Friday 23 May 2014

TutoriL 3_Q2

Miss can you please take a look on my code?
I have no idea why my table dint come out =_= TimeTable
&nbsp 8.00-9.30 9.30-11.00 11.00-12.30 12.30-2.00 2.00-3.30 3.30-5.00 5.00-6.30
Monday &nbsp [WJB203](C409)
Tuesday &nbsp [CD110](Lab C)
Wednesday
Thurdsay &nbsp [CD108](Lab M) &nbsp [BD127](C209)
Friday [CD108] (Lab A) &nbsp [CD110](Lab B)(5.30-7.00)



Link to BIBLIOGRAPHY

Tutorial 3 (23th MAY 2014)

BIBLIOGRAPHY
PERSONAL DETAILS
First Name: Wei Wen &nbsp &nbsp &nbsp Sur Name:Soh

Student ID:1001335470
Gender:Female
Age:19
Address:No.2,jln seri cheras9, Tmn seri cheras, Batu10
E-mail Address:swwen5148@gmail.com
Contact No:(H) 90813811 &nbsp &nbsp &nbsp(HP): 016-6691494
Hobby:Swimming


FAMILY MEMBER <
Father:Soh Chee Koon
Mother:Tan Souk Hun
Sibling(s):
  • Soh Zhen Jun
  • Soh Wei Wen
  • Soh Zhen Jing
Page not found


Link to TimeTable

Friday 16 May 2014

Tutorial 2 (16th MAY 2014)

i) Layer 1 : Physical Layer 
The first layer of the seven layers of Open Systems Interconnection (OSI) network model is called the Physical layer. Physical circuits are created on the physical layer of Open Systems Interconnection (OSI) model.Physical layers describe the electrical or optical signals used for communication.Physical layer of the Open Systems Interconnection (OSI) model is only concerned with the physical characteristics of electrical or optical signaling techniques which includes the voltage of the electrical current used to transport the signal, the media type (Twisted PairCoaxial CableOptical Fiber etc), impedance characteristics, physical shape of the connector, Synchronization etc.

Layer 2 : Datalink Layer

The second layer of the seven layers of Open Systems Interconnection (OSI) network model is called the Datalink layer. The Data Link layer resides above the Physical layer and below the Network layer. Datalink layer is responsible for providing end-to-end validity of the data being transmitted. The Data Link Layer is logically divided into two sublayers, The Media Access Control (MAC) Sublayer and the Logical Link Control (LLC) Sublayer.

Layer 3: Network Layer

The third layer of the seven layers of Open Systems Interconnection (OSI) network model is the Network layer. The Network layer of the OSI model is responsible for managing logical addressing information in the packets and the delivery of those packets to the correct destination. Routers, which are special computers used to build the network, direct the data packet generated by Network Layer using information stored in a table known as routing table.

Layer 4 : Transport Layer

The fourth layer of the seven layers of Open Systems Interconnection (OSI) network model is the Transport layer. The Transport layer handles transport functions such as reliable or unreliable delivery of the data to the destination. On the sending computer, the transport layer is responsible for breaking the data into smaller packets, so that if any packet is lost during transmission, the missing packets will be sent again.

Layer 5 : Session Layer 

Session layer is the fifth layer of seven layered Open Systems Interconnection (OSI) Model.The position of Session Layer of the Seven Layered Open Systems Interconnection (OSI) model is between Transport Layer and the Presentation Layer.The session layer is responsible for establishing, managing, and terminating connections between applications at each end of the communication.
In the connection establishment phase, the service and the rules (who transmits and when, how much data can be sent at a time etc.) for communication between the two devices are proposed. The participating devices must agree on the rules. Once the rules are established, the data transfer phase begins. Connection termination occurs when the session is complete, and communication ends gracefully.

Layer 6 : Presentation Layer
The position of Presentation Layer in seven layered Open Systems Interconnection (OSI) model is just below the Application Layer. When the presentation layer receives data from the application layer, to be sent over the network, it makes sure that the data is in the proper format. If it is not, the presentation layer converts the data to the proper format. On the other side of communication, when the presentation layer receives network data from the session layer, it makes sure that the data is in the proper format and once again converts it if it is not.

Layer 7 :Application Layer
The Application Layer the seventh layer in OSI network model. Application Layer is the top-most layer of the seven layered Open Systems Interconnection (OSI) network model. Real traffic data will be often generated from the Application Layer. This may be a web request generated from HTTP protocol, a command from telnet protocol, a file download request from FTP protocol etc.





ii) Client Side Code:-Software that is downloaded from Web server to browser and then executes on the client.

Server Side Code : -Software that runs on the server, not the client: Receives input from,URL                                                          parameters,HTML form dataCookies,HTTP headers.
                      -Can access server-side databases, e-mail servers, files, mainframes, etc.
                      -Dynamically builds a custom HTML response for a client
Differences: - 
Server Side Code : 
-It is written in the .CS file for C# and .vb file for VB.Net.
-Server side code will always run on server side and create round trip on server in the response of request for any aspx page. 
-These will consume the servers memory.
-server side code validate data to check whether sent data is correct or not. 


Client Side Code : 
-It is a scripting language (JavaScriptpt or vb script) that can be included in the HTML Page or can contain in the Source File either .vb or .cs . 
-It runs on client's browser it does not create any round trip to the server. 
e.g validation of controls dynamically hiding and displaying some of controls or there values etc. 
-The reason why we do client side validations is to save the to and from time taken for the request to go to the server and the response to get back to the browser. 
-Client side code validate the data before sending it to server.

iii) 
Web Application:
-Web application or web app is any application software that runs in a web browser or is created in a browser-supported programming language (such as the combination of JavaScriptHTML and CSS) and relies on a common web browser to render the application.
Example:  Google Doc , iCloud , sliderocket

Web Services:
-A programmable application component accessible via standard Web protocols. 
-Built on existing and emerging standards ( HTTP, XML, SOAP, UDDI, WSDL)
-Server-based application which may be accessed over the web via HTTP, but is meant  primarily for interaction with other programs.



Wednesday 14 May 2014

Static vs. Dynamic Web Sites (15th MAY 2014)

Static Websites
The closest approximation of a static website is an online brochure. It acts and feels like a printed brochure you can view through your computer screen. Remember those days where printing was done using plates? Every time you needed to change design or text, you needed to create a new plate from which to print off.
Instead of using plates, static websites use HTML, the basic coding protocol used by websites. Each change to a static website requires a person, who knows how to use HTML, to go in and manually change the code.

Advantages of static websites

·         Quick to develop
·         Cheap to develop
·         Cheap to host

Disadvantages of static websites

·         Requires web development expertise to update site
·         Site not as useful for the user
·         Content can get stagnant

Dynamic Websites
Dynamic websites have far more functionality and flexibility. Their initial set up is more complicated and uses more complex coding types such as PHP or ASP. However once it’s been set up, and style sheets have been put in place, managing a dynamic website is much easier and, with the right Content Management System (CMS), updating content, or creating new pages, can be done with no programming skills.

This means changes can be made as often as you like, new pages, landing pages and campaign pages can be added when you need them. Relevant calls to action can be scripted and strategically placed, new deals uploaded when they are current, old, irrelevant content can be deleted. You can control your own website in-house using in-house equipment and people. There is no need to pay anyone to make content changes to your website.


Advantages of dynamic websites

·         Much more functional website
·         Much easier to update
·         New content brings people back to the site and helps in the search engines
·         Can work as a system to allow staff or users to collaborate

Disadvantages of dynamic websites

·         Slower / more expensive to develop
·         Hosting costs a little more

Example of static websites: http://www.maidservicetexas.com/


Example of dynamic websites: http://www.computerhope.com/



d to pay anyone to make content changes to your websit

Friday 9 May 2014

Tutorial(1) - 9th MAY. 2014

1) The HTTP is an application protocol for distributed, collaborative systems. HTTP is the foundation of data communication for the World Wide Web. Https is “Hyper Text Transfer Protocol” with Secure Sockets Layer, another protocol primarily developed with secure, safe Internet transactions in mind.

2) Packet-switched networks move data in separate, small blocks -- packets -- based on the destination address in each packet. When received, packets are reassembled in the proper sequence to make up the message.On the Internet, the network breaks an e-mail message into parts of a certain size in bytes. These are the packets. Each packet carries the information that will help it get to its destination -- the sender's IP address, the intended receiver's IP address, something that tells the network how many packets this e-mail message has been broken into and the number of this particular packet. The packets carry the data in the protocols that the Internet uses: Transmission Control Protocol/Internet Protocol (TCP/IP). Each packet contains part of the body of your message. A typical packet contains perhaps 1,000 or 1,500 bytes.Each packet is then sent off to its destination by the best available route ,a route that might be taken by all the other packets in the message or by none of the other packets in the message. This makes the network more efficient.
3) 3G is shorthand for “3rd generation,” and refers to a networking standard in cell phone technology that is capable of providing high-speed data service to mobile devices.
While 4G stands for 4th generation, which is more faster than the 3g, Using a 4G smartphone on Verizon’s 4G LTE network means you can download files from the Internet up to 10 times faster than with 3G.

Limitation - 3G- Roaming and data/voice work together has not yet been implemented.
        
                    -4G-The risk of receiving a virus attack and tracking cookies through this IP-address system increases by 4G.

4) 









Thursday 10 October 2013

Tutorial 5 – 7th OCT. 2013

a) In computer scienceACID (Atomicity, Consistency, Isolation, Durability) is a set of properties that guarantee that database transactions are processed reliably. In the context of databases, a single logical operation on the data is called a transaction.

b) http://www.nytimes.com/pages/podcasts/index.html

c) Prisoners- http://www.imdb.com/title/tt1392214/?ref_=hm_cht_t4.
    Gravity- http://www.imdb.com/title/tt1454468/
    Rush- http://www.imdb.com/title/tt1979320/
    The Walking dead- http://www.imdb.com/title/tt1520211/
    Now You See Me- http://www.imdb.com/title/tt1670345/

The website had provided a search bar for visitors to search what they looking for,beside the search bar visitors can also specific the type of searching.Some details had provided for the search results.The visitors will benefits the most because they will not wasting time on searching movies or show.

Student Name: Soh Wei Wen
ID : 1001335470

Thursday 3 October 2013

Tutorial 4– 4th OCT. 2013

PART A:
a)Green computing, also called green technology, is the environmentally responsible use of computers and related resources. Such practices include the implementation of energy-efficient central processing units (CPUs), servers and peripherals as well as reduced resource consumption and proper disposal of electronic waste (e-waste).



b) i)Develope a sustainable green computing plan.
   ii)Recycle.
  iii)Make environmentally sound purchase decisions.
  iv)Reduce paper consumption.
  v)Converse energy.

c) http://www.energystar.gov/?fuseaction=find_a_product.showProductGroup&pgw_code=CO


d)



PART B:
a) 1) In computer networks and telecommunications, a dedicated line is a communications cable or other facility dedicated to a specific application, in contrast with a shared resource such as the telephone network or the Internet.

2)Integrated Services for Digital Network (ISDN) is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network. It was first defined in 1988 in the CCITT red book. Prior to ISDN, the telephone system was viewed as a way to transport voice, with some special services available for data. The key feature of ISDN is that it integrates speech and data on the same lines, adding features that were not available in the classic telephone system. There are several kinds of access interfaces to ISDN defined as Basic Rate Interface (BRI), Primary Rate Interface (PRI), Narrowband ISDN (N-ISDN), and Broadband ISDN (B-ISDN).

3)Digital subscriber line (DSL, originally digital subscriber loop) is a family of technologies that provide Internet access by transmitting digitaldata over the wires of a local telephone network. In telecommunications marketing, the term DSL is widely understood to mean asymmetric digital subscriber line (ADSL), the most commonly installed DSL technology. DSL service is delivered simultaneously with wired telephone service on the same telephone line. This is possible because DSL uses higher frequency bands for data. On the customer premises, a DSL filter on each non-DSL outlet blocks any high frequency interference, to enable simultaneous use of the voice and DSL services.

4)Fiber-To-The-Premises (FTTP) is a technology for providing Internet access by running fiber optic cable directly from an Internet Service Provider (ISP) to a user's home or business. It facilitates much faster speeds than dial-up and most coaxial cable Internet connections, and generally needs to be serviced less. It's also considered one of the most "future proof" types of Internet technology, since there are no foreseeable devices that could use more bandwidththan can be sent via fiber optic cables. Despite its benefits, it is difficult and expensive to install.

5)T-carrier, sometimes abbreviated as T-CXR, refers to one of several digital transmission systems developed by Bell Labs. T-carriers are used in North America, South Korea, and Kyoto

6)Asynchronous Transfer Mode (ATM) is, according to the ATM Forum, "a telecommunications concept defined by ANSI and ITU (formerly CCITT) standards for carriage of a complete range of user traffic, including voicedata, and video signals". ATM was developed to meet the needs of the Broadband Integrated Services Digital Network, as defined in the late 1980s,[and designed to unify telecommunication and computer networks. It was designed for a network that must handle both traditional high-throughput data traffic (e.g., file transfers), and real-timelow-latency content such as voice and video.

b)  EBR-2310 Ethernet Broadband Router

Standards
• IEEE 802.3 10Base-T Ethernet
• IEEE 802.3u 100Base-TX Fast Ethernet
• IEEE 802.3 NWay Auto-Negotiation

Advanced Firewall Features
• Network Address Translation (NAT)
• MAC Filtering
• Website Filtering
• Scheduling

Device Management
• Internet Explorer v6 or later; or other Java-enabled Browsers

Certifications
• FCC

Led
• Power
• WAN
• Local Network—10/100Mbps

Operating Temperature
• 32°F to 131°F (0°C to 55°C)

Operating Humidity
• 90% Maximum (Non-condensing)

Dimensions
• Item (WxDxH): 4.5” x 5.9” x 1.4”
• Packaging (WxDxH): 8.3” x 10.9” x 2.7”

Weight
• Item: 0.5 lbs
• Packaging: 1.6 lbs 
Minimum System Requirements
• Cable or DSL Modem
• Computer with:
• Windows® XP SP2 or Windows 2000 SP4**
• Internet Explorer 6
• CD-ROM Drive
• Network Interface Card








C)