This document provides an overview of chapter 7 from the textbook Discovering Computers 2008. The chapter discusses computer communications and networks. It describes the components needed for successful communications including sending/receiving devices, communications devices, and transmission media. The chapter also covers network architectures like client/server and peer-to-peer, topologies like bus and star, standards such as TCP/IP and Wi-Fi, and transmission media including physical cables and wireless options. Uses of communications technology and common devices are also outlined.
The document discusses computer networks and communication. It defines key network concepts like transmission methods, network categories, protocols, and internet terms. It explains the basic elements of communication including senders, mediums, receivers, and messages. It also summarizes different network types like LANs, WANs, intranets, and the internet. Finally, it outlines the OSI model layers and their functions in network communication.
This document discusses computer networks and communications. It begins by describing the basic components of a communications system, including sending and receiving devices connected by a communications channel. It then discusses the various uses of computer communications, such as email, instant messaging, wireless messaging, and Internet access. The document outlines different types of networks including LANs, WANs, and wireless networks. It also describes common network topologies and standards used for networking, such as Ethernet, TCP/IP, Wi-Fi, Bluetooth, and RFID.
This document provides an introduction to mobile computing. It discusses how information is the foundation of decision making and differentiates humans from animals. It explores the evolution of computing from centralized mainframes to ubiquitous computing accessible anywhere, anytime from any device. The document examines the attributes of mobility and how physical mobility evolved into logical mobility. It outlines some motivations and functions of mobile computing as well as examples of mobile applications.
This document provides an overview of computer networking and telecommunications. It discusses how networks allow hardware, software, and people to be connected. It describes the basic anatomy of networks, including network interface cards and modems. It also discusses different types of networks like local area networks and wide area networks. Additional topics covered include electronic mail, bulletin boards, teleconferencing, and emerging technologies like video conferencing and electronic funds transfer.
The document provides an overview of mobile computing architecture. It describes a three-tier architecture with a presentation tier (user interface), application tier (process management), and data management tier. It discusses various types of middleware that can be used in the application tier, including message-oriented middleware and transaction processing middleware. It also covers managing context in mobile computing, including user context, device context, network context, and others. The Client Context Manager maintains information about the mobile device, user, location, and environment to provide context awareness.
This chapter discusses computer communications and networks. It describes the components needed for successful communications including sending and receiving devices, communications software, and transmission media. Various network types such as LANs, WANs, intranets and extranets are defined. Common network devices like routers, hubs, switches and wireless access points are explained. Both physical wired media like twisted pair and fiber optic cables and wireless transmission media are covered. Network standards including Ethernet, TCP/IP, Wi-Fi, Bluetooth and others are also outlined.
The document discusses various hardware devices used in network communications. A Network Interface Card (NIC) allows a computer to communicate over a network and access the network. A Wireless Network Interface Card (WNIC) provides wireless data transmission over a radio network. An internal modem is built into a stand-alone computer to transmit data over phone or cable lines, while an external modem is separate from the computer and mobile. A switch establishes connections between devices that want to communicate, and a hub contains multiple ports to connect LAN segments. A router connects multiple computers or routers and transfers data packets between networks, and a wireless access point connects wireless devices to form a wireless network and relay data to a wired network.
The latest development in network and communicationMuhd Airil
This document defines and describes various types of computer networks and communication technologies. It begins by defining a computer network as a collection of interconnected devices that allows sharing of resources and information. It then discusses mobile computing and specifies the features of mobile devices like smartphones. The document also describes Internet technologies like VoIP and blogs. It explains different network types such as PAN, VPN, WLAN, and WiMAX. It concludes that computer networks have greatly benefited various fields by connecting people worldwide.
The document discusses computer networks and communication. It defines key network concepts like transmission methods, network categories, protocols, and internet terms. It explains the basic elements of communication including senders, mediums, receivers, and messages. It also summarizes different network types like LANs, WANs, intranets, and the internet. Finally, it outlines the OSI model layers and their functions in network communication.
This document discusses computer networks and communications. It begins by describing the basic components of a communications system, including sending and receiving devices connected by a communications channel. It then discusses the various uses of computer communications, such as email, instant messaging, wireless messaging, and Internet access. The document outlines different types of networks including LANs, WANs, and wireless networks. It also describes common network topologies and standards used for networking, such as Ethernet, TCP/IP, Wi-Fi, Bluetooth, and RFID.
This document provides an introduction to mobile computing. It discusses how information is the foundation of decision making and differentiates humans from animals. It explores the evolution of computing from centralized mainframes to ubiquitous computing accessible anywhere, anytime from any device. The document examines the attributes of mobility and how physical mobility evolved into logical mobility. It outlines some motivations and functions of mobile computing as well as examples of mobile applications.
This document provides an overview of computer networking and telecommunications. It discusses how networks allow hardware, software, and people to be connected. It describes the basic anatomy of networks, including network interface cards and modems. It also discusses different types of networks like local area networks and wide area networks. Additional topics covered include electronic mail, bulletin boards, teleconferencing, and emerging technologies like video conferencing and electronic funds transfer.
The document provides an overview of mobile computing architecture. It describes a three-tier architecture with a presentation tier (user interface), application tier (process management), and data management tier. It discusses various types of middleware that can be used in the application tier, including message-oriented middleware and transaction processing middleware. It also covers managing context in mobile computing, including user context, device context, network context, and others. The Client Context Manager maintains information about the mobile device, user, location, and environment to provide context awareness.
This chapter discusses computer communications and networks. It describes the components needed for successful communications including sending and receiving devices, communications software, and transmission media. Various network types such as LANs, WANs, intranets and extranets are defined. Common network devices like routers, hubs, switches and wireless access points are explained. Both physical wired media like twisted pair and fiber optic cables and wireless transmission media are covered. Network standards including Ethernet, TCP/IP, Wi-Fi, Bluetooth and others are also outlined.
The document discusses various hardware devices used in network communications. A Network Interface Card (NIC) allows a computer to communicate over a network and access the network. A Wireless Network Interface Card (WNIC) provides wireless data transmission over a radio network. An internal modem is built into a stand-alone computer to transmit data over phone or cable lines, while an external modem is separate from the computer and mobile. A switch establishes connections between devices that want to communicate, and a hub contains multiple ports to connect LAN segments. A router connects multiple computers or routers and transfers data packets between networks, and a wireless access point connects wireless devices to form a wireless network and relay data to a wired network.
The latest development in network and communicationMuhd Airil
This document defines and describes various types of computer networks and communication technologies. It begins by defining a computer network as a collection of interconnected devices that allows sharing of resources and information. It then discusses mobile computing and specifies the features of mobile devices like smartphones. The document also describes Internet technologies like VoIP and blogs. It explains different network types such as PAN, VPN, WLAN, and WiMAX. It concludes that computer networks have greatly benefited various fields by connecting people worldwide.
Any process that permits the passage from a sender to one or more receivers of information of any nature, delivered in any easy to use form by any electromagnetic system.
The key points are:
- An extranet extends a company's intranet to external users like suppliers, vendors or customers.
- It allows controlled access to a company's network and data by selected external users for business purposes.
- Extranets use internet protocols and security measures to securely share information with partners and suppliers while keeping internal data private.
- They enable collaboration and information sharing for joint projects or distribution purposes in a secure manner.
In summary, an extranet extends a private intranet beyond the company firewall to allow partners and suppliers access to select data and applications for business collaboration while maintaining security and privacy of internal information.
LTE provides significantly higher data throughput and lower latency than previous mobile network technologies. This allows for improved quality of experience for users accessing real-time services like voice calls, gaming, and video. LTE will also enable new high bandwidth services like HD video and multi-user interactive gaming. Alcatel-Lucent's LTE solution aims to meet users' quality of experience expectations and reduce costs for network operators by introducing a flat IP architecture.
The latest development networks and communications (Microsoft Word)ainizbahari97
1. The document describes various topics related to computer networks and communications technologies. It discusses mobile computing technologies like wearable computers and smartphones. It also covers networking topics such as personal area networks (PANs), virtual private networks (VPNs), wireless local area networks (WLANs), and WiMAX. Finally, it discusses internet technologies including voice over internet protocol (VoIP) and blogs.
The document discusses various topics related to wireless and mobile computing including wireless communication, effects of device portability, mobile computing platforms, wireless and fixed networks, wireless management, building blocks of mobile computing, CDMA and DAMA, wireless networks, CSMA problems, and the hidden terminal problem. It also covers applications of wireless technology and security concerns in wireless networks.
Your media everywhere, anytime. This summarizes end-user expectations when ever-wider broadband and ever-lower flat-rate tariffs combine with users’ thirst for digital content.
The authors describe Ericsson’s end-to-end solution for remote access services, which builds on the IMS and UPnP families of standards, along with the Home IMS Gateway (HIGA), which serves as an intermediary gateway for connecting the device-centric consumer electronics space with the user-centric telecommunications world. The gateway approach leaves
the consumer electronics and telecommunications business models unaffected, while at the same time creating synergies between the two.
VoIP provides voice calls over the internet using packet switching rather than traditional circuit switching. The document discusses the technology behind VoIP, including standards like SIP and H.323. While VoIP is still developing, services are appearing that offer VoIP using these standards. The document also outlines issues that have arisen with VoIP implementation and research being done to address these issues, focusing on a case study from the University of Southampton.
This document discusses multimedia information representation and networking. It begins by defining multimedia as using text, graphics, video and sound simultaneously. It describes the different media types used in multimedia - text, images, audio and video. It discusses how these different media types are represented and transmitted digitally and compressed over networks. It also outlines several types of networks used for multimedia communications, including telephone networks, data networks, broadcast networks, integrated services digital networks and broadband networks.
The latest open source software available and the latest development in itRizwan Razman
This document discusses open source software, hardware, and the latest developments in information and communication technology (ICT). It provides definitions and examples of open source operating systems like Ubuntu Linux and Fedora Linux. It also discusses open source application software such as OpenOffice and Squirrel Mail. Examples of recent hardware include the Lexmark X8350 and X9575 printers. Software examples covered are Adobe Photoshop CS3 and CS4. The document concludes with an overview of pervasive computing and examples like smartphones and personal digital assistants.
This document discusses multimedia over IP networks. It describes how IP is used to transport various types of media such as voice, video and messaging. It also discusses multimedia conferencing using tools like Adobe Connect and Polycom that allow interacting with people worldwide through video and audio. Real-time Transport Protocol (RTP) and RTP Control Protocol (RTCP) are also described as protocols used for delivering multimedia over IP networks.
The latest development in network and communicationRizwan Razman
The document discusses recent developments in networking and communication technologies. It describes mobile computing, defining it as using computing devices while in transit. It also discusses internet technologies like VoIP and blogs. Regarding network types, it covers personal area networks (PANs), wireless local area networks (WLANs), and worldwide interoperability for microwave access (WiMAX). The document concludes that these latest developments make networking and communication easier and more useful for IT users.
The document discusses Internet telephony and Voice over Internet Protocol (VoIP). It defines IP telephony as using Internet protocol to exchange voice, fax, and other information traditionally carried over telephone networks. VoIP aims to standardize IP telephony. The document then describes how a VoIP call is completed by digitizing, compressing, and transmitting voice data over the Internet in packets before reassembling it at the destination. It notes benefits of IP telephony include potential cost savings compared to traditional telephone networks.
This document discusses how LTE subscribers will behave differently than 3G subscribers and outlines requirements for an evolved Subscriber Data Management (eSDM) solution. Key points include:
1) LTE subscribers will use multiple devices and expect service ubiquity across devices and networks.
2) An eSDM solution is needed to consolidate subscriber information across access networks and domains to provide a personalized experience.
3) The solution must be highly scalable, reliable, and flexible to support new applications and services utilizing the large LTE network pipes.
Bluetooth is a wireless technology standard for exchanging data over short distances. It allows devices such as phones, laptops, headphones, and others to connect to each other and exchange information without wires. Bluetooth operates using radio waves in the unlicensed ISM band at 2.4 GHz and switches between different channels very rapidly. It was developed in 1994 and is now maintained by the Bluetooth Special Interest Group with over 6,000 member companies. While it provides a convenient wireless connection for devices in close proximity, some early implementations had security vulnerabilities that could allow unauthorized access to data.
This document contains a glossary of terms related to video conferencing. It defines terms such as analogue, bandwidth, codec, document camera, firewall, H.320, IP video conferencing, LAN, MCU, NAT, protocol, TCP/IP, USB, and WAN. The glossary provides concise definitions of various technical terms used in the context of video conferencing systems and connections.
Every once in a while a new technology changes the game. Some benefit from it while others fail to adapt. Long Term Evolution, or LTE for short, is on the surface ,just yet another fast wireless standard bringing us faster mobile networking. But just like the freeway was much more than just a faster road, LTE actually has a chance to change the rules for app developers and create new possibilities.
This presentation will help you understand “Data”, Data Management, Data Communication System, Types of Data Transmission etc. and how data management effects business growth.
To know more about Welingkar School’s Distance Learning Program and courses offered, visit:
http://www.welingkaronline.org/distance-learning/online-mba.html
Internet TV, also known as IPTV, delivers video and audio content over an Internet connection. It can be viewed on computers, televisions through set-top boxes, and mobile devices. While similar to traditional TV delivery methods, Internet TV transmits information as data packets over the Internet rather than through broadcast radio waves or cable wires. It provides more content variety than cable TV and allows viewing on any Internet-connected device. IPTV is beginning to compete with traditional TV delivery by using existing broadband infrastructure to deliver television signals.
Verimatrix - Multi-network Solutions in the Real World - CSTB 2012Verimatrix
Verimatrix is a company that provides content and revenue security solutions for multi-network, multi-screen applications. The document discusses industry trends towards converging IPTV and over-the-top (OTT) delivery to provide an enhanced experience for consumers. It also outlines Verimatrix's ViewRight ONETM solution which provides a unified approach to security across networks like DVB, IPTV, and OTT to enable multi-network offerings with a consistent user experience.
This is the subject slides for the module MMS2401 - Multimedia System and Communication taught in Shepherd College of Media Technology, Affiliated with Purbanchal University.
The document summarizes the key phases and activities of the system development life cycle, including planning, analysis, design, implementation, and operation/support phases. It describes the objectives of each phase such as determining requirements during analysis or developing detailed designs during design. Project management, documentation, and techniques like prototyping and testing are discussed as important elements that occur throughout the entire development cycle.
Any process that permits the passage from a sender to one or more receivers of information of any nature, delivered in any easy to use form by any electromagnetic system.
The key points are:
- An extranet extends a company's intranet to external users like suppliers, vendors or customers.
- It allows controlled access to a company's network and data by selected external users for business purposes.
- Extranets use internet protocols and security measures to securely share information with partners and suppliers while keeping internal data private.
- They enable collaboration and information sharing for joint projects or distribution purposes in a secure manner.
In summary, an extranet extends a private intranet beyond the company firewall to allow partners and suppliers access to select data and applications for business collaboration while maintaining security and privacy of internal information.
LTE provides significantly higher data throughput and lower latency than previous mobile network technologies. This allows for improved quality of experience for users accessing real-time services like voice calls, gaming, and video. LTE will also enable new high bandwidth services like HD video and multi-user interactive gaming. Alcatel-Lucent's LTE solution aims to meet users' quality of experience expectations and reduce costs for network operators by introducing a flat IP architecture.
The latest development networks and communications (Microsoft Word)ainizbahari97
1. The document describes various topics related to computer networks and communications technologies. It discusses mobile computing technologies like wearable computers and smartphones. It also covers networking topics such as personal area networks (PANs), virtual private networks (VPNs), wireless local area networks (WLANs), and WiMAX. Finally, it discusses internet technologies including voice over internet protocol (VoIP) and blogs.
The document discusses various topics related to wireless and mobile computing including wireless communication, effects of device portability, mobile computing platforms, wireless and fixed networks, wireless management, building blocks of mobile computing, CDMA and DAMA, wireless networks, CSMA problems, and the hidden terminal problem. It also covers applications of wireless technology and security concerns in wireless networks.
Your media everywhere, anytime. This summarizes end-user expectations when ever-wider broadband and ever-lower flat-rate tariffs combine with users’ thirst for digital content.
The authors describe Ericsson’s end-to-end solution for remote access services, which builds on the IMS and UPnP families of standards, along with the Home IMS Gateway (HIGA), which serves as an intermediary gateway for connecting the device-centric consumer electronics space with the user-centric telecommunications world. The gateway approach leaves
the consumer electronics and telecommunications business models unaffected, while at the same time creating synergies between the two.
VoIP provides voice calls over the internet using packet switching rather than traditional circuit switching. The document discusses the technology behind VoIP, including standards like SIP and H.323. While VoIP is still developing, services are appearing that offer VoIP using these standards. The document also outlines issues that have arisen with VoIP implementation and research being done to address these issues, focusing on a case study from the University of Southampton.
This document discusses multimedia information representation and networking. It begins by defining multimedia as using text, graphics, video and sound simultaneously. It describes the different media types used in multimedia - text, images, audio and video. It discusses how these different media types are represented and transmitted digitally and compressed over networks. It also outlines several types of networks used for multimedia communications, including telephone networks, data networks, broadcast networks, integrated services digital networks and broadband networks.
The latest open source software available and the latest development in itRizwan Razman
This document discusses open source software, hardware, and the latest developments in information and communication technology (ICT). It provides definitions and examples of open source operating systems like Ubuntu Linux and Fedora Linux. It also discusses open source application software such as OpenOffice and Squirrel Mail. Examples of recent hardware include the Lexmark X8350 and X9575 printers. Software examples covered are Adobe Photoshop CS3 and CS4. The document concludes with an overview of pervasive computing and examples like smartphones and personal digital assistants.
This document discusses multimedia over IP networks. It describes how IP is used to transport various types of media such as voice, video and messaging. It also discusses multimedia conferencing using tools like Adobe Connect and Polycom that allow interacting with people worldwide through video and audio. Real-time Transport Protocol (RTP) and RTP Control Protocol (RTCP) are also described as protocols used for delivering multimedia over IP networks.
The latest development in network and communicationRizwan Razman
The document discusses recent developments in networking and communication technologies. It describes mobile computing, defining it as using computing devices while in transit. It also discusses internet technologies like VoIP and blogs. Regarding network types, it covers personal area networks (PANs), wireless local area networks (WLANs), and worldwide interoperability for microwave access (WiMAX). The document concludes that these latest developments make networking and communication easier and more useful for IT users.
The document discusses Internet telephony and Voice over Internet Protocol (VoIP). It defines IP telephony as using Internet protocol to exchange voice, fax, and other information traditionally carried over telephone networks. VoIP aims to standardize IP telephony. The document then describes how a VoIP call is completed by digitizing, compressing, and transmitting voice data over the Internet in packets before reassembling it at the destination. It notes benefits of IP telephony include potential cost savings compared to traditional telephone networks.
This document discusses how LTE subscribers will behave differently than 3G subscribers and outlines requirements for an evolved Subscriber Data Management (eSDM) solution. Key points include:
1) LTE subscribers will use multiple devices and expect service ubiquity across devices and networks.
2) An eSDM solution is needed to consolidate subscriber information across access networks and domains to provide a personalized experience.
3) The solution must be highly scalable, reliable, and flexible to support new applications and services utilizing the large LTE network pipes.
Bluetooth is a wireless technology standard for exchanging data over short distances. It allows devices such as phones, laptops, headphones, and others to connect to each other and exchange information without wires. Bluetooth operates using radio waves in the unlicensed ISM band at 2.4 GHz and switches between different channels very rapidly. It was developed in 1994 and is now maintained by the Bluetooth Special Interest Group with over 6,000 member companies. While it provides a convenient wireless connection for devices in close proximity, some early implementations had security vulnerabilities that could allow unauthorized access to data.
This document contains a glossary of terms related to video conferencing. It defines terms such as analogue, bandwidth, codec, document camera, firewall, H.320, IP video conferencing, LAN, MCU, NAT, protocol, TCP/IP, USB, and WAN. The glossary provides concise definitions of various technical terms used in the context of video conferencing systems and connections.
Every once in a while a new technology changes the game. Some benefit from it while others fail to adapt. Long Term Evolution, or LTE for short, is on the surface ,just yet another fast wireless standard bringing us faster mobile networking. But just like the freeway was much more than just a faster road, LTE actually has a chance to change the rules for app developers and create new possibilities.
This presentation will help you understand “Data”, Data Management, Data Communication System, Types of Data Transmission etc. and how data management effects business growth.
To know more about Welingkar School’s Distance Learning Program and courses offered, visit:
http://www.welingkaronline.org/distance-learning/online-mba.html
Internet TV, also known as IPTV, delivers video and audio content over an Internet connection. It can be viewed on computers, televisions through set-top boxes, and mobile devices. While similar to traditional TV delivery methods, Internet TV transmits information as data packets over the Internet rather than through broadcast radio waves or cable wires. It provides more content variety than cable TV and allows viewing on any Internet-connected device. IPTV is beginning to compete with traditional TV delivery by using existing broadband infrastructure to deliver television signals.
Verimatrix - Multi-network Solutions in the Real World - CSTB 2012Verimatrix
Verimatrix is a company that provides content and revenue security solutions for multi-network, multi-screen applications. The document discusses industry trends towards converging IPTV and over-the-top (OTT) delivery to provide an enhanced experience for consumers. It also outlines Verimatrix's ViewRight ONETM solution which provides a unified approach to security across networks like DVB, IPTV, and OTT to enable multi-network offerings with a consistent user experience.
This is the subject slides for the module MMS2401 - Multimedia System and Communication taught in Shepherd College of Media Technology, Affiliated with Purbanchal University.
The document summarizes the key phases and activities of the system development life cycle, including planning, analysis, design, implementation, and operation/support phases. It describes the objectives of each phase such as determining requirements during analysis or developing detailed designs during design. Project management, documentation, and techniques like prototyping and testing are discussed as important elements that occur throughout the entire development cycle.
Este documento presenta una práctica sobre los poliedros regulares (tetraedro, hexaedro y octaedro) que incluye estudiar sus características, leer teoría sobre cada uno, realizar ejercicios prácticos y ver videos como ayuda. Los estudiantes deben contestar preguntas sobre las características, estudiar en profundidad cada poliedro usando enlaces web, hacer los ejercicios prácticos y entregar la práctica en papel para el 26 de marzo.
This document contains lecture slides on building simple interactive apps for mobile devices. It discusses separating an app's presentation and functionality through XML layouts. It then demonstrates a simple temperature conversion app with buttons to convert between Celsius and Fahrenheit. When the device orientation changes, the app reverts to default values, likely because the activity is recreated on orientation changes and its state is not saved. The document recommends saving state regularly to prevent data loss during configuration changes.
- Momentum is defined as the product of an object's mass and its velocity. The formula for momentum is p = mv, where p is momentum, m is mass, and v is velocity.
- The momentum of an object depends on both its mass and velocity - an object with greater mass or greater velocity will have greater momentum. For example, a lorry has greater momentum than a car moving at the same speed due to its larger mass.
CSC1100 - Chapter11 - Programming Languages and Program DevelopmentYhal Htet Aung
This document discusses various programming languages and the program development cycle. It describes low-level languages like machine language and assembly language as well as high-level procedural languages like COBOL and C. Object-oriented languages such as Java, C++, C#, and visual programming languages are also covered. The document outlines the six steps in the typical program development cycle: analyzing requirements, designing the solution, validating the design, implementing the design, testing the solution, and documenting the solution. Programming tools used at each step like flowcharts, pseudocode, and debugging are also summarized.
This document provides an overview of communications and networks. It discusses the components required for successful communications including sending and receiving devices. It describes different types of networks including LANs (local area networks), MANs (metropolitan area networks), and WANs (wide area networks). It also differentiates between client/server and peer-to-peer network architectures. The document aims to help readers understand computer communications and networking concepts.
This document provides an overview of communications and networks. It discusses the components required for successful communications including sending and receiving devices. It describes different types of networks including LANs (local area networks), MANs (metropolitan area networks), and WANs (wide area networks). It also differentiates between client/server and peer-to-peer network architectures. The document covers a wide range of topics relating to computer communications and networking.
This document provides information about computer communications and networks. It begins with definitions of computer communication and connectivity. It then discusses wireless technology and wireless revolution. The four elements of every communication system are described as sending and receiving devices, connection devices, data transmission specifications, and communication channels. Various communication channels and physical connections like cables are explained. Key concepts around networks such as topology, architecture and different types of networks are also summarized.
A computer network connects computers and devices together through communication devices and transmission media. It allows sharing of resources like printers, files, data and information. There are three main types of networks - local area networks (LANs) within a small geographical area, metropolitan area networks (MANs) within a city, and wide area networks (WANs) across large areas like countries. Network architecture refers to the overall design of a computer network and describes how it is configured and what strategies are used. The two main architectures are client/server, where a server provides services to clients, and peer-to-peer where all computers have equal capabilities without a central server.
I N T R O T O C O M P U T E R N E T W O R K S ( N E W)Yahya Electone
A network connects multiple computers and devices through communication devices and transmission media. Local area networks connect devices within a limited area like a home or office building, while wide area networks cover larger geographic areas and can connect local networks, like the Internet. The Internet uses the Transmission Control Protocol and Internet Protocol to transmit data broken into packets. Wireless technologies enable cable-free connections between devices using radio frequencies or light waves.
This document provides objectives for a chapter that discusses computer communications and networks. It begins by defining computer communications and its basic components. It then lists several objectives related to differentiating between various network types like LANs, MANs, and WANs; network architectures like client/server and peer-to-peer; and network topologies like star, bus, and ring networks. It also describes various uses of computer communications technologies and standards used for network communications.
The document provides an introduction to the internet and how it works. It discusses some key terms like intranet, extranet, modem, ISP, and IP addresses. It explains that computers connect to each other via gateways and communicate using IP addresses rather than phone numbers. Various internet connection types like dial-up, cable, and wireless are described. The functions of web browsers and how to navigate web pages using URLs and hyperlinks are also summarized.
The document summarizes networking and telecommunication topics, including:
1) The basics of computer networks including hardware, software, and people connecting computers locally and remotely.
2) Common network components like network interface cards, modems, and protocols that establish communication standards.
3) Types of networks including local area networks (LANs) within a building and wide area networks (WANs) connecting multiple sites over long distances.
4) Interpersonal communication technologies like email, teleconferencing, and instant messaging that allow synchronous and asynchronous interactions.
5) Converging technologies including online services, fax, voice mail, video conferencing, and digital payment systems.
This chapter discusses computer networks and communications. It defines networks as collections of connected computers and devices that allow sharing of resources and data. The chapter describes different types of networks including LANs, MANs, and WANs. It also explains common network devices, transmission media, and wireless communication standards used to connect computers and transmit data. The chapter provides an overview of how computer communications work and examples of applications like email, instant messaging, and file transfers that rely on computer networks.
The document discusses communications and networks. It defines communications as the process of transferring data between computers. It identifies the key components needed for successful communications as sending devices, communications devices, communications channels, and receiving devices. It also discusses different types of networks like local area networks (LANs) and wide area networks (WANs), as well as networking technologies like Ethernet and TCP/IP. It explains concepts like intranets, extranets, and firewalls.
This chapter discusses computer communications and networks. It describes the components needed for successful communications, including sending/receiving devices, communications devices, communications channels, and transmission media. The chapter discusses uses of computer communications like the internet, email, and collaboration software. It describes different types of networks including LANs, WANs, client/server networks, and peer-to-peer networks. Standards like TCP/IP, Ethernet, and wireless technologies are also covered. The chapter concludes with sections on communications software, devices, and setting up home networks.
The document discusses different types of computer networks. It describes local area networks (LANs) as connecting hosts in a single office or building over short distances. Wide area networks (WANs) connect devices over longer distances, spanning towns, states or countries, and are typically run by telecommunications companies. Metropolitan area networks (MANs) provide connectivity over areas like a city or campus. LANs use switches to direct traffic to specific hosts, while WANs can be point-to-point connections between two devices or switched networks combining multiple point-to-point links.
1. The document discusses various topics related to data communication, networking, and the Internet. It defines data communication, describes its key components and how it enables sharing of information across computer systems.
2. Network types like LAN, MAN and WAN are described based on their geographical coverage. Popular network topologies, transmission media and models like TCP/IP and OSI are also summarized.
3. Distributed processing and its advantages are mentioned. The importance of protocols and standards for effective communication between networked devices is highlighted.
Dr. John Sum introduces various concepts related to telecommunications and computer networks. He discusses different types of telecommunication media that can transmit electronic signals including twisted pair wire, coaxial cable, fiber optic cable, microwave, satellite, cellular, and infrared transmission. He also examines network topologies like ring, bus, star, hierarchical and mobile ad-hoc networks. Finally, he covers protocols, applications, and the role of telecommunications in connecting computers and enabling functions like email, videoconferencing, electronic data interchange and more.
Dr. John Sum introduces various concepts related to telecommunications and computer networks. He discusses different types of telecommunication media that can transmit electronic signals including twisted pair wire, coaxial cable, fiber optic cable, microwave, satellite, cellular, and infrared transmission. He also describes network topologies like ring, bus, star, and hierarchical networks. The document covers protocols like TCP/IP and OSI 7-layer model, as well as applications of telecommunications including email, videoconferencing, electronic data interchange, and public network services.
Wireless communication technologies allow for mobility and flexibility through radio signals rather than wired connections. They include technologies like Bluetooth, WiFi, wireless LANs and MANs that enable applications such as video conferencing, telemedicine, and distance learning. Common wireless standards are IEEE 802.11 for WiFi and IEEE 802.16 for WiMax. Wireless networks face challenges of limited spectrum availability, lower bandwidth and higher delays compared to wired networks. Emerging wireless technologies are expanding connectivity and access to services for more users.
This document provides an overview of computer networking concepts for class 8 students. It defines a computer network and its basic components, including nodes, senders, receivers, and transmission medium. It describes the advantages of networking and different types of networks like LAN, WAN, MAN, and PAN. It also discusses networking media, devices, terminology, and protocols like TCP/IP, HTTP, FTP, and IMAP/POP. The key topics covered include introduction to networks, networking advantages, media, types of networks, devices, terminology, and protocols.
The document discusses key aspects of information systems including hardware, software, data, people, and procedures. It then covers various measures to secure data such as software access restrictions, backup and recovery, and virus protection. Finally, it discusses the evolution of the internet from early networks in the 1960s-1970s to the introduction of the world wide web in the 1990s.
Similar to CSC1100 - Chapter07 - Communications & Networks (20)
HIT3328 - Chapter0701 - Dialogs, Tabs and ListsYhal Htet Aung
This document discusses dialogs, tabs, and lists in Android mobile app development. It begins with a short introduction to design patterns and how API designers use patterns like method chaining and builder. It then covers creating custom dialog boxes in Android and how to construct them using callbacks. Tabbed layouts are explained using tab widgets and frame layouts. Lists are enhanced by adding images to rows using custom row adapters. Throughout, it emphasizes patterns like method chaining used in the Android SDK.
The document provides an overview of a lecture on sketching apps. It discusses elements of design like motivation, scenarios, tasks and modes of operation. It provides examples of sketches and prototypes for mobile apps. Key differences between sketches and prototypes are outlined, with sketches being more tentative and exploratory while prototypes allow for more testing. An example concept for a gardening app is used to demonstrate sketching and paper prototyping techniques. The document emphasizes that sketching and prototyping help evolve the initial design and problem understanding.
This document discusses menus, frame layouts, and lists in Android mobile app development. It covers creating custom menus as resources, handling menu clicks, and displaying toasts. It also explains how to use frame layouts to overlay views and toggle visibility. Finally, it discusses using adapters to connect lists to data sources and format each list item view.
The document discusses navigation flow and design approaches for mobile applications. It covers modeling navigation flows using simple notation to represent activities, triggers between activities, menus, tabs, and data passing. It emphasizes designing the navigation flow on paper first before coding. The initial code builds should focus on demonstrating the navigation flow without functionality, by wiring up lists, dialogs, menus and basic triggers between activities. Sketches of screens can also be included in initial builds to test overall look and feel. Detailed screen layouts are not needed in early builds.
This document discusses principles for designing forms on mobile devices. It covers:
1) Different layout options for labels and fields, recommending labels above input fields based on usability research.
2) Using a TableLayout to improve alignment and control over columns.
3) The "read-tap asymmetry" principle, which means labels can be smaller than fields since text can be read at smaller sizes.
4) Styles can be used to apply common formatting to labels consistently.
5) Scrolling is ideal for long forms on mobile. A soft keyboard pops up for data entry but lacks a tab button to navigate between fields.
HIT3328 - Chapter02 - Foundation and ToolsYhal Htet Aung
This document contains lecture notes on mobile application development for Android. It discusses the fundamentals of programs and operating systems, and provides an overview of what Android is for programmers. It covers Android development tools like the Eclipse IDE, Android SDK, and emulator. It also discusses configuring the IDE for additional insight through logging and emulator control. The document demonstrates how to build a simple Android app with a linear layout, text and image views. It explains the concepts of activities, views, view groups, and resources in Android apps.
This document discusses passing data between activities in Android applications. It provides an overview of different data passing methods, including using global variables stored in the application object, storing data in a separate data layer like a database, and sending data in bundles via intents. It also covers the Android activity lifecycle and how activities are stacked. The document includes code snippets and diagrams to illustrate concepts. It concludes with demos of passing data between activities using global variables and intents.
HIT3328 - Chapter01 - Platforms and DevicesYhal Htet Aung
This document discusses mobile application development for smartphones. It covers mobile ecosystems, hardware capabilities and constraints, operating systems, and the application development lifecycle. The key points are:
1) Mobile ecosystems involve various players like platform providers, hardware manufacturers, network operators, and content providers. Operating systems like Android and iOS have different ecosystem participants.
2) Smartphone hardware faces constraints like limited memory, processing power, and battery life. Developers must optimize for these constraints.
3) Mobile operating systems tightly control apps to optimize resource usage and prioritize phone calls. Developers must be aware of how their app can be suspended, terminated or moved between foreground and background.
4) The application development process involves planning,
This document discusses various topics relating to computer security, ethics, and privacy. It covers types of computer security risks like viruses, worms, and Trojan horses. It also discusses techniques for safeguarding against internet and network attacks, unauthorized access and use, hardware theft and vandalism, and software theft. Some key safeguarding techniques mentioned are using antivirus software, firewalls, strong passwords, access controls, and biometric authentication.
1) A database is a collection of related data organized so that it can be easily accessed, managed, and updated. Database management systems (DBMS) allow users to create databases and access data in a controlled manner.
2) The database approach offers advantages over file processing systems like reduced data redundancy, improved data integrity, and shared access to data. Popular DBMSs include Microsoft Access, MySQL, Oracle, SQL Server, and IBM DB2.
3) Database administrators and analysts work to design efficient databases, define user access privileges, monitor performance and security, and ensure the reliability of data through backups and recovery procedures.
This document provides an overview of operating systems and system software. It defines key terms like operating system, utility programs, and device drivers. It describes the basic functions of an operating system such as booting up a computer, providing a user interface, managing memory and programs, scheduling jobs, and establishing network and internet connections. It also discusses various types of operating systems like stand-alone, network, and embedded operating systems. Finally, it explains the purpose of common utility programs that come with operating systems like file managers, firewalls, disk cleaners, and backup utilities.
The document discusses different types of storage devices and media, describing the characteristics of magnetic disks like hard disks, optical discs like CDs and DVDs, as well as other storage technologies. It covers the basics of how these storage devices work, their capacities and speeds, and differentiates between read-only, recordable, and rewritable variants. The goal is to help students understand computer hardware storage and how various storage devices and media store and retrieve data.
This document discusses various computer output devices. It begins by defining output as processed data conveyed to users and describes the four main categories of output devices: display devices, printers, audio devices, and other specialized devices. The document then provides details on the characteristics and uses of different types of monitors (LCD, plasma, CRT), printers (inkjet, laser, photo), and audio devices (speakers, headphones). It concludes by suggesting configurations of output devices for different types of users (home, mobile, business).
This document discusses various types of computer input devices. It defines input and describes common input methods like keyboards, mice, touchscreens, scanners, cameras, and biometric devices. It explains how these devices work and are used for tasks like data entry, navigation, document scanning, video/photo capture, and identity verification. The document is intended to help students understand the characteristics and functionalities of basic computer hardware input components.
CSC1100 - Chapter02 - Components of the System UnitYhal Htet Aung
This document discusses the components of the system unit. It describes the central processing unit (CPU) which includes the control unit that directs operations and the arithmetic logic unit (ALU) that performs calculations. The CPU fetches instructions from memory and follows a machine cycle of fetch, decode, execute, and store. Caching and pipelining help improve processor speed. Memory temporarily stores instructions and data and comes in types like RAM, ROM, and flash memory. Expansion slots hold adapter cards to add functionality. Various ports allow connection to other devices.
CSC1100 - Chapter01 - Overview of Using ComputersYhal Htet Aung
This document provides an overview of using computers and defines key computer literacy terms. It describes the components of a computer including input devices, output devices, the system unit, storage, and communication devices. It also defines software, distinguishing between system software and application software. The document discusses advantages of using computers such as speed, reliability, consistency, storage, and communication. It also covers disadvantages including privacy violations, impacts on the labor force and environment, and potential health risks.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
2. 2
Chapter 7 Objectives
Discuss the components required for
successful communications
Explain the purpose of
communications software
Identify various sending
and receiving devices
Describe various types of lines for
communications over the telephone network
Describe uses of computer communications
Describe commonly used
communications devices
List advantages of using a network
Discuss different ways to set up
a home network
Differentiate among client/server,
peer-to-peer, and P2P networks
Identify various physical and wireless
transmission media
Describe the various network
communications standards
3. 3
Communications
What are computer communications?
Process in which two or more computers/devices transfer
data, instructions, and information
4. 4
Communications
What is needed for successful communications?
Sending Communications Communications
device — initiates device — connects channel — media
instruction to the sending device to on which data,
transmit data, the communications instructions, or
instructions, or channel information travel
information
Communications Receiving
device — connects device — accepts
the communications transmission of data,
channel to the instructions, or
receiving device information
5. 5
Uses of Computer Communications
What are some uses of communications technology?
Instant
Internet Web E-Mail Messaging
Internet
Chat Rooms Newsgroups
Telephony
Fax Machine
Web Video
FTP or Computer
Folders Conferencing
Fax/Modem
6. 6
What are wireless messaging services?
TEXT MESSAGING
Limit messages to usually fewer
than 300 characters
Text messaging Mobile to Mobile
allows users to send Mobile to E-Mail
and receive short Web to Mobile
text messages Mobile to Provider: use common
(SMS) on a phone short code – 4 or 5 digit num
or PDA assigned to specific content or
wireless service provider, followed by
message – e.g. vote for TV prg
contestant
7. 7
What are wireless messaging services?
PICTURE MESSAGING
Video messaging: to send short video clips (about 15
seconds)
Smart phones & PDAs with picture/video messaging
also called MMS (multimedia message service)
Camera phone, video phone
Mobile to Mobile
Mobile to E-Mail
Picture messaging
allows users to send
graphics, pictures,
video clips, sound
Video
files, and short text
messaging
messages
8. 8
What are wireless messaging services?
WIRELESS INSTANT MESSAGING (IM)
Real-time Internet communications service that allow
wireless mobile devices to exchange messages with
one or more mobile devices or online users
Some WISP provide IM service: smart phone &
PDAs can be used to send & receive instant messages
AOL Instant Messenger (AIM),
Yahoo! Messenger
Mobile to Mobile Wireless instant
Mobile to PC messaging allows
Web to Mobile wireless mobile
devices to exchange
messages
9. 9
Uses of Computer Communications
What are wireless Internet access points
and cybercafés?
Wireless Internet access
point allows wireless
connection to Internet in
public location
Hot sport, 3G network
Cybercafé is coffee house
that provides computers
with Internet access – some
are also hot spots
10. 10
Uses of Computer Communications
What is a global positioning system (GPS)?
Navigation system consists of one or more earth-based
receivers that accept & analyze signals sent by satellites in
order to determine the geographical location
GPS receiver: handheld, mountable or embedded device
containing an antenna, a radio receiver and a processor –
many include screen display showing an individual’s
location on a map
11. 11
Uses of Computer Communications
What is a global positioning system (GPS)?
Step 2.
Step 1. A GPS receiver
GPS satellites orbit (such as in a car, a
Earth. Every wearable device, a
thousandth of a smart phone, a
second, each satellite handheld device,
sends a signal that or a collar)
indicates its current determines its
position to the GPS location on Earth
receiver. by analyzing at
least 3 separate
satellite signals
from the 24
satellites in orbit.
12. 12
Uses of Computer Communications
What are collaboration and groupware?
Collaboration or work
online is working with other
users connected to a server
A document management system
provides for storage and
management of a company’s
documents
Groupware is software that
allows people work together
and share information over a
network
13. 13
Uses of Computer Communications
What are voice mail and web services?
Voice mail is voice message
converted to digital form
Web services describe standardized
software that enables programmers
to create applications that
communicate with other remote
computers over the Internet or on an
internal business network
doesn’t specific require prg lang,
OS, or Web browser
By sending properly formatted
XML (eXtensive Markup
Language) files to Web services
15. 15
Networks
What is a network
network?
Collection of
computers and devices
connected via
communications
devices and
transmission media
What are the advantages of using a network?
16. 16
Networks
What is a local area network (LAN and a
LAN)
metropolitan area network (MAN
MAN)?
Network in limited geographical area such as
home or office building
Wireless LAN (WLAN
WLAN)
Metropolitan area network (MAN) connects LANs
in city or town
17. 17
Networks
What is a wide area
network (WAN)?
Network that covers
large geographic
area using many
types of media
Internet is world’s
largest WAN
22. 22
Networks
What is a bus network?
All computers and devices connect to central
cable or bus
23. 23
Networks
What is a ring network?
Cable forms closed
ring, or loop, with all
computers and devices
arranged along ring
Data travels from
device to device
around entire ring, in
one direction
24. 24
Networks
What is a star network?
All devices connect to
a central device (hub
or switch)
All data transferred
from one computer to
another passes
through hub or switch
25. 25
Networks
What is an intranet?
Internal network that uses Internet technologies
Makes information accessible to employees
Typically includes connection to Internet
Extranet allows customers or suppliers to access
part of company’s intranet
28. 28
Network Communications Standards
What are Ethernet and token ring?
Ethernet technology allows computers to contend
for access to network
If two computers send data at same time, a collision occurs and
computers must send the data again
Token ring technology controls access to network
by requiring devices to pass a special signal,
called token
29. 29
Network Communications Standards
What are TCP/IP and 802.11 (Wi-Fi)?
TCP/IP (Transmission Control Protocol/Internet
Protocol) technology transmits data by breaking it up
into small pieces, or packets
Commonly used for Internet transmissions
802.11 (Wi-Fi) is family of standards for wireless LANs
32. 32
Network Communications Standards
What are UWB, IrDA, RFID, WiMAX, and Wireless
Applications Protocol (WAP)?
UWB IrDA
specification allows specification allows
data to be transferred data to be transferred Worldwide Interoperability
wirelessly via short-range wirelessly via infrared for Microwave Access (WiMAX
radio waves light waves or 802.16)
standard that specifies how wireless
devices communicate over the air
Radio Frequency in a wide area
Identification (RFID) Wireless Applications
uses radio signals to communicate Protocol (WAP)
with a tag placed in an object allow wireless mobile devices
to access Internet
34. 34
Communications Software
What is communications software?
System software
Programs that help users
establish connection to
Internet, other network,
or another computer Programs that help users Application
manage transmission of software
data, instructions,
and information
Programs that provide an
interface for users to
communicate with one
another
Application software for communication:
e-mail, FTP, Web browser, newsgroup/message
boards, chat rooms, instant messaging, video
conferencing, Internet telephony,…
36. 36
Communications Over the Telephone Network
What is the public switched
telephone network (PSTN)?
Worldwide telephone
system that handles
voice-oriented
telephone calls
37. 37
Communications Over the Telephone Network
What is a dial-up line?
Temporary connection using telephone line for
communications
Computers at any two locations can establish a
connection using modems and telephone network
Costs no more than making regular call
38. 38
Communications Over the Telephone Network
What is a dedicated line?
Always-on connection
between two
communications
devices
39. 39
Communications Over the Telephone Network
Dedicated lines:
5 types:
1.ISDN (Integrated Service Digital Network) line
2.DSL (Digital Subscriber Line), ADSL (Asymmetric …)
3.FTTH & FHHB (Fiber to the Home/Building)
4.T-Carrier line (T1, fractional T1, T3)
5.ATM (Asynchronous Transfer Mode)
ISDN line technique
multiplexing of carrying 3 or more
signals at once through
the same line
41. 41
Communications Devices
What are examples of communications devices?
Common types are dial-up modems, ISDN and
DSL modems, cable modems, wireless modems,
network cards, wireless access points,
routers, and hubs
ISDN and DSL modems send
and receive data from ISDN
and DSL lines
42. 42
Communications Devices
What is a dial-up modem?
A dial-up modem converts digital signals to analog signals
and vice versa
Usually in the form of an adapter card
43. 43
Communications Devices
What are ISDN (Integrated Service Digital Network)
and DSL (Digital Subscriber Line) modems?
Communications devices that send and
receive digital ISDN and DSL signals
Usually external devices in which one
end connects to a telephone line and the other
end connects to a port on the system unit
44. 44
Communications Devices
What is a cable modem?
Sends and receives data
over cable television
(CATV) network
Much faster than dial-
up modem or ISDN;
speed similar to DSL
Sometimes called a
broadband modem
Placed after cable splitter
System unit has network
card – e.g. Ethernet card
45. 45
Communications Devices
What is a wireless modem?
Allows access to the Web
wirelessly from a
notebook computer, a
PDA, a smart phone, or
other mobile device
Typically use the same waves used by cellular telephones
Has external or built-in antenna
Available as PC Cards, ExpressCard modules and flash
cards
46. 46
Communications Devices
What is a network card?
Is an adapter card, PC Card,
ExpressCard module, USB
network adapter, or flash card
that enables computer or device to
access network
Coordinates the transmission and
receipt of data, instructions &
information to & from the
computer or devices containing
the network card Wireless network card
Sometimes called network
interface card (NIC)
47. 47
Communications Devices
What is a wireless access point?
Central
communications
device that allows
computers and
devices to transfer
data wirelessly among
themselves or
wirelessly to a wired
network
48. 48
Communications Devices
What is a router?
Connects computers and
transmits data to correct
destination on network
Routers forward data on
Internet using fastest
available path
Some routers have a built-in
hardware firewall
49. 49
Communications Devices
What is a hub or switch?
Device that provides central
point for cables in network
Some hubs include routers –
hub receives data from many
directions and then forwards it
to one or more destinations
What are the differences between a hub & a switch & a router?
50. 50
Home Networks
What is a home network?
Multiple computers
connected in home
Several types of home
networks
Ethernet — connect
computers via cable
Powerline cable —
use electrical lines in house
Phoneline — use
telephone lines
Wireless Home Network
HomeRF network, Wi-Fi home network
52. 52
Communications Channel
What is a communications channel?
Transmission media on which data travels in
communications system
Bandwidth is amount of
Transmission media data that can travel
are materials capable of over a communications
carrying one or more channel
signals
Latency is the time it
takes a signal to travel
from one location to
another on a network
53. 53
Transmission Media
Transmission media
category
Baseband media Broadband media
transmit only one transmit multiple signals
signal at a time at much faster speed
Download transfer rates are
faster than upload
DSL, cable television Internet
service, satellites,…
55. 55
Transmission Media
Transmission media
types
Physical transmission media Wireless transmission media
Twisted-Pair Cable, Coaxial Infrared, Broadcast Radio,
Cable, Fiber Optic Cable Cellular Radio, Microwave
56. 56
Physical Transmission Media
What is physical transmission media?
Wire, cable and other
tangible materials used to
send communications signals
57. 57
Physical Transmission Media
What are twisted-pair cable and coaxial cable?
Twisted-pair cable is used for telephone systems and network cabling
(LAN)
Reduced noise – electrical disturbance that can degrade
communication
58. 58
Physical Transmission Media
What are twisted-pair cable and coaxial cable?
Coaxial cable is often used for cable television wiring – long distance
Single copper wire surrounded by at least 3 layers: an insulation
material, a woven or braided metal, a plastic outer coating
59. 59
Physical Transmission Media
What is fiber-optic cable?
Capable of carrying
significantly more
data at faster speeds
than wire cables
Less susceptible
to interference
(noise) and, therefore,
more secure
Smaller size (thinner
and lighter)
60. 60
Wireless Transmission Media
What is wireless transmission media?
Used when inconvenient, impractical, or impossible to
install cables
Includes Bluetooth and IrDA
61. 61
Wireless Transmission Media
What are broadcast radio and cellular radio?
Broadcast radio distributes radio signals over long distances (btw
cities, countries,…) and short distances (within an office or home)
- Flexible & portable but slower, more susceptible to noise
- used by Bluetooth, UMB, HomeRF, Wi-Fi, and WiMAX
* Bluetooth & UMB are alternatives to infrared communications
* Hot spots use Wi-Fi & WiMAX networks
Cellular radio
is form of broadcast radio used for
mobile communications – wireless
modems & cellular telephones (use high-
frequency radio waves to transmit voice
& digital data messages)
- 1G, 2G & 3G
62. 62
Wireless Transmission Media
What is a microwave station?
Earth-based reflective dish contains antenna, transceivers
and other equipments for microwave communications
Microwave: radio waves at high-speed signal transmission
(fixed wireless)
Must be transmitted in
straight line with no
obstructions
63. 63
Wireless Transmission Media
What is a communications satellite?
Space station that receives microwave
signals from earth-based station, amplifies
(strengthens) signals, and broadcasts
signals back to any number of earth-based
stations (microwave stations, smart phones
& GPS) - uplink down link
Air navigation, television and radio
broadcast, & Internet connections use
communications satellites
Satellite Internet connection needs a
satellite dish & a satellite modem card
64. 64
Summary of Communications and Networks
Communications terminology
and applications
Various communications
devices, media, and procedures
How to join computers into a network
Chapter 7 Complete