We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Various ways of communication on the internet

essay
The whole doc is available only for registered users

A limited time offer! Get a custom sample essay written according to your requirements urgent 3h delivery guaranteed

Order Now

What are the various ways of communication on the internet?Introduction Internet is a connecting between two computers or more anywhere in the world via dedicated routers and server. The Internet provides various ways of communication depending on the users’ needs and requirements. When two computers or more are connected with the Internet, they can send and receive all kinds of information such as text, graphics, voice, video, and computer programs, this is what we called internet communication. Types of Internet communication

Blog
Personal websites that many individuals created are including blogs or web logs. Blog postings are time stamped and usually arranged with the newest item first. The reader can put their comments on every post if the owner allowed it by putting comment box on their blogs or web logs. Some blogs are like online diaries with personal information; others focus on information about a hobby or theme such as knitting, electronic devices, good book, etc. Most online blogs are written by individual bloggers there are also group blogs with multiple contributors. Nowadays, some businesses and newspapers also have started blogging as a quick publishing method. Two most popular online blogs are WordPress and Blogger. Wiki

A Wiki is a website specially designed to allow visitors to use their browser to add, edit, or delete the site content. “Wiki” itself come from the Hawaiian word for fast, which describes the simplicity of editing and publishing through wiki software. The most famous site for this perhaps is WIKIPEDIA, an online encyclopedia that is written and edited by anyone who wants to contribute, that has millions of entries in over 20 languages. E-Mail

Email or electronic mail is the transmission of electronic message over the internet. For daily use, we prefer to use webmail because it is frees from installing and maintaining and e-mail client on every computer or devices to access e-mail. In the figure below we can see three basic elements of typical e-mail; they are header, massage and signature.

Figure1: three basic elements of an E-mail
Sources: internet
Advantages of using e-mail are: First, easy to use. You can organize your daily correspondence, send and receive electronic messages and save them on computers. Second, Emails are fast. They are delivered at once around the world. Next, Emails do not use paper. They are environment friendly and save a lot of trees from being cut down and you can send picture, text , or any other attachment using e-mail. Social media

Social media is the way people communicate nowadays .Which they create their own. They use social media to exchange information and depending on the networks and technologies that allows people to share general content like sharing texts, photos, videos, audios and other contents. Social media is not use only by regular internet user, but for business as well. There are some kind of social media such as twitter, Facebook, YouTube, MySpace and other communication platforms such as whatsapp, Skype, and yahoo messenger. Facebook is an online social networking based in Menlo Park, California. Facebook was found by Mark Zuckerberg and his friends from Harvard University on February 4, 2004. It was designed only for the memberships of Harvard’s student but later it expanded worldwide. Facebook allows people above thirteenth to join their site. It required a registration and user have to create a personal profile, add some other user as a friend, messaging, post pictures or a status, and even receive notifications from other users. The benefits of Facebook are the user may get a lot of new friends and people will know more about overseas countries. Summary

Communication is the most popular use of the Internet with email topping the list of all the technologies used. Some of the types of communication technologies used also include email discussion groups, Usenet news, chat groups and etc. These are unique to networked computer environments and have come into wide popularity because of the Internet. Other technologies, including video and audio conferencing and Internet telephony, are also available on the Internet. Most of the technologies that are unique to the Internet require communication to be done in text letters with some symbols and punctuation. Communicating effectively involves taking the time, except in informal communications, to use correct grammar, spelling, and punctuation and writing an appropriate message. B) What are the steps you should take to improve the security of wireless networkIntroduction Today’s organizations increasingly rely on the mobility and lower cost of wireless networking. Schools K-12 and small to medium-sized businesses are investing in Wi-Fi to leverage benefits including more flexible network connectivity, improved productivity, and reduced capital expense.

As wireless local area networks (WLANs) become an operational standard, technologies are becoming more secure, faster, and easier to deploy and manage. Properly deployed, wireless networks can provide security that matches or exceeds that of the wired network. With advanced technology based on multiple layers of protection, governments and businesses are trusting confidential and business critical applications to run over WLAN 1. Using the Anti-virus softwareThe most Anti-virus, anti-virus, or AV software is computer software used to prevent, detect and remove malicious computer viruses. Most software described as antivirus also works against other types of malware.( Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of executable code, scripts, active content, and other software. The Hacker can use the malware to enter your internet zone and get your information) So using the Anti-virus software is very important for the user of Wireless internet.

It can keep the malware away and keep security of using the wireless network. It can check and delete the malware in which your networking equipment such as lap-top or hand-phone. 2. FirewallThe meaning of firewall is a combination of software and hardware equipment made between the internal network and external network, the interface between the private network and the public network structure of the protective barrier. Was a way to get the image of the security argument, it is a combination of computer hardware and software, so that between the Internet and intranet establish a security gateway (Security Gateway), to protect the internal network from unauthorized users intrusion, firewall access rules mainly by the services, verification tools, packet filtering and application gateways four parts, a firewall is located between the computer and the network it is connected to software or hardware. The inflow and outflow of all computer network communications and data packets have to go through the firewall. In the network, the meaning “firewall” refers to an internal network and the public access network separate ways, it is actually an isolation technology.

A firewall is a visit to the implementation of the two network communication control scale, it allows you to “agree” and data into your network while you “do not agree” and shut out the data, the maximum prevent network hackers to access your network. In other words, if you do not pass through the firewall, inside the company who cannot access the Internet, people cannot be on the Internet and communicate with people inside the company. 3. Be careful to using the wireless network yourselvesThe first to points is using the software tools to keep the security. By the way, you also should be careful with yourselves. Try to never enter in the dangerous website and never connect with unknown Wi-Fi, When you using the public Wi-Fi, you should try to avoid to enter your network account.

If you have to enter it, you should cancel the key of remember the account password. These are the ways that keep security of wireless network by themselves. 4. Don’t broadcast your SSIDMost WLAN access points and routers automatically (and continually) broadcast the network’s name, or SSID (Service Set IDentifier). This makes setting up wireless clients extremely convenient since you can locate a WLAN without having to know what it’s called, but it will also make your WLAN visible to any wireless systems within range of it. Turning off SSID broadcast for your network makes it invisible to your neighbors and passers-by (though it will still be detectible by WLAN “sniffers”). 5. Shut Down The Network When It’s Not Being Used

A bit of advice is even more dependent on specific circumstances than most of them. If you have the sort of network that does not need to be running twenty-four hours a day, seven days a week, you can reduce the availability of it to security crackers by turning it off when it isn’t use. Shutting down your network will most certainly prevent outside hackers from breaking in. ConclusionMobile devices and technologies have permanently changed the way work is accomplished, allowing connectivity anywhere within the company as well as at home, in airports, hotels, and other Wi-Fi hotspots. With this freedom, new threats arise to the corporate network as wireless signals penetrate beyond walls and devices connect outside the relative safety of the company.

To maintain security, you can use anti-virus software that prevents and removes malicious computer viruses. And secondly, you can use Firewall that separates the private network and public network so that people on the Internet cannot communicate with people inside the company. Thirdly you have to be careful yourselves when you use wireless network. And then you must not broadcast your SSID . Finally, you can shut down the network when it’s not being used to prevent outside hackers from breaking in. Today’s wireless networks are helping institutions and cutting business costs, increase productivity and create new efficiencies in times of budget cuts. As they follow secure administrative practices, organizations small and large benefit from safe, reliable network connectivity. The right tools will assist in configuration changes and firmware updates to reduce user error and other threats.

References

BIBLIOGRAPHY

Educause Learning, 2011. 7 Things You Should Know About Wikis. [Online] Available at: http://net.educause.edu/ir/library/pdf/ELI7004.pdf[Accessed 5 August 2014]. English Online, 2013. Emails – Advantages and Disadvantages of Electronic Mail. [Online] Available at: http://www.english-online.at/media/emails/advantages-disadvantages-of-electronic-mail.htm[Accessed 5 August 2014]. Netgear, 2012. 5 Steps to Secure the Wireless Netwrok. [Online] Available at: http://www.netoutcomes.com/wp-content/uploads/2014/01/NETGEAR_Secure-Wireless-Network.pdf[Accessed 2 August 2014]. Springer, 2014. Social Websites: Practices and Tools for Emerging Markets. [Online] Available at: http://www.springer.com/cda/content/document/cda_downloaddocument/9783319024899-c1.pdf?SGWID=0-0-45-1422502-p175484889[Accessed 5 8 2014]. Steiner, J. K. a. K., 2012. Ten Ways to Improve the Security. [Online] Available at: https://www.us-cert.gov/sites/default/files/publications/TenWaystoImproveNewComputerSecurity.pdf[Accessed 30 July 2014].

Related Topics

We can write a custom essay

According to Your Specific Requirements

Order an essay
icon
300+
Materials Daily
icon
100,000+ Subjects
2000+ Topics
icon
Free Plagiarism
Checker
icon
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access
immediately?

Your Answer Is Very Helpful For Us
Thank You A Lot!

logo

Emma Taylor

online

Hi there!
Would you like to get such a paper?
How about getting a customized one?

Can't find What you were Looking for?

Get access to our huge, continuously updated knowledge base

The next update will be in:
14 : 59 : 59