Tuesday 29 May 2012

My Project Design


Designs influenced by Objectives
Design & Review of objectives
Initial objectives:
Objective 1:
Must be able to detect movements higher up.
Design:
The reason I thought this objective should be included in the project was because the robot is very small a person would be considerably taller so I thought I would need to put angle the sensor so it would detect taller objects.
Objective 2:

The robot will use an ultrasonic sensor to detect an intruder. The robot must be small enough so that 
it can remain hidden from a potential intruder.
Design:
During the design stage of the project I was thinking on how I would make the robot detect intruders so I thought that I should implement an ultrasonic sensor to enable the robot to detect movement. I also stated in the design that the robot should be as small as possible.
Objective 3:
The robot would remain silent and relay the detection then after duration of time restart the program.
Design:

In the design I stated that the detecting robot should remain silent so that the intruder is unaware they had triggered an alarm. The alarm should also be able to automatically restart after detection without the need for user input.

Objective 4:

The robot wouldn’t sound an alarm because it has to be a silent security device to relay the detection accurately to another device.

Design:
During the design stage I also thought that the project should use a wireless connection to send a message to the other device. The reason I set is as an objective was to ensure that the robot uses a wireless medium to send a receive messages as this makes the robot more stealthy.
Objective 5:
The alert must be sent to the device securely and a reasonable time after the detection is made.
Design:
A concern which I thought about in my design was the actual time taken to receive the detection from the other NXT brick if the time is too long then it’s very important that it’s made better so this was the reason I set it as an objective





Objective 1:
The way in which the design of my robot has been influenced by objectives was that in my designs I made the sensor angle upwards so that It would detect higher objects. I included this design in my storyboard.


Objective 2:
The way my designs have been influenced by objective 2 was to make my robot as small as possible so that it can remain undetectable to intruders. I will try to include the fewest amount of Lego components as possible without hindering performance.



Objective 3:
This objective influenced the programming and not the physical design. I will have to implement a forever loop on the NXT program for the robot and a wait block so that it will forever detect intruders after a 10 seconds cool down period between each detection.



Objective 4:

This objective influenced me to think that I will need to have another NXT brick in order to relay the detection secretly. I needed to think about the programming for the receiving brick as well as how to connect the Bluetooth together. This influenced the design of my pseudo code.


Objective 5:

During the planning of the project I believed that this is a serious factor in the project and I must be able to make the whole “Send Intrusion Message” function work correctly and work quickly. This influenced me to look at the various ways In which I’m able to send messages using the NXT bricks so Blue tooth became heavily involved in the design of the robot as well as in the programming. The use of Blue-tooth would need to be explained in my user guide as well as the Technical document. Blue-tooth also influenced me to look for additional ideas for future development of the project. The use of Blue-tooth also improved the design of the project because in the early stages of planning the project I was thinking of using a wired technique of relaying detection messages but the blue-tooth enables the robot to stay as small as possible and without needing the change the physical design of the robot.


Monday 21 May 2012

Jobs In the interactive media industry

Q 1: Average salary for interactive media jobs, compared with average salary for IT jobs in general (12.4)

The average wage for someone who works in the interactive media industry is £37,000 while the average wage of someone in the I.T sector in general is £50,000 although the average wage in the I.T sector has increased by 22% from the previous year (2011) while the I.T sector in general has only increased by 5%.


From the statistics above you can clearly see that interactive media jobs are getting paid more year on year than the I.T sector in general.


Q 2: How many Interactive Media jobs have been advertised on this website over the past 3 months? (12.4)

The numbers of jobs in the interactive media industry which have been quoted on the I.T job watch website in the last 3 months are 34 which is a slight increase from the previous year but significantly less than the amount which were quoted in 2010.


Q3:

How many of these jobs were likely to have been junior positions? (12.4)

From the listings I can identify about 9 jobs which are possible junior positions while the others seem to be experienced or senior job roles.

Q4: Which parts of the UK have the most jobs? (12.4)

From the map view it seems that most of the jobs listed are located in Central London and in larger city areas such as Edinburgh and Bristol.


Q5: What IT skills are most in demand at the moment? (12.4)

The most desired I.T skill at the moment is CSS which stands for Cascading style sheets which is a file which is in charge of setting up various elements of a HTML document such as the font, font colour and overall layout.

Q6: What computer applications are most in demand at the moment? (12.4)

The most wanted computer applications at the moment seem to be Adobe software such as Photoshop and Illustrator.


Q7: Click on the "Find Jobs" button and see what comes up.

IT support roles seem to be one of the most demanded roles in the IT sector.

Q8: You might notice that many jobs are advertised by job agencies. What is a job agency and how do they make their money? (12.4)

A job agency named “Accenture” makes money by receiving a percentage of the salary of the employee the employer hires.

Q9: Explain what is meant by 'Permanent' and 'Contract' in the job market. (12.4)

A permanent job is a job in which you are part of forever until fired or made redundant. A contract job is job in which you assigned to for set period of time and given a certain task to complete in that time. A contractor normally gets more money while a permanent job is more secure and regular.

Q10 & Q11:


Find one job that you could potentially apply for. Describe it, and explain why you would like this job. (12.5)


Evaluate your skills in relation to this job. (12.5)What can you already do? What do you still need to learn?


One of the jobs which I think I could apply for would be the following job as I have experience In Databases, digital media creation & editing as well as a basic network understanding. I don't have experience in administration for Linux.


Q12:

Besides advertisements, how else might you meet potential employers? (12.5)

Meet the employer in person or go to their official website and see if you can apply. Other ways you can meet an employer is through trade fairs or expos, you would basically arrive there with your CV and the employer may consider you.


Thursday 3 May 2012

Communication Protocols


Communication Protocols

Comprehensively explain protocols, devices and methods used in digital communication systems with elucidated examples and consistently using subject terminology correctly


Introduction


In this essay I will be explaining the uses of communication protocols as communication protocols act as the rules and restrictions for digital communication. A protocol is in charge of enabling devices to communicate with each other by agreeing on formats. There are several different types of networks which have their own features and technologies to enable them to establish a connection. Here is a list of some of the types of networks; PAN (Personal Area Network), LAN (Local Area Network), MAN (Metropolitan Area Network), (WAN) Wide Area Network. Each of these types of networks has their own advantages and disadvantages.


The Internet


The way in which people are able to communicate over the internet is by the implementation of several protocols. The protocols such as “IP” (Internet protocol) enable users to communicate with other users computers. IP is tasked with setting the correct destination for each packet. The creation of the internet by Tim Berners-Lee has given birth to several different ways in which we communicate in modern society. One of the most common used platforms in which to communicate these days are social networking sites such as Facebook and Twitter. The birth of these platforms has resulted in people all over the world being able to communicate with people the other side of the world very easily and free of charge. Social networking sites such as Facebook enable users to post all text messages, photos and videos to a digital personal space. Everything posted on Facebook would then be able to be viewed and commented on by yours friends. The popular social networking sites such as Facebook and Twitter can also be used on most new portable devices such as phones and also Internet TVs. As mobile phones use 3G this essentially enables a user to be connected to the internet all of the time.

How emails are sent

The way in which emails are sent is by sending an electronic message from one to another server. There are various protocols which handle various different tasks to complete the transport of a message. For example SMTP is a protocol which manages the layout of email an email while the protocol POP3 manages the authentication of usernames , email addresses and password. The MUA (Mail User Agent) is in charge of retreiving an email and manipulating the email so that is ready the read by the user.


Instant messaging


Instant messaging is a communication system which enables users to communicate with other people connected to the internet in real-time. The social networking site Facebook has an instant messaging service which enables Facebook users to speak with their friends. Instant messaging is free as you only really require a wired or Wi-Fi connection to communicate. The disadvantage of instant messaging is that because it’s so widely used it’s often used as a platform in which to send computer viruses or steal sensitive information which you have posted to someone. Before instant messaging people would spend lots of time on the telephone which would of cost a lot of money. Instant messaging acts as a cheaper and more effective way in which to communicate with friends and family.


Web 2.0


The internet has enabled the birth of various other platforms in which we use to communicate with other people


Popular communication services which can be found on the internet are forums which are basically a discussion board on various topics consisting of a community which have registered to the forum. An example of forum is “Empire Movie Magazine Forum” which consists of topics about movies and the community would likely be film fans.


One of the most popular uses of the internet is Social Networking and the most popular social networking sites currently are Facebook and Twitter which basically acts a digital place in which you can communicate and socialize with your friends. Facebook is also a platform in which companies can advertise their products to their target audience which is done by analysing the data which the user has inputted to their profile.


The internet also acts a platform in which to conduct business as online businesses such as Ebay and Amazon act as a popular choice for consumers to buy from as its most of the time cheaper and more convenient.


The World Wide Web acts a huge platform in which an individual can obtain information on pretty much anything. The World Wide Web isn't as restricted as the media that you see on TV so user-generated content can be uploaded onto sites such as YouTube which wouldn't be allowed on national TV. This platform acts as powerful way in which to relay information to the world.


CoIP


CoIP stands for conferencing over internet protocol and is a protocol which is used when more than two computers want to communicate using video and audio transmission at the same time. It’s a protocol which would be used when using software such as GoToMeeting which is video conferencing software.


3G is the 3rd generation in network communication technology as this enables mobile devices users to reach speeds a lot higher than previous generations as well as broadened security. 3G essentially enables all users to reach speeds of 10 mbps and are pretty much guaranteed a connection 24/7. Popular websites are often design a mobile interface for their website to enable their website to be easy to navigate on weird screen resolutions.


One of the advantages of 3G over Wi-Fi is that it has a larger range than Wi-Fi as a Wi-Fi connection can only be established if the device is within 15 meters but one of the advantages of Wi-Fi has over 3G is that it can establish a faster connection speed in most cases. Wi-Fi is also a lot cheaper than 3G and it also consumes a lot less battery life than 3G.


Bluetooth


Bluetooth is a close range wireless technology which has a high level of security meaning that a security code would need to be inputted before any communication can be inputted. Bluetooth can be found on devices such as mobile phones and wireless headsets. On my previous course I created a security robot which was programmed to relay a detection message to an external device and the way I did this was to establish a connection via Bluetooth. Bluetooth is more energy efficient than Wi-Fi because it require less bandwidth to establish a connection so it’s a perfect network to use on devices such as wireless mice and keyboards as it consumes less battery life than Wi-Fi would as these wireless devices would likely require rechargeable batteries.


GSM (Global System for Mobile Communications)


2G GSM is a technology which was created a replacement to 1G and has various advantages over 1G such as the network is a lot more stable than 1G as well as it uses digital signals instead of analogue which 1G uses. The quality of signals isn’t hindered that much inside buildings. GSM operates pretty much everywhere on the world so there aren’t any compatibility problems when travelling around the world apart from countries such as Japan. The disadvantages of GSM are that the signal can sometimes be disrupted by electronics. GSM is a shared network so in large populated areas you can experience a great deal of network lag as a result of lots of people using the network. GSM cannot be used on airplanes because the GSM signal can cause disruption to other electronics such as an airplanes radio. The advantages 3GSM have over 2G that it’s completely worldwide.


VoIP Protocols


Voice over internet protocol is a way in which people are able to communicate over the internet using a telephone which is free of charge. The type of data which transmitted when you talk on a phone is analogue audio signal which isn’t recognised on the internet so the VoIP converts the signal into a digital data which can be recognised. An analogue signal is a constant, always changing signal while a digital signal is a whole number value which can recognised by a computer.


The internet’s packet switching technology is used to establish a phone service between two computer systems. The transmission cost of an average phone call is only 128kbps which is hardly anything these days because of the growing implementation of fibre optic broadband.


The three most common services of VoIP currently are ATA (analogue telephone adaptor) which basically enables a normal telephone to use the VoIP service as ATA is basically an analogue to digital converter which enables it to work correctly.


Protocols


There are various rules that protocols that are put in place to manage the communication between computers on a network. These rules include guidelines that regulate the access method, topologies, types of cabling, and speed of data transfer. Different protocols offer different speeds and range so this reflects in the topology in which it is used in. For example longer ranged topology would use a fast Ethernet topology which uses a fibre optic cabling.


Protocols between networks are designed and illustrated and layered in the OSI model. Different network methods have their place in the OSI model The LAN protocols can be put under the physical and data link layers of communications over various LAN media such as Ethernet wires and wireless radio waves. The WAN protocol is for the lowest three layers and defines communication over various wide-area media, such as fibre optic and copper cables.




<><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><> <><><><>
Protocol
Cable
Speed
Topology
Ethernet
Twisted Pair, Coaxial, Fibre
10 Mbps
Linear Bus, Star, Tree
Fast Ethernet
Twisted Pair, Fibre
100 Mbps
Star
Local Talk
Twisted Pair
23 Mbps
Linear Bus or Star
Token Ring
Twisted Pair
4 Mbps - 16 Mbps
Star-Wired Ring
FDDI
Fibre
100 Mbps
Dual ring
ATM
Twisted Pair, Fibre
155-2488 Mbps
Linear Bus, Star, Tree



Importance of Network Protocols



Network Protocol is needed because the message or data sent by networks have to reach their destinations by going through different networks of different structure and different platform. Network protocols are performing the duty to make our sent data compatible to the new networks. They also help create a standard of communication, such as TCP/IP. This is used to enable different operating systems to talk to each other over a network. So the main significance of the network protocols is compatibility of networks over the internet.





Network Protocols and network topologies






OSI Model



The OSI model is the standard architecture for modern Communication systems. More on blog:







Network Devices in Weymouth College



More on blog:








Digital Communication Techniques & Services



http://dan-burden.blogspot.co.uk/2011/11/digital-communication-techniques.html



HTML



HTML stands for hypertext mark-up language and is a scripting language which is used by software developers. Authoring software such as Adobe Dreamweaver CS5 is a program which enables the user creates webpages using HTML code. Adobe Dreamweaver has a feature which enables users to create a webpage in design view which basically involves importing content to the stage and the code is written for you.  HTML is a scripting language which is supported by pretty much every internet browser.



HTTP Secure



HTTP secure stands for hypertext transfer protocol secure and are a security protocol which provides encrypted communication between a user and webserver. This protocol prevents any unauthorised eavesdropping from external sources. This protocol Is implemented on e-commerce websites such as Amazon and eBay which require the user to type in their credit card details.



CSS (Cascading Style sheets)



CSS files are in charge of several parts of a webpage for example properties such as type of font, font size and positioning of content. CSS files would be targeted in a HTML document and would be located in the same director as the HTML document.

CSS reduces the amount of HTML code a website requires and therefore vastly decreases page sizes and bandwidth usage.

The CSS code is also a lot smaller which ultimately means less bandwidth.CSS gives the developer much better control over the layout of your web pages.



HTML 5


HTML 5 is the newest version of HTML and offers many new features such as more collaboration with multimedia content. HTML 5 is very similar to flash as Flash websites offer a unique rich media feel. HTML 5 is has been implemented into most modern internet browsers such as Firefox, Google Chrome and Safari. Users who are using older operating systems such as Windows XP wouldn’t be able to view HTML 5 content.

Wednesday 2 May 2012

Network Protocols


Introduction
There are several different types of networks which have their own features and technologies to enable them to establish a connection. Here is a list of some of the types of networks; PAN (Personal Area Network), LAN (Local Area Network), MAN (Metropolitan Area Network), (WAN) Wide Area Network. Each of these types of networks has their own advantages and disadvantages.
Personal Area Network
A personal area network normally uses equipment and technologies which are used by one person and enable other systems to use the devices on the network an example of the type of devices which would commonly be used on this network are printers.
Local Area Network
A local area network (LAN) supplies networking capability to a group of computers in close proximity to each other such as in an office building, a school, or a home. Local area networks are mostly made up of cheap hardware such as Ethernet cables and network adaptors. A local area network can be made up of a minimum of two computers while large LAN’s can include thousands of computers and then they can be divided into separate logical groups called subnets. The internet protocol called “Class A" LAN can in theory accommodate more than 16 million devices organized into subnets.
Wide Area Network
A wide area network typically consists of two or more local area networks. Computers connected to a wide-area network are often connected through public networks, such as the telephone line system or satellites.
Protocols
There are various rules that protocols that are put in place to manage the communication between computers on a network. These rules include guidelines that regulate the access method, topologies, types of cabling, and speed of data transfer. Different protocols offer different speeds and range so this reflects in the topology in which it is used in. For example longer ranged topology would use a fast Ethernet topology which uses a fibre optic cabling.
Protocols between networks are designed and illustrated and layered in the OSI model. Different network methods have their place in the OSI model The LAN protocols can be put under the physical and data link layers of communications over various LAN media such as Ethernet wires and wireless radio waves. The WAN protocol is for the lowest three layers and defines communication over various wide-area media, such as fibre optic and copper cables
Protocol
Cable
Speed
Topology
Ethernet
Twisted Pair, Coaxial, Fiber
10 Mbps
Linear Bus, Star, Tree
Fast Ethernet
Twisted Pair, Fiber
100 Mbps
Star
LocalTalk
Twisted Pair
23 Mbps
Linear Bus or Star
Token Ring
Twisted Pair
4 Mbps - 16 Mbps
Star-Wired Ring
FDDI
Fiber
100 Mbps
Dual ring
ATM
Twisted Pair, Fiber
155-2488 Mbps
Linear Bus, Star, Tree

Importance of Network Protocols
Network Protocol is needed because the message or data sent by networks have to reach their destinations by going through different networks of different structure and different platform. Network protocols are performing the duty to make our sent data compatible to the new networks. They also help create a standard of communication, such as TCP/IP. This is used to enable different operating systems to talk to each other over a network. So the main significance of the network protocols is compatibility of networks over the internet.

WAN wide area networks connect to organisations which are located nationwide. A wide are network would likely be used to connect smaller local area networks to other Local area networks which may be located further away for example in another country.
MAN metropolitan area network. Authorities and finance would use this type of network. This type of network would typically be used to connect separate offices around a city with extremely fast transfer speed.
PAN personal area network would use network medians such as Bluetooth. Personal area networks typically involve a portable device which has internet connectivity such as a PDA. You can use these networks to transfer files including email and calendar appointments, digital photos and music. The range of a PAN network would typically only over the distance of 10 metres.
There are many useful services that are featured in networks which include enable schools and businesses to share resources with all the computers connected to the network. This is perfect for businesses which want to relay important files and documents to all the employees with ease. The way in which this is done is simply by uploading files to a central server which can then be accessed by everyone on the network. Without this feature it would be considerably harder and take considerably longer for businesses to get files to employees. This feature is also perfect for businesses which are looking to save money by using fewer resources such as paper because files can simply be completed on a computer then saved and sent through the network without needing to print the documents.
Networks also have the capacity to provide their own private email service. This is perfect for businesses and schools as it enables an email system to be created in the internal network which ultimately enables you to send emails to users in the network. An example would be to have a boss of a business send a mass message to all employees without needing to stage a meeting or print out loads of pages. This saves money, easier and consumes considerably less resources.
Telecommunication services are useful in networks as it enables businesses to implement other connection mediums such as wireless technology so that employees can access the network in a remote or mobile location as long as they are in the network range. For example they can use laptops anywhere in the building without being hindered by the length of their network cable. Wireless computers can also be linked together which is useful if a computer needs to be controlled remotely by another computer for maintenance needs.
This way of connecting the business together makes the network pretty secure from external intrusions as well as enabling the business to safely relay information and communicate at a considerably lower cost that if it was done other ways.