malware and adware programs. The original virus may modify the copies, or the copies may modify themselves, as occurs in a metamorphic virus. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive. Meanwhile viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer. Viruses are sometimes confused with computer worms and Trojan horses. A worm can spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a file that appears harmless. Worms and Trojans may cause harm to either a computer system's hosted data, functional performance, or networking throughput, when executed. In general, a worm does not actually harm either the system's hardware or software, while at least in theory, a Trojan's payload may be capable of almost any type of harm if executed. Some can't be seen when the program is not running, but as soon as the infected code is run, the Trojan horse kicks in. That is why it is so hard for people to find viruses and other malware themselves and why they have to use spyware programs and registry processors. Most personal computers are now connected to the Internet and to local area networks, facilitating the spread of malicious code. Today's viruses may also take advantage of network services such as the World Wide Web, e-mail, Instant Messaging and file sharing systems to spread, blurring the line between viruses and worms. Furthermore, some sources use an alternative terminology in which a virus is any form of self-replicating malware. Some malware is programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Other malware programs are not designed to do any damage, but simply replicate themselves and perhaps make their presence known by presenting text, video, or audio messages. Even these less sinister malware programs can create problems for the computer user. They typically take up computer memory used by legitimate programs. As a result, they often cause erratic 36
  • 37. behavior and can result in system crashes. In addition, much malware is bug-ridden, and these bugs may lead to system crashes and data loss. Many CiD programs are programs that have been downloaded by the user and pop up every so often. This results in slowing down of the computer, but it is also very difficult to find and stop the problem. Other disadvantages of computer are:- The teenagers of today's society have changed dramatically due to the Computer. Nowadays, the majority of teenagers have a PC and it has played a key role in their lives. Teenagers need to be equipped with knowledge of computer technology, as most things in life require the use of computers. One disadvantage of owning a computer is the information that students can access from the Internet. The Internet has also made the youth of today quite lazy, especially in terms of their education. If a student needs to research information for school, they merely access a relevant site and download the information, rarely paying attention to what is written. Purchasing the network cabling and file servers can be expensive. If the file server breaks down the files on the file server become inaccessible. Viruses can spread to other computers throughout a computer network. There is a danger of hacking, particularly with wide area networks. Computers are very engaging on children as well as adults. Kids with access to software that is not age appropriate may be exposed to such negative influences as violence, strong language, and over-stimulation from fast- action graphics. Latest technology Laptop 37