Rainbow Pinwheel Pointer

Wednesday, 29 April 2015

The Conclusion

          World today as we can see has made itself so used to technology that the world would collapse if it was taken away. The main reason for the tremendous growth of telecommunication is we needed a better way to relay massages to each other. These technology is hugely important aspect, not only for people around the world, but also for small and large business. It can connected people from all over the world and now, even major business we can handle it just from our home by using an internet, nothing is impossible. Besides, with technology, makes every transactions  or things get more easier and ready to go. It gives many benefits to ourselves, society and to the country also. In a nutshell, telecommunication, internet, and wireless technology getting more important along with the progress of the world's modernity.


Just for fun ;)

Friday, 24 April 2015

7.4 THE WIRELESS REVOLUTION : RFID AND WIRELESS SENSOR NETWORK


RADIO FREQUENCY IDENTIFICATION (RFID)


How RFID works.
  1.  RFID is sytems provide the powerful technology for tracking the movement of goods through out the supply chain.
  2. RFID system use tiny tags with embedded microchips containing data about an item and its location to transmit radio signal over short distance to RFID readers.
  3. The reader unit consists of an antenna and radio transmitter with a decoding capability attached to a stationary or handhend device. 
  4. The reader emits radio waves in ranges anywhere from one inch to hundred feet, depending on its power output, the radio frequency employed, and surrounding environmental condition.
  5. The reader captures data, decodes them, and sends them back over a wired or wireless network to a host computer for further processing.

WIRELESS SENSOR NETWORK

A WIRELESS SENSOR NETWORK

  1. Wireless sensor networks (WSNs) are ntwork of interconnected wireless devices that are embedded into the physical environment to provide measurements of many points over large spaces.
  2. These devices have built-in processing storage, and radio frequency sensors and antennas.
  3. They are linked into an interconnected network that routes the data they capture to a computer for analysis.




7.4 THE WIRELESS REVOLUTION : WIRELESS COMPUTER NETWORKS AND INTERNET ACCESS

WIRELESS COMPUTER NETWORKS AND INTERNET ACCESS

BLUETOOTH

  1. Popular name for the 802.15 2 wireless networking standard.
  2. Useful for creating small personal area network (PANs).
  3. Links to 8 devices within a 10-meter area using low-power.
  4. Can transmit up to 722 Kbps in the 2.4-GHz band.
  5. Communicate with wireless phone, pagers, computers, printers, and computing devices even operate each other without direct user intervention.
  6. has low-power requirements, making it appropriate for battery powered handled computers or cell phones.


WI-FI AND WIRELESS INTERNET ACCESS

Mobile laptop computers equipped with network interface cards link to the wired LAN by communicating with the access point. The access point uses radio waves to transmit network signals from the wired network to the client adapters, which convert them into data that the mobile device can understand. The client adapter then transmits the data from the mobile device back to the access point, which forwards the data to the wired network.


  1. An 802.11 set of standards for wireless LANS and wireless internet access also known as Wi-Fi.
  2. 802.11b -> transmit up to 11Mbps in the unlicensed 2.4-GHz band and has an effective distance of 30 to 50 meters.
  3. 802.11g -> transmit up to 54 Mbps in the 2.4-GHz range.
  4. 802.11n -> transmit over 100Mbps.
  5. Wireless devices communicate with a wired Lan using access points.
  6. Access points is a  box consisting of a radio receiver/ transmitter and antennas that link to a wired network, router,or hub.
  7. HOTSPOTS = one or more access points providing wireless internet access in a public place.
  8. Some hotspots are free or do not require any aditional software to use. 
  9. Wi-Fi hotspots can be found in hotels, airport lounges, libraries, cafes, and college campuses.
  10. Wi-Fi technology poses several challenges -> Wi-Fi's security features, which make these wireless network vulnerable to intruders.

WiMax


  1. The IEEE developed a new family of standards known as WiMax.
  2. WiMax which stands for Worlwide Interoperability for Microwave Access, is the popular term for IEEE Standard 802.16.
  3. It has a wireless access range of up to 31 miles and transmission up to 75Mbps.
  4. WiMax antennas are powerful enough to beam high-speed Internet Connections to Rooftop antennas of homes and businesses that are miles away.
  5. Cellular handsets and laptops with WiMax capabilities are appearing in the marketplace.

Wednesday, 22 April 2015

7.3 THE GLOBAL INTERNET

What is the internet?
  • The internet has become the world most extensive, public communication system that now rivals the global telephone system in reach and range.
  • It's also the largest implementation of client/server computing and internetworking, linking hundreds of thousand of individual networks and 1 billion people worldwide.
  • This global network of networks began in the early 1970s as a U.S department of defense network to link scientists and university professors around the world.
  • Individuals connect the internet in 2 ways : through local Internet service providers (ISPs) and through their business firm.

  1. Digital Subcriber Line (DSL) technologies operate over existing telephone lines to carry voice, data and video at transmission rates ranging from 385Kbps all the way up to 40Mbps, depending on usage patterns and distance.
  2. Cable Internet Connectons provided by cable vendors use digital cable coaxil lines to deliver high-speed internet access to homes and businesess.

7.3.1 Internet addressing And Architecture.

         The Domain Name System
  1. The Internet is based on the TCP/IP networking protocol suite. ever computer is assigned a unique Internet Protocol (IP) address, which is currently four strings of numbers ranging from 0 to 255, as in the address 207.46.250.119.
  2. The Domain Name system (DNS) is a system for converting IP addresses into names, such as google.com. DNS has hierarchical structure which specifies a root domain, top level domains, second-level domains, and host computers at the third level.


Figure 7.1 The Domain Name System

The common domain extension currently aviable and official approved are shown in the following list :

.com  commercial organisation/businessess

.edu   educational institutions
.gov   U.S goverment instituions

Internet Network Architecture and Governance
  • Internet policies are established by several organizations and governmental bodies, including the internet Architecture Board (IAB)
  • The Internet Corporation for Assinged Names and Numbers (ICANN)
  • The Internet Network Information Center (InterNIC)
  • the internet Engineering Task Force (IETF)
  • The Internet Society (ISOC)
  • The World Wide Web Consortium (W3C)

  1. These agencies infleunce goverment agencies, major network owners and ISP.
  2. Everyone who uses the internet pays some fee-hidden or otherwise to maintain the network. For example, each organization and business firm pays for its own nerworks and its own local Internet connnection services, a part of which is paid to the long-distance trunk line owners.
  3. The Internet Engineering Task Force adopted a new internet Protocol Version 6 (IPv6), which uses a 128-bit addressing scheme which produces 3.4 x 1038 addresses.
  4. The existing Internet has many shortcomings chief among which are poor security, no service level guarentees, no differential service, no differential pricing, and bandwidth limitions that would prevent the emergence of wide-scale Internet television or internet (NGI) are consortia 200 unversities, private businesses, and goverment agencies in the United States that are working on a new, robust, high-bandwidth version of the internet.


Figure 7.2 Internet Network Architecture


7.3.2 Internet Services And Communication

  1. The Internet is based on client/server techonology. Client paltforms include PCs, cell phones, PDAs, handled devices, and information appliances. Users of the Internet control what services they access through client applications on thier computers such as web browsers. Internet services include e-mail, electronic discussion groups (Usenet groups and LISTSERV), chatting, and instant messaging, Telnet, File Transfer Protocol (FTP), and the World Wide Web.
  2. Each Internet service is implemented by one or more software programs.
Example :
  • E-mail enables messages to be exchanged from computer to computer, with capabilities for routing messages to multiple recipents, forwarding messages, an attaching text documents or multimedia messages.
  • Internet telephony: Voice over IP (Voip) technology uses IP to deliver voice information in digital form using packet switching, avoiding the tolls charged by local and long-distance networks.


Figure 7.3 Client/Server Computing on The Internet




Figure 7.4 HOW IP TELEPHONY WORKS

7.3.3 The web

  1. Web pages are formatted with graphics,text, and dyamic links using Hypertext Markup Language (HTML).
  2. Web pages are requested by clients and delivered by web servers using the Hypertext Transfer Protocol (HTTP). HTTP is the first set of letters  at the start of every web addres, followed by the Domain name, the directory path to the requested documents, and the document name.
  3. The address typed in to a browser to locate file, including the directory path and the document name together is called a Uniform Resource Locator (URL). A web server software for location and managing stored Web pages, the most common Web server today is Apache HTTP Server.




Figure 7.4 A Virtual Private Network Using the Internet.

This VPN is a private network of computers linked using a secure "tunnel" connction over the Internet. It protects data transmitted over the public Internet by encouding the data and "wrapping" them within the Internet Protocol (IP).  By adding a wrapper around a network message to hide its content, organizations can create a private coonnection that travels through the public Internet.

Search Engine
  1. Users can find information on the internet using search engines. The first search engines were simple keyword indexes of all the pages visited. Contemporary search engines use more complex models for finding relevant information. Google ranks Search based on the relevance, or popularity, of each page. Web sites for locating information such as Yahoo!, Google, and MSN have become so popular and easy to use that they  also serve as major portals for the internet, as well as major shopping tools. In search engine marketing, search results display both listings to a query as well as major advertisments related to the search query. The paid, sponsered advertisement are the fastest-growing form of Internet advertising.


Figure 7.5 Major Web Search Engines

  1. Internet networking technology is used by organization to create private networks called intranets and ectranets, intranets extended to authorized vendors and customers to facilate communication and business transactions. Intranets and extranets are protected from unauthorized visits by Firewalls-security system with specialized software system with specialzed software to prevent outsiders from entering private networks.

Web 2.0 refers to second-generation, interacive Internet-based services, such as :
  • Mashups: Software services that enables users and system developers to mix and match content or software components to create something entirely new.
  • Blgs : Informal yet structured Web site where subscribing individuals can publish stories, opinions, and links to other web sites of interest.
  • RSS: RSS (Rich site Summary, or Really Simple Syndication) technology pulls specifed content from Web sites feeds its automatically to users' computers, where it can be stored for later viewing.
  • Wikis: Collaborative Web Sites where visitors can add, delete, or modify content on the site, including the work of previous authors

Web 3.0: The future Web 

web 3.0 is the promise of a future Web where all this digital information, all these contacts, can be woven together into a single meaningful experience. 




Monday, 20 April 2015

7.2 COMMUNICATION NETWORKS

COMMUNICATION NETWORKS

SIGNALS: DIGITAL VS ANALOG

  • Analog  signal is  represented by a continiuous waveform that passes thought acommunication medium an has been used for voice communication.
  • A digital signal is a discrete,binary waveform, rather than a continuos waveform.
  • Digital signals communicate information as strings of two discrete states: one bit and zerobits, which are represented as on–off electrical pulses.
  • Called a modem to translate digital signals into analog form.




FIGURE 7.1   Functions of the modem


  • A modem is a device that translates digital signals from a computer into analog form so that they can be transmitted over analog telephone lines. The modem also translates analog signals back into digital form for the receiving computer.
Modem

Local area network (LAN)


Type of networks

LOCAL AREA NETWORK(LAN)



  • Designed to connect personal computers and other digital devices within a halfmile or 500-metre radius.
  •  Connect a few computers in a small office, all the computers in one building, or all the computers in several buildings in close proximity Windows, Linux, and Novell.
  •  three major LAN topologies:

  1. Star topology :all devices on the network connect to a single hub organized into a hierarchy.
  2. Bus topology, one station transmits signals, which travel in both directions along a single transmission segment. All machines on the network receive the same signals, and software installed on the client’s enables each client to listen for messages addressed.
  3. Ring topology connects network components in a closed loop.Messages pass from computer to computer in only one direction.

CAMPUS AREA NETWORK(CAN)


  •  Up to 1,000 meters(a mile);a college campus or corporate facility.
  • CAN is a network of multiple interconnected local area networks (LAN) in a limited geographical area. A CAN is smaller than a wide area network (WAN) or metropolitan area network (MAN).
  • CAN benefits are as follows:

  1. Cost-effective
  2. Wireless, versus cable
  3. Multidepartmental network access..
  4. Single shared data transfer rate (DTR)

Metropolitan area network(MAN)


  • Span broad geographical distances—entire regions, states, continents, or the entire glob.
  • Computers connect  through public networks  such as the telephone system or private cable systems, or through leased lines or  satellites.

WIDE AREA NETWORK(MAN)


  • A network that spans a metropolitan area,usually a city and its major suburbsIts geographic scope falls between a WAN and a LAN





      
     FIGURES 7.1 NETWORK TOPOLOGIES


  • Wide range of speeds is possible for any given medium depending on the software and hardware configuration         

           



  TRASMISSION MEDIA AND TRANSMISSION SPEED


  • Networks use different kinds of physical tranmission media:
Transmission media
  • Twisted Wire  consists of strands of copper wire twisted in pairs and is an older type of transmission medium.
  • The telephone systems in buildings had twisted wires installed for analog communication.
  • Used LANs, such as CAT5

Coaxial Cable

  • Coaxial cable, similar to that used for cable television, consists of thickly insulated copper wire.
  • Transmit a larger volume of data than twisted wire.

Fibre Optics and Optical Networks 

  • Fibre optic cable consists of bound strands of clearglass fibre, each the thickness of a human hair.
  • Data are transformed into pulses of light,which are sent through the fibre optic cable by a laser device.

Wireless Transmission Media

  • Wireless transmission is based on radio signals of various frequenciessed to handles the major traffic.
  • Microwave systems ;follow a straight line and do not bend with the curvature of the earth.
  • Such as Communication satellites are typically used for transmission in large.

Transmission Speed

  • The total amount of digital information that can be transmitted through any telecommunications medium is measured in bits per second.
  • Hertz  frequencies that can be accommodated on a particular telecommunications channel is called its bandwidth                                                                                                                   

Tuesday, 14 April 2015

7.1. TELECOMMUNICATIONS AND NETWORKING IN TODAY'S BUSINESS WORLD.

If we work in a business, we can't do without networks. We need to communicate rapidly with the customers, suppliers and employees. Until about 1990, business used the postal system or telephone system with voice or fax for communication. Today, however, we and employees for example, use computers, e-mail and messaging, the internet, cell phones, and mobile computers connected to wireless networks for this purpose.

      There are two fundamentally different types of networks , that is telephone networks and computer networks. Telephone networks historically handled voice communication, and computer networks handled data traffic.

       Networking and communication trends :-


  1. Convergence : the telephone networks and computer networks converging into single digital network using internet standards.
  2. Broadband : more than 68% U.S internet users have broadband access.
  3. Broadband wireless : voice, data communication are increasingly taking place over broadband wireless platforms.
      
      If we had to connect the computers for two or more employees together in the same office, we would need a computer network.

           Computer Network :-
  • Two or more connected computers
  • Major components in simple network are :-
  •  client and server computers   
  •  network interfaces (NICs)   
  •  connection medium       
  •  network operating system  
  •  Hubs, switches, routers  
  • Software-defined networking (SDN)
  • functions of switches and routers managed by central program

The diagram shows compenents of a simple computer network

Networks in large companies
       The network we have just described above might be suitable for a small business. But, how about for the large companies with many different locations and thousand of employees ? As a firm grows, and collects hundreds of small local area networks, these networks can be tied together into a corporate-wide networking infrastructure.

           Network in large companies are :-
  • hundreds of local area networks ( LANs ) linked to firmwide corporate network
  • various powerful servers -Web site ,  -Corporate intranet, extranet , -Backend systems
  • mobile wireless LANs ( Wi-Fi networks )
  • Videoconferencing system
  • Telephone network
  • Wireless cell phones

Today's corporate network infrastructure is a collection of many different networks from the public switched telephone network, to the internet.




Monday, 13 April 2015

Chapter 7 : Telecommunications,the Internet, and Wireless Technology

       

           In this post we will gives a brief about the chapter, Telecommunications, the Internet, and Wireless Technology. Firstly, what is telecommunication? What is internet? What is wireless technology? 





          Now, let us take a look one by one the definition of all these three.



  • Telecommunication occurs when the exchange of information between two entities that is includes the uses of technology. Communication technology uses channels to transmit information through electric signals over signal cables in the form of electromagnetic wavesThe examples of modern technologies for long-distance communication usually involve electrical and electromagnetic technologies, such as telephone, facsimile, radio and etc.

  • Internet is a worldwide network of computers and computer network that communicate with each other using the internet protocol. Any computer on the internet has a unique IP address that can be used by other computers to route information to it. Hence, any computer on the internet can send a massage to any other computer using its IP address. These massages carry with them the originating computer's IP address allowing for two-way communication. For an example, by using an internet, we can communicate people all over the world by using internet.

  • Wireless technology is used to meet many needs in this new era. The most common use is to connect laptop users who travel from location to location. Another common use is for mobile networks that connect via satellite. The examples of wireless technology is the mobile phone, also known as a cellular phone, these wireless phones use radio waves to enable their users to make phone calls from many locations worldwide. 



The diagram shows, how the telecommunication and internet works




These are the examples of wireless technology :-



Mobile phone



Laptop



In this post, it roughly explain the definition with examples provided. This is the introduction for the chapter that we are going to summarize it in the next post. 




Tuesday, 7 April 2015

The Introduction



           Assalamualaikum WBT to our beloved lecturer, madam NORFAIZAH BT MAT NOR. This is the first post from our group,so, we hope that we managed to do it nicely and successfully according to what you have expected. First and foremost,our group name is MIScreampuff which is consisted of 6 members. 

Image result for cream puff
Why we choose MIScreampuff? 

          MIS stands for Management Information System, can also interprete as 'miss', because we are teenage girls and creampuff, because we like to eat it, it is kind of cute though. 

        We gather here as a group, to fulfill  our duty assignment which is became part of the carrymarks. At first, the lecturer gave a brief about the assignment in a class before we started to do it. Then, the chief of a group will be selected and the division of works happen.

Now, introducing our so-capable-powerful-intelligent group ....



Chief of Group
NADIRA ELLYNDA BINTI MOHD TAJUDDIN (HR096765)



Members of Group
NURUL SYAHIRA AZLIN BINTI ATAN (HR096672)


SITI NURAFIQAH BINTI MOHD HANAFI (HR096780)


NURRAHMANI MADIAH BINTI MOHAMAD (HR097209)


FARAH NADHIRAH BINTI ABU NOBLI (HR096409)


NUR AFIFAH BINTI MOHAMAD ROZAMI (MT096213)



           Next, we will post about the chapter that we choosed and define it. Apart from that, this is all about our group, we hope that you understand our aim clearly and continue to read our next post.