You are on page 1of 66

INTERNET

 The Internet is a network of computer linking,


many different types of computer all over the
world. It is a network of networks sharing a
common mechanism for addressing computer,
and a common set of communication protocols
for communication between two computers on
the network.
 Internet is a world wide collection of separate
but interconnected networks that are accessed
daily by millions of people to obtain
information, disseminate information or
communicate with others.
 Combination of two words –

 Interconnection and Networks.

 It Covers the globe and includes large,


international networks as well as many smaller
LANs

1
• It offers access to data, graphics, sound,

software, text and people through a


variety of services and tools for
communication and data exchange. Like
Telnet, FTP, e-mail,
News(USENET),Hypertext (WWW).
• Consists of thousands of separately
administered networks.
• This high level of connectivity
encourages an unparalleled degree of
communication, resource sharing and
information access.

2
 The Internet carries messages,
documents, programs and data files that
contain every kind of information for
businesses, educational institutions,
government agencies and individuals.
 The Internet has made things simple. It
can be used for following:
INTERNET 1. Direct Communications
2. Online shopping
3. Distance Education (e-learning)
4. Banking
5. Knowledge Base
6. Travel
7. Bill Payments….etc.

3
 The Internet has its root in the
ARPANET system of the Advance
Research Project Agency of the U.S.
Department of Defense. ARPANET
was the first WAN and had only four
sites in 1969. The internet evolved
from basic ideas of ARPANET for
interconnecting computers and was
HISTORY AND
used by research organizations and
EVOLUTION universities initially to share and
exchange information. In 1989, the
U.S. Government lifted restrictions
on use of the Internet and allowed it
to be used for commercial purpose as
well, then the internet has grown
rapidly to become the world’s largest
network.

4
YEAR WISE
DEVELOPMENT
 1960 – US Department of Defense created a
network ARPANET (Advance Research Projects
Agency Network) to link US scientific and
academic researchers.
 The Root of the internet began with an
experimental project called ARPANET.
 The objective of ARPANET project to create a
computer network that would allow researchers
located in different places to communicate with
each other.
 In 1969, ARPANET was the first WAN and had
only four computer.
 1970 - ARPA developed a new protocol TCP/IP
for transferring data between networks.

5
 1980 - National Science Foundation
(NSF) used ARPANET to connect 5
regional supercomputers centres at major
universities so users could share their
work.
 Hundreds of college and university
YEAR WISE networks were connected to ARPANET.
DEVELOPMENT Students were granted access to
ARPANET.
 In 1989, ARPANET evolved to Internet.

 1990 - Development of WWW

 In 2001 - 60 million computers were


connected to Internet.

6
 Nobody owns the Internet.

 Internet Society (ISOC) is the closest as


owner of Internet. ISOC is an open
membership professional society with
over 175 organizations, corporations,
Government Agencies and nearly 9000
INTERNET individual member.
GOVERNANCE  There are some governing bodies
overseeing the technical aspects of
Internet.
 These bodies defines how Internet
works and how new technology is to be
implemented.

7
Internet Society (ISOC)
Critical mission is to work for Internet
development, evolution, use and benefit the
people around the world. ISOC primarily
addresses three issues:
1. Public policy : The frame policy
regarding copyright, privacy access
INTERNET and censorship.
GOVERNANCE 2. Education and Training : In order
to improve Internet infrastructure in
developing countries, ISOC delivers
education and training program.
3. Maintaining Standard : ISOC
works typically for development and
maintaining of Internet Standards.

8
 Internet Architecture Board (IAB) –
concerned oversight of the architecture of
the Internet.
 Internet Engineering Task Force
(IETF) – provides technical and other
contributions to the engineering and
evolution of Internet.
INTERNET  Internet Engineering Steering
GOVERNANCE Group(IESG) – responsible in
administrating the rules and procedure
laid down by ISOC. It is primarily
responsible for technical management of
IETF activities and processing the
Internet standards.
 Internet Network Information Center
(InterNIC) – domain name registration.

9
 Internet Research Task Force (IRTF) –

This community operates in same manner as


IETF. The only difference is that they focus
in specific issues through research groups.
IRFT primarily works on long term issue
INTERNET such as Internet applications, architecture,
GOVERNANCE protocols and technology. IAB is
responsible for framing and appointing
chairperson of IRTF.

 World Wide Web Consortium (W3C) –

develop protocols for evolution of WWW.

10
INTERNET,
INTRANET AND
EXTRANET
Intranet
 Private and secure internal information
system which uses Internet technology to
collect and disseminate information of
interest to all staff.
 An intranet is a LAN or WAN that uses
TCP/IP protocols but belong exclusively
to a corporation, school, or organization.
The intranet is accessible only to the
organization’s workers. If the intranet is
connected to the internet, then it is
secured by a firewall to prevent
unauthorized users from gaining access to
it.

11
BASIS OF COMPARISON INTERNET INTRANET EXTRANET

Intranet can be described as a Extranet can be described as a


Internet can be described as a
network of computers or a private network that uses
global system of
Description private network designed for a public network to share
interconnected computer
specific group of users information with clients
network.
(organization). (suppliers and vendors).

Internet is the largest network


in as far as the number of It is a small network with a few It is a small network with a few
Size Of The Network
connected devices is number of connected devices. number of connected devices.
concerned.

Extranet is a means of
Intranet is a means of sharing
Internet is a means of sharing conveying information
sensitive or confidential
Purpose information throughout the between members of the
information throughout the
world. organization and external
organization.
members.

12
It is not regulated by any It is regulated by a specific It is regulated by multiple
Regulation
authority. organization. organizations.

The content on the network is


Content in the network is The content in the network is accessible to members of the
Content On The Network readily accessible by everyone accessible only to members of organization and external
who is connected. the organization. members with access to the
network.

Ownership of extranet is by a
Internet has no known Ownership of intranet is by a
Ownership single or multiple
ownership. single organization.
organizations.

Extranet is also regulated by


Internet is unregulated and Intranet is regulated by the
Mechanism Of Regulation contractual agreements
uncensored. organization policies.
between organizations.

13
Internet contains different
Intranet contains only specific Extranet contains only specific
Information source of information and is
group information. group information.
available for all.

Time is required to train users Time is required to train users


Users need no training on how
User Training on how to work with the on how to work with the
to work with the network.
network. network.

Example of extranet is when


An example intranet is a
An example of internet is the companies like HP, Intel and
company like ExxonMobil
Example network you use to google Lenovo decide to use the same
using internal network for its
words with. network for related business
business operations.
operations.

An intranet may be accessible An intranet may be accessible


Users have unrestricted access from the internet, but it is from the internet, but it is
Access and can access internet protected by a password and protected by a password and
anonymously. accessible only to authorized accessible only to authorized
users. users.

Security of the network is


Security is dependent of the
Security of the network is enforced through a firewall that
Security user of the device connected to
enforced through a firewall. separates internet and extranet.
network. 14
Company
network Firewall

Web
Web
browser
browser

15
Internet Vs Intranet
 Internet  Intranet
• Public Network • Private Network
• External websites • Internal websites
• E-Commerce • Commutation & Information access
• Insecure • Secure
• TCP/IP • TCP/IP
• Limited management • Managed
• Accessible to all • Accessible to authorized users only
• Speed – Slower • Speed – Faster
• Bandwidth – More • Bandwidth – Less
• Not owned by anyone • Owned by the Company
• Used by general public • Used by employees
• Information : general • Information: specific to company

16
Extranet
 An extranet is an intranet that can
be accessed by outside users over
the Internet. To gain entrance to
the extranet’s resources, an
external user typically must log on
to the network by providing a valid
user ID and password.
 Extranets are usually accessed via
Internet, and can be used to
provide customers and business
partners with access to the data
they need.

17
THREE MYTHS
ABOUT
INTERNET

 Myths 1 : Internet is free

 Myths 2 : Someone control

the Internet

 Myths 3 : The Internet and

world wide web are Identical

18
MYTHS 1 : THE
INTERNET IS FREE

 The fact that there has traditionally been no


cost associated with online content – such as
news and product information – or email
exchange, other than what the Internet users
pay their ISPs for Internet access.
 Many People – such as students, employees
and consumers who opt for free internet
services or use free access available at public
libraries or other public locations – pay
nothing for internet access. Yet it should also
be obvious that someone, somewhere, has to
pay to keep the Internet up and running.

19
 The growing trend of subscription or per-

use fees to access resources – such as journal


or newspaper articles, music, and games –
via the Internet. Typically these fees are
relatively small, and many companies are
working on way to make the processing of
small fee practical, such as charging a few
cents to read each online articles and then
including all user’s micro-request donations
for use the site. Many experts expects the
use of fee-based Internet content to continue
to grow at a rapid pace.

20
MYTHS 2 : SOME CONTROLS THE
INTERNET

 The Popularity of Conspiracy theories in past year has contributed to the

spread of this myth. In fact, no single group or organization controls the


Internet. Governments in each country have the power to regulate the content
and use of the Internet within their borders, as allowed by their laws.

 However, legislators often face serious obstacle getting legislation passed

onto law – let alone getting it enforced. Making government control even
harder is the “bombproof” design of the internet itself. If a government tries
to block access to or from a specific country.

21
MYTHS 3 : THE
INTERNET AND
WORLD WIDE WEB
ARE IDENTICAL
 Since you can now use a Web browser to
access most of the Internet resources,
many people think the Internet and the
Web are same thing. Although everyday
many people use the term Internet and web
interchangeably, they are not the same
thing.
 Technically Internet is the physical
network, and the Web is the collection if
Web pages accessible over the Internet.

22
Client Server Technology

 Internet is based on Client-Server

technology.

 The Internet consists of two types

of computers Servers and Clients.


INTERNET
CONCEPTS  Computers that read the
information offered are called
Clients.

 Clients run Web Browser


(Netscape Navigator, Internet
Explorer)
23
A NETWORK
ARCHITECTURE IN
WHICH EACH
COMPUTER OR
PROCESS ON THE
NETWORK IS
EITHER A CLIENT
OR A SERVER
24
 Servers

 Respond to Client requests for

information

 Accept data from clients

 Provide gateway to other computers to

access the Internet

 Provide a physical location where

several domains can be hosted

 Server runs a special software known

as Web Server Software

25
 Client
 Applications that run on
computers
 Client Required a Software Web
Browser to open any web Pages.
 Rely on servers for
 Files
 Devices
 Processing power
 Example: E-mail client
 An application that enables you
to send and receive e-mail

26
ADDRESSING SCHEMES – IP
ADDRESSES AND
DOMAIN NAME SYSTEM
 DNS

 IP Addresses- Physical Domain

 Every machine connected to the Internet


must have an address by which it can be
located on the Internet. – IP Address.
 IP Address must be unique.

 An IP address is a 32-bit number, divided


into two sections, the network number
and the host number.
 The IP address is a set of numbers
separated by dots.
202.100.17.32
01101110.01100100.10001.1000

27
IP ADDRESS
 An IP address is the identifier that enables your device to send or
receive data packets across the internet. It holds information related to
your location and therefore making devices available for two-way
communication. The internet requires a process to distinguish between
different networks, routers, and websites. Therefore, IP addresses
provide the mechanism of doing so, and it forms an indispensable part
in the working of the internet. You will notice that most of the IP
addresses are essentially numerical. Still, as the world is witnessing a
colossal growth of network users, the network developers had to add
letters and some addresses as internet usage grows.
 An IP address is represented by a series of numbers segregated by
periods(.). They are expressed in the form of four pairs - an example
address might be 255.255.255.255 wherein each set can range from 0 to
255.
28
DOMAIN NAME
SYSTEM
 Worldwide system of distributed databases of
names and addresses of computers connected
to Internet.
 DNS names are constructed in a hierarchical
naming fashion.
 The names of the domain describe
organizational or geographical relations.
 Every computer on the Internet can have both
a domain name (Virtual Domain) and an IP
address.
 DNS addresses have two parts : a host name
followed by a domain that generally identifies
the type of institution that uses the address.
ibm.com, amity.edu, songs.pk

29
There are two types of domains –
Geographic Domains and Non-
Geographic Domains

Non Geographic Domains


• .com – for commercial organisations
(Business)
• .net – network resources (ISP)
• .gov – non military government
organizations
• .edu – Educational organizations
• .mil – Military
• .org – other organization.

30
Geographic Domains
• .au – Australia
• .ca – Canada
DOMAIN NAME • .fr - France

SYSTEM • .uk - United Kingdom


• .in - India
• .il - Israel
• .pk - Pakistan

31
 Some large institutions and
corporations divide their domain
addresses into smaller subdomains.

amity.asb.edu

 Each domain name is registered with

InterNIC.

 InterNIC checks whether the domain

name is unique and then accepts the


registration. Registration is valid for
two years.

32
Each webpage has a unique address, called a
Uniform Resource Locator (URL) that identifies its
location on the Internet.

An Internet address, usually beginning with http://,


that uniquely identifies a web page.

URL
http://www.rediffmail.com/index.html

(UNIFORM
Protocol : http (Hypertext Transfer Protocol)
RESOURCE
Host Computer Name : www (world wide web) LOCATOR)

Domain Name : rediffmail

Domain Type : com

File Name : index.html (web page address)


33
URL
 URL stands for Uniform Resource Locator. It is the address of a resource, which
can be a specific webpage or a file, on the internet. It is also known as web
address when it is used with http. It was created in 1994 by Tim Berners-Lee.
URL is a specific character string that is used to access data from the World Wide
Web. It is a type of URI (Uniform Resource Identifier).
 Every URL contains the following information:
• The scheme name or protocol.
• A colon, two slashes.
• A host, normally called a domain name but sometimes as a literal IP address.
• A colon followed by a port number.
• Full path of the resource.

34
 Every single document on the web page has its own unique
URL.

 Type the URL in the address box of the browser and the
browser is directed to the document’s location.

 ftp://- File Transfer Protocol

 https://- Secure Hypertext Transfer Protocol

35
 The Internet works because
every computer connected to it
uses the same set of rules and
procedures – Protocols
Internet
 These protocols control timing
Protocols
and data format
 Internet uses TCP/IP –
Transmission Control Protocol /
Internet Protocol

36
TCP
 TCP/IP stands for Transmission Control Protocol/ Internet Protocol. It is a
set of conventions or rules and methods that are used to interconnect network
devices on the Internet.
 The internet protocol suite is commonly known as TCP/IP, as the foundational
protocols in the suite are Transmission Control Protocol and Internet Protocol.
 It chooses how the information will be traded over the web through end-to-end
communications that incorporate how the information ought to be organized
into bundles (bundles of data), addressed, sent, and received at the goal.
This communication protocol can also be utilized to interconnect organize
devices in a private network such as an intranet or an extranet.

37
 Characteristics of TCP/IP:
• Share Data Transfer: The TCP allows applications to create channels of
communications across a network. It also permits a message to be separated into
smaller packets before they are transmitted over the web and after that collected in
the right order at the destination address. So, it guarantees the solid transmission of
data across the channel.
• Internet Protocol: The IP address tells the packets the address and route so that they
reach the proper destination. It includes a strategy that empowers portal computers on
the internet-connected to arrange forward the message after checking the IP address.
• Reliability: The most vital feature of TCP is solid data delivery. In arrange to supply
unwavering quality, TCP must recover information that’s harmed, misplaced, copied,
or conveyed out of arranging by the Arrange Layer.
• Multiplexing: Multiplexing can be achieved through the number of ports.
• Connections: Before application forms can send information by utilizing TCP, the
devices must set up a connection. The associations are made between the harbor
numbers of the sender and the collector devices.
38
TCP
 TCP
 TCP stands for Transmission Control Protocol. It is a transport layer
protocol that facilitates the transmission of packets from source to
destination. It is a connection-oriented protocol that means it establishes the
connection prior to the communication that occurs between the computing
devices in a network. This protocol is used with an IP protocol, so together,
they are referred to as a TCP/IP.
 The main functionality of the TCP is to take the data from the application
layer. Then it divides the data into a several packets, provides numbering to
these packets, and finally transmits these packets to the destination. The
TCP, on the other side, will reassemble the packets and transmits them to
the application layer. As we know that TCP is a connection-oriented
protocol, so the connection will remain established until the communication
is not completed between the sender and the receiver.

39
 TCP/IP

 Industry standard protocol

suite for WAN developed in


1970s and 1980s by the US
Department of Defense.
PROTOCOLS
 It is a routable protocol for

connecting dissimilar
systems.
 TCP/IP suite consists of 2

protocols – TCP and IP


40
• IP
 Provides basic network
connectivity
 Breaks data into packets –
datagrams
 Routes the packet efficiently to its
destination
• TCP
 Error Checking
 Ordering the packets
 Removal of duplicate packets
 Recovery from lost packets

41
IP
 Here, IP stands for internet protocol. It is a protocol defined in the
TCP/IP model used for sending the packets from source to destination.
The main task of IP is to deliver the packets from source to the
destination based on the IP addresses available in the packet headers. IP
defines the packet structure that hides the data which is to be delivered
as well as the addressing method that labels the datagram with a source
and destination information.
 An IP protocol provides the connectionless service, which is
accompanied by two transport protocols, i.e., TCP/IP and UDP/IP, so
internet protocol is also known as TCP/IP or UDP/IP.
 The first version of IP (Internet Protocol) was IPv4. After IPv4, IPv6
came into the market, which has been increasingly used on the public
internet since 2006.

42
 SMTP (Simple Mail Transfer Protocol) – It
is a TCP/IP protocol for sending message from
one computer to another computer on a
network. This protocol is used on the Internet
to route e-mail.
 HTTP (Hypertext Transfer Protocol) – The
protocol is used to carry requests from a
browser to a Web Server and to transport
pages from Web Servers back to the requesting
browser.
 FTP (File Transfer Protocol) – It is a fast
application level protocol widely used for
copying files to and from remote computer
system on a network using TCP/IP, such as the
Internet.
 TELNET - protocol for connecting a local
computer to a remote computer

43
INTERNET
SERVICES
 Internet Service Provider (ISP)

 Internet Content Provider (ICP)

 Application Services Provider (ASP)

 World Wide Web (www)

44
INTERNET SERVICES
 Internet Services means the service provided to you
by us using digital or analogue technology to
enable you to gain access to the Internet and certain
services, whether by means of a television, personal
computer or otherwise.
 Internet Services allows us to access huge amount of
information such as text, graphics, sound and software
over the internet. Following diagram shows the four
different categories of Internet Services.

45
INTERNET SERVICE
PROVIDER
 An ISP, also called Internet access provider, or IAP is a organization
that provides the required software, to connect to the Internet. For a
monthly fee, the ISP provides the user software package, username,
password and access phone number. Equipped with a modem, the user can
then log on to the Internet and browse the web.
 The ISP connects to its customers using different kind of connection such
as dial-up, DSL or dedicated high-speed interconnects.
 The pricing and services available through two ISPs may differ somewhat.
For e.g. some ISPs may provide you with an connection to internet only
but some may give other services also like virus protection, spam filtering.

46
 ICP stands for Internet Content Provider. Website owners
should apply for an ICP Licence, otherwise the Chinese
Ministry of Information Industry( MII ) would not consider
your website as a legal one. The ICP license is just like an
online business license from Chinese government.

 This license regime was instated by the Telecommunications


INTERNET Regulations of the People's Republic of China that was
promulgated in September 2000. By the letter of the law, all
websites with their own domain name that operate inside China
CONTENT are required to obtain a license, and China-based Internet
service providers are required to block the site if a license is not
acquired within a grace period. Licenses are issued at the
PROVIDER provincial level.

 Operating from China is also a prerequisite for acquiring a


license. Foreign companies such as Google, unable to acquire a
ICP license on their own, often partner up with Chinese Internet
companies to use the licenses of the Chinese company.

47
 An Application Service Provider or ASP provides
"applications" as a service - specifically, software
and services having to do with the information
technology requirements of companies and
individuals. The service offered by Application
Service Providers may include processing credit card
payments, providing customer relations management
APPLICATION (CRM) services to businesses, or customized
applications.
SERVICE  The operational concept is straightforward - a
service provider identifies a function or activity that
PROVIDER is common to a number of companies. The
Application Service Provider then offers the service
to its identified market for a fixed fee, in effect
removing the personnel, equipment and logistical
challenges inherent if each company is going to set
up its own system.

48
It refers to an Interconnected system of
Computers all over the world that store
information in multimedia form.

Webpage is a document on www the include WORLD


test, pictures audio and video. Document on
WWW are called web pages. WIDE
WEB
WWW or just Web is most popular method of
accessing the Internet service and its
information located on different servers, it
resides on the top of the Internet.

Web is popular because of the use of hypertext


concept. Hypertext provides a new way of
storage and retrieval information on the
internet.
49
Electronic Mail (E-mail)

Newsgroups

Telnet – Remote Access to Distant Computer INTERNET


APPLICATION
File Transfer Protocol (FTP)

Internet Relay Chat (IRC)

Voice over Internet Protocol (VOIP)

Chat
50
ELECTRONIC MAIL (E-
MAIL)
 It refers to exchange of text messages and
computer files over a communication network
such as LAN or Internet.
 Internet provides basics communication services to
its user in any part of world by e-mail facility.
 It allows messages, may be in text, audio, video or
combination of all, accessed by multiple users,
delivered exclusively on computer network.
 The primary advantages of e-mail are :
 Paperless Communication, Coping Messages,
Printing of Message, Public Bulletin Boards,
Faxes and Meetings, Forwarding the messages,
Transfer of Data/Files, Address Book,
Composing Message, etc.

51
The Usenet of just Newsgroup service of the
Internet allows a group of users to focus on a
topic of their interest by exchanging their
information.

To become a member of newsgroup, the users


are required to subscribe it and they are
organized in a directory and are divided into NEWSGROUP
categories and sub-categories.

Newsgroups are generally used for discussion


and posting opportunities, such as creating
partnerships or selling items .

Newsgroup user can use a nickname to keep


his/her identity secret as user is usually not
acquainted with all possible reader/members.
52
Telnet is a standard Internet application that provides
the user the ability to log into machine over TCP/IP.
Using such connection, user can execute standard

TELNET programs form remote locations including e-mails.


Some common use of Telnet service are:
1. Computing power of the remote
(TERMINAL computer
2. Software of the remote computer may
be used that user wants to use.
NETWORK) 3. Remote computer database or archive
can be accessed.
4. A user can log into ones own computer
from another computer.

53
It provides the facilities to transfer files
between machines over the Internet.

Large files of computer program FILE


containing text, images, sound, movie,
etc. an be transmitted. TRANSFER
PROTOCOL
It also allows the concerned access to
the same Internet server by multiple
users.

Using special FTP software, you can


easily download files in an FTP site,
server that archives such file.
54
INTERNET
RELAY CHAT
 IRC or just Chat, is a popular way for Internet
users to communicate in real-time with other
users. Real-time communication means
communicating with other users in the
immediate present.

 IRC is a multi user system where people join


channels to talk publicly or privately. Channels
are discussion where chat users convene to
discuss a topic. Chat message are typed on a
users computer and sent to the IRC Channel,
where all users who have joined that channel
receive the message. Users can then read, reply
to, or ignore that message or create their own
message.

55
VOICE OVER INTERNET
PROTOCOL
 Voice over IP is a general term for a family of
methodologies, communication protocols, and transmission
technologies for delivery of voice communications and
multimedia sessions over Internet Protocol (IP) networks,
such as the Internet.

 Internet telephony refers to communications services —


voice, facsimile, and/or voice-messaging applications —
that are transported via the Internet, rather than the public
switched telephone network (PSTN). The basic steps
involved in originating an Internet telephone call are
conversion of the analog voice signal to digital format and
compression/translation of the signal into Internet protocol
(IP) packets for transmission over the Internet; the process
is reversed at the receiving end.

 VoIP systems employ session control protocols to control


the set-up and tear-down of calls as well as audio codecs
which encode speech allowing transmission over an IP
network as digital audio via an audio stream.

56
CHAT
 Chat Programs allows Internet users
to send and receive messages
instantly free of cost. For this, it is
necessary for people to establish the
connection in the same channel for
communication.
 In chat program the user receives
message on the screen, even when
sender of the message is in the
middle of typing. Two major types
chat programs exist :
 Webchat
 Internet Relay Chat

57
INTERNET - ADVANTAGES

Employment Knowledge
High Speed 24*7
Opportunities Reservoir

Direct contacts
Interactive Business on the between
Non biased
Communication Internet customers and
organisations

Reduction of Source of
Cost Effective
Uncertainty Entertainment

58
 Internet Crime

 Virus attacks

INTERNET -  Privacy Issues

DISADVANTAGES  Pornography

 Physical Ailments

59
 There are many important societal issues

related to the Internet. One – network and


Internet security. Two important issues –
CENSORSHIP
censorship and privacy – are discussed in
AND PRIVACY context of Internet use.
ISSUES  Censorship

 Web Browsing Privacy

 E-mail Privacy

60
CENSORSHIP
 The control or suppression of what can be accessed, published, or
viewed on the Internet. It may be carried out by governments or by
private organizations at the behest of government, regulators, or on
their own initiative. Individuals and organizations may engage in self-
censorship for moral, religious, or business reasons, to conform to
societal norms, due to intimidation, or out of fear of legal or other
consequence.
• FORMS of CENSORSHIPPreventive (exercised before the
expression is made public)
• Prior restraint by government
• Licensing
• Self-censorship

61
 The First Amendment to the U.S. Constitution
guarantees a citizen’s right to free speech. This
protection allows people to say or show things to
others without fear of arrest. People must observe
some limits to free speech, of course, such as the
prohibition of obscenity over the public and of child
pornography.

CENSORSHIP  But How does the right to free speech relate to alleged
patently offensive or indecent materials available over
the Internet, where they might be observed by children
and the public at large? There have been some
attempts at Internet Content Regulation – What some
would view as censorship – in resent years, but the
courts have had difficulty defining what is “patently
offensive” and “indecent” as well as finding the fair
balance between protection and censorship.

62
WEB BROWSING PRIVACY
 Privacy, as it relates to the Internet, encompasses what information

about individuals is available, how it is used, and by whom.

 Many individuals who browse the Web on regular basis is maintaining

the privacy of where they go and what they do at web sites. You might
wonder :
 Does any one keep track of which Web sites I visits

 What hyperlinks I click on ?

 How long I stay on a web sites ?

 What thing I download and buy ?

 What about the information I provide to web sites ?

 Can I specify who get to see it ?

The answer of each questions is “yes” to some extent, but it depends


on specific web sites visited, the setting on your PC, and what
other precaution you have taken to protect your privacy.

63
 Private browsing is a feature that major web browsers offer to help keep
your temporary browsing data private. When using a private browser, such
as incognito mode, your browsing history, search records, and cookies
aren’t retained. Private browsing allows users to surf the internet
without the browser collecting history. This is helpful if a survivor is
concerned that someone may be monitoring their internet activity by going
through the browser history.
 Private browsing essentially removes any tracking of user's Web
activities from the local machine, and by extension, the website
that the user is visiting. The best example is the use, or rather
disuse of cookies, that are used by websites to track user
activities and store data. For example, this is used by websites
such as Amazon to know a user's previously browsed products
and keep a user logged in to the site even after the browser has
been closed and the computer turned off.

64
E-MAIL
PRIVACY
 Many people mistakenly believe that the e-
mail they send and receive is private and
will never be read by anyone other than the
intended recipient. Since it is transmitted
over public media, however, only encrypted
e-mail can be transmitted safely.
 Unlikely to happen to your personal e-mail,
non-encrypted email can be intercepted and
read by someone else. Consequently, from a
privacy standpoint, a non-encrypted e-mail
message should be viewed more like a
postcard than a letter.

65
66

THANK
YOU

You might also like