Telecommunication & Networking
Sunday, 20 May 2012
Sunday, 29 April 2012
www?
Stands for "World Wide Web." It is important to know that this is not a synonym for the Internet. The World Wide Web, or just "the Web," as ordinary people call it, is a subset of the Internet. The Web consists of pages that can be accessed using a Web browser. The Internet is the actual network of networks where all the information resides. Things like Telnet, FTP, Internet gaming, Internet Relay Chat (IRC), and e-mail are all part of the Internet, but are not part of the World Wide Web. The Hyper-Text Transfer Protocol (HTTP) is the method used to transfer Web pages to your computer. With hypertext, a word or phrase can contain a link to another Web site. All Web pages are written in the hyper-text markup language (HTML), which works in conjunction with HTTP.
Network Topology
A network topology describes the arrangement of systems on a computer network. It defines how the computers, or nodes, within the network are arranged and connected to each other. Some common network topologies include star, ring, line, bus, and tree configurations. These topologies are defined below:
Star - One central note is connected to each of the other nodes on a network. Similar to a hub connected to the spokes in a wheel.
Ring - Each node is connected to exactly two other nodes, forming a ring. Can be visualized as a circular configuration. Requires at least three nodes.
Line - Nodes are arranged in a line, where most nodes are connected to two other nodes. However, the first and last node are not connected like they are in a ring.
Bus - Each node is connected to a central bus that runs along the entire network. All information transmitted across the bus can be received by any system in the network.
Tree - One "root" node connects to other nodes, which in turn connect to other nodes, forming a tree structure. Information from the root node may have to pass through other nodes to reach the end nodes.It is helpful for a network administrator to know the pros and cons of different network topologies when putting together a network. By weighing the benefits of each type, the administrator can choose the configuration that is most efficient for the network's intended purpose.
Star - One central note is connected to each of the other nodes on a network. Similar to a hub connected to the spokes in a wheel.
Ring - Each node is connected to exactly two other nodes, forming a ring. Can be visualized as a circular configuration. Requires at least three nodes.
Line - Nodes are arranged in a line, where most nodes are connected to two other nodes. However, the first and last node are not connected like they are in a ring.
Bus - Each node is connected to a central bus that runs along the entire network. All information transmitted across the bus can be received by any system in the network.
Tree - One "root" node connects to other nodes, which in turn connect to other nodes, forming a tree structure. Information from the root node may have to pass through other nodes to reach the end nodes.It is helpful for a network administrator to know the pros and cons of different network topologies when putting together a network. By weighing the benefits of each type, the administrator can choose the configuration that is most efficient for the network's intended purpose.
WiMax 2
It has not been long since we saw the first WiMax implementation. And even as we are getting a feel of it Wimax 2 has been announced. A consortium WCI has been announced which will strive for meeting the standards set by WiMax 2. The WCI (WiMAX 2 Collaboration Initiative ) is an initiative lead by leading WiMAX™ silicon suppliers, equipment makers and research organizations to accelerate interoperability of WiMAX 2 based on the IEEE 802.16m standard.
What is WiMax 2?
WiMAX 2 is the next phase of WiMAX technology which is based on the IEEE 802.16m standard. This standard has been built upon the existing 802.16e standard by adding new capabilities while maintaining backward compatibility. Yes, WiMax 2 will be backward compatible to the existing WiMax standard. WiMAX 2 offers higher system capacity with peak rates of more than 300 Mbps, lower latency and increased VoIP capacity, meeting the International Telecommunications Union (ITU) requirements for 4G technology.WiMAX forum vice president Mohammad Shakouri says the goal is for the new WiMAX standard to deliver average downlink speeds of more than 100Mbps to users. 802.16m amendment will provide the basis for WiMAX System Release 2 and provide existing WiMAX operators a graceful migration path to gain performance enhancements and add new services. IEEE 802.16m specification is expected to be completed by end of the in the 3rd quarter of 2010.
Improvements
WiMax 2 is expected to offer improved performance in areas like
• Coverage and Spectral Efficiency
• Power Conservation
• Data Capacity and VoIP capabilities
• Lower Latency and QoS Enhancements
• Inter-working with other Wireless Networks
• Multi-carrier support
• GPS based services
• Self-Organizing network features
Future of WiMAX
According to WiMAX forum, nearly 45 companies have actively supported IEEE 802.16m as an IMT-Advanced technology alternative. It is widely expected that both LTE-Advanced and 802.16m will be included. The performance enhancements defined in IEEE 802.16m build on the capabilities established with IEEE 802.16e-2005, which has 4 years of worldwide, field-proven experience. This assures backwards compatibility, hence WiMAX System Release 2 will provide a graceful migration path for today’s WiMAX operators. This also provides them the confidence that they have selected a proven technology that is structured to meet current and future network demands. With this evolutionary growth path, the WiMAX technology is well-positioned to
meet the challenges and demands anticipated for the next generation of mobile networks.
Ref: www.wimaxforum.org
What is WiMax 2?
WiMAX 2 is the next phase of WiMAX technology which is based on the IEEE 802.16m standard. This standard has been built upon the existing 802.16e standard by adding new capabilities while maintaining backward compatibility. Yes, WiMax 2 will be backward compatible to the existing WiMax standard. WiMAX 2 offers higher system capacity with peak rates of more than 300 Mbps, lower latency and increased VoIP capacity, meeting the International Telecommunications Union (ITU) requirements for 4G technology.WiMAX forum vice president Mohammad Shakouri says the goal is for the new WiMAX standard to deliver average downlink speeds of more than 100Mbps to users. 802.16m amendment will provide the basis for WiMAX System Release 2 and provide existing WiMAX operators a graceful migration path to gain performance enhancements and add new services. IEEE 802.16m specification is expected to be completed by end of the in the 3rd quarter of 2010.
Improvements
WiMax 2 is expected to offer improved performance in areas like
• Coverage and Spectral Efficiency
• Power Conservation
• Data Capacity and VoIP capabilities
• Lower Latency and QoS Enhancements
• Inter-working with other Wireless Networks
• Multi-carrier support
• GPS based services
• Self-Organizing network features
Future of WiMAX
According to WiMAX forum, nearly 45 companies have actively supported IEEE 802.16m as an IMT-Advanced technology alternative. It is widely expected that both LTE-Advanced and 802.16m will be included. The performance enhancements defined in IEEE 802.16m build on the capabilities established with IEEE 802.16e-2005, which has 4 years of worldwide, field-proven experience. This assures backwards compatibility, hence WiMAX System Release 2 will provide a graceful migration path for today’s WiMAX operators. This also provides them the confidence that they have selected a proven technology that is structured to meet current and future network demands. With this evolutionary growth path, the WiMAX technology is well-positioned to
meet the challenges and demands anticipated for the next generation of mobile networks.
Ref: www.wimaxforum.org
Tuesday, 17 April 2012
Monday, 2 April 2012
Computer History
Beginning of the computer that is actually formed by a professor of English mathematician, Charles Babbage (1791-1871). In 1812, Babbage noticed the natural compatibility between machines and mathematics mechanical mechanical machine that is very good at doing the same tasks repeatedly without error, while the mathematics of a simple repitisi requires certain steps. Problem is then developed to put the machine mechanics as a tool to answer the mechanic. Babbage's first attempt to address this issue appeared in 1822 when he proposed a machine to perform the calculation of differential equations called Differential Engine. By using steam, the machine can store programs and can perform calculations and print the results automatically. After working with machinery during the 10th, Babbage was suddenly inspired to make a general-purpose computer, called the Analytical Engine. Babbage's assistant, Augusta Ada King (1815-1842) helped revise the plan, seek funding from the British government and communicated to the general specifications of the Analytical Engine.
In 1980, the U.S. Defense Department named a programming language with the name of the ADA as a tribute to him. Consists of about 50,000 components, the basic design of the Analytical Engine uses perforated cards containing operating instructions for the machine.
In 1889, Herman Hollerith (1860-1929) applied the perforation to perform calculations. His first task is to find a faster way to do the calculations for the U.S. Census Bureau. Hollerith uses perforated cards to enter census data are then processed by a mechanical device. A card can store up to 80 variables and the card serves as a data storage media. Hollerith then develop the tools and he founded the Tabulating Machine Company in 1896 which later became the International Bussines Machine (1924).
In the next period, Vannevar Bush (1890-1974) created a calculator to solve the differential equation d in 1931. The machine is very large and heavy as hundreds of teeth and the shaft needed to perform calculations. In 1903, John V. Atanasoff and Clifford Berry tried to apply an electric computer Boolean algebra in electrical circuits. This approach is based on the work Goorge Boole (1815-1864) in the form of a binary system of algebra, which states that any mathematical equation can be expressed as true or false. By applying the conditions are right one into the electrical circuits in the form of connected-disconnected, Atanasoff and Berry made the first electric computer in 1940.
In 1980, the U.S. Defense Department named a programming language with the name of the ADA as a tribute to him. Consists of about 50,000 components, the basic design of the Analytical Engine uses perforated cards containing operating instructions for the machine.
In 1889, Herman Hollerith (1860-1929) applied the perforation to perform calculations. His first task is to find a faster way to do the calculations for the U.S. Census Bureau. Hollerith uses perforated cards to enter census data are then processed by a mechanical device. A card can store up to 80 variables and the card serves as a data storage media. Hollerith then develop the tools and he founded the Tabulating Machine Company in 1896 which later became the International Bussines Machine (1924).
In the next period, Vannevar Bush (1890-1974) created a calculator to solve the differential equation d in 1931. The machine is very large and heavy as hundreds of teeth and the shaft needed to perform calculations. In 1903, John V. Atanasoff and Clifford Berry tried to apply an electric computer Boolean algebra in electrical circuits. This approach is based on the work Goorge Boole (1815-1864) in the form of a binary system of algebra, which states that any mathematical equation can be expressed as true or false. By applying the conditions are right one into the electrical circuits in the form of connected-disconnected, Atanasoff and Berry made the first electric computer in 1940.
Kenali Perkakasan Asas Komputer Anda!
Kaitan Teknologi Maklumat Dengan Stress
Agaknya zaman moden kini, kita tidak boleh lari dari stress atau tekanan. Apatah lagi kita semakin bekerja keras untuk seiring mengejar teknologi yang semakin canggih dan hidup yang semakin mencabar. Bergantung juga kepada apakah punca dan tanda-tanda yang menyebabkan stress boleh berlaku. Begitu juga Belajar mahupun berkerja.
Cerita pasal kerja dan belajar, kita juga ingin tahu apakah jenis kerja dan pelajarab yang benar-benar buat sesorang itu menjadi semakin stress? Setelah telah dibuat kajian rupa-rupanya momentum stress yang terlampau adalah di bidang IT atau dalam ayat panjangnya Teknologi Maklumat!
Fakta tentang kesahihan topik tersebut aku dapat dari kajian yang dibuat oleh SWNS ke atas 3000 orang mewakili Skillsoft sebagai penyedia pembelajaran secara dalam talian.
Benarkah? Kenapa? Bagaimana? Macammana? Semuanya berlaku….
- Masa - bekerja dalam masa yang panjang sehingga tidak mampu uruskan kehidupan sebagai manusia biasa. Apatah lagi kerja dibawah syarikat besar sebagai vendor atau outsources. Dah lah kerja lebih masa kadang-kadang dari pagi sampai pagi esok lepas tu tiada bayaran kerja lebih masa danclaim lain-lain.
- Log/Kerja – biasanya kerja di dalam bidang IT bergantung kepada berapa banyak laporan kes atau masalah yang diterima. Biasanya disebut sebagailog case atau job. Apa yang boleh aku katakan, log yang diterima jarang boleh habiskan dalam masa sehari kerana jumlah log yang diterima atau dibahagikan oleh operasi IT berlebihan. Apatah lagi apabila ada syarikat yang kununnya nak cut cost tapi menyeksa staff lain! Staff 5 orang, loguntuk 15 orang
- Pencapaian - yang ini selalunya dituju kepada pencapaian syarikat yang ingin capai sasaran perniagaan mereka. Apa yang tak logiknya apabila jurutera mereka bekerja macam buruh kasar. Mereka nak untung tapi pekerja dilayan macam lembu yang dicucuk hidung. Bukan nak komplen tak tentu hala tapi bayangkan lah kalau dalam satu hari nak kena selesaikan 15 – 20 klien! Padahal 1 hari boleh selesaikan 5 – 6 kes klien sahaja, akal ada ke? Nak kaya cepat dan nak jimat pun agak-agak la.
- Pengurus - ini lagi satu masalah. Ada pengurus dalam bidang IT tapi tak pernah tahu pasal IT, yang ini memang cam haram! Mulalah fikir dia bagus, bila dah fikir bagus, mulalah yang jadi mangsanya ialah jurutera IT (aku la tu hu3). Dah la tak tahu apa-apa dalam kerja-kerja field, lepas tu dok main hentam semua kerja boleh dilakukan segera. Adeh dah lama aku tak kerja pun masih terasa bahangnya
topologi bus :)
Topologi bas atau juga dikenali sabagai Ethernet menggunakan satu talian memanjang di mana setiap nod berhubung kepadanya. Data akan dihantar oleh setiap nod dengan harapan ianya tidak berlanggar dengan data yang dipindahkan dari nod yang lain. Sekiranya ianya berlaku,nod tersebut akan mencuba sekali lagi sehingga berjaya.
Kelemahan topologi bas ini adalah dari segi penyenggaraannya. Ianya agak rumit untuk diselenggara memandangkan sambungannya adalah dalam bentuk bersiri. Jika berlaku kerosakan pada mana-mana talian pada mana-mana nod,ia akan menyebabkan keseluruhan sistem tidak akan berfungsi. Tambahan pula untuk mengesan secara tepat tempat atau nod yang mengalami kerosakan.
Setiap nod boleh disambungkan ke sistem rangkaian dan juga boleh dikeluarkan pada bila-bila masa tanpa menjejaskan keseluruhan sistem secara langsung. Tambahan lagi sekiranya salah satu nod tidak berfungsi ia juga tidak menjejaskan rangkaian komputer yang lain.
Kelebihan lain yang ada pada topologi ini ialah ianya menggunakan kabel tunggal dan tidak memerlukan perkakasan tambahan bagi mendirikan rangkaian. Maka ianya tidak memerlukan kos yang terlalu tinggi bagi tujuan penyelenggaraan.
Kelebihan
Kekurangan
Kelemahan topologi bas ini adalah dari segi penyenggaraannya. Ianya agak rumit untuk diselenggara memandangkan sambungannya adalah dalam bentuk bersiri. Jika berlaku kerosakan pada mana-mana talian pada mana-mana nod,ia akan menyebabkan keseluruhan sistem tidak akan berfungsi. Tambahan pula untuk mengesan secara tepat tempat atau nod yang mengalami kerosakan.
Setiap nod boleh disambungkan ke sistem rangkaian dan juga boleh dikeluarkan pada bila-bila masa tanpa menjejaskan keseluruhan sistem secara langsung. Tambahan lagi sekiranya salah satu nod tidak berfungsi ia juga tidak menjejaskan rangkaian komputer yang lain.
Kelebihan lain yang ada pada topologi ini ialah ianya menggunakan kabel tunggal dan tidak memerlukan perkakasan tambahan bagi mendirikan rangkaian. Maka ianya tidak memerlukan kos yang terlalu tinggi bagi tujuan penyelenggaraan.
Kelebihan
- Komputer atau peranti lain mudah untuk disambungkan ke kabel utamanya.
- Memerlukan kuantiti kabel yang lebih kecil jika dibandingkan dengan topologi bintang.
Kekurangan
- Keseluruhan rangkaian tidak dapat berfungsi sekiranya terdapat masalah dengan kabel utama.
- Penamat atau peranti talian (terminators) diperlukan dikedua-dua hujung kabel tulang belakang.
- Agak sukar untuk mengesan sekiranya keseluruhan rangkaian tidak berfungsi.
Subscribe to:
Posts (Atom)