Thursday, 26 May 2016

Last Class Telecommunication & Networking

This class more about tips for final exam and the type and advantages/disadvantages topology network. Dr Dayana ask the students to watch the video about topology ( MIT Blossoms) which is the wedding table relate computer network. After that, the students have to acting to become topology. This can make student more understand and remember the long time about the type of topology.




What do I want from this class?
Improve my knowledge about the types and different of network topology. For example, the advantages of star topology and the disadvantages of linear bus topology.

What might I expected from this class?
Dr Dayana ask the student to watch the video blossoms about topology and then the student had to acting in the type of topology.

Why this class is relevant to my study?
This class is relevant to my study because it is easy when become the teachers then have to making decisions about the type of topology.

What new thoughts have come into my head so far in this class?
  • The star topology has to go hub then go another workstations.
  • The linear bus topology has terminator in the end also has backbones.
Lastly, I would enjoy learning this subject. I would like to say a big word of thank you to Dr Dayana & Dr Affandy and all the fellow classmates 1SPPS.
Thank you for this enjoyable 15 weeks of fun! This subject would be my most unforgettable moment.

Monday, 23 May 2016

Network & Computer Security

Introduction to Network
Consists of the provisions & policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network accessible resources.

Unauthorized Access/Used

Unauthorized access : When an individual gain access to a computer, network or file without permission.
Unauthorized used : Using a computer resource for unauthorized activity.

Types of unauthorized access/used.
1. Hacking - act of breaking into a computer or network. Using a computer to hack another computer system.
2. War Driving & Wi-Fi piggybacking - unauthorized used of a Wi-Fi network.
3. Interception of communication - gaining unauthorized access to the files/data/messages/e-mail.

Computer Sabotage
Acts of malicious destruction to a computer or computer resource.

Forms of computer sabotage :
  • Botnet - computer that is controlled by a hacker.
  • Denial of service - attempt to flood a network with so many requests for action. Leads to shuts down or simply cannot handle legitimate requests anymore.
  • Computer viruses 
Phishing & Web Spoofing

Phishing 
  • attacks are performed with the intention to acquire personal information like credit card numbers, bank account.
  • the recipients are encouraged to enter personal identification data.
Web Spoofing
  • mocking the web presences of trusted corporations with the intention to trick customers.
  • also employed for phishing attacks.
Desktop Security Issues 
End users' security can be endangered through threats like adware, spyware, viruses and worms.
  1. Adware - programs used to deliver advertising content
  2. Spyware - intends to remain unrecognized
  3. Viruses - programs that are attached to executable files or documents. Virus is executed when the host program is executed or documents is loaded.
  4. Worms - programs that can replicate or copy themselves. Example : when it is being distributed as e-mail attachment, a worm might send a copy to all the address listed.
  5. Trojan horses - program do not replicate themselves but typically cause damage or compromise of security of infected computers. Damage caused varies include data theft and destruction or illegitimate access.

Sunday, 22 May 2016

Social & Ethical issues, Intellectual property rights, Ethics.




Intellectual property rights.
Legal rights to which the creator of intellectual property, original creative works, are entitled. 

Types of intellectual property rights. 

1. Copyrights - exclusive right given to the owner of a copyright for a specific period. (Copyright Act 1987) 
                                    

2. Trademarks - sign which distinguishes the goods and services of one trader from those of another. A mark includes words, logos, pictures, names, letters, numbers or a combination of these.  


3. Patents - exclusive right granted for an invention, which is a product or a process that provides a new way of doing something or offers a new technical solution to a problem.
 
Obtain a copyright
  • sufficient effort has been expected to make the work original in character
  • the work has been written down, recorded or reduced to a material form
  • the author is qualified person or the work is made in Malaysia or the work is first published. 
Cyberlaws in Malaysia.

1. Digital Signature Act 1997
The Act mainly provides for the licensing and regulation of Certification Authorities (CA). CA issue Digital Signatures and will certify the identity of a signor by issuing a certificate. The Act also makes a digital signature as legally valid and enforceable as a traditional signature. The Digital Signature Act was brought into force on 1st October 1998.

2. Computer Crime Act 1997 
The Act makes it an offense to
  1. Enter or attempt to enter into computers and computer systems without authorization.
  2. Damage or alter data/information in computers or computer systems by planting viruses or other means.
  3. Aid people in doing items 1 & 2.
  4. Give passwords to people who are not authorized to receive it.
The Computer Crime Act was brought into force on 1st June 2000.

3. The Copyright ( Amendment ) Act 1997
Serves to protect the expression of thoughts and ideas from unauthorized copying and/or alteration.
The Copyright (Amendment) Act amends the Copyright Act 1987 to extend copyright law to the new and converged multimedia environment. The transmission of copyright works over the internet now clearly amounts to infringement. Technological methods of ensuring works and authorship info are not altered or removed is also protected. The Copyright ( Amendment) Act 1997 was brought into force on 1st April 1999.

4. The Communications and Multimedia Act 1998
Convergence of technologies is also resulting in the convergence of the following industries: telecommunications, broadcasting, computing and content.
The CMA provides for a restructuring of the converged ICT industry. It creates a new system of licenses and defines the roles and responsibilities of those providing communication and multimedia services. The Communications and Multimedia Act was brought into force on 1st April 1999.

5.  The Electronic Government Activities Act 2007
To facilitate the electronic delivery of government services to the public.

6.  Software Piracy and Digital Counterfeiting
Creating duplicates of software/digital items and then selling/using them as authentic items.
 

Tuesday, 3 May 2016

Internet Application ( for teaching & learning )

Type of internet application

1.Asynchronous application
2.Synchronous application 

Asynchronous Application 
-communication not occurring at the same time,different time and place
-learners view information & respond at different times& from different place
-for example: news group, online forum

Synchronous Application
-communication is in real time. Same time & different place
-learners view content at the same time. Responses are immediate
-for example: Text chatting( google talk, yahoo messenger, e-learning )
                     Video chatting( skype )


Pros and Cons

Pros
  • plenty of time to formulate thoughts
  • able to respond in detail
  • giving them time to research certain ideas   
Cons
  • time lost waiting for a response 
Before the class dismiss, En Affandy ask to choose internet application for teaching & learning. Doing by microsoft word and must 1 page only. I would like to choose twitter for teaching & learning because twitter is a free, online social media tool, found at Twitter.com. You can also download the app onto your computer, tablet or phone. Once you have your account set up, you can post, or tweet, your thoughts in messages of 140 characters or less. That tweet can include a link to another website, a video, or photo. You can also share something someone else has posted through a re-tweet. After submit at e-learning UTM, En Affandy choose random student to present about why they choose that internet application, explain how to implement application in teaching and advantages and drawbacks in impleting the application.  

Thursday, 28 April 2016

Web Searching & Email Application.

Web Searching

World Wide Web (WWW) It is called a "web" because the interconnections between documents resemble a spider's web. Web searching is an act of looking for information in computer database or network (web).

Categories of Web Searching.
1.Directories- hierarchical representation of hyperlinks.
2.Search engines- allows user to submit a query that consists of a word or phase. Searches the database. Example: Google, Yahoo.
3.Meta-search engines- use of more than one other search engine to complete the search job. Example: Metasearch, Metacrawler and Meta search engine.
4.Yellow pages-  white pages allows user to lookup information about individuals. Also can use white page to track down the telephone numbers and email addres. Yellow pages contain information about businesses.

Searching Techniques.
1.Terminology
2.Pattern matching queries- Required keyword: mark with "+" before the keyword
                                           Prohibited keyword: mark with "-" before the keyword

3.Boolean query- query that consist keywords but with logical operators (AND,OR,NOT)
4.Search strategies
5.Search generalization
6.Search specialization

Searching: How does it works?
1.User interface: Allows you to type a query and displays the results.
2.Searcher: The engine searches the database for matching your query.
3.Evaluator: The engine assigns scores to the retrieved information.
4.Gatherer: The component that travels the WEB, and collects information.
5.Indexer: The engine that categorizes the data collected by the gatherer.

Searching Tips.  
 1.Use different resources to find/search different kinds of information.
 2.Use successive query refinement to achieve effective search queries.
 3.Think carefully for the keywords typed in the search engine.
 4.Use Boolean queries when you need combinations of keywords.

After end of slide Web searching, we've been asked to find topic about "communication model" with pdf at google and send it to elearning UTM. I google "communication model pdf" it easy to find it.

Email Application. 
A mail, but is sent electronically across the internet. It also quickly delivered in seconds or minutes.

Advantages & Disadvantages.
Advantages: Convenience, Fast speed, Inexpensive, Printable, Reliable, Global, Generality ( not limited to text, but graphics, programs, even sounds )

Disadvantages: Misdirection, Interception, Forgery, Overload, Funk (spamming), No response (from the receiver).

Email Address
-user@host
Example: noordayana@utm.com
                noordayana: username
                utm.com: host
-username and host are separated by "@" 

Email Server and Client. 
Email server- software that can send/receive email from/to other email server.
Email client- software that can transfer email from a local host to a local email server. 
Mailbox- an electronic mailbox is a disk file which holds email messages.

Carbon Copy Section (CC)
- send a message to more than one person, all recipients will see the list of email addresses.
Blind Carbon Copy Section (BCC)
- the addresses won't be seen by the recipients

How does email works? 



Before the class dismiss, Dr Dayana asked to do flow chart on how email work and send it at elearning UTM. 

 This is my flow chart on how email work :D
 

Sunday, 20 March 2016

Week 5 : Wireless Technology & Internet Infrastructure.

Wireless Technology.

Wireless signal (radio) signals are used to send data through the airwaves between devices, instead of physical cable. Wireless technology is generally used for mobile IT equipment. It encompasses cellular telephones, personal digital assistants (PDA's) and wireless networking.

Cisco's Wireless Data Initiatives. 
  
-Point-point / multipoint wireless



-Wireless LAN

 

-Wireless local loop





-Mobile Cellular voice / Data Communications




Uses of wireless technology :

1. Mobile users can use their cellular phone to access e-mail anywhere and anytime.
2. Travelers with portable computers can connect to the internet through base stations installed in airports, railway stations, and other public locations.
3. At home, users can connect devices on their desktop to synchronize data and transfer files.

Type of wireless technology :

 1. Wireless wide area networks (WWANs)
 2. Wireless metropolitan area networks (WMANs)
 3. Wireless local area networks (WLANs)
 4. Wireless personal area network (WPANs)

Wireless technology

1. Infra Red
2. Wireless local area networks (WLANs) , WiFi
3. Broadband wireless
4. Bluetooth
5. WiMAX - to extend the range of wireless network.

Internet Infrastructure.

What is Internet?

A global collection of network. Interconnected computers work by transmitting data through a special type of packet switching which is known as the IP ( internet protocol). When you connect to the internet, your computer becomes part of a network.

Internet VS World Wide Web


A Hierarchy of Networks

-from a single computer to LAN
-from LAN to ISP
-ISP to WWW



 Internet Protocol

Every machine on the internet has a unique identifying number, called an IP address. The IP stands for internet protocol, which is the language that computers use to communicate over the internet. A protocol is the pre-defined way that someone who wants to use a service talks with that service. The "someone" could be a person, but more often it is a computer program like a web browser.




Type of internet connection and access

1. Dial connection
2. Cable
3. Satellite internet access
4. Fixed wireless
5. Broadband
6. Mobile wireless 
  
Before the class dismiss, DR Dayana teach "how to change theme" at gmail.com. Also, how to change photo. Dr Dayana also told about important of nickname IP address. It is because to easy people find by search name and very important to interview especially a professional job. Dr Dayana also told to put a formal photo. By this class, I more understand about e-mail and important of IP address. THANK YOU :D 

  

 

Wednesday, 16 March 2016

Week 4 : Computer Networking (Part 2)

Defining Computer Networking

Computer network is a collection of computers and other hardware devices so that network users can share hardware, software, data and they can communicate with each other electronically. 





Type of Network
 Many types of network depending on the geographical area.

1. Local Area Network (LAN) - Covers relatively small geographical area. Example: home, school and office.

2. Metropolitan Area Network (MAN) - Design to service a metropolitan area. Consist of multiple LAN. Example city.

3. Wide Area Network (WAN) - Covers large geographical area and consist of two or more LAN connected together using communication technology internet is the largest WAN.

4. Personal Area Network (PAN) - Network of personal devices. Example: printer, mobile devices, wired and wireless.



Network Component 

1. Hots/ End Nodes
Refers to the data source and the data destination. Example: personals computers, terminals, workstations and automatic teller machine. 



2. Transmission media(Cable)
For transmitting data and control signals. Responsible for sending electric or signal through spesific media. It can be bounded(wired) or unbounded (wireless) media.  


3. Network Electronic Device
Responsible to control data from source to destination. To connect multiple network together or to connect computer or network to the internet. Example: bridges, routers, multiplexers, switches, hubs, gateways and front end processors. 

4. Application/Software
The protocol determines the rules and procedure to send data, terminate data, interpret data, present data and control mistakes. Software in the network function to ensure data is delivered at respective destination. To control data transmission. 

5. Network Architecture Standard & Protocol. 
To ensyre interoperability between various devices and equipment made by different vendors. Also, to enable devices made by different companies to work or communicate with each other. Example : TCP/IP, Ethernet (802.3), Wi-Fi (802.11), and WiMAX.

Networking Architecture
Network architecture is the way they are design to communicate.

2 types of network architecture

1. Client/server networks
Client = computers that request or utilize network resources.
Server = processing the request by client.
Retrieves file from server : download, transfer from client to server : upload

2. Peer to peer network
No central server. Have direct access to other devices attached to the network. Example itunes, bluetooth between handphone.

Network Topology
Study of the arrangement or mapping of the element (links, nodes) of a network, especially the physical (real) and logical (virtual) interconnections between nodes.

Physical network topology
1. Linear bus 

2. Ring 


3. Star

4. Tree / Hybrid

5. Mesh


2. Logical Network Topology
2 types of logical network is shared media topology and token-based topology. 

Before the class ended, we've been asked to make a slides using google slide about network topology. Our class has been divided by 5 groups. For example, linear bus topology, ring topology, star topology, tree topology and mesh topology. I and my friends have to make slide about ring topology using google slide. Google slide very simple because can make assessment together with friend through online with different place.


Saturday, 5 March 2016

Week 3 : Computer Networking


What do I want from this class?
I want to learn more about computer networking for my career as a teacher in the future that are technologically advanced.

What might I expected from this class?
I expected that I will learn about type of cable, cable connector and compare wired and wireless network in terms of speed,cost and reliability.

Why this class is relevant to my study?
This class very relevant to my study because improve my knowledge about computer networking and world today is full advanced with technology especially communication and networking.

What new thoughts have come into my head so far in this class?
 I learn about how to set up network by network components. For example, Printer(1), computer(2), personal laptop(1), concentrator/hubs(1), server(1), wires and network interface card(2). This is my example answer. ( NIC must with computer)






COMPUTER NETWORKING

Wired Vs Wireless network  

Wired network-connected by using cables. Example using conventional telephone cables. 

Wireless network-use signals to transfer data. Example television and radio network and cellular network.

For home connection,
    Speed-Wired network better than wireless network.
    Cost-Wired network
    Reliability-Wireless network. 


Type of Cable.

1.Coaxial cable - carry large number of high-speed video transmission at one time.


2.Fiber optic cable - Transfers data represented by light pulses (billions of bit per second).




3.Twisted-pair cable
   i)Shielded twisted pair (STP)
  ii)Unshielded twisted pair (UTP)



Cable Connector
1.Coaxial cable connector - Bayonet-Neill-Concelman (BNC)
2.Fiber optic cable connector - ST & SC Connector
3.UTP Cable connector - RJ-45 Connector ( RJ = Registered Jack )

Network Hardware. 

1. File server - fast computer



2. Workstation - computer that connected to a network. Example laptop.


3. Network Interface Card (NIC) 
 -provides the physical connection between the network and the computer workstation.
 -three most common network interface connection are Ethernet cards, localtalk connectors (macintosh computer-apple), and token ring cards ( nine pin Din type connector).




4. Concentrator/Hubs
-central connection point, lots of extra network traffic, network less efficient.

5. Switch
-connect the devices together via networking cables and to facilitates communication between the devices, but they differ in how they transfer data.

When to use switch? hubs?

Switch - network larger ( more 50 users)
Hubs - small network (less 30 users)

6. Repeater
-to boost the signal with a device called a repeater. The repeater electrically amplifies the signal it receives and rebroadcasts it.





7. Bridges - connects multiple network segments.                                                                                   
 
 
8. Routers - Connectors that used to link different networks. Like bridges but more advanced. 


Before the class dismiss, we've been asked to set up network by these network components.
-Printer(1), computer(2), personal laptop(1), concentrator/hubs(1), server(1), wires and network interface card(2).*(NIC must with computer)