Guide For G10
Guide For G10
- Importance of multimedia
- Explain Multimedia and their components
- Describe multimedia authoring and its tools (make use of Macromedia Flash)
- Summarize multimedia editing
- Edit and publish multimedia files
- Explain computer animation
File management
Brainstorming
File management is the process of organizing and keeping track of files and folders,
helping you stay organized, so information is easily located.
The followings are the advantages and disadvantages of traditional file based approach:
Advantages Disadvantages
The followings are the advantages and disadvantages of computer based approach:
Advantages Disadvantages
Data duplication
Accessibility
Cost effective
Direct access, less flexible
Security Inconsistency
Reliability
Files here are very less likely to undergo Requires expertise (including training)
damage or destruction.
Data backup
Any damages from nature or handling can
Security
be completely avoided in a file management
system.
Data recovery
Data sharing
Limited, manual backup required
Scalability
Data retrieval
Limited, not ideal for large datasets
Environment friendly
Common storage devices (let’s do a simple google; we end up with the below screenshots)
Key concepts:
File management is the process and act of creating an organized structure in which you
store information for easy retrieval.
Folder (directory) is a virtual storage space used to store and organize computer files.
File name extension
Brainstorming
1. How do you identify one file from another (a music file from an image file, for
instance)?
2. What do you understand by the term filename extension?
A file extension is a two- or three- or four-letter identifier found at the end of a file name
being followed by a period. The extension tells you about the characteristics of a file
and its use.
File extensions are used by an operating system to identify what applications are
associated with a particular file type.
Activity – in-class activity – define an OS (Operating System and list some popular operating systems)
Section activity – lists down some random files from a device and differentiate them based on their file
extensions; including the application they’re made of.
Files are typically displayed in a hierarchical tree structure. When you see the structure,
it looks like a tree; hence, the term hierarchical tree structure is used to describe it.
The first or the top folder (directory) in the structure is called the root directory. A
directory contained inside another directory is called a subdirectory.
The terms parent and child are often used to describe the relationship between the
directory and the subdirectory.
For Example, the root directory of the main partition on a computer is usually C:\.
spy.mp4
spy.mp4
Pathname: refers to a path for files and folders is the list of parent directories that the
computer (the OS to be precise) must go through to find that particular item.
Filesystems have two different types of paths: absolute and relative paths.
Side note: The slash (/) is used to delimit names in the sequence.
Note that it is perfectly acceptable to have several files with the same file name, as long
as they have unique pathnames. That is, the same file name may be used in different
directories.
Absolute pathname is the path given from the root directory to the file. Relative
pathname is the path referenced relative to the current directory.
File conversion
File conversion is the process of converting a file from one file format into another.
File converter is the software that converts a file from one file type to another.
If a file was created in one application and you want to use it in another, you can either
import the file or use a conversion program.
Create a document (using MS-Word) and practice activity 1.6 given on the textbook.
Backup and recovery describe the process of creating and storing copies of data that
can be used to protect individuals and organizations against data loss. This is
sometimes referred to as operational recovery.
Restoring is the process of copying backed-up data from a secondary location and
restoring it to its original device or a new device. The purpose of the backup is to create
a copy of data that we use to recover in the event of a primary data failure.
File compression
File deletion
File restoration
Unit 2 – Computer Networks
Overview
And therefore, the fundamental components of a network are devices, media, messages
and protocols.
Data can be transmitted from point A to point B (from device A to device B) via a
physical pathway or medium. These pathways are called transmissions media and can
be either physical or wireless. The physical transmission use wire, cable, and other
tangible materials; wireless transmission media send communications signals through
the air or space.
The physical transmission media are generally referred to as guided media (or cable
media) – example, twisted pair wire, coaxial cable, and fiber optic cable.
Ethernet cable which is used to connect networking devices through UTP cable and end
is terminated with RJ45 connector. UTP cable consists of 4 pair or 8 wire of different
color that is used to terminate on RJ45 (or 8P8C - Eight Position, Eight Contact)
connector.
An easy way to remember color code is in odd places (1, 3, 5, and 7) color with white strip is present.
Hold both ends/RJ-45connectors of cable with their Jack in downward position. Now
start matching the color coding from left pin of connector towards right.
There are 3 types of cables
o Straight through
o Rollover or Console
Straight cable
Devices having different function can be connected with this type of cabling. It is used
to connect:
hubs to switches
PC to PC
PC to a Router*
Unlike straight through cabling, crossover cables use the two different wiring standards: one end
uses the T568A wiring standard and the other end uses the T568B wiring standard.
Note that the only difference with respect to straight cable is that 1st and 3rd and 2nd and 6th
numbered cables are swapped on the 2nd end of the cable.
Rollover or console cable
It is used for device configuration. For example, one end of console cable is connected
to console port of the router or a switch and other end would be connected to NIC
(Network Interface Card) port of your laptop or PC.
Below is the color coding of Console cable. The color coding of both ends are totally
reversed.
Networking devices
Network devices, also known as networking hardware, are physical devices that allow
hardware on a computer network to communicate and interact with one another.
Examples include Repeater, Hub, Bridge, Switch, Routers, Gateway, and NIC, etc.
Note that are there are 7 layers in the OSI (Open Systems Interconnection) layers:
Application layer
Presentation layer
Session layer
Transport layer
Network layer
Data link layer
Physical layer
Repeater
The collision domain1 of all hosts connected through Hub remains one. Also, they do
not have the intelligence to find out the best path for data packets which leads to
inefficiencies and wastage.
o Active hub
o Passive hub
o Intelligent hub
1
A collision domain is a network segment connected by a shared medium or through repeaters where
simultaneous data transmissions collide with one another.
Bridge
Switch
o unmanaged switches
o managed switches
o smart switches
o Layer 2 switches
o Layer 3 switches
o PoE (Power over Ethernet) switches
o gigabit switches
o rack-mounted switches
o desktop switches
o modular switches
Routers
- a router is a device like a switch that routes data packets based on their IP
addresses
- the router is mainly a Network Layer device
- routers normally connect LANs and WANs
- have a dynamically updating routing table based on which they make decisions
on routing the data packets
- the router divides the broadcast domains of hosts connected through it
NIC – NIC or network interface card is a network adapter that is used to connect the
computer to the network. It is installed in the computer to establish a LAN. It has a
unique id that is written on the chip, and it has a connector to connect the cable to it.
The cable acts as an interface between the computer and the router or modem. NIC
card is a layer 2 device which means that it works on both the physical and data link
layers of the network model.
Brouter – it is also known as the bridging router is a device that combines features of
both bridge and router. It can work either at the data link layer or a network layer.
Working as a router, it is capable of routing packets across networks and working as
the bridge, it is capable of filtering local area network traffic.
1. Radio waves
2. Microwaves
3. Infrared waves
Telecommunications network
Mobile communications
1. Bluetooth network
2. WLAN (Wireless Local Area Network)
3. Cellular networks
4. 4G vs 5G
5. Satellite networks
Data communications
Delivery: refers to the successful and accurate transmission of data from the source to
the destination.
Significance – an effective data communication system ensures that the data sent by
the sender is reliably delivered to the intended recipient without loss or corruption.
Accuracy: involves the precision and correctness of the data transmitted. It ensures
that the received data is an exact replica of the original information.
Jitter: refers to the variation in the arrival time of data packets. Inconsistent delays can
lead to jitter, affecting the quality of real-time applications.
Latency: is the time it takes for data to travel from the source to the destination. High
latency can result in delays and sluggish performance.
Significance – minimizing jitter and latency is crucial for maintaining a smooth and
responsive data communication system, especially in applications where timing is
critical.
Conclusion
These four characteristics collectively determine the efficiency and reliability of a data
communication system. A well-designed system should prioritize the successful and
accurate delivery of data in a timely manner while minimizing variations in latency and
jitter. Achieving a balance among these characteristics is essential to meet the diverse
requirements of different communication scenarios and applications.
Key components and concepts related to data communication include:
Receiver: the device or system that receives and processes the transmitted data
Message
The actual data or information being transmitted from the sender to the receiver
Channel
Modulation: the process of encoding digital data into analog signals for transmission
Demodulation: the process of decoding analog signals back into digital data at the
receiving end
Multiplexing
The technique of combining multiple data streams into a single channel for transmission,
and optimizing the use of available bandwidth.
Transmission Modes
Simplex: data flows in one direction only (examples: Television broadcasting, radio
broadcasting, electronic billboards and/or public displays, elevator floor indicators,
alarm systems, temperature and weather sensors …).
Methods employed to identify and rectify errors that may occur during data
transmission.
Examples include:
Parity bit
Checksums
CRC (Cyclic Redundancy Check)
Hamming code
FEC (Forward Error Correction)
ARQ (Automatic Repeat reQuest)
Interleaving
Networking
Protocol: refers to a set of rules and conventions that govern the format and timing of
data transmission between devices. Protocols ensure that data is exchanged accurately
and efficiently.
Established sets of rules and standards that ensure compatibility and seamless
communication between diverse systems
Examples include:
An IP address, which stands for Internet Protocol address, is a numerical label assigned
to each device connected to a computer network that uses the Internet Protocol for
communication.
Why IP?
IP addresses serve two main purposes: host or network interface identification and
location addressing.
Network routing: enables routers to forward data packets between different networks
based on the destination IP address.
Types of IP addresses
Note
IP addresses are essential for the proper functioning of the internet and local networks,
enabling devices to communicate and share information. They are assigned
dynamically (temporarily) or statically (permanently) by network administrators or
Internet Service Providers (ISPs). Additionally, IP addresses can be public (routable on
the internet) or private (used within a local network and not directly accessible from the
internet).
Classes of IP Addresses
Prefix: identifies the physical network to which the computer is attached; it’s also
known as a network address.
Suffix: identifies the individual computer (host) on the network; it’s also called
the host address.
Public IP Range Private IP Range Subnet Mask # of Networks # of Hosts per Network
1.0.0.0 10.0.0.0
Class A to to 255.0.0.0 126 16,777,214
127.0.0.0 10.255.255.255
128.0.0.0 172.16.0.0
Class B to to 255.255.0.0 16,382 65,534
191.255.0.0 172.31.255.255
192.0.0.0 192.168.0.0
Class C to to 255.255.255.0 2,097,150 254
223.255.255.0 192.168.255.255
It is often used for audio and video streaming, such as IP-based cable TV networks.
Another example is the delivery of real-time stock market data from one source to many
brokerage companies.
Network mask
A network mask, also known as a subnet mask, is a 32-bit number used in Internet
Protocol (IP) networking to divide an IP address into network and host portions. It works
in conjunction with IP addresses to define the boundaries of a network and identify the
network and host parts of an address.
Note that the network mask consists of a series of contiguous '1' bits followed by a
series of contiguous '0' bits.
Common network mask formats include:
Dotted decimal notation: in this format, the network mask is expressed as four octets
separated by dots, each representing 8 bits.
Example: 255.255.255.0
CIDR (Classless Inter-Domain Routing) notation: this notation represents the number of
'1' bits in the network mask by appending a forward slash and the subnet prefix length
to the IP address.
Example 1:
Example 2:
IP address: 192.168.1.10
In this example, the network portion is 192.168.1.0, and the host portion is 10. The
network mask helps define the scope and boundaries of IP networks.
Private IP Addresses
Within each network class, there is designated IP address that is reserved specifically
for private/internal use only. This IP address cannot be used on Internet-facing devices
as that are non-routable.
For example, web servers and FTP servers must use non-private IP addresses. However,
within your own home or business network, private IP addresses are assigned to your
devices (such as workstations, printers, and file servers).
Special IP Addresses