**Information System**

**Information System**

Testing

Testing...

Yup it's working :p

**Call Me Kuan**


Hello and welcome to all blog visitors, I'm Gan Teck Kuan, currently enrolled in Degree in Business Admin.(Hons) Entrepreneurship course, Year 1 Trimester 1. I'm in Tutorial Group 2 of the course.

I was born in Kota Bharu, Kelantan. Spent my childhood and finished my Primary and Secondary education at the same place also. Now I'm joining UTAR to finish my Degree.

I enjoy visiting anywhere on my motorcycle, as I'm an enthusiast in traveling on these machines. I'm also a hobbyist in tarantula keeping, currently owning several species in my collection.
Other than that I also like to watch videos and movies and also hanging out with friends.

TOP WEBSITES THAT I VISITED THE MOST & WHY
  1. Lowyat.NET - Insanely Addictive Malaysia Forum.
  2. YouTube - Broadcast Yourself.
  3. Malaysian Bikers Community.
  4. Malaysian Tarantula Society Forum - Index.
  5. Universiti Tunku Abdul Rahman.
Why? Because :
  1. This is a forum with many ideas and contribution from various members of Malaysia society. I can get many information here about so many things that I don't know which to start with.
  2. For my entertainment purpose only.
  3. As I'm a motorcycle enthusiast, this forum is a great place for me to hangout and get latest information about Malaysia's motorcycle trend and changes.
  4. I also keep tarantulas, so, this forum serves a a platform for me to interact with other keepers and improve my knowledge about these pets.
  5. I get all my lecture notes and tutorial questions here.
MY TOP 5 INTERNET ACTIVITIES
  1. Instant messenging.
  2. Watch YouTube videos.
  3. Read stuffs.
  4. Download stuffs.
  5. Some light online gaming perhaps?
You can contact me via :
MSN- tkgan88@hotmail(dot)com

^u^AbOuT KiM ProFile**


Welcome to UTAR En T2 Blog , my name is Foo Siew Khim , or you can call me Kim , now I am study my degree course at UTAR . Currently I am year one trimester one in Degree in Business Admin.(Hons) Entrepreneurship course .

I was born in Kota Bharu , Kelantan . My childhood and school life also spent in the same place .


I very like to cook especially for my family . My successful recipe usually came from newspaper , I also buy the cook book but mostly failed , so I think the author will not teach you every steps , they will miss out some steps you need to go find by yourself . I also like to bake cake and bread which was learned from the newspaper recipe .
Other than that , I also like go to travel overseas . When I go to different country I can learn many different cultures and tastes many delicious local foods . I watch the movies or series of drama to fill my free time . Lastly , I think the hobbie most girls will have is shopping . I like to go shopping but that doesn't means I like to buy many things .

TOP WEBSITES THAT I VISITED THE MOST & WHY

  1. YouTube-Broadcast Yourself
  2. Welcome to Facebook
  3. UTAR WBLE:Login the site
  4. Alibaba Manufacturer Directory-Suppliers,Manufacturers,Exporters & Importers
  5. Google


Because:

  1. I can learn many things like handicrafts and watch many funny videos
  2. I can play the psychological test when i feel bored
  3. I go to this website to download my lecture notes and tutorial questions
  4. There are many things to sell with very cheap prices because most product came directly from the manufactures .
  5. I use this website to find any information I want.


My Top 5 Internet Activities
  1. Find Information
  2. Watch YouTube Videos
  3. Instant Messenging
  4. Download Lectures Notes
  5. Play Online Games
You can contact me via:

MSN => tea_n_tomato@hotmail(dot)com

About M3 ^o^ Kelvin


Welcome to all blog visitors, I'm Hooi Chee Hoong, currently enrolled in Degree in Business Admin.(Hons) Entrepreneurship course, Year 1 Trimester 1,Tutorial Group 2.

I was born in Kuala Lumpur at Aug'90 but i spent my childhood at Ipoh, Perak. I finished my primay and secondary school at Ipoh also. After graduate from secondary school, I took the foundation programmed at UTAR, Kampar and now I'm enrolled in the degree.

I like sports, especially basketball and snooker. At my free time, i also like to hang out with friends having good movies. I also like to travel a lot, tasting delicious foods from different places.

TOP WEBSITES THAT I VISITED THE MOST & WHY
  1. Community channel between friends and classmate.
  2. Intranet that keep UTAR student update with UTAR latest news.
  3. This is where UTAR student download lecture notes and tutorial questions.
  4. Automotive forum where i get information on vehicles at Malaysia.
  5. Watch videos and MVs.
MY TOP 5 INTERNET ACTIVITIES
  1. Watch movies.
  2. Online gaming.
  3. Download movies.
  4. Reading news and articles.
  5. Listen to the online music channel.
You can contact me via :
kelvin_zhixiong@hotmail.com

About Gin~


Hello and welcome to all of the visitors. I am Oh Meng Gin, Gin shall be a nick name to all of you as well. I have just completed my foundation course which was in stream A of UTAR and currently under graduate of Degree in Business Administration (Hons) Entrepreneurship. This is my first year and first semester. I am glad that I have been arranged in this friendly group which is T2.

In 1991, I have existed in this world and currently locates at Ipoh which is a state of Malaysia. I have spent my childhood happily and wisely. I completed my primary and secondary education at Sam Tet Primary and Secondary school. After over hundred of exams, I came to UTAR to step forward to a bright future.

My hobby changes oftenly so I shall call it as hobbies since there're so many of them. I like to cycle around to enjoy the refreshing air especially the morning mist but I dare not to cycle to my recent university under the big and hot sun which might caused skin cancer to me. Fishing was my past hobby because I am lack of patience recently. Shopping was a ideal hobby for me though but recently I am facing financial problem and I am sorry to the branded stuffs because daddy couldn't take you all home. Lastly, keeping pets is 1 of my recent hobby because I am getting kill by boredom and loneliness.

Lets keep it short by now or else I am going to ruin this blog with thousand of words and irrelevant sentences. Anyways, wish all of the blog visitors take your time and enjoy in this amazing blog which is a ideal and beneficial place to communicate. Thank you.

TOP WEBSITE THAT I VISITED THE MOST:
1.Facebook
2.U
tar Portal
3.Mudah.my
4.Utar WBLE
5.www.greekshares.com

WHY? BECAUSE:
1. I can chat with my friends and take the funny psychological tests.
2. I can update myself and be alert to any new events that UTAR helds.
3. In this site, I could do some marketing research such as item's market price.
4. With this site, I could keep in touch with my lecturers and tutors and download my latest updated notes.
5. I just realised that i have great interest in big income so in this site I could learn how to invest in stocks such as purchasing, selling, understanding the concept of the investment requirement and etc.

MY TOP 5 INTERNET ACTIVITIES.
1. Play online games
2. Watch drama
3. Instant messaging
4. Look for profitable opportunities
5. Listen to music

Feel free to contact me via :
squall-oh@hotmail.com =)
( Bet you will not be regret for adding this in your Msn Messenger*)

Jo3l ^^


Well, its hard for me to start writing something especially writing a blog since I am new to it :( I'll just follow the same old way of writing something which is to introduce myself. I'm Joel Fam Weng Soon( not much people know my full name though xD ), going to be 20 this year. Everyone calls me Joel or El. As an undergraduate in UTAR, Kampar, I am enrolling in Degree in Business Administration (Hons) Entrepreneurship. Not many students are taking this course and thats the reason why we have only 2 classes for this course. I am in T2. Although this class have only around 6 students we are close together and I have pretty happy with it.

Coming out of my mother's womb in 1990, I was a 9 pounds fat baby and proudly the heaviest baby in the hospital of Kota Bahru, Kelantan. Although i was born in Kelantan, my family shifted to Ipoh where i spent my childhood and adulthood in this city known as the Bougainvillea city. As naughty as a child can be, I did many things that caused troubles and heartaches to my parents. Although having much trouble teaching me, my parents brought me up well. Having me to study in one of the famous schools in Ipoh, I completed my primary and secondary studies in SRJK (c) Sam Tet and SMJK (c) Sam Tet. School memories are the best memories for me after all as I always missed the days in school where all I have to worry about is only studies. Only after growing up did I realize that how fortunate I have been when I was young and innocent. I would also like to take this opportunity to show my gratitude to my family especially my parents for giving me a fabulous childhood to me. Thank you and I love you daddy and mommy.

As for my hobbies, I have to admit I do not have a healthy one. My current hobby is to surf the internet and playing computer games :/ That should explain why my tummy is growing day by day. I used to like playing basketball and fishing but since i left school, its hard to have all friends playing together and its too bored to play alone T.T.

I guess that will briefly let you know about me. And yes, I do think I am friendly and like to make friends although many did say I look too cool to talk to.

TOP 5 WEBSITES THAT I HAVE VISITED AND WHY?
3. Wble

Why? because :
1. Socializing with friends and games.
2. To view game replays and music videos.
3. For lecture notes and tutorial questions.
4. For Utar's notices and events.
5. To seek for new games.

MY TOP 5 INTERNET ACTIVITIES
1. Gaming.
2. Chatting with friends.
3. Watching and downloading dramas or movies.
4. Listening and downloading songs and music videos.
5. Watching games replays.

You can contact me via :
joelfam@hotmail.com

The Evolution of Computer Systems: From Mainframe Computer Systems to Microcomputer Systems.

The evolution of computer is an interesting process. Instead of developing from small sized machines into huge ones, the computer actually shrinks during the evolution.

In fact, the first computer ENIAC ( stands for Electronic Numerical Integrator and Computer), that was announced in 1946 was a behemoth.

It contained:
1) 17,468 vacuum tubes,
2) 7,200 crystal diodes,
3) 1,500 relays,
4) 70,000 resistors,
5)10,000 capacitors,
6) and around 5 million hand-soldered joints.

It weighed 30 short tons (27 t), was roughly 8.5 by 3 by 80 feet (2.6 m × 0.9 m × 26 m), took up 680 square feet (63 m2), and consumed 150 kW of power.

ENIAC was designed to calculate artillery firing tables for the United States Army's Ballistic Research Laboratory, but its first use was in calculations for the hydrogen bomb.

When ENIAC was announced in 1946 it was heralded in the press as a "Giant Brain". It boasted speeds one thousand times faster than electro-mechanical machines, a leap in computing power that no single machine has since matched.

Now let us go to the main focus. The size and the power featured by ENIAC are all the typical traits of a Mainframe Computer System. In fact, ENIAC was the first mainframe computer ever created.

Facts about mainframe computer:
1) Huge in size, they can take up to a whole room of space.
2) Very expensive, can cost up to millions for a single system.
3) Very expensive to run, considering the size and performance of the computer system.
4) Have the ability to host multiple operating systems.
5) Very powerful, has high processing speed and huge storage capacity.
6) Highly secure and reliable, due to the "graceful degradation" property(to continue operating properly in the event of the failure of (or one or more faults within) some of its components) and the allowance of services during operation.
7) Have the ability to support multiple users, crucial for organizational operation.
8) Can add or hot swap system capacity non disruptively and granularly.
9) Have peripheral processors, which manage the I/O (input and output) devices, leaving the CPU to deal only with high-speed memory.
10) Often nick named " The Big Iron".

ENIAC - The First Mainframe, Maintained BY "ENIAC Girls"

IBM 704

IBM 360 Model 50

Modern IBM T-REX Mainframe System

The mainframes are indeed impressive in terms pf power and size. However there's some drawbacks that prevented them from being used by daily computer users like most of us. The truth is mainframes are just too bulky to house and too expensive to operate for the average folks.

So, in order to deliver the computer technology to the mass, computer manufacturers had to come up with something that can fit easily into our daily life. As a result of this demand, eventually microcomputer was born.

However there's a catch, the transformation from mainframe to microcomputer didn't just happened overnight. There's one important transition stage where one type of computer was introduced - the minicomputer.

The first successful minicomputer was Digital Equipment Corporation’s 12-bit PDP-8, which cost from US$16,000 upwards when launched in 1964. The existence of the important precursors of the PDP-8 include the PDP-5, LINC, the TX-0, the TX-2, and the PDP-1 suggest that minicomputers were invented a few years back earlier though.

Minicomputers were also known as midrange computers. They had relatively high processing power and capacity that mostly fit the needs of mid range organizations. They were used in manufacturing processes or handling email that was sent and received by a company.

They usually took up one or a few cabinets the size of a large refrigerator or two, compared with mainframes that would usually fill a room.

Facts about minicomputer:
1) Utilizes transistor and core memory technology.
2) Sits in the spectrum between mainframe and microcomputer in terms of size and processing speed.
3) Runs full multi-user, multitasking operating systems such as VMS and Unix.
4) Commonly used as servers in network environment and hundreds of personal computers can be connected to the network with a minicomputer acting as server like mainframes.
5) Single user minicomputers are used for complex designing tasks.

The First Commercially Successful Minicomputer - The PDP-8

IBM Series 1 Racked System

Hewlett Packard 2116C

Modern IBM i5 Family

The minicomputers were very successful during 1960s to 1970s. However their reign ended when microcomputer emerged during mid-1980s to 1990s.

The change in the trend was made possible with the lowered cost of microprocessor based hardware, the emergence of inexpensive and easily deployable local area network systems, the emergence of the 68020, 80286 and the 80386 microprocessors, and the desire of end-users to be less reliant on inflexible minicomputer manufacturers and IT departments/“data centers” — with the result that minicomputers and dumb terminals were replaced by networked workstations and servers and PCs in the latter half of the 1980s.

During the 1990s the change from minicomputers to inexpensive PC networks was cemented by the development of several versions of Unix to run on the Intel x86 microprocessor architecture, including Solaris, FreeBSD, NetBSD and OpenBSD. Also, the Microsoft Windows series of operating systems, beginning with Windows NT, now included server versions that supported pre-emptive multitasking and other features required for servers.

As microprocessors have become more powerful, CPUs built up from multiple components — once the distinguishing feature differentiating mainframes and mini systems from microcomputers — have become increasingly obsolete, even in the largest mainframe computers.

A microcomputer is a computer with a microprocessor as its central processing unit. They are physically smaller when compared to mainframe and minicomputers. Many microcomputers (when equipped with a keyboard and screen for input and output) are also personal computers (in the generic sense).

Facts about microcomputer:
1) Physically considerably smaller than mainframe or minicomputers.
2) Has a microprocessor as its central processing unit.
3) The most common type of computer in existence today.
4) PC and PC-compatible computers have processors with different architectures than processors in Apple computers.
5) These two types of computers also use different operating systems.
6) PC and PC-compatible computers use the Windows operating system while Apple computers use the Macintosh operating system (MacOS).
7) The majority of microcomputers sold today are part of IBM-compatible. However the Apple computer is neither an IBM nor a compatible. It is another family of computers made by Apple computer.
8) Comes equipped with at least one type of data storage, usually RAM but most are equipped with secondary non-volatile data storage.
9) Normally serves single user.
10) Can be modified to serve multiple users.

Altair 8800 - The First Commercial Microcomputer, Packaged With Microsoft System

Sinclair ZX80

GE TermiNet 300

Modern Day's Acer Predator System

Timeline of Computer Evolution : From Mainframe to Microcomputer

Image Showing The Evolution Of Computer

1940s - ENIAC, the first mainframe computer was invented.

1960s-1970s - The minicomputers replaced the mainframes in most application. Being smaller and cheaper to operate but still powerful enough to do the job.

1980's and 1990's - The minicomputers gave way to microcomputers due to the lowered cost of hardware and emergence of new network technologies.

The Comparison Between General Purpose Application Software and Function-Specific Application Software.

Application software are designed to help us to perform a singular or multiple related specific tasks. They're also often called software applications, applications or apps.

There are two types of application software which is the General Purpose Application Software and the Function-Specific application software.

So now let us look further into the differences and functions of both types of application software.

1) The General Purpose Application Software

General purpose application software packages are generally tools that provide specific capabilities, but not in support of a specific purpose.

In other words,

These software performs common information processing jobs for end users but not in support of a specific purpose. They are also known as productivity packages because they greatly increase the productivity of the end users. For example, a spreadsheet program is a general purpose application. It does spreadsheets, but those could be spreadsheets that you use to balance your checkbook, or manage your fantasy football league.

Examples of General Purpose Application Software:


Desktop Publishing Software - Often used to create graphics for point of sale displays, promotional items, trade show exhibits, retail package designs and outdoor signs. In very simple words, it could be said that it is a page maker application.


Word-Processing Software - Used for the production (including composition, editing, formatting, and possibly printing) of any sort of printable material.



Spreadsheet Software - Used for any kind of spreadsheet work including analysis, planning or modeling. This is a general purpose software with many functions.

2) Function-Specific Application Software

Function-specific software are highly specialized software that are designed to handle specific tasks. They're more limited in what they can do, but they usually perform much better than a general purpose program in a specific task.

For example, TurboTax (a tax preparation package) is a special purpose application. Sure, it adds and subtracts numbers like a spreadsheet, but you can't use it to plan your monthly budget. It does only one thing - prepare tax returns.

Examples of Function-Specific Application Software:


Computer-Aided Design Software - Used for the design of objects, real or virtual. CAD often involves more than just shapes but also the dimensions of the designed objects.


Supply Chain Management Software - Used in executing supply chain transactions, managing supplier relationships and controlling associated business processes.


Enterprise Resource Planning Software- A large and complex software system that integrates all the various departments of an organization under a single software solution. Given the name, the primary task of the enterprise system is to optimize the use of resources and to provide the organization's management team with analytical information that would be helpful in the making of decisions and in the daily operations of the company. There are multiple ERP software systems in the market, catering to wide variety of industries.

The Evolution of Data Management Technology : From Traditional File to Data Warehouse.

Data Management Technology is designed to help provide an environment that is both convenient and efficient to use in retrieving and storing information. It controls the creation, maintenance, and the use of the database with computer as a platform of an organization and its end users.

Data management technology like everything else, has undergone evolution process to reach its present complexity and functionality.

Before the advancement in data management technology, organizations utilized Traditional File Processing system to organize and maintain their databases. However, this system has many limitations that we'll see through later.

After the data management technology improved, various firms had adopted the modern data management approach, which is the utilization of Database Management system. With much more stability, reliability and security the data warehouse provided, the traditional file processing system is being slowly phased out from the business organizations.

1)
Traditional File Processing System
-
Each user defines and implements the needed files for a specific application to run, meaning there will be multiple files created all containing some similar information. For example, the student ID of a UTAR student will be found in both the course registration files and also the UTAR portal administration files because the student ID is needed in both files.
- Were an early attempt to computerize the manual filing system.
- Is a collection of application programs that perform services for the end-users.
- Each program defines and manages its own data.

Disadvantages :
1) Separation and isolation of data

- When data is isolated in separate files, it is more difficult for us to access data that should be available. The application programmer is required to synchronize the processing of two or more files to ensure the correct data is extracted.

2) Duplication of data
- Means the same data were recorded and stored in different files.
- Independent data files create many duplicated data.
- When employing the decentralized traditional file processing system, the uncontrolled duplication of data will occur. Uncontrolled duplication of data is undesirable because:
i) Duplication is wasteful
ii) Duplication can lead to loss of data integrity

3) Data dependence
- Using traditional file processing system, the physical structure and storage of the data files and records are defined in the application program code.
- This characteristic is known as program-data dependence. Making changes to an existing structure are rather difficult and will lead to a modification of program.
- Such maintenance activities are time-consuming and subject to error.

4)Incompatible file formats
- The structures of the file are dependent on the application programming language. However file structure provided in one programming language such as direct file, indexed-sequential file which is available in COBOL programming, may be different from the structure generated by other programming language such as C.
- The direct incompatibility makes them difficult to process jointly.


5) Fixed queries / proliferation of application programs
- File-based systems are very dependent upon the application programmer. Any required queries or reports have to be written by the application programmer. Normally, a fixed format query or report can only be entertained and no facility for ad-hoc queries if offered.
- File-based systems also give tremendous pressure on data processing staff, with users' complaints on programs that are inadequate or inefficient in meeting their demands.
- Documentation may be limited and maintenance of the system is difficult.
- Provision for security, integrity and recovery capability is very limited.

2) Database Management System (DMS)
- A single repository of data (data warehouse) is maintained that is defined once and then accessed by many users, using different programs.
- Sharing of data is possible.
- Set of computer programs that governs the creation, maintenance, and the utilization of the database with computer as a platform of an organization and its end users.
- May use a variety of database models, such as the network model or relational model.
- In large systems, a DBMS allows users and other software to store and retrieve data in a structured way, by using concurrency control software.
- Provides facilities for recovering hardware and software failures, thus reduces the application development time considerably when compared to the file system approach and availability of up-to-date information of all the users.
- Also provides security to the data stored in the database system.

Advantages :
1) Control of data redundancy
- The database approach tries to eliminates the redundancy by integrating the files. Although the database approach does not eliminate redundancy entirely, it controls the amount of redundancy inherent in the database.

2) Data consistency
- By eliminating or controlling redundancy, the database approach reduces the risk of inconsistencies occurring. It ensures that all copies of the data are kept consistent.

3) More information from the same amount of data
- With the integration of the operated data in the database approach, it may be possible to derive additional information for the same data.

4) Sharing of data
- Database belongs to the entire organization and can be shared by all authorized users.

5) Improved data integrity
- Database integrity provides the validity and consistency of stored data. Integrity is usually expressed in terms of constraints, which are consistency rules that the database is not permitted to violate.

6) Improved security
- Database approach provides a protection of the data from the unauthorized users. It may take the term of user names and passwords to identify user type and their access right in the operation including retrieval, insertion, updating and deletion.

7) Enforcement of standards
- The integration of the database enforces the necessary standards including data formats, naming conventions, documentation standards, update procedures and access rules.

8) Economy of scale
- Cost savings can be obtained by combining all organization's operational data into one single database with applications to work on one source of data.

9) Balance of conflicting requirements
- By having a structural design in the database, the conflicts between users or departments can be resolved. Decisions will be based on the base use of resources for the organization as a whole rather that for an individual entity.

10) Improved data accessibility and responsiveness
- By having an integration in the database approach, data accessing can be crossed departmental boundaries. This feature provides more functionality and better services to the users.

11) Increased productivity
- The database approach provides all the low-level file-handling routines. The provision of these functions allows the programmer to concentrate more on the specific functionality required by the users. The fourth-generation environment provided by the database can simplify the database application development.

12) Improved maintenance
- Database approach provides a data independence. As a change of data structure in the database will be affect the application program, it simplifies database application maintenance.

13) Increased concurrency
- Database can manage concurrent data access effectively. It ensures that no interference between users that would not result any loss of information nor loss of integrity.

14) Improved backing and recovery services
- Modern database management system provides facilities to minimize the amount of processing that can be lost following a failure by using the transaction approach.

SQL Server Enterprise Manager

Example of Another Database Management Software

Data Warehouse
- Subject-oriented data repository designed with enterprise-wide access in mind.
- In addition to data query and reporting, a data warehouse provides facility for getting quick, accurate, and often insightful information
- Is designed so that its users can recognize the information they want and access that information using simple tools.
- Integrates operational data from various sources into a single and consistent architecture that supports analysis and decision-making within the organization
- Operational (legacy) systems create, update and delete production data that "feed" the Data Warehouse.

Advantages :
1) More cost-effective decision making
- Integration of various operational data into a single source helps in lowering the cost in analysis and decision making.

2) Better enterprise intelligence
- All the data can be governed by tapping into a single source thus helping the identification of possible problems or business advantages.

3) Enhanced customer service
- Faster decision making and actions carried out ensures shorter time the customers will have to wait. Therefore improving customer services.

4) Allowing business reengineering
- The integration of data make it easier to redesign the business organization whether completely or partially.

5) Information system reengineering
- Information system can be redesigned easier due to the flexibility of data management offered by the data warehouse.

Data Warehouse Diagram

Network and Telecommunications : The Evolution in Telecommunication: From Wire to Wireless

Telecommunication Network is a network of telecommunication links and nodes arranged so that messages may be passed from one part of the network to another part of network over multiple links and through various nodes.

There are few examples of telecommunications network:
  • The computer network
  • The Internet network
  • The public switched telephone network
  • The global Telex network
  • The aeronautical ACARS network

Wired Technologies

Twisted-pair Wire

Twisted-pair wire is the most widely used medium for telecommunication. Twisted-pair wires are ordinary telephone wires which consist of two insulated copper wires twisted into pairs and are used for voice and data transmission. The use of two wires twisted together helps to reduce crosstalk and electromagnetic induction. The transmission speed ranges from 2 million bits per second to 100 million bits per second.

Coaxial Cable

Coaxial cable is widely used for cable television systems, office buildings, and other worksites for local area networks. The cables consist of copper or aluminum wire wrapped with insulating layer typically of a flexible material with a high dielectric constant, all of which are surrounded by a conductive layer. The layers of insulation help minimize interference and distortion. Transmission speed range from 200 million to more than 500 million bits per second.

Fiber Optic Cable

Fiber optic cable consists of one or more filaments of glass fiber wrapped in protective layers. It transmits light which can travel over extended distances without signal loss. Fiber-optic cables are not affected by electromagnetic radiation. Transmission speed may reach trillions of bits per second. The transmission speed of fiber optics is hundreds of times faster than for coaxial cables and thousands of times faster than for twisted-pair wire.


Wirelss Technologies

Wireless LANs


Wireless local area network use a high-frequency radio technology similar to digital cellular and a low-frequency radio technology. Wireless LANs use spread spectrum technology to enable communication between multiple devices in a limited area. An example of open-standards wireless radio-wave technology is IEEE 802.11b.

Communications Satellites

The satellites use microwave radio as their telecommunications medium which are not deflected by the Earth's atmosphere. The satellites are stationed in space, typically 22,000 miles above the equator. These Earth-orbiting systems are capable of receiving and relaying voice, data, and TV signals.

Bluetooth

Bluetooth is a short range wireless technology. Operate at approx. 1Mbps with range from 10 to 100 meters. Bluetooth is an open wireless protocol for data exchange over short distances.



Type of Network
Local Area Network
A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as home, school, computer laboratory, office building, or closely positioned group of buildings. Each computer or device on the network is a node. Current wired LANs are most likely to be based on Ethernet technology, although new standards like ITU-T G.had also provided a way to create a wired LAN using existing home wires (coaxial cables, phone lines and power lines)

Wide area network

Wide area network (WAN) is a computer network that covers a large geographical area such as a city, country, or spans even intercontinental distances, using a communications channel that combines many types of media such as telephone lines, cables, and air waves. A WAN often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer.

Virtual Private Network

Virtual private network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. The data link layer protocols of the virtual network are said to be tunneled through the larger network when this is the case. One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features.

Client-server
Client-server computing or networking is a distributed application architecture that partitions tasks or work loads between service providers and service requesters, called client. Often clients and servers operate over a computer network on separate hardware. A server machine is a high-performance host that is running one or more server programs which share its resources with clients. A client does not share any of its resources, but requests a server's content or service function. Clients therefore initiate communication sessions with servers which await incoming requests.


Peer to Peer
A peer-to-peer, commonly abbreviated to P2P, is any distributed network architecture composed of participants that make a portion of their resources such as processing power, disk storage or network bandwidth directly available to other network participants, without the need for central coordination instances such as servers or stable hosts. Peers are both suppliers and consumers of resources, in contrast to the traditional client-server model where only servers supply, and clients consume.