KEMBAR78
Basics of Internet | PDF | Computer Network | Internet Access
0% found this document useful (0 votes)
6 views11 pages

Basics of Internet

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views11 pages

Basics of Internet

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

CHAPTER 4

BASICS OF INTERNET
email?
What is
>
> Audio conference

> Introduction to Information Technology > Video Conference

> Computer Network


> Network Communication Protocols
> Software And Hardware Of The nternet
evolved, and streaming services like
further
gained|immense popularity.
1. Introduction to Information Netflix and Spotify
evolution Continues in
Technology The internet's constant
beyond, with technologies like
the 2020s and
The Evolution of the Internet reality, and the
artificial intelligence, virtual
promising to further
Internet of Things (loT)
The Internet, a sprawling web connecting billions
reshape Qur lives.
of devices worldwide, has transformed our lives
decades
in ways barely imaginable just a few The internet's advantages are COuntless,
a humble Cold of our lives. It has
ago. lIts journey, however, from impacting nearly every aspect
War-era military project to an everyday essential, easier
revolutionized communication, making it
has been remarkable and far-reaching. in
and faster to connect with anyone, anywhere
In the 1960s, the seeds of the internet were world. Access to information is
the
sown with ARPANET, a US Department of unprecedented, with vast libraries of knowledae
Defense-funded project to create a at our fingertips.
communication network resilient to attacks. The
1970s saw ARPANET evolve, with the invention The Internet has becomea powerfuleducational
of protocols like TCP/IP laying the groundwork tool, offering online courses, resources, and
for the internet we know today. Email also interactive learning platforms. Students can
accesS diverse educational materials and
emerged as a major communication tool.
connect with educators and peers globally.
The 1980s witnessed the birth of the World Wide E-commerce has transformed the way we shop
Web, invented by Tim Berners-Lee at CERN. This and do business,providing new opportunities for
user-friendly interface, with its hyperlinked entrepreneurs and businesses of all sizes to
pages and websites, opened up the internet to a reach a wider audience.
wider audience. The 1990s saw the internet's
popularity skyrocket with the rise of dial-up The internet offers endless entertainment
connections, search engines like Yahoo! and options, from streaming movies and music to
AltaVista,and the dot-com boom.
playing games and exploring virtual worlds.
Social media platforms provide avenuesS T
The 2000s ushered in the broadband revolution.
offering significantly faster speeds than dial-up. connecting with like-minded individuals and
Social media platforms like Facebook and sharing experiences. The internet has facilitated
emerged, transforming online collaboration and knowledge sharing amony
MySpace researchers worldwide, to
communication. Smartphones and tablets leading
became essential devices in the 2010s, marking
advancements in various fields like medicine,
the mobile internet revolution. Social media
science, and technology.

60
Despite its numerous advantages, the
internet interactive space for communication,
also presents challenges, such as the
divide, privacy and security concerns, the digital
community building, and information sharing.
of misinformation and fake news, spread (Source: Statista)
and addiction
and mental health issues. By " Online Collaboration Tools: Platforms like
acknowledging its
advantages and addressing its challenges, we Google Docs and Slack offer real-time
can ensure that the internet continues to be a collaboration on documents, projects, and
force for good in the world. tasks, enhancing productivity and teamwork
across geographical boundaries.
Features of the Internet
Gaming: Online gaming communities

The Internet, a sprawling web connecting billions connect millions of players worldwide,
of devices worldwide, boasts several key fostering virtual interactions and
features that have revolutionized competitions. The global gaming market
generated over $184.4 billion in revenue in
communication, information access, and global
connectivity. 2023

Cloud Computing: Cloud-based services


Global Reach: Nearly 5.4 billion people, or
distribute computing resources across vast
67% of the global population, used the networks, providing efficient scalability and
internet in 2023 (Source: Our World in Data).
on-demand access to applications and data.
" Device Diversity: Accessing the internet is no
longer limited to desktop computers. Mobile Fiber Optic Technology: Fiber optic cables
offer significantly faster internet speeds
devices now dominate, with over 5.3 billion
compared to traditional copper cables,
smartphone users globally (Source:Statista). enabling faster data transfer, streaming, and
Affordability: Internet access costs have downloads. The global average download
steadily decreased over the years, making it speed in 2023 is 100.4 Mbps (Source:
more accessible to people in developing Speedtest. net).
economies. The average global monthly
" 5G Networks: Fifth-generation (5G) mobile
broadband price in 2023 was $58.59 (Source: networkS are revolutionizing internet speeds
Cable.co.uk). with ultra-low latency and significantly faster
traditional data transfer rates, paving the way for new
" No Single Governing Body: Unlike applications like autonomous vehicles and
media controlled by centralized entities, the
augmented reality.
Internet operates without a single governing
authority. This allows for diverse perspectives Open Source Software: Open-source
content but also presents challenges
in software development allows for
and
harmful content and
regulating collaborative code creation and modification,
misinformation. fostering innovation and accessibility for
Peer-to-Peer Communication: Decentralized developers around the globe.
blockchain
protocols like BitTorrent and
direct communication
and data 2.Computer Network
enable
between users, bypassing
sharing This is the most common meaning and refers to
autonomy.
intermediaries and fostering user a collection of interconnected computing
devices like computers, printers, servers, and
billion people actively
" Social Media: Over 4.8 other gadgets that communicate and share
creating a global,
use social media platforms,

61
Networks (PAN)
resources. These devices can be connected Personal Area
physically through cables or wirelessly using
technologies like Wi-Fi or Bluetooth. smartwatch paired
Imagine you're wearing a
notifications. That's a PANI
with your phone for
Key characteristics of a computer These short-range networks
connect personal
network: devices like wireless headphones,
keyboards
central device within a
Nodes: These are and fitness trackers to a
the individual devices limited range, typically less than 10 meters
connected to the network, such as computers, Bluetooth and Zigbee are Common PAN
printers, and servers. Each node has a unique
identifier called an IP address that allows it to be technologies.
identified and located on the network. Local Area Network (LAN)
Links: These are the physical or wireless
Picture an office with computers sharing files
connections that allow data to be transmitted
and printers. That's a LAN! These networks
between nodes. Wires, cables, and fiber optic connect devices in aconfined area, like a home
lines are examples of physical links, while Wi-Fi
and Bluetooth are examples of wireless links. or office, usually using cables or Wi-Fi for faster
speeds and wider coverage than PANs.
Protocols: These are the set of rules and
procedures that govern how devices Wireless Local Area Network (WLAN)
communicate with each other on the network.
Common protocols include TCP/IP, HTTP and Think of your home Wi-Fi network. That's a
SMTP. WLAN! It's essentially a LAN using wireless
technologies like Wi-Fi to connect devices
Resources: These are the shared elements of a without cables, offering greater flexibility and
network, such as files, printers, and internet mobility within the designated area.
access. Networked devices can access and
share these resources based on their Campus Area Network (CAN)
permissions.
Imagine a university campus with buildings
Computer networks can be categorized into interconnected for information sharing. That's a
different types based on their size, scope, and CAN! Its like a large LAN spanning a
wider
purpose. Some common types include: geographical area, often within a single campus
or institution, using amix of wired and
connections.
wireless
Type of Networks
PAN Personal Area Network
LAN Local Area Network Metropolitan Area Network (MAN)
WLAN Wireless Local Area Network Picture a city with interconnected
CAN Campus Area Network and public safety systems. traffic lights
MAN Metropolitan Area Network That's a MAN! These
networks cover entire cities or
WAN Wide Area Network areas, typically using high-bandwidthmetropolitan
SAN Storage Area Network cables to connect fiber optic
various institutions ana
SANS System Area Network organizations for efficient data
POLAN Passive Optical Local Area Network communication. sharing and
EPAN Enterprise Private Network
VPN Virtual Private Network

62
Wide Area Network (WAN) Internet Protocol (|P)
Imagine accessing your office files from Picture each device on the network having a
anywhere in the world. That's a WAN! These IP! It
unique address like a house number. That's
networks span vast geographical distances, routes data packets to the correct
destination
even across Continents, connecting
address,forming the fundamental framework for
geographically dispersed LANS, MANS, and Internet communication.
individual devices using dedicated
communication lines or the internet. 4. Application Layer Protocols
Virtual Private Network (VPN) These protocols operate at the highest level,
dictating how specific applications
Think of creating a secure tunnel within the communicate andexchange data:
internet. That's a VPN! It encrypts your internet
traffic and routes it through a remote server, Hypertext Transfer Protocol (HTTP)
providingsecure access to private networks and
Imagine the language websites and browsers
protecting your data from unauthorized access.
use to talk to each othe. That's HTTP! It governs
how web pages are requested and delivered,
Storage Area Network (SAN)
making it the backbone of web browsing and
Imagine a dedicated network for- storing and online interactions.
accessing data for multiple servers. That's a
SAN! These high-performance networks are File Transfer Protocol (FTP)
specifically designed for data storage and
retrieval, offering centralized, secure, and
Think of a dedicated courier service for digital
efficient data management for businesses.
files. That's FTP! It allows transferring files
efficiently and securely between computers over
3. Network Communication a network.

Protocols Simple Mail Transfer Protocol (SMTP)


Transmission Control Protocol (TCP) Picture the behind-the-scenes machinery
sending and receiving emails. That's SMTP! It
Imagine packets carrying information neatly defines the rules for sending and receiving email
addressed and delivered in the right order. That's messages between servers.
TCP! It's a reliable protocol that ensures data
arrives accurately and completely, making it vital 5. Security Protocols
for web browsing, email, and file transfers.
These protocols prioritize data privacy and
User Datagram Protocol (UDP) integrity, safeguarding information in the digital
world:
Think of tossing information packets without
delivery.
worrying about sequence or guaranteed Hypertext Transfer Protocol Secure
That's UDP! It's a faster, lighter protocol suited
(HTTPS)
for real-time applications like streaming
audio/video and gaming, where
online Imagine an encrypted version of HTTP, adding a
Occasional lost packets don't significantly layer of security to web communication. That's
impact the experience. HTTPS! It protects data exchanged between

63
your browser and a website, making it Here's a breakdown of the
online transactions and sensitive crucial for
world.
software required for the
lnternet: essential
exchange. information
Operating System (0S)
Secure Sockets Layer (SSL)/Transport
Layer Security (TLs) This is the foundation software that manages
your device's resources and provides the
Think of an invisible shield encrypting platform for running other software applications.
communication channels. That's SSL/TLS! The most commonly used operating systems for
These protocols secure data internet access include:
transmission by
encrypting information exchanged between two
parties, making them vital for online banking, Windows: A popular choice for personal
e-commerce, and secure communication computers, offering a user-friendly interface
channels. and compatibility with a wide range of
applications.
6. Routing Protocols macOS: Designed for Apple devices like
These protocols act as digital traffic Macbooks and iMacs, known for its stability
cops, and user-friendly interface.
directing data packets along the optimal path
within networks:
Linux: A free and open-source operating
Border Gateway Protocol (BGP) system with various distributions offering
flexibility and customization options for
Imagine the internet's master navigation system. experienced users.
That's BGP! It governs how data packets find
their way across large, interconnected networks Android: The dominant operating system for
like the Internet, ensuring efficient routing and smartphones and tablets, offering avast app
avoiding traffic jams. ecosystem and diverse functionalities.

Open Shortest Path First (0SPF) iOS: Apple's mobile operating system for
iPhones and iPads, is known for its security
Think of a local network's routing map. That's and integration with other Apple devices.
OSPF! It determines the shortest path for data
Web Browser
packets within a specific network, like your office
or university campus, ensuring smooth internal
This is the application you use to
communication.
internet, access websites, and
navigate the
interact Wi
7. Software And Hardware Of The online content. Popular web browsers
include:
Internet Google Chrome: Widely used for its
simplicity, and vast extension library. speed,
To access and use the Internet, you need a Google Chrome web browser
combination of hardware and software working
together. While the hardware involves your Mozilla FirefoxX: Focuses on
device and its connection to the internet, the privacy a
security, offering features like built-in
software plays a crucial role in facilitating protection, trackin9
communication and interaction with the online

64
Safari: Apple's default browser
macOS devices, known for for iOS and several options available, each with its
its
integration with other Apple products.seamless advantages and limitations:
" Microsoft Edge: The default browser " Dial-up: Using a phone line, dial-up offers
Windows 10 and 11, offering for slow and outdated internet access, primarily
improved
performnance and integration with Microsoft used in areas without other options.
services.
" DSL (Digital Subscriber Line): A broadband
Here's abreakdown of the essential Hardware technology using phone lines, offering faster
required for the internet and more reliable internet than dial-up, widely
available in residential areas.
Device " Cable: Utilizing cable TV infrastructure, cable
This is the physical device you use to interact internet provides high-speed internet access
that is suitable for streaming, gaming, and
with the internet, such as:
downloading large files.
Personal computer (PC): Desktops or laptops Fiber optic: The fastest and most reliable
provide accesS to the internet through
internet option, utilizing fibre optic cables for
various operating systems and offer larger
high-speed data transmission, ideal for heavy
Screens for comfortable browsing and
internet usage andlarge businesses.
working.
Satellite: Providing internet access in remote
" Smartphone: These mobile devices have areas with limited options, satellite internet
become the most commonly used tools for transmits data through satellites orbiting the
internet access, offering compact portability Earth, but can have higher latency and lower
and various internet functionalities. speeds compared to terrestrial options.
" Tablet: Combining the functionalities of Mobile data: Through cellular networks,
smartphones and laptops,tablets offer larger smartphones and tablets can access the
Screens than phones while remaining internet on the go, offering convenience but
portable for casual browsing or multimedia generally having higher data costs and
consumption. potentially slower speeds comparedto home
internet connections.
" Gaming console: While primarily used for
gaming, modern consoles often offer internet Network Interface Card (NIC)
access for browsing, streamingservices, and
online gaming. This is an essential hardware component within
your device that physically connects it to the
" Smart TV: Some smart TVs come equipped internet cable or receives wireless signals. Most
with internet browsing capabilities, allowing modern devices have built-in NICs, but in some
you to access streaming services, online
cases, an external NIC might be needed.
content, and web apps directly on your
television. Router

Internet Connection If you have multiple devices at home needing


internet access, a router acts as a central hub,
This establishes the physical link between your distributing the internet connection to all devices
device and the internet network. There are through wired or wireless connections. Most

65
Satellite: Aviable option for remote areas where
home internet plans include a router provided by wired connections are scarce. However, speeds
the service provider.
much slower, latency is high,
and
are usually
Modem can be restrictive. Not suitable
data usage caps
applications like gaming or video
for real-time
Certain types of internet connections, like DSL conferencing.
andcable, require amodem to convert the signal
from the provider into a format your device can Fixed Wireless: Delivers internet through radis
understand. Modems might be provided by the waves from towers, similar to cell phone signals
service provider or purchased separately. Good alternative in areas with limited wired
options. Offers moderate speeds and decent
An Internet service provider (ISP) is a company
reliability, but not as fast as fiber or cable.
that grants you access to the vast network
known as the Internet. Think of them as the toll 5G Home Internet: The latest innovation
gates on the information superhighway, allowing promising high speeds wirelessly through 5G
youto enter and navigate its data channels. networks. Still in its early stages, but has the
potential to be disruptive in the future
Now, there are different "roads" you can take on
this highway, each with its pros and cons, and Availability and speeds vary depending on
location and carrier.
here are some of the main internet connection
options:
8. Intranet
Wired Connections
An intranet is a kind of private network. For
Fiber-optic: The gold standard! Blazing-fast example, an intranet is used by different
speeds, super reliable, and low latency (lag). organizations and only members/staff of that
Perfect for heavy internet users, online gaming, organization have access to this. It is a system
and streaming high-definition content. in which multiple computers of an organization
Downside: Requires installation of fiber optic (or the computers you want tO connect) are
cables, which might be less available in all connected through an intranet. As this is a
locations, and can be pricier. private network, so no one from the outside
world can access this network.
Cable: A popular choice thanks to its wide
availability and good speeds. Uses the same
cables as cable TV, so it's often bundledwith TV
packages. Download speeds are generally high, Company or Server
but upload speeds can be slower. Less reliable Organization
than fiber and susceptible to network Firewallntemet
congestion. PC1 PC2 PC3
INTRANET
DSL (Digital Subscriber Line): Utilizes existing
phone lines, making it readily available even in
rural areas. Affordable and offers decent Intranets play a crucial role in
download speeds, but upload speeds are providing a centralized platformorganizations
for seamless
by
significantly slower than cable or fiber. Not ideal Internal communication. collaboration,
for intensive online activities. knowledge sharing. thereby significantly and
enhancing productivity, streamlining
and tostering a culture of operations
innovation ano

66
officiency. Here are the reasons that increase its center
" It can be utilized as a correspondence
data at
point where employees can store
importance:

download files
whatever point they need and
Improves internal communication in just a few seconds.
Connects employees across locations and
. It connects employees.
time zones
are
" The documents stored on the intranet
Boosts recognition and reward much more secure.

Simplifies employee onboarding Disadvantages of Intranet


Provides organizationalclarity The expense of actualízing intranets is
normally high.
Encourages knowledge sharing
The staff of the company or organízation
Features of Intranet
require special training to know how to use
" Document management: The ability to store, the system.
organize, and share documents. Data overloading.
Collaboration tools: The ability to collaborate Although the intranet provides good security,
on projects and tasks. it still lacks in some places.
" News and announcements: The ability to 9. What is email?
share news and announcements with

employees. Electronic mail, commonly shortened to "email,


is a communication method that uses electronic
Employee directory: The ability to find devices to deliver messages across computer
contact information for employees.
networks. "Email" refers to both the delivery
" Training and development: The ability to system and individual messages that are sent
provide training and development resources and received.

to employees. What are the parts of an email?


The ability to access
" HR resources:

HR-related information, such as benefits and SMTP envelope


policies.
The SMTP "envelope" is the data communicated
ability to submit between servers during the email delivery
" Support services: The
It consists of the sender's email
support tickets and get help from IT.
process.
address and the recipient's email address. This
Advantages of Intranet envelope data tells the mail server where to send
the message, just as a mail carrier references
conveying data the address on an envelope to deliver a letter to
" In the intranet, the cost of
utilizing the intranet is very low. the correct location. During the email delivery
process, this envelope is discarded and replaced
can easily get
Using an intranet employees every time the email is transferred to a different
dataanytime and anywhere. server.

use.
It is easy to learn and

67
Header Body
Like the SMTP envelope. email contains
The body of an any
and recipient. Most of the
the
provides critical information aboutemail header
the sender the sender wishes to send:
file
innformatiN
text, images,
time,
matches the information provided inthe header
videos, and/or other attachments, providen
that they do not exceed the email
envelope, but this may not always the SMTP
be the case. restrictions.
client's size
For instance, a scammer Senders address(From
may disquise the From: senderdDabcmail.com

SOurce of a message by using a


address in the header of an email. legitimate emall (To: recelver@xyzmail.com Recelver's address (Toi

recipient only sees the header andBecause the


Date: 6 Decem1ber 2016 Date

email - not the envelope body of an Subiect: About the format of email writing
subject of email
data - they may not IA blank lIne)
know the message is Dear/Respected Friend/Sir,
malicious. Salutaton

The header may also Body of the email must contains complete
contain
fields that allow the recipient to several optional sentences. Ecah topic should be told or
asked in new paragraph. Use 'Please let me
reply to, forward, know when needa reply and 'Kindly or
Body
categorize, archive, or delete the email. 'Please' for asking help.
header fields include the Other
following: Regards, Complimentary Close
The Date' field Senders name Name of the sender ate the end
contains the date the email is of the email

sent. This is a mandatory


header field.
The From field contains Howdoes email work?
the email address of
the sender. If the email
address is Email messages are sent from
with adisplay name, that may be associated software
field as well. This is also a shown in this programs and .web
browsers,
mandatory header referred to as email collectively
field. 'clients! Individual
messages are routed through multiple
The To' field contains the before they reach the servers
email address of the recipient's email server,
recipient. If the email address is similar to the waya traditional letter
a display name, that may be
associated with
shown in this
through several post offices before it might travel
as well. field recipient's mailbox. reaches its

The Subject' field contains Once an email message has


any been sent, it folows
information about the message thecontextual several steps to its final
destination:
wants to include. It is displayed sender
as a separate Ihe
line above the body of an email. sender's mail server., also called a
Transfer Agent (MTA), initiates Mal
The Cc' (carbon copy) field allows the Transfer Protocol (SMTP) a Simple Mall
send acopy of the email to additional
sender to connection.
recipients. The SMTP
The recipients marked in the "To' field
can
checks
text that tells the email envelope data -the
the email address(es) listed in the Cc' field. see the
message for the server where to send a
The 'Bcc (blind carbon copy) field allows then uses the recipient's email address,
the Domain
translate the domain name Name System (DNS)
sender to send a copy of the email to additional
into an IP address.
recipients. The recipients marked in the To' field The SMTP
cannot see the email address(es) listed in the looks
'Bcc field. server associated for a mail exchange (MX)
name. lf one with the recipient's domain
exists, the
recipient's mail server. email iis forwardedItothe

68
The email is stored on the recipient's mail server translate a domain name into its
IP address
and may be accessed via the Post Ofice server.
before delivering the message to the next
Protocol (POP)* or Internet Message Access
Protocol (MAP). These two protocols function 11. Audio conference
slightly differently: POP downloads the email to Teleconference,
the recipient's device and deletes it from the Audio conference also called
phone call
mail server, while IMAP stores the email within means meeting a group or party via a
the email client, allowing the recipient to access instead of meeting them physically. The person
called the
it from any connected device who starts the audio conference is
attending
calling party and the people who are
What is an email client? the calls are known as participants. So, in the
audio conference at the same time, one can talk
An email client is a software program or web to many people. Technology requirement of the
application* that enables users to send, receive, audio conference:
and store emails. Popular email clients include
" Phone/Computer with access to iternet
Outlook, Gmail, and Apple Mail.
Connection
What is an email address?
Speakers
An email address is a unique string of
" Microphone
characters that identifies an email account, or
'mailbox where messages can be sent and Benefits of Audio Conference
received. Email addresses are formatted in three
conference to video
distinct parts: a local part, an "@" symbol, and a It we compare audio
domain. conference then it is less expensive, easy to set
But, yes
address
up, and very much accessible by all.
For example, in the email conference as it lacks
can not compare to video
employee@example.com, "employee" denotes
the richness of video conference. In a video
the
the local part, and "example.com" denotes conference, one can see each other as
well as
listen to one another, and this
reduces
domain.
miscommunication, but the audio conference is
Local part not the case.
the final location
The local part tells the server The audio conference has also saved
a lot of
may include a
of an email message. It time and expense as noW people do not
have to
letters, numbers, and certain
combination of
underscores). The travel to meet and discuss anything rather they
(like Also, at the
punctuation marks can host the audio conference call.
characters for an email people
maximum number of same time, youcan interact with as many
local part and
address (including both the as you can.
recommended length
domain) is 320, though the
characters. Demerits of Audio Conference
is capped at 254

10. Domain Apart from the advantages, there are some


limitations like the first one is that
a domain name, like communication is only verbal. Studies show that
The domain may be 192.0.2.0. In non-verbal
address, like effective communication is
example.com, or an IP
protocol uses DNS to communication. Also, the audio conference call
theformer case. the SMTP
cannot keep you focused in the meeting, as

69
There are some minor factors too that can also
people cannot see images of each other so
many times people who don't pay attention to affectthe quality of video conferencing like s
the speaker and do his/her work like of the microphone. In video
cooking or placement
any either chores. The third demerit is the
poor
conferencing the audio plays an important role,
quality of the audio call, since the without any audio one cannot decode th
communication is telephonic then there are message of others. Thus, the placenment and
many times poor network reduces the quality of quality of the microphone also matter. At the
audio which affects the communication. Also, same time, in the placement of a meeting, one
the background noise affects the quality of the should sit inthe light before attending the video
voice. conference as in darkness your face will not be
visible to others. Also, during the presentation,
12. Video Conference the size of fonts and images matters a lot. If the
Video conference enables the user to
font size of the presentation is too small or
connect images are blurred then no one can read vour
from different locations by both video and
audio presentation or understand your images.
transmnission at the same time,
using
telecommunication technology. Or we can say The usefulness of Videoconferencing
that it is atype of online meeting where people
meet Iive on an audio-visual call.
Video Distance Learning: Even before the coviD
conference is also called video teleconference. It situation, many people are using video
is more effective and efficient than audio conferencing in the education field. This enables
Conference calls, as we can see the facial setting up a classroom-type environment where
expressions of the people which helps us to teachers and students can both interact with
connect them more easily rather than voice calls each other. However, there are some limitations,
where only we can hear a voice. Technology and one is the lack of human touch.
requirements fora video conference:
Business meetings: Again this is very popular,
Computer with accesS to an internet people meet and do their work together over a
Connection distance.
" Browser
Telecommuting/Home Office: No one has ever
Speakers thought that people could work from home and
the only thing that made it possible
Microphone(for both audio and video advancement of Information technology iswhich
the
conference) includes video conference.
Web camera (for only video conference)
Legal environment: The Use of video
" Factors affecting Video Quality conferencing has becomne a more
If we talk about the factors which can affect
practice in the courtroom. It helps frequent
video quality is firstly the speed of the internet. witnesses to appear in court without to testity
traveling to the courtroom. physically
Poor internet connection or slow connection
acts as abarrier because people aren't able to Telemedicine: There are
see each other, sometimes their video or audio needs medical advice butmany times a patient
gets paused. Although with the advancement of visit a doctor physically, he/she is not able to
new technology, motion pictures can work in then video conferenclng
comes into the picture, and
slower internet connection, again people have to can take medical staying at home one
compromise with the video quality. specialist.
advice from the doctor or

You might also like