0% found this document useful (0 votes)
91 views29 pages

Bandwidth LEC3

Bandwidth refers to the rate at which data can be transferred from a website to a computer within a specific time period. The amount of bandwidth determines the speed and efficiency of internet activities like loading web pages and downloading files. Bandwidth is generally measured in bits or bytes per second. Having more bandwidth allows for faster downloading. Internet service providers rent bandwidth to consumers at commonly available rates.

Uploaded by

mubarak idriss
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
91 views29 pages

Bandwidth LEC3

Bandwidth refers to the rate at which data can be transferred from a website to a computer within a specific time period. The amount of bandwidth determines the speed and efficiency of internet activities like loading web pages and downloading files. Bandwidth is generally measured in bits or bytes per second. Having more bandwidth allows for faster downloading. Internet service providers rent bandwidth to consumers at commonly available rates.

Uploaded by

mubarak idriss
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 29

What is bandwidth?

 Bandwidth' describes the rate at which data can be


transferred to your computer from a website or internet
service within a specific time.

 Therefore the amount of bandwidth you have (the


bandwidth 'strength') determines the efficiency and speed
of your internet activity – that is, when you open web pages,
download files and so on.

 Bandwidth is generally measured in ‘bits per second' or


sometimes ‘bytes per second'.
Why Is It Important? 
Bandwidth is used to transfer data fast so you can easily access your
page to view it.
The more bandwidth you have, the more faster you can download
more things 
Commonly Available Bandwidth
 Internet Service Provider (ISP) is a company that has very high-
speed connection to the Internet but very expensive.

 ISP makes its money by renting some of that high-speed


connection to consumers who don't want to spend a lot of money
each month for an Internet connection.  
What's an Internet Browser?
 An internet browser, also known as a web browser or simply a
browser, is a software program that you use to access the internet
and view web pages on your computer.

 You can think of your browser as your gateway to the internet. If


you want to enter online sweepstakes, for example, you must first
open the giveaways' websites in your internet browser.

 The main purpose of an internet browser is to translate, or render,


the code that websites are designed in into the text, graphics, and
other features of the web pages that we are all used to seeing today.
Modern Internet Browsers:
 Internet browsers have developed into powerful tools that let
you safely and quickly access your favorite websites.

 Modern internet browsers have many helpful features.


Tabbed browsing, for example, helps you open up many web
pages in individual tabs, instead of needing a resource-intensive
separate window for each page.

 The ability to mute sound in individual tabs is another helpful


feature that many modern browsers support.
Which Internet Browsers Are Available
Today?
Most browsers are available for free download. The six most popular
internet browsers today include:
 Mozilla Firefox (Download Firefox)
 Google Chrome (Download Chrome)
 Microsoft
Edge (formerly Internet Explorer) (
Download Microsoft Edge) 
 Apple Safari (Download Safari)
 Opera (Download Opera)
 AOL Explorer (Download AOL Explorer)
A 'web search engine
 A 'web search engine' is a software system that is designed to search for
information on the World Wide Web.

 The search results are generally presented in a line of results often referred
to as search engine results pages (SERPs).

 The information may be a mix of web pages, images, and other types of files.
 Some search engines also mine data available in databases or 
open directories.
 Unlike web directories, which are maintained only by human editors, search
engines also maintain real-time information by running an algorithm on a 
web crawler.
The Best Search Engines 
 Most people don't want three dozen search engines, especially
people who are not trained internet users. 
 Most people want a single search engine that delivers three
key features:

1. Relevant results (results you are actually interested in)


2. Uncluttered, easy to read interface
3. Helpful options to broaden or tighten a search
1. Google Search
Email - Electronic mail
 Electronic mail or e-mail makes it possible to exchange
messages through a local or worldwide communication network
such as Internet.

 Computers are generally used as terminals, but electronic


agendas, cell phones, data communication terminals or other
data exchange equipment can also be used.

 The best known and most widely used network is Internet.


Most e-mail software and services allow for the attachment of
files containing text, documents, sound, pictures, and even
computer programs.
There are two main types of e-mail.
 The first enables subscribers of a network provider to
send and receive messages with e-mail software. Messages
are processed on the sender’s terminal.

 The second type, Web mail, is accessible through


navigation software that enables a computer connected to
Internet to send and receive mail, without the services of
a network provider. If such service were offered in
Québec, only data essential to the object of the file could
be retrieved.
Typical Components of an Email System
 Most email systems include a basic text editor for composing
messages, but many allow you to edit your messages using any
editor you want.

 Some systems will also provide basic formatting, including


bold, italics, font color and HTML.

 A program can be used to send the message to a recipient by


specifying the recipient's address. the same message can be sent
to several users at once. This is called broadcasting.
 Sent messages are stored in electronic mailboxes until the
recipient fetches them. To see if you have any mail, you may
have to check your electronic mailbox periodically, although
many systems alert you when mail is received.

 After reading your mail, you can store it in a text file, forward
it to other users, or delete it. Copies of memos can be printed
out on a printer if you want a paper copy.
Email Provided by Online Services and ISPs
 All online services and Internet Service Providers (ISPs) offer
email, and most also support gateways so that you can exchange
mail with users of other systems.

 Usually, it takes only a few seconds or minutes for mail to arrive


at its destination. This is a particularly effective way to
communicate with a group because you can broadcast a message
or document to everyone in the group at once.

 Although different email systems use different formats, there are


some emerging standards that are making it possible for users on
all systems to exchange messages.
Confidentiality
 E-mail is a very convenient tool. However, it does not guarantee the
confidentiality and integrity of messages, nor does it ensure the
authenticity of their source and their author’s identity.

 Specific steps must be taken to protect the information that is


transmitted. It is fairly easy to access a message during transmission
and read or modify it.

 E-mail offers about the same degree of confidentiality as a postcard.


Messages sent through Internet do not go directly to the recipient;
they transit through a more or less large number of computers
before reaching their destination.
 This path varies from one time to another depending on many
factors, notably the state of the network and how busy it is.

 Network providers must inform customers of their policy for


the management of electronic mail and the protection of
personal information. Messages sent and received by their
subscribers go through their systems or reside in them for a
more or less long period.
Protection Measures
 Apply patches proposed by software developers; Software
developers constantly propose modifications to correct
glitches in their programs. They offer patches and updates to
improve e-mail security.

 Use up-to-date anti-virus software ; A terminal can be


contaminated by the introduction of a virus. Some of these
viruses are harmless. But others can destroy the contents of a
terminal or make possible illegal intrusions. Up-to-date anti-
virus software can detect and eliminate most viruses.
 Use encryption software :To protect a message’s confidential data,
the use of encryption software is recommended. This kind of
software encodes the contents of the message, making it illegible
and difficult to decipher. This has both a protective and deterrent
effect. Encryption software is available on the market and can be
downloaded for free on Internet.

 Manage your password; E-mail boxes are protected by a password.


This password should be frequently modified to avoid being known
by too many people who could access a user’s mailbox without
authorization. Changing your password regularly gives you better
control of your mailbox. It is also advisable not to activate the
password recording or memorizing function to better control
access to the mailbox.
Access and correction rights
 Electronic messages and files circulating in public and
private organizations are subject to provisions of the Act
respecting Access to documents held by public bodies and
the Protection of personal information and the Act
respecting the protection of personal information in the
private sector.
Access and correction rights recognized to citizens by these
two laws must be respected.
Conservation and destruction of messages
 E-mail system administrators must set time limits for the
conservation of messages.
 In public bodies, these time limits must be recorded in a
calendar approved by the National Archives.
 Private organizations would be well-advised to adopt the
same policy.
 They could thus enforce more effectively access and
correction rights citizens are entitled to.
Policy on the use of email in the enterprise
 Rules for the management and use of e-mail within a company must be clear
and known to all users.

 They should know who can access mailboxes (system administrator,


manager, auditor) and in which circumstances such access is authorized
(redirecting undelivered messages, serious suspicions of fraud).

 In the workplace, it is reasonable to expect employers to control the use of


their own communication means. However, employees are entitled to the
respect of their privacy in this process.

 Employees should be informed of the reasons for control, and the means of
control they can be subjected to. They must be clearly informed of their
rights and obligations.
Elementary Precautions
In addition to the measures already mentioned, other precautions should be taken.
 To each mailbox should be attached a password known and managed only by
the employee authorized to access it.

 In case of a common mailbox, only employees authorized to access it should


know the password.

 The organization’s computer system should require users to change their


passwords regularly, say every month, and discard those previously used. Since
network providers do not usually require users to modify their passwords,
company policy on the use of e-mail should remedy the matter.

 No personal data should be transmitted, unless encrypted. If encryption


software is used, the encryption keys should be carefully managed .

You might also like