CLICK HERE FOR BLOGGER TEMPLATES AND MYSPACE LAYOUTS »

~STARP HEBAT~


STAR PUTRA TERUS GEMILANG

Sunday, June 27, 2010

ring

A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travels from node to node, with each node along the way handling every packet.

Because a ring topology provides only one pathway between any two nodes, ring networks may be disrupted by the failure of a single link[1]. A node failure or cable break might isolate every node attached to the ring. FDDI networks overcome this vulnerability by sending data on a clockwise and a counterclockwise ring: in the event of a break data is wrapped back onto the complementary ring before it reaches the end of the cable, maintaining a path to every node along the resulting "C-Ring". 802.5 networks -- also known as IBM Token Ring networks -- avoid the weakness of a ring topology altogether: they actually use a star topology at the physical layer and a Multistation Access Unit (MAU) to imitate a ring at the datalink layer.

Many ring networks add a "counter-rotating ring" to form a redundant topology. Such "dual ring" networks include Spatial Reuse Protocol, Fiber Distributed Data Interface (FDDI), and Resilient Packet Ring.

star topologi

Star networks are one of the most common computer network topologies. In its simplest form, a star network consists of one central switch, hub or computer, which acts as a conduit to transmit messages.[1] Thus, the hub and leaf nodes, and the transmission lines between them, form a graph with the topology of a star. If the central node is passive, the originating node must be able to tolerate the reception of an echo of its own transmission, delayed by the two-way transmission time (i.e. to and from the central node) plus any delay generated in the central node. An active star network has an active central node that usually has the means to prevent echo-related problems.

The star topology reduces the chance of network failure by connecting all of the systems to a central node. When applied to a bus-based network, this central hub rebroadcasts all transmissions received from any peripheral node to all peripheral nodes on the network, sometimes including the originating node. All peripheral nodes may thus communicate with all others by transmitting to, and receiving from, the central node only. The failure of a transmission line linking any peripheral node to the central node will result in the isolation of that peripheral node from all others, but the rest of the systems will be unaffected. [2]

It is also designed with each node (file servers, workstations, and peripherals) connected directly to a central network hub, switch, or concentrator.

Data on a star network passes through the hub, switch, or concentrator before continuing to its destination. The hub, switch, or concentrator manages and controls all functions of the network. It is also acts as a repeater for the data flow. This configuration is common with twisted pair cable. However, it can also be used with coaxial cable or optical fibre cable.

Contents [hide]
1 Advantages
2 Disadvantages
3 References
4 See also

bus topologi

A bus topology connects each computer (nodes) to a single segment trunk (a communication line, typically coax cable, that is referred to as the 'bus'. The signal travels from one end of the bus to the other. A terminator is required at each to absorb the signal so as it does not reflect back across the bus. A media access method called CSMA/MA is used to handle the collision that occur when two signals placed on the wire at the same time. The bus topology is passive. In other words, the computers on the bus simply 'listen' for a signal; they are not responsible for moving the signal along.

Sunday, June 20, 2010

Network Tropologi

A network consists of multiple computers connected using some type of interface, each having one or more interface devices such as a Network Interface Card (NIC) and/or a serial device for PPP networking. Each computer is supported by network software that provides the server or client functionality. The hardware used to transmit data across the network is called the media. It may include copper cable, fiber optic, or wireless transmission. The standard cabling used for the purposes of this document is 10Base-T category 5 ethernet cable. This is twisted copper cabling which appears at the surface to look similar to TV coaxial cable. It is terminated on each end by a connector that looks much like a phone connector. Its maximum segment length is 100 meters.

Network Categories
There are two main types of network categories which are:

Server based
Peer-to-peer
In a server based network, there are computers set up to be primary providers of services such as file service or mail service. The computers providing the service are are called servers and the computers that request and use the service are called client computers.

In a peer-to-peer network, various computers on the network can act both as clients and servers. For instance, many Microsoft Windows based computers will allow file and print sharing. These computers can act both as a client and a server and are also referred to as peers. Many networks are combination peer-to-peer and server based networks. The network operating system uses a network data protocol to communicate on the network to other computers. The network operating system supports the applications on that computer. A Network Operating System (NOS) includes Windows NT, Novell Netware, Linux, Unix and others.

Network Architecture

Network architecture is the design of a communications network. It is a framework for the specification of a network's physical components and their functional organization and configuration, its operational principles and procedures, as well as data formats used in its operation.

In computing, the network architecture is a characteristics of a computer network. The most prominent architecture today is evident in the framework of the Internet, which is based on the Internet Protocol Suite.

In telecommunication, the specification of a network architecture may also include a detailed description of products and services delivered via a communications network, as well as detailed rate and billing structures under which services are compensated.

In distinct usage in distributed computing, network architecture is also sometimes used as a synonym for the structure and classification of distributed application architecture, as the participating nodes in a distributed application are often referred to as a network. For example, the applications architecture of the public switched telephone network (PSTN) has been termed the Advanced Intelligent Network. There are any number of specific classifications but all lie on a continuum between the dumb network (e.g., Internet) and the intelligent computer network (e.g., the telephone network). Other networks contain various elements of these two classical types to make them suitable for various types of applications. Recently the context aware network, which is a synthesis of the two, has gained much interest with its ability to combine the best elements of both

Computer Network


A computer network allows sharing of resources and information among devices connected to the network. The Advanced Research Projects Agency (ARPA) funded the design of the Advanced Research Projects Agency Network (ARPANET) for the United States Department of Defense. It was the first operational computer network in the world.[1] Development of the network began in 1969, based on designs developed during the 1960s. For a history see ARPANET, the first network.
[edit] Purpose
Computer networks can be used for several purposes:
Facilitating communications. Using a network, people can communicate efficiently and easily via e-mail, instant messaging, chat rooms, telephony, video telephone calls, and videoconferencing.
Sharing hardware. In a networked environment, each computer on a network can access and use hardware on the network. Suppose several personal computers on a network each require the use of a laser printer. If the personal computers and a laser printer are connected to a network, each user can then access the laser printer on the network, as they need it.
Sharing files, data, and information. In a network environment, any authorized user can access data and information stored on other computers on the network. The capability of providing access to data and information on shared storage devices is an important feature of many networks.
Sharing software. Users connected to a network can access application programs on the network.

Thursday, June 3, 2010

database developement

A database consists of an organized collection of data for one or more multiple uses. One way of classifying databases involves the type of content, for example: bibliographic, full-text, numeric, image. Other classification methods start from examining database models or database architectures: see below. Software organizes the data in a database according to a database model. As of 2010[update] the relational model occurs most commonly. Other models such as the hierarchical model and the network model use a more explicit representation of relationships.

Tuesday, June 1, 2010

software information system

SIW is an advanced System Information for Windows tool that gathers detailed information about your system properties and settings and displays it in an extremely comprehensible manner.
SIW can create a report file (CSV, HTML, TXT or XML), and is able to run in batch mode (for Computer Software and Hardware Inventory, Asset Inventory Tracking, Audit Software Licenses, Software License Compliance).
The system information is divided into few major categories:
Software Inventory: Operating System, Installed Software and Hotfixes, Processes, Services, Users, Open Files, System Uptime, Installed Codecs, Software Licenses (Product Keys / Serial Numbers / CD Key), Passwords Recovery.
Hardware Inventory: Motherboard, CPU, Sensors, BIOS, chipset, PCI/AGP, USB and ISA/PnP Devices, Memory, Video Card, Monitor, Disk Drives, CD/DVD Devices, SCSI Devices, S.M.A.R.T., Ports, Printers.
Network Information: Network Cards, Network Shares, currently active Network Connections, Open Ports.
Network Tools: MAC Address Changer, Neighborhood Scan, Ping, Trace, Statistics
Miscellaneous Tools: Eureka! (Reveal lost passwords hidden behind asterisks), Monitor Test, Shutdown / Restart.
Real-time monitors: CPU, Memory, Page File usage and Network Traffic.
SIW is a standalone utility that does not require installation (Portable Freeware) - one less installed program on your PC as well the fact that you can run the program directly from an USB flash drive, from a floppy, from a network drive or from a domain login script. SIW can be distributed freely (ftp, archives, CD-ROMs ...).

concepts of information system

1 A Natural Structuring ConceptInformations systems are being designed as parts of increasingly complex systems. The complexity of these systems may result from their size, from the complexity of the information they need or generate, from the complexity of their behavior, from a long evolution,... In order to deal with this complexity, adequate structuring mechanisms are needed. We argue that the concept of agent is appropriate and natural to deal with the complexity of studied systems by decomposing them in a natural way.
When doing Requirements Engineering for an IS, it is important to model not only the ``to-be IS'' (what Jackson calls the machine [8]) but also the environment with which the machine will interact, which exists in spite of the machine (thereby constraining the machine) and in terms of which the requirements have to be expressed. Such an environment description can be structured in a natural way by identifying various agents having interactions among themselves and with the machine. The environment can be considered as a composite system [2] made of agents of different kinds like human beings (probably users of the IS), existing software, computer hardware or other kinds of devices like mechanical devices. All these agents have characteristics and behaviours that need to be taken into account to correctly model the behaviour of the ``to-be IS''.
The concept of agent is therefore a natural basic building block for structuring the description of an IS and its environment. Beneficial consequences of this structuring appear at various stages of the Requirements Engineering process. When modelling, it is well known that structuring allows analysts, amongst other things, to focus on some specific concerns and to distribute the work among them. Similarly, such advantages appear at the validation stage where a cooperative animation technique allows different people to play the role of agents and test requirements descriptions against scenarios (see [7]). Compositional reasoning can also be applied on a specification structured with agents, allowing to reason on or prove properties of some agents, by relying on conclusions previously achieved for other agents (see [11]).

Information systems

Information Systems (IS) is a professional and academic discipline concerned with the strategic, managerial and operational activities involved in the gathering, processing, storing, distributing and use of information, and its associated technologies, in society and organizations. As an area of study, IS bridges the multidisciplinary business world and the interdisciplinary computer science field that is evolving toward a new scientific discipline.[4][5][6][7] An information systems discipline therefore is supported by the theoretical foundations of information and computations such that undergraduate students have unique opportunities to explore the academics of various business models as well as related algorithmic processes within a computer science discipline.[8][9][10] Typically, information systems or the more common legacy information systems include people, procedures, data, software, and hardware (by degree) that are used to gather and analyze digital information.[11][12] Specifically computer-based information systems are complementary networks of hardware/software that people and organizations use to collect, filter, process, create, & distribute data (computing).[13] Today, Computer Information System(s) (CIS) is often a track within the computer science field studying computers and algorithmic processes, including their principles, their software & hardware designs, their applications, and their impact on society.[14][15][16] Overall, an IS discipline emphasizes functionality over design.[17]
As illustrated by the Venn Diagram on the right, the history of information systems coincides with the history of computer science that began long before the modern discipline of computer science emerged in the twentieth century.[18] Regarding the circulation of information and ideas, numerous legacy information systems still exist today that are continuously updated to promote ethnographic approaches, to ensure data integrity, and to improve the social effectiveness & efficiency of the whole process.[19] In general, information systems are focused upon processing information within organizations, especially within business enterprises, and sharing the benefits with modern society.[20]

programme development phase

Program Development Phase
To make a program, the programmer has to undergo several phases and which will determine how and what the program he should make.
Firstly, the programmer has to undergo the analyzing phase. In this phase, the programmer has to conduct a survey to determine the problem faced by the client and know the target user.
Then, the programmer will begin the design phase. In the design phase, the programmer has to design the program and draw them out as a pseudo code, flow chart or top down design model.
Next is the coding phase. In the coding phase, the programmer will begin his work on coding the program. The coding is usually be done by several programmer as a complex program consist of many syntax.
Testing and debugging phase are the next phase. Here the program done will be tested to ensure that is error free. The usual error is the syntax error, logic error and run-time error. This phase is also called debugging because the error occurred are also known as bug.
Finally it is the documentation phase. Documentation is also including internal documentation and marketing documentation. Internal documentation is made so that the programmer can easily edit the code in the future. It also enables other programmer to know how the program is coded so that they can also improve it. Marketing documentation is done so that the customer can have a better understanding on the program. This will also enable the potential customer to compare the program with other product and expect what they could gain from the program.Read more: http://www.bukisa.com/articles/108793_program-development-phase#ixzz0pez39EOS

programming concepts

Introduction
Computer programs are collections of instructions that tell a computer how to interact with the user, interact with the computer hardware and process data. The first programmable computers required the programmers to write explicit instructions to directly manipulate the hardware of the computer. This "machine language" was very tedious to write by hand since even simple tasks such as printing some output on the screen require 10 or 20 machine language commands. Machine language is often referred to as a "low level language" since the code directly manipulates the hardware of the computer.
By contrast, higher level languages such as "C", C++, Pascal, Cobol, Fortran, ADA and Java are called "compiled languages". In a compiled language, the programmer writes more general instructions and a compiler (a special piece of software) automatically translates these high level instructions into machine language. The machine language is then executed by the computer. A large portion of software in use today is programmed in this fashion.
We can contrast compiled programming languages with interpreted programming languages. In an interpreted programming language, the statements that the programmer writes are interpreted as the program is running. This means they are translated into machine language on the fly and then execute as the program is running. Some popular interpreted languages include Basic, Visual Basic, Perl and shell scripting languages such as those found in the UNIX environment.
We can make another comparison between two different models of programming. In structured programming, blocks of programming statements (code) are executed one after another. Control statements change which blocks of code are executed next.
In object oriented programming, data are contained in objects and are accessed using special methods (blocks of code) specific to the type of object. There is no single "flow" of the program as objects can freely interact with one another by passing messages.
In this tutorial, we focus only on structured programming.

Program Structure
Virtually all structured programs share a similar overall structure:
Statements to establish the start of the program
Variable declaration
Program statements (blocks of code)
The following is a simple example of a program written in several different programming languages. We call this the "Hello World" example since all the program does is print "Hello World" on the computer screen.
Language
Example program
"C"
#include
void main() {
printf("Hello World");
}
C++
#include
int main()
{
cout
Pascal
program helloworld (output);
begin
writeln('Hello World');
end.
Oracle PL/SQL
CREATE OR REPLACE PROCEDURE helloworld AS
BEGIN
DBMS_OUTPUT.PUT_LINE('Hello World');
END;
Java
class helloworld
{
public static void main (String args [])
{
System.out.println ("Hello World");
}
}
Perl
#!/usr/local/bin/perl -w
print "Hello World";
Basic
print "Hello World"

multimedia developement

About Us - Overview
Your gateway to MSC Malaysia is the Multimedia Development Corporation (MDeC), a high-powered 'one-stop agency' focused on ensuring the success of MSC Malaysia and the companies operating in it.
MDeC is incorporated under the Companies Act of Malaysia, and owned and funded by the Government. At MDeC, we combine the entrepreneurial efficiency and effectiveness of a private company with the decision-making authority of a high-powered government agency.
Our role is to advise the Malaysian Government on legislation and policies, develop MSC Malaysia-specific practises, and set breakthrough standards for multimedia operations. We also promote MSC Malaysia locally and globally, as well as support companies which are locating and located within MSC Malaysia.
We are dedicated to ensuring MSC Malaysia is the world's best environment to harness the full potential of ICT. MDeC is a champion, facilitator and partner. We champion the merits of MSC Malaysia, facilitate the entry of companies and partner with the Government and the private sector in realising both a vision and an opportunity.MDeC ensures that companies interested in entering MSC Malaysia have what they need to succeed. We guarantee a 30-day turnaround for applications, and will coach companies through the application process. As a performance-oriented, client-focused agency, we also assist in expediting permit and license approvals, and introduce companies to potential local partners and financiers.
Companies wishing to participate in the Corridor need not look elsewhere. Application begins and ends here. MDeC stands ready to work with investors, foreign and local, big or small, to ensure that MSC Malaysia fulfils its promises. Visit our Success Stories section to see what existing MSC Malaysia companies have to say about us.



hardware and software


hardware and software


multimedia concepts

35.1 INTRODUCTION
As the name suggests, multimedia is a set of more than one media element used to produce a concrete and more structured way of communication. In other words multimedia is simultaneous use of data from different sources. These sources in multimedia are known as media elements. With growing and very fast changing information technology, Multimedia has become a crucial part of computer world. Its importance has realised in almost all walks of life, may it be education, cinema, advertising, fashion and what not.
Throughout the 1960s, 1970s and 1980s, computers have been restricted to dealing with two main types of data - words and numbers. But the cutting edge of information technology introduced faster system capable of handling graphics, audio, animation and video. And the entire world was taken aback by the power of multimedia.

35.2 OBJECTIVES
After going through this lesson you should be able to
explain what is multimedia
understand the importance of individual media elements
identify different hardware components required to run a multimedia
appreciate the impact of audio in educational presentation
describe how visual images, graphics and audio can be added to a presentation
enhance the capability of multimedia through interactive video impact

35.3 WHAT IS MULTIMEDIA?
Multimedia is nothing but the processing and presentation of information in a more structured and understandable manner using more than one media such as text, graphics, animation, audio and video. Thus multimedia products can be an academic presentation, game or corporate presentation, information kiosk, fashion-designing etc. Multimedia systems are those computer platforms and software tools that support the interactive uses of text, graphics, animation, audio, or motion video. In other words, a computer capable of handling text, graphics, audio, animation and video is called multimedia computer. If the sequence and timing of these media elements can be controlled by the user, then one can name it as Interactive Multimedia.

35.4 DIFFERENT MEDIA ELEMENTS
(i) Text
Inclusion of textual information in multimedia is the basic step towards development of multimedia software. Text can be of any type, may be a word, a single line, or a paragraph. The textual data for multimedia can be developed using any text editor. However to give special effects, one needs graphics software which supports this kind of job. Even one can use any of the most popular word processing software to create textual data for inclusion in multimedia. The text can have different type, size, color and style to suit the professional requirement of the multimedia software.

(ii) Graphics
Another interesting element in multimedia is graphics. As a matter of fact, taking into consideration the human nature, a subject is more explained with some sort of pictorial/graphical representation, rather than as a large chunk of text. This also helps to develop a clean multimedia screen, whereas use of large amount of text in a screen make it dull in presentation.
Unlike text, which uses a universal ASCII format, graphics does not have a single agreed format. They have different format to suit different requirement. Most commonly used format for graphics is .BMP or bitmap pictures. The size of a graphics depends on the resolution it is using. A computer image uses pixel or dots on the screen to form itself. And these dots or pixel, when combined with number of colors and other aspects are called resolution. Resolution of an image or graphics is basically the pixel density and number of colors it uses. And the size of the image depends on its resolution. A standard VGA (Virtual Graphics Arrays) screen can display a screen resolution of 640 ´ 480 = 307200 pixel. And a Super VGA screen can display up-to 1024 ´ 768 = 786432 pixel on the screen. While developing multimedia graphics one should always keep in mind the image resolution and number of colors to be used, as this has a direct relation with the image size. If the image size is bigger, it takes more time to load and also requires higher memory for processing and larger disk-space for storage.
However, different graphics formats are available which take less space and are faster to load into the memory.
There are several graphics packages available to develop excellent images and also to compress them so that they take lesser disk-space but use higher resolution and more colours. Packages like Adobe PhotoShop, Adobe Illustrator, PaintShop Pro etc. are excellent graphics packages. There are Graphics gallery available in CD’s (Compact Disk) with readymade images to suit almost every requirement. These images can directly be incorporated into multimedia development.

(iii) Animation
Moving images have an overpowering effect on the human peripheral vision. Followings are few points for its popularity.

Showing continuity in transitions:
Animation is a set of static state, related to each other with transition. When something has two or more states, then changes between states will be much easier for users to understand if the transitions are animated instead of being instantaneous. An animated transition allows the user to track the mapping between different subparts through the perceptual system instead of having to involve the cognitive system to deduce the mappings.
Indicating dimensionality in transitions:
Sometimes opposite animated transitions can be used to indicate movement back and forth along some navigational dimension. One example used in several user interfaces is the use of zooming to indicate that a new object is "grown" from a previous one (e.g., a detailed view or property list opened by clicking on an icon) or that an object is closed or minimized to a smaller representation. Zooming out from the small object to the enlargement is a navigational dimension and zooming in again as the enlargement is closed down is the opposite direction along that dimension.

Illustrating change over time
Since animation is a time-varying display, it provides a one-to-one mapping to phenomena that change over time. For example, deforestation of the rain forest can be illustrated by showing a map with an animation of the covered area changing over time.

software requirements

A Software Requirements Specification (SRS) is a complete description of the behavior of the system to be developed. It includes a set of use cases that describe all the interactions the users will have with the software. Use cases are also known as functional requirements. In addition to use cases, the SRS also contains non-functional (or supplementary) requirements. Non-functional requirements are requirements which impose constraints on the design or implementation (such as performance engineering requirements, quality standards, or design constraints).
[edit] General Outline of a SRS
Software Requirements Specifications (SRS)
Cover Page
Revisions Page
Table of Contents
1 INTRODUCTION
1.1 Product Overview
1.2 Purpose
1.3 Scope
1.4 Reference
1.5 Definition And Abbreviation
2 OVERALL DESCRIPTION
2.1 Product Perspective
2.2 Product Functions
2.3 User Characteristics
2.4 General Constraints
2.5 Assumptions and Dependencies
3 SPECIFIC REQUIREMENTS
3.1 External Interface Requirements
3.1.1 User Interfaces
3.1.2 Hardware Interfaces
3.1.3 Software Interfaces
3.1.4 Communications Protocols
3.1.5 Memory Constraints
3.1.6 Operation
3.1.7 Product function
3.1.8 Assumption and Dependency
3.2 Software Product Features
3.3 Software System Attributes
3.3.1 Reliability
3.3.2 Availability
3.3.3 Security
3.3.4 Maintainability
3.3.5 Portability
3.3.6 Performance
3.4 Database Requirements
3.5 Other Requirements
4 ADDITIONAL MATERIALS
SRS for UMS (University Management System):
1. GENERAL DESCRIPTION – UMS is University Management System for managing the records of the alumni of the university as well as staff, faculty and higher authorities.
1.1 Purpose – The purpose for developing this type of software or introducing this UMS is to facilitate everyone who is concerned with the university.
1.2 Scope – The scope of UMS is global i.e. it should be able to be accessed from anywhere through internet i.e. registered users must be able to login to their accounts by directly accessing the university’s website and then signing in with their username and password anytime and anywhere.
1.3 Abbreviation – UMS University Management System
1.4 Overview – As the ums is able to have a user interface. It should have a drop down boxes and if we drag mouse on any control at our welcome screen information regarding that the control should be displayed. Help menu should be there. As a teacher it should provide them to upload the various assignments and the attendance of the students. As a developer it should make a user interface which is user friendly. He should make the UMS as simple as he can. Backup at the main server should be made.
2. OVERALL DESCRIPTION
2.1 Product Perspective – product i.e. UMS should be able to provide a basic and easy interchange of information i.e. it should be able to remove the communication gaps between a teacher and the student. It should have chat facilities for all the users that are online. It should be compatible with all the operating systems.
2.2 Product Functions - The following are the product functions of the UMS:
The UMS login box should on the official website of the university.
The password field should be secured.
After signing in all updates and new announcements for users should be displayed.
By clicking on the dropdown box of the options the user should be able to view progress reports, assignments, notes, attendance, placement services and results.
User should be able to change the passwords.
Web pages should support pdf, ppt, doc and similar supported formats so that they can be easily downloadable and unloadable.
2.3 User Characteristics – A user can only have his/her registration number as username so if he joins the university then only he can login. This prevents misuse, unauthorized access and hacking of the product.
2.4 General Constraints – Server capacity is how many users can access or can be online at once. More is the number of users more will be the network traffic and hence the server comes in a down state. Personal firewall and updating is a tough task, it should be such that it should not block the network traffic, making the system slower. Firewall of the UMS should not collide with the firewall of the user system.
2.5 Assumptions and Dependencies – UMS should work even at when the network traffic is high. Server should have a power backup as well as a database backup. The UMS should be compatible with most of the operating systems i.e. previous and latest ones.
3. SPECIFIC REQUIREMENTS
3.1 External Interface Required
3.1.1 User Interfaces – The external users are the students and the teachers of the university. The students can have an access to their accounts for their attendance, assignments etc. The teachers have also an account to access their account for uploading of the students’ attendance and the assignments to be submitted by them.
3.1.2 Hardware Interfaces – The external hardware interface used for accessing the UMS is the personal computers of the teachers and the students. The PCs may be laptops with wireless LAN as the internet connections provided will be wireless.
3.1.3 Software Interfaces – The Operating Systems can be any version of Windows, Linux, Unix or Mac which supports TCP/IP protocols.
3.1.4 Communication Interfaces – The communication interface is a local area network through wireless network routers.
3.2 Performance Requirements – The PCs used must be at least Pentium 4 machines so that they can give optimum performance of the product.
3.3 Design Constraints – The constraints at the designing time are that the needs of the university students and the teachers may keep on changing so the designers must keep this in view and design the product in this way that it is easily updatable.
3.4 Attributes – The following are the attributes of the product UMS:
It should be equipped with current and archive database.
All records can easily be updated.
It should have its personal firewall.
It should facilitate student with updating his/her account, downloading or uploading of assignments from anywhere.
It should also do the same for teachers they can also have their pay checks online i.e. UMS should be capable of online transaction.
3.5 Other Requirements – The software is such that as the time goes by the need of the university management, students and teachers may keep on changing thus it is made to change from time to time.

hardware requiremants for networking

EZ-Zone Computer System Requirements
Computer Hardware and Operating System Softwarefor your EZ-Zone Software Products
* Click for server requirements
* Compatible with Apple Computers using a Windows Emulator or using Mac OS X 10.5 Leopard and Windows Operating system.
Local Area Network (LAN) Four Station Peer to Peer - The Ethernet hub connects the computer stations together to allow data and hardware resources to be shared. Ethernet hubs are now available in wireless format as well, eliminating the need for wires.
Make one computer the "server". It must run at all times. Network sharing can be set up on the "C" drive of the serving computer.
Drag and drop the *.exe file to the desk top of the other computers.
A separate program CD-Rom must be installed on the client computers, so that the proper control libraries are installed.
Standard Printers - can be used in a variety of formats. Tractor style work well for single and multiple label printing. Laser and bubble jet printers work well for volume reports and invoicing. The printer(s) can be connected to the parallel port on one computer and be shared by all computers on the LAN.
Barcode scanners - are easily connected using a key board wedge. Simple connect the scanner between your keyboard and computer.
Receipt Printers - must be compatible to the program being used. Call for details or read the help menu for specifications. Receipt printers are connected to the parallel port. All programs will print receipt on 8.5 " by 11".
Standard Printers - can be used in a variety of formats. Tractor style work well for label making. Laser printers work well for volume reports. All printers can be connected to the parallel port.
Cash drawers for POS systems - are connected directly to your receipt printer and when a receipt is made the cash drawer kicks open.
Computer specifications - Minimum specifications.
1.6 GHz CPU
1 Gigabyte Ram
250 GB hard drive
Keyboard, mouse (optical mouse controls work the best)
Color monitor - screen resolution 1024 x 768 or larger
Ethernet network card (on network for multiple users)
56 K fax modem (for inventory ordering and report sending)
For data serving, use UPS (universal power supply - 20 minute battery back up)
Laser or bubble-jet printer (for printing standard reports)
Ethernet hub and wire to attach other computers
Internet account with a mail account to use e-mail tools
Sound card and speakers for barcode use
2nd printer port (for label printing - optional)
Tractor feed printer (for labels - optional)
BACK UP - VERY IMPORTANT; Use one of the following:
USB Memory stick 16 GiG
CD-Rom read-write
Tape back up
External hard drive
Note - Laptop computers can be used, but must be designed for all day operation.
* Make a back up of your EZ-Zone Software nightly and remove from your premise, in the event that you have data corruption, you can install your back-up. Using computers that are not reliable can cause conflicts in your database. If you are not sure if your computer is capable of serving database software, contact our support with the specifications of your computer.
Computer specifications - Specifications for a new computer.
2.0 GHz Dual Core CPU
2 Gigabytes ECC Ram (for servers add 100 MB per user) ECC stands for error correcting code memory
250 GB hard drive
Keyboard, optical mouse with wheel
Color monitor - screen resolution 1024 x 768 or larger
56 K Fax Modem (for inventory ordering and report sending)
Laser printer for quick printing
Ethernet network card (on network for multiple users)
Ethernet hub and wire to attach other computers
Additional Ethernet network card for high speed internet or use central Ethernet hub with router for sharing
Internet account with a mail account to use e-mail tools
Laser Printer
2nd printer port (for label printing - optional)
Tractor feed printer (for labels - optional)
Sound card and speakers
For data serving, use UPS (universal power supply - 20 minute battery back up)

basic concepts

Introduction
This is a continuation of my series of articles on the terms and concepts that are frequently asked in IT interviews. This article is an attempt to discuss the salient terminologies and concepts related to Computer networking that are often asked in interviews. Although an article on Computer Networking concepts and terms would run for many pages, I have discussed only important ones to make it fit in one article.
Computer Network
A Computer Network implies two or more computers those are linked together through some software, hardware, etc for the purpose of exchanging data and information.
Internet
The Internet is a network of networks. It is "the worldwide, publicly accessible network of interconnected computer networks that transmit data by packet switching using the standard Internet Protocol (IP)."
World Wide Web
The World Wide Web or WWW is a hypertext based distributed information system. It "is the global network of hypertext (HTTP) servers that allow text, graphics, audio and video files to be mixed together." It is an "information space in which the items of interest, referred to as resources, are identified by global identifiers called Uniform Resource Identifiers (URI)." According to Tim Berners-Lee, inventor of the World Wide Web, "The World Wide Web is the universe of network-accessible information, an embodiment of human knowledge."
Modem
A modem is a modulator-demodulator device that is used for converting the transmission signals from digital to analog for transmission over voice-grade phone lines. While the digital signals are converted to a form suitable for transmission over analog communication at the source, the reverse happens at the destination where these analog signals are returned to their original digital form.
Network Interface Controller
A network card, network adapter or the Network Interface Controller (NIC) is a piece of computer hardware that facilitates the systems in a network to communicate.
Broadcasting
When the information transfer is from one system to many systems using the same means of transfer then such a network is known as a Broadcasting or Multicasting.
Unicasting
When the information transfer is from one system to any other single system using the same means of transfer then such a network is known as Point-to-Point or Unicasting.
Bandwidth
Network bandwidth or network throughput is a measure of the data transfer rate or the amount of data that can pass through a network interface over a specific period of time. This is expressed in bits per second or bps.


Broadband
This is a wide-band technology that is capable of supporting voice, video and data. It is "a transmission medium capable of supporting a wide range of frequencies, typically from audio up to video frequencies. It can carry multiple signals by dividing the total capacity of the medium into multiple, independent bandwidth channels, where each channel operates only on a specific range of frequencies."
Integrated Services Digital Network (ISDN)
Integrated Services Digital Network, an international standard for end-to-end digital transmission of voice, data, and signaling facilitates very high-speed data transfer over existing phone lines.
Network Load Balancing
Network Load Balancing may be defined as a technique that "distributes the network traffic along parallel paths to maximize the available network bandwidth while providing redundancy."
Local Area Network
LAN also known as Local Area Network are networks restricted on the bases of the area they cover. These networks stretch around an area of 10 meters to 1 km. "LANs enabled multiple users in a relatively small geographical area to exchange files and messages, as well as access shared resources such as file servers and printers." The commonly used LAN devices include repeaters, hubs, LAN extenders, bridges, LAN switches, and routers.
Metropolitan Area Network
MAN also known, as Metropolitan Area Network is a network that is larger than LANs spreading across an area of 1 km to 10kms. A simple example for this type of network is the branches of a bank spread across the city and are connected for information exchange.
Wide Area Network
WAN also known, as Wide Area Network is a network that is larger than a MAN, it spreads across an area of 100kms to 1000 kms. "A WAN is a data communications network that covers a relatively broad geographic area and that often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer." A simple example for these networks is the network of a huge IT company, which contains branches all over the world with all its branches connected to each other.
Wireless Networks
Wireless Networks are those networks wherein the interconnection between two systems is not physical. The computers that interchange information are not physically linked with wires.
Bluetooth
Bluetooth is a wireless network that has a short range and can be used to connect a system with its internal components like monitor, mouse, CPU, etc without actually having a plug in. Components that support the Bluetooth technology can be detected whenever they are in the detectable range.
Routing
When there are multiple paths between the sender and the receiver the best path for sending the information has to be chosen. The choice is made based on a number of criteria like the number of hops between the systems or on the physical distance between the systems. This process of finding the best path is known as routing.

computer networks and Communications

10 INTRODUCTION
The purpose of a computer communications network is to allow moving information from one point to another inside the network. The information could be stored on a device, such as a personal computer in the network, it could be generated live outside the network, such as speech, or could be generated by a process on another piece of information, such as automatic sales transactions at the end of a business day. The device does not necessarily have to be a computer; it could be a hard disk, a camera or even a printer on the network. Due to a large variety of information to be moved, and due to the fact that each type of information has its own conditions for intelligibility, the computer network has evolved into a highly complex system. Specialized knowledge from many areas of science and engineering goes into the design of networks. It is practically impossible for a single area of science or engineering to be entirely responsible for the design of all the components. Therefore, a study of computer networks branches into many
areas as we go up from fundamentals to the advanced levels.
20 MOBILE COMPUTING
2.1 DEFINITION
Using a computing device while in transit. Mobile computing implies wirelesstransmission, but wireless transmission does not necessarily imply mobilecomputing. Fixed wireless applications use satellites, radio systems and lasers totransmit between permanent objects such as buildings and towers.