0% found this document useful (0 votes)
64 views

ch3 Common Network Applications PDF

The document discusses common network applications including web browsing, search engines, and email. It describes how web browsers connect to servers using URLs and HTTP to access websites and web pages. It also provides details on how search engines work by crawling the web, indexing content, and providing search results. The document concludes by explaining the basics of how email works for transmitting messages and files over the internet.

Uploaded by

Gibson Nsofu
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views

ch3 Common Network Applications PDF

The document discusses common network applications including web browsing, search engines, and email. It describes how web browsers connect to servers using URLs and HTTP to access websites and web pages. It also provides details on how search engines work by crawling the web, indexing content, and providing search results. The document concludes by explaining the basics of how email works for transmitting messages and files over the internet.

Uploaded by

Gibson Nsofu
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

3.

0 COMMON NETWORK APPLICATIONS


In the previous chapter, we explained and demonstrated how to design a basic computer network. In this chapter we ask
ourselves “now that the network is setup, then what?” The answer to this question leads us to discuss the common
network applications. We discussed earlier in chapter 1 that there is a vast application or use of the internet or network
facility. However in this course we will only discuss the main applications namely; Web Browsing, Search Engines and
Emails.

3.1 WEBSITES AND WEB BROWSING


Many times, the terms “Internet” and “World Wide Web,” or even just “the web,” are used interchangeably. But really,
they are not the same thing at all! The Internet is an interconnected network of networks. Many services run across the
Internet: electronic mail, voice and video, file transfers, and, yes, the World Wide Web. The World Wide Web is simply one
piece of the Internet made up of web servers that have HTML pages that are being viewed on devices with web browsers.
Website make it possible for us to Decide what to wear using online current weather conditions, Find the least congested
route to your destination, displaying weather and traffic video from webcams, Check your bank balance and pay bills
electronically among several other applications including search engines.

URLs
Uniform Resource Locator- URLs are the names most people associate with web addresses. When a web address (or URL) is
typed into a web browser, the web browser establishes a connection to the web service running on the server using the
HTTP protocol. The URL http://www.cisco.com/index.html is an example of a URL that refers to a specific resource - a web
page named index.html on a server identified as cisco.com

Web browsers are the client applications our computers use to connect to the World Wide Web and access resources
stored on a web server. As with most server processes, the web server runs as a background service and makes different
types of files available. In order to access the content, web clients make connections to the server and request the desired
resources. The server replies with the resources and, upon receipt, the browser interprets the data and presents it to the
user.

Browsers can interpret and present many data types, such as plain text or Hypertext Markup Language (HTML, the
language in which web pages are constructed). Other types of data, however, may require another service or program,
typically referred to as plug-ins or add-ons. To help the browser determine what type of file it is receiving, the server
specifies what kind of data the file contains. Some common Web browsers in use today include Google Chrome, Internet
Explorer and Mozilla Firefox listed below.

To better understand how the web browser and web client interact, we can examine how a web page is opened in a
browser. For this example, we will use the URL: http://www.cisco.com/web-server.htm.

First, the browser interprets the three parts of the URL:


1. http (the protocol or scheme)
2. www.cisco.com (the server name)
3. web-server.htm (the specific file name requested).

©Pc-doc [email protected]
The browser then checks with a name server to convert www.cisco.com into a numeric address, which it uses to connect to
the server. Using the HTTP protocol requirements, the browser sends a GET request to the server and asks for the file web-
server.htm. The server in turn sends the HTML code for this web page to the browser. Finally, the browser deciphers the
HTML code and formats the page for the browser window.
The URL http://www.cisco.com/index.html is an example of a URL that refers to a specific resource - a web page named
index.html on a server identified as cisco.com (click the tabs in the figure to see the steps used by HTTP).

©Pc-doc [email protected]
Web Site:
When a web address (or URL) is typed into a web browser, the web browser establishes a connection to the web service
running on the server using the HTTP protocol. The Hypertext Transfer Protocol (HTTP), one of the protocols in the TCP/IP
suite, was originally developed to publish and retrieve HTML pages and is now used for distributed, collaborative
information systems. HTTP is used across the World Wide Web for data transfer and is one of the most used application
protocols.

HTTP specifies a request/response protocol. When a client, typically a web browser, sends a request message to a server,
the HTTP protocol defines the message types the client uses to request the web page and also the message types the server
uses to respond. The three common message types are GET, POST, and PUT.

GET is a client request for data. A web browser sends the GET message to request pages from a web server. As shown in
the figure, once the server receives the GET request, it responds with a status line, such as HTTP/1.1 200 OK, and a message
of its own, the body of which may be the requested file, an error message, or some other information.

POST and PUT are used to send messages that upload data to the web server. For example, when the user enters data into
a form embedded in a web page, POST includes the data in the message sent to the server.

PUT uploads resources or content to the web server.

Although it is remarkably flexible, HTTP is not a secure protocol. The POST messages upload information to the server in
plain text that can be intercepted and read. Similarly, the server responses, typically HTML pages, are also unencrypted.

For secure communication across the Internet, the HTTP Secure (HTTPS) protocol is used for accessing or posting web
server information. HTTPS can use authentication and encryption to secure data as it travels between the client and server.
HTTPS specifies additional rules for passing data between the Application layer and the Transport Layer.

Web browsers are the client applications our computers use to connect to the World Wide Web and access resources
stored on a web server. As with most server processes, the web server runs as a background service and makes different
types of files available.
Browsers can interpret and present many data types, such as plain text or Hypertext Markup Language (HTML, the
language in which web pages are constructed). Other types of data, however, may require another service or program,
typically referred to as plug-ins or add-ons. To help the browser determine what type of file it is receiving, the server
specifies what kind of data the file contains. Common Web Browser Examples are Internet Explorer. Mozilla Firefox,
Google Chrome and Opere mini among several others displayed in the figure below.
©Pc-doc [email protected]
3.2 SEARCH ENGINES
A web search engine is a software system that is designed to search for information on the World Wide Web. The search
results are generally presented in a line of results often referred to as search engine results pages (SERPs). The information
may be a mix of web pages, images, and other types of files. Some search engines also mine data available in databases or
open directories.
Unlike web directories, which are maintained only by human editors, search engines also maintain real-time information by
running an algorithm on a web crawler. Internet content that is not capable of being searched by a web search engine is
generally described as the deep web

Processes in search engines


Web crawling: a "spider" checks for the standard filename robots.txt, addressed to it, before sending certain information
back to be indexed depending on many factors, such as the titles, page content, JavaScript, Cascading Style Sheets (CSS),
headings
Indexing: associating words and other definable tokens found on web pages to their domain names and HTML-based fields.
The index helps find information relating to the query as quickly as possible
Searching: mixing all processes to display results.

Web search engines are commercial ventures supported by advertising revenue. Search engines examples include the
famouse google search, yahoo search and and Bing among several others listed in the table below.

©Pc-doc [email protected]
3.3 ELECTRONIC MAIL (E-MAIL)

Electronic Mail (E-Mail) is a method of transmitting data, text files, digital photos, or audio and video files from one
computer to another over an intranet or the Internet. E-mail enables computer users to send messages and data quickly
through a local area network or beyond through the Internet. E-mail came into widespread use in the 1990s and has
become a major development in business and personal communications. Electronic mail is a form of groupware. It lets
users communicate with one another, coordinate activities, and easily share information. Electronic mail is the foundation
and data transport system of many groupware applications. Groupware is software that groups of people use together over
computer networks and the Internet. It is based on the assumption that computer networks can help people increase their
productivity by collaborating and sharing information. As soon as electronic mail was invented, it began driving demand for
the Internet. This wasn’t what the developers had in mind, but it turned out that people connecting to people was the killer
app for the Internet. It is now possible to Receive and send e-mail, or make an Internet phone call, at an Internet cafe over
lunch.

Format Of An E-Mail Address

 The Source And Destination Of The Message: Different addressing conventions are used depending upon the e-mail
destination. An interoffice message distributed over an intranet, or internal computer network, may have a simple
scheme, such as the employee’s name, for
 The e-mail address: Has the first part of the address containing the user’s name, followed by the symbol @, the
domain name, the institution’s or organization’s name, and finally the country name.
A typical e-mail address might be [email protected]. In this example john is the user’s name; abc is the domain name—
the specific company, organization, or institution that the e-mail message is sent to or from; and the suffix com
indicates the type of organization that abc belongs to—com for commercial, org for organization, edu for educational,
mil for military, and gov for governmental. An e-mail message that originates outside the United States or is sent
from the United States to other countries has a supplementary suffix that indicates the country of origin or
destination. Examples include UK for the United Kingdom, Fr for France, and au for Australia.
 Headers And Footers: display technical information called headers and footers above and below the main message
body. In part, headers and footers record the sender’s and recipient’s names and e-mail addresses, the times and
dates of message transmission and receipt, and the subject of the message.
 Plain Text Box: Contains the body of regular e-mail messages.
 Files Attached Section: most e-mail programs allow the user to send separate files attached to e-mail transmissions.
This enables the user to append large text- or graphics-based files, including audio and video files and digital
photographs, to e-mail messages.
 Send And Reply-To Features In E-Mail (Outlook)
When you receive a message, there are several actions you can take on that message.
 To reply to only the sender, select Reply.
 To reply to the original sender and all other recipients on the To and Cc lines, select Reply All.
 To send the message to someone not on the To or Cc lines, select Forward.
1. From a message you've received, select Reply, Reply All, or Forward. These buttons can be found in several
different places depending on your screen resolution and version of Outlook. You can find them at the top of your
Reading Pane, alongside the right edge of the message, or on the main Outlook ribbon.

Attachments aren't included because you'd be sending the exact same attachment back to the person who sent it
to you. There is no way to change this behavior. Once you click Reply or Reply All, you can attach a new version of
the original file or any other file you'd like to include. If you need to send a message with its attachments to other
individuals, use the Forward option.

©Pc-doc [email protected]
How E - Mail Works
E-mail users create and send messages from individual computers using commercial e-mail programs or mail-user agents
(MUAs). Most of these programs have a text editor for composing messages. The user sends a message to one or more
recipients by specifying destination addresses. When a user sends an e-mail message to several recipients at once, it is
sometimes called broadcasting.
E-mail data travels from the sender’s computer to a network tool called a message transfer agent (MTA) that, depending
on the address, either delivers the message within that network of computers or sends it to another MTA for distribution
over the Internet (see Network). The data file is eventually delivered to the private mailbox of the recipient, who
retrieves and reads it using an e-mail program or MUA. The recipient may delete the message, store it, reply to it, or
forward it to others.

E-mail, the most popular network service, has revolutionized how people communicate through its simplicity and
speed. Yet to run on a computer or other end device, e-mail requires several applications and services. Two example
Application layer protocols are Post Office Protocol (POP) and Simple Mail Transfer Protocol (SMTP), shown in the
figure. As with HTTP, these protocols define client/server processes.When people compose e-mail messages, they
typically use an application called a Mail User Agent (MUA), or e-mail client. The MUA allows messages to be sent and
places received messages into the client's mailbox, both of which are distinct processes. In order to receive e-mail
messages from an e-mail server, the e-mail client can use POP. Sending e-mail from either a client or a server uses
message formats and command strings defined by the SMTP protocol. Usually an e-mail client provides the
functionality of both protocols within one application.

The e-mail server operates two separate processes: Mail Transfer Agent (MTA) and Mail Delivery Agent (MDA)
The Mail Transfer Agent (MTA) process is used to forward e-mail. As shown in the figure, the MTA receives messages from
the MUA or from another MTA on another e-mail server. Based on the message header, it determines how a message has
to be forwarded to reach its destination. If the mail is addressed to a user whose mailbox is on the local server, the mail is
passed to the MDA. If the mail is for a user not on the local server, the MTA routes the e-mail to the MTA on the
appropriate server.

©Pc-doc [email protected]
In the figure, we see that the Mail Delivery Agent (MDA) accepts a piece of e-mail from a Mail Transfer Agent (MTA) and
performs the actual delivery. The MDA receives all the inbound mail from the MTA and places it into the appropriate users'
mailboxes. The MDA can also resolve final delivery issues, such as virus scanning, spam filtering, and return-receipt
handling. Most e-mail communications use the MUA, MTA, and MDA applications. However, there are other alternatives
for e-mail delivery.

A client may be connected to a corporate e-mail system, such as IBM's Lotus Notes, Novell's Groupwise, or Microsoft's
Exchange. These systems often have their own internal e-mail format, and their clients typically communicate with the e-
mail server using a proprietary protocol. The server sends or receives e-mail via the Internet through the product's Internet
mail gateway, which performs any necessary reformatting. As another alternative, computers that do not have an MUA can
still connect to a mail service on a web browser in order to retrieve and send messages in this manner. Some computers
may run their own MTA and manage inter-domain e-mail themselves. If, for example, two people who work for the same
company exchange e-mail with each other using a proprietary protocol, their messages may stay completely within the
company's corporate e-mail system.

As mentioned earlier, e-mail can use the protocols, POP and SMTP (see the figure for an explanation of how they each
work). POP and POP3 (Post Office Protocol, version 3) are inbound mail delivery protocols and are typical client/server
protocols. They deliver e-mail from the e-mail server to the client (MUA). The MDA listens for when a client connects to a
server. Once a connection is established, the server can deliver the e-mail to the client.

The Simple Mail Transfer Protocol (SMTP), on the other hand, governs the transfer of outbound e-mail from the sending
client to the e-mail server (MDA), as well as the transport of e-mail between e-mail servers (MTA). SMTP enables e-mail to
be transported across data networks between different types of server and client software and makes e-mail exchange
over the Internet possible. The SMTP protocol message format uses a rigid set of commands and replies. These commands
support the procedures used in SMTP, such as session initiation, mail transaction, forwarding mail, verifying mailbox
names, expanding mailing lists, and the opening and closing exchanges. Some of the commands specified in the SMTP
protocol are:
HELO - identifies the SMTP client process to the SMTP server process
EHLO - Is a newer version of HELO, which includes services extensions
MAIL FROM - Identifies the sender
RCPT TO - Identifies the recipient
DATA - Identifies the body of the message

©Pc-doc [email protected]
How To Create An E-Mail Account (Gmail account)
There are several mail service provider such as yahoo mail, Microsoft outlook and Gmail. Though their appearances might
be slightly different, the major features and steps to creating an account are similar and we have picked the steps involved
in the creation of a Gmail account for reference.

Gmail is a web-based email account provider owned by Google. In this guide, we’re going to show you how to get started
with email by creating an account in Gmail.
You’ll need a computer with internet access and a web browser installed on your computer for this process.
Follow these step-by-step instructions to create a Gmail account
Step 1: Go to Google
Open up your internet browser and go to the Google home page: http://www.google.co.uk and then click on Gmail at the
top right corner of the page

Step 2: Create an account


You’ll now be in the ‘Sign in’ section. As you don’t have a Google account yet, you need to create one. Click Create an
account.

Step 4: Set-up
To set up your new account, Google needs some information about you – first, your first and last names. The ‘choose your
username’ is the unique email address that you wish to use, which will be placed before ‘@gmail.com’. Because it needs to
be unique, Google may have to check the availability of any name that you decide on to make sure that no one already has
it. Type an email name into the ‘choose your username’ box and then fill out the rest of your information.

©Pc-doc [email protected]
If the email name that you requested in is not available, you’ll get a message saying that somebody already has that
username and offering you some alternatives. You can decide to accept one of the alternatives or type in another name
and check its availability once more. You will have to complete some of the other boxes again. You may have to do this a
few times. Once you finalise your email address, it’s a good idea to make a note of it so that you can refer to it until you
remember it.
You’ll need to come up with a password so that you can log in securely to your account. Google may explain that you
should try one with at least 8 characters long to be secure. Use letters and numbers to make the password more secure and
difficult to guess. You can add an existing email address to keep your new email secure aswell.
Step 5: verification
To get to the next steps you will need to Accept Google's privacy and terms first, once you have read it click on I Agree.

©Pc-doc [email protected]
Google will now ask you to verify your account via text or voice call, select the option that you want and click on Continue.
If you chose the text message option you will see a new window where you will have to enter the code that Google has sent
to your mobile number. Select Continue and congratulations you have created your Gmail account.
Step 6: Google mail dashboard
You will be automatically redirected to Gmail's dashboard and once you have read all of the information your Gmail is
now ready to use. On the left hand side you will be able to see your inbox, sent mail and trash, you will also be able to
compose emails from this list too.

Step 7: Creating a profile picture


You will now have set up your account. You can go straight to your inbox and get started, or you can set up a photo to show
as your profile picture. To set up your profile picture click
on the profile icon on the top right hand corner of the page and click Change.
Then, you can upload a photo saved to your computer. Once you are happy with the picture you have chosen then select
Set as profile picture. You can change this at any time by going back into your profile picture settings.

Step 8: Completing your setup


You can complete your Google mail setup by clicking the available resources on the dashboard.

Now that you have fully set up your account how about looking at some of the other Google mail guides we have available?
Click on the Next Steps guides below to see how to use Gmail

©Pc-doc [email protected]
3.4 OTHER INTERNET COMMUNICATION TOOLS/ INSTANT MESSAGING (IM)

Instant messaging (IM) is a form of real-time communication between two or more people based on typed text. The text is
conveyed via computers connected over either a private internal network or over a public network, such as the Internet.
Developed from earlier Internet Relay Chat (IRC) services, IM also incorporates features such as file transfer, voice, and
video communication. Like e-mail, IM sends a written record of the communication. However, whereas transmission of e-
mail messages is sometimes delayed, IM messages are received immediately. The form of communication that IM uses is
called real-time communication. Social Media in common use are Twitter, Facebook, Instagram and Pinterest. We will
discuss some of these below.
a. Skype

Skype (/skaɪp/) is a telecommunications application software product that specializes in providing video chat and voice calls
between computers, tablets, mobile devices, the Xbox One console, and smartwatches via the Internet and to regular
telephones. Skype additionally provides instant messaging services. Users may transmit both text and video messages, and
may exchange digital documents such as images, text, and video. Skype allows video conference calls.
Skype implements a freemium business model. Much of the service is free, but Skype Credit or a subscription is required to
call a landline or a mobile phone number. At the end of 2010, there were over 660 million worldwide users, with over 300
million estimated active each month as of August 2015 At one point in February 2012, there were 34 million users
concurrently online on Skype.
Skype allows users to communicate over the Internet by voice, using a microphone, by video using a webcam, and by
instant messaging. Skype-to-Skype calls to other users are free of charge, while calls to landline telephones and mobile
phones (over traditional telephone networks) are charged via a debit-based user account system called Skype Credit. Some
network administrators have banned Skype on corporate, government, home, and education networks, citing such reasons
as inappropriate usage of resources, excessive bandwidth usage and security concerns.
There is Skype for Windows, iOS, Android, Mac and Linux that runs on respective platforms and devices.

b. Twitter

Twitter is on online news and social networking site where people communicate in short messages called tweets. Tweeting
is sending short messages to anyone who follows you on Twitter, with the hope that your messages are useful and
interesting to someone in your audience. Another description of Twitter and tweeting might be microblogging.
Some people also use Twitter to discover interesting people and companies online and to follow their tweets for as long as
they are interesting.
In addition to its relative novelty, Twitter's big appeal is how rapid and scan-friendly it is: you can track hundreds of
interesting twitter users, and read their content with a glance. This is is ideal for our modern attention-deficit world.
Twitter employs a purposeful message size restriction to keep things scan-friendly: every microblog 'tweet' entry is limited
to 280 characters or less. This size cap promotes the focused and clever use of language, which makes tweets very easy to
scan, and also very challenging to write well. This size restriction has really made Twitter a popular social tool.

©Pc-doc [email protected]
Twitter is very simple to use as broadcaster or receiver. You join with a free account and Twitter name. Then you send
broadcasts daily, or even hourly. Go to the 'What's Happening' box, type 280 characters or less, and click 'Tweet'. You will
most likely include some kind of hyperlink.
To receive Twitter feeds, you simply find someone interesting (celebrities included), and 'follow' them to subscribe to their
tweet microblogs. Once a person becomes uninteresting to you, you simply 'unfollow' them.
You then choose to read your daily Twitter feeds through any of various Twitter readers.
Twitter is that simple.
People send tweets for all sorts of reasons: vanity, attention, shameless self-promotion of their web pages, boredom. The
great majority of tweeters do this microblogging as a recreational thing, a chance to shout out to the world and revel in
how many people choose to read your stuff.

There is a growing number of Twitter users who send out some really useful content. And that's the real value of Twitter: it
provides a stream of quick updates from friends, family, scholars, news journalists, and experts. It empowers people to
become amateur journalists of life, describing and sharing something that they found interesting about their day.
Yes, that means there is a lot of drivel on Twitter. But at the same time, there is a growing base of really useful news and
knowledge content on Twitter. You'll need to decide for yourself which content is worth following there.Yes, that is one
aspect of Twitter. Among other things, Twitter is a way to learn about the world through another person's eyes.
Tweets from people in Thailand as their cities become flooded, tweets from your soldier cousin in Afghanistan who
describes his war experiences, tweets from your traveling sister in Europe who shares her daily discoveries online, tweets
from a rugby friend at the Rugby World Cup. These micro bloggers are all mini-journalists in their own way and Twitter lets
them send you a constant stream of updates right from their laptops and smartphones.

Yes, absolutely. Thousands of people advertise their recruiting services, their consulting businesses, their retail stores by
using Twitter. And it does work.
The modern internet-savvy user is tired of a television advertisement. People today prefer advertising that is faster, less
intrusive, and can be turned on or off at will. Twitter is exactly that. If you learn how the nuances of tweeting work, you can
get good advertising results by using Twitter.
But Isn't Twitter a Social Messaging Tool?
Yes, Twitter is social media, absolutely. But it's more than just instant messaging. Twitter is about discovering interesting
people around the world. It can also be about building a following of people who are interested in you and your
work/hobbies and then providing those followers with some kind of knowledge value every day.
Whether you are a hardcore scuba diver who wants to share your Caribbean adventures with other divers, or are Ashton
Kutcher entertaining your personal fans: Twitter is a way to maintain a low-maintenance social connection with others, and
maybe influence other people in a small way.

Twitter has become one of the most used social media platforms because it is both personal and rapid. Celebrities use
Twitter to build a more personal connection with their fans. Katy Perry, Ellen DeGeneres, even President Trump are some
famous Twitter users. Their daily updates foster a sense of connectedness with their followers, which is powerful for
advertising purposes, and also quite compelling and motivating for the people following the celebs.
Yes, Twitter is a blend of instant messaging, blogging, and texting, but with brief content and a very broad audience. If you
fancy yourself a bit of a writer with something to say, then Twitter is definitely a channel worth exploring. If you don't like
to write but are curious about a celebrity, a particular hobby topic, or even a long-lost cousin, then Twitter is one way to
connect with that person or topic. Try Twitter for a couple weeks, and decide for yourself if you like it.

©Pc-doc [email protected]
c. Whatsapp Messenger
WhatsApp is free to download messenger app for smartphones. WhatsApp uses the internet to send messages, images,
audio or video. The service is very similar to text messaging services, however, because WhatsApp uses the internet to send
messages, the cost of using WhatsApp is significantly less than texting. You can also use Whatsapp on your desktop, simply
go to the Whatsapp website and download it to Mac or Windows. It is popular with teenagers because of features like
group chatting, voice messages and location sharing. UPDATE: WhatsApp has changed its terms of service, raising the
minimum age at which you can use the service from 13 to 16 years of age across Europe. Under the new E.U General Data
Protection Regulation (GDPR), Ireland has now set the Digital Age of Consent to 16 years old. This means young people
under the age of 16 in Ireland are not allowed to access this platform.

WhatsApp is now owned by Facebook, has 1 billion users worldwide and is the biggest online messenger app on the
market. Founded in 2009 by ex-Yahoo employees it started as a small startup and swelled to 250,000 users in just a few
months, growing so fast that they had to add a charge for using the service per year to slow the subscription rate down. In
2014, WhatsApp was acquired by Facebook and has seen continued growth, reaching the 1 billion mark in July 2017.
It is popular with teenagers because of features like group chatting, voice messages and location sharing.

To use WhatsApp you need a compatible smartphone or tablet with a sim card, an internet connection, and a phone
number. The app uses your phone number as its username, and your account is locked to the phone, although you can
transfer your contacts over to new devices. Whatsapp is free to use in Ireland. However, if abroad, the Whatsapp website
states:
Please be aware that:
 If your phone is roaming, additional mobile data charges may apply. Learn how to configure roaming settings for
WhatsApp on Android | iPhone | Windows Phone | Nokia S40 | BlackBerry | BlackBerry 10
 If you send SMS messages to your friends inviting them to use WhatsApp, service charges from your mobile
provider may also apply.

Users of WhatsApp can share their location in real time over messages. They can also organise lists of contacts so that they
can quickly send messages to lots of people in group chats through WhatsApp. Probably the best feature of WhatsApp is
that it allows users to keep in touch with people living abroad, without incurring the international charges associated with
text messages.Whatsapp now lets its users share their location in real time. This feature allows you to share your exact
location with a friend or loved one. This may be useful when you are meeting friends in a crowded area, or you want to let
someone know you have arrived at your destination safely.
To use it you:
1. Open the contact you would like to share your location with
2. For IoS select the + button, and for android select the paperclip on the lower left-hand side of your screen
3. Choose ‘Location’
4. When the map appears, select the ‘Share Live Location’ option
5. You will then see this message ‘Participants in this chat will see your location in real-time. This feature shares your
location for the duration even if you’re not using the app. You can stop sharing at any time’.
6. You can then decide how long you would like to share your real-time location with this person, you have the option
of 15 Minutes, 1 Hour or 8 Hours.

It is important to know that you are allowing your movements to be tracked by another person. Only use this feature with
people you know and trust. Parents should talk to their child about location sharing and advise them against it.

WhatsApp have also added the ability to delete messages that you may have sent in error. This may be helpful if you sent a
message to the wrong contact. The next update to the messaging service will look at adding a ‘Reply Privately’ function
while in a group chat.
WhatsApp users can also now hold down a message in a group chat to select and add a reply to it. It ensures that members
in a group can follow conversations more easily and respond to specific questions in a group chat or write comments on
content in the group.

©Pc-doc [email protected]
WhatsApp terms and conditions specify that users should be at least 16 years of age to use the service in Europe. By
default, WhatsApp will automatically set your Privacy Settings to allow any WhatsApp user to view your last seen, profile
photo and status.
d. Facebook Messenger

Facebook Messanger is Instant messging services that usually come as a subapp of the facebook social application. It sis
used to send messages in form of text, images and videos to friends on your facebook friendlist or your phone contacts.
This app is compatible with all of your devices.

Facebook Instantly connect with the people in your life. Messenger is free, fast, and secure according to the developper
and offers other features listed below.

- Reach anyone. You can use names or phone numbers to find friends.
- Use everywhere. Messenger works across all mobile and desktop devices. You can even connect with people
internationally!
- Connect however you want. Send a text message, share a photo, or start a video chat — all in Messenger.
- Communicate better with groups. Catch up in real time with high quality group video chat or customize your messaging
experience with colors, nicknames, and group photos.
- Call and video chat your friends 1:1 or in groups. It's free over Wi-Fi (otherwise standard data charges apply), so talk as
long as you want, even with people in other countries.
- Express yourself. Send emojis, stickers, and GIFs to conversations or add new masks and effects to your video chats.
- Capture photos and videos with fun art and effects. You can save these to camera roll, send to conversations, or post to
your Day, a place where people can see what you're up to.
- Play games and compete with your friends. You can compare scores and see how you rank against other people.
- Chat with businesses. You can make reservations, check on orders, and get real-time customer service.

©Pc-doc [email protected]
3.5 BENEFITS AND RISKS OF SOCIAL NETWORKS

Social networking has changed the way we communicate, do business, get our daily news fix and so much more. But is it
really all it's cracked up to be? That depends on who you talk to and how you're using it. A site like Facebook could serve as
an opportunistic launching pad for a new business owner, or it could be an inescapable source of negative peer pressure for
a young teen. There are pros and cons to everything in life – and that includes our social networking habits.
Here are some of the major pros and cons that most people are familiar with. As you go through them, ask yourself how
you can take more advantage of the pros while minimizing the cons whenever you decide to check out your favorite social
networks.

The positives
Social networking has lots of good points
You can express yourself: showing off your favourite song lyrics or posting pictures of your new outfit. It is a lot harder to
feel embarrassment over the internet than in person, so people find it easier to vent their feelings on sites like Facebook.
In fact, it has become so much a part of people's lives that you can learn someone's life story just by checking their page.
Their friends, likes and dislikes, relationship status, phone number, address…everything.

Ability to connect to other people all over the world. One of the most obvious pros of using social networks is the ability
to instantly reach people from anywhere. Use Facebook to stay in touch with your old high school friends who've
relocated all over the country, get on Google Hangouts with relatives who live halfway around the world, or meet brand
new people on Twitter from cities or regions you've never even heard of before.
Easy and instant communication. Now that we're connected wherever we go, we don't have to rely on our
landlines, answering machines or snail mail to contact somebody. We can simply open up our laptops or pick up our
smartphones and immediately start communicating with anyone on platforms like Twitter or one of the many social
messaging apps available.
Real-time news and information discovery. Gone are the days of waiting around for the six o'clock news to come on TV or
for the delivery boy to bring the newspaper in the morning. If you want to know what's going on in the world, all you need
to do is jump on social media. An added bonus is that you can customize your news and information discovery experiences
by choosing to follow exactly what you want.
Great opportunities for business owners. Business owners and other types of professional organizations can connect with
current customers, sell their products and expand their reach using social media. There are actually lots of entrepreneurs
and businesses out there that thrive almost entirely on social networks and wouldn't even be able to operate without it.
General fun and enjoyment. You have to admit that social networking is just plain fun sometimes. A lot of people turn to it
when they catch a break at work or just want to relax at home. Since people are naturally social creatures, it's often quite
satisfying to see comments and likes show up on our own posts, and it's convenient to be able to see exactly what our
friends are up to without having to ask them directly.

Negatives
Not everyone in the 21st century thinks about the negative effects of having social networking accounts - but simple things
like not setting your privacy settings properly or liking someone's photo can have bad results.

©Pc-doc [email protected]
Cyberbullying: can be a problem as people can take advantage of the fact that there is no one who can effectively stop the
bullying when it happens, due to everything being performed behind a screen. The only way for a bully to be stopped is if
they are reported and victims may be too intimidated to do it.
Social networking can also ruin relationships as people may get jealous if they find out their boyfriend or girlfriend is
exchanging messages with other people.
It can also be a waste of time as people can visit a site to check on thing and end up spending the whole day 'behind the
screen' and as a result, not doing anything useful with their lives.

Information overwhelm. With so many people now on social media tweeting links and posting selfies and sharing YouTube
videos, it sure can get pretty noisy. Becoming overwhelmed by too many Facebook friends to keep up with or too many
Instagram photos to browse through isn't all that uncommon. Over time, we tend to rack up a lot of friends and followers,
and that can lead to lots of bloated news feeds with too much content we're not all that interested in.
Privacy issues. With so much sharing going on, issues over privacy will always be a big concern. Whether it's a question
of social sites owning your content after it's posted, becoming a target after sharing your geographical location online, or
even getting in trouble at work after tweeting something inappropriate – sharing too much with the public can open up all
sorts of problems that sometimes can't ever be undone.
Social peer pressure .For people struggling to fit in with their peers – especially teens and young adults – the pressure to do
certain things or act a certain way can be even worse on social media than it is at school or any other offline setting. In
some extreme cases, the overwhelming pressure to fit in with everyone posting on social media or becoming the target of a
cyberbullying attack can lead to serious stress, anxiety and even depression.
Online interaction substitution for offline interaction. Since people are now connected all the time and you can pull up a
friend's social profile with a click of your mouse or a tap of your smartphone, it's a lot easier to use online interaction as a
substitute for face-to-face interaction. Some people argue that social media actually promotes antisocial human behavior.
Distraction and procrastination. How often do you see someone look at their phone? People get distracted by all the social
apps and news and messages they receive, leading to all sorts of problems like distracted driving or the lack of gaining
someone's full attention during a conversation. Browsing social media can also feed procrastination habits and become
something people turn to in order to avoid certain tasks or responsibilities.
Sedentary lifestyle habits and sleep disruption. Lastly, since social networking is all done on some sort of computer or
mobile device, it can sometimes promote too much sitting down in one spot for too long. Likewise, staring into the artificial
light from a computer or phone screen at night can negatively affect your ability to get a proper night's sleep. (Here's how
you can reduce that blue light, by the way.)
Focus on using social media for all the good points outlined in this article, but be wary of falling victim to the dark side of an
online interaction.

©Pc-doc [email protected]

You might also like