Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
in
Serial Transmission
M
-M
us
ht
a
us
sa
Serial transmission has the advantage of being simple and reliable because other
next it is not transmitted until the current one has been received. However,
because only one bit can be transmitted at a time, the transmission is slow.all
peripheral devices that connect through a universal serial bus(USB) use serial data
transmission.
Parallel transmission
If the devices are connected by more than one wire, then more bits can be sent
simultaneously. A sensible number of wires would be eight, because then whole
byte can be sent at the same time.
M
-M
us
ht
a
us
sa
in
Parallel transmission of data is faster than serial transmission because all the bits
are travelling at the same time. It is less reliable as the bits can become muddled
up. The bits might reach out of sequence at the destination. This problem is call
skew. Parallel transmission is suitable for short distances.
sa
in
In the case of odd parity, the situation is reversed. Instead, if the sum of bits with
a value of 1 is odd, the parity bit's value is set to zero. And if the sum of bits with a
value of 1 is even, the parity bit value is set to 1, making the total count of 1's in
the set an odd number.
ht
a
1010001
00000000
us
M
-M
0000000
even
us
odd
00000001
10100011
10100010
1101001
11010010
11010011
1111111
11111111
11111110
Error detection
If an odd number of bits (including the parity bit) are transmitted incorrectly, the
parity bit will be incorrect, thus indicating that a parity error occurred in the
transmission. The parity bit is only suitable for detecting errors; it
cannot correct any errors, as there is no way to determine which particular bit is
corrupted. The data must be discarded entirely, and re-transmitted from scratch.
On a noisy transmission medium, successful transmission can therefore take a long
time, or even never occur. However, parity has the advantage that it uses only a
single bit and requires only a number of XOR gates to generate.Parity bit checking
is used occasionally for transmitting ASCII characters, which have 7 bits, leaving
the 8th bit as a parity bit.
Contact the teacher: 03215275281
For example, the parity bit can be computed as follows, assuming we are sending
simple 4-bit values 1001.
B receives: 10010
B computes parity: 1+0+0+1+0 (mod 2) = 0
in
sa
result.
us
ht
a
Odd parity
us
M
-M
Integrated circuits are more expensive when they have more pins. To reduce the
number of pins in a package, many ICs use a serial bus to transfer data when
speed is not important.
As suggested by the name Universal Serial Bus, data transmission in the bus
occurs in a serial form. Bytes of data are broken up and sent along the bus one bit
at a time, with the least significant bit first as illustrated by following figure 3.
Internet use poses security challenges from spyware, as well as hacking and
malware. Spyware is malware that secretly collects various types of personal
information from a users computer. Users are also vulnerable to Internet-based
deception (or computer-based social engineering) Such as:
sa
in
Phishing
Pharming
Advance fee fraud.
Some other Internet security problems include:
Spam
Browser cookie files
Adware
M
-M
us
ht
a
us
Computer Security
Firewall
A firewall is a utility program (or it can also be a hardware device) that filters the
information coming through the Internet connection into your personal computer or
into a company's network. Its main aim is to try to stop any attempts by intruders
to enter your system through the internet connection.
It is set up to allow mainly one way access, i.e. you can go out onto the Internet
and access pages, but it checks every data packet that either enters or leaves the
computer against a set of rules. If the data coming back is from an unauthorized
source then it is blocked. More.
in
You may have heard people saying, 'I can't get on that site at school because it's
been blocked'; that is the firewall in action.
sa
All networks and indeed all home PCs should have an active firewall.
us
Spyware protection
Spyware is a software program that once installed on your computer can monitor
and collect personal information about your web surfing habits and the web pages
that you visit.
M
-M
us
ht
a
You are usually unaware that your machine has been infected by spyware and it
can sit in the background, collecting information about you and then transmitting it
back to the author of the spyware - often advertisers who want to know what you
are interested in and what adverts you click on.
Spyware may be installed without your knowledge by downloading some shareware
or other software that seems to do something useful e.g. a free game or utility.
Whilst spyware is normally harmless, it can interfere with your control of the
computer in other ways. It can install additional software which redirects the web
browser to sites that it wants you to visit. It can also change the computer settings
which can result in slow connect speeds and it can prevent you from accessing
secure internet services.
Key loggers are another form of spyware, but they are not so harmless. The
purpose of a key logger is to monitor and store a record of every keystroke made
on the computer. This data may then be sent to a remote server without your
knowledge. It is specifically looking for user names and passwords used for things
such as bank accounts, credit card numbers etc.
Computer security software normally includes an anti-spyware section to help
detect these malicious programs. You need regularly scan your system for spyware
and key loggers and remove them if they are found.
Anti-virus
A computer virus is a software program that is designed to copy itself over and over
again and to attach itself to other programs.
Viruses do not damage the computer hardware. They affect the data and programs
stored on the computer.
They can cause an immense amount of time wasting and financial loss for people
and businesses. For example, the "Melissa" virus was so effective in spreading itself
that many huge corporations had to shut down their email systems until the virus
could be contained.
The operating system tries to make sure that data is not corrupted by viruses. In
order to do this, antivirus software is used.
sa
in
There are a number of anti-virus programs available for wiping out viruses for
example Norton, McAfee, Sophos and AVG.
us
The anti-virus software contains a database of known viruses. Every time a file is
opened, the anti-virus utility checks the content, looking for hidden viruses against
its database.
ht
a
When the utility recognises a virus pattern, it will alert the user, and ask them
whether they want to remove the virus and clean the system, or whether they
simply want to 'quarantine' the virus.
M
-M
us
New and more damaging viruses are being written all the time and so to keep up
with these new threats, the anti-virus companies provide constant updates to their
software. Normally, you log on to the internet and the software will update itself
either automatically or after a certain period set by you.
There is usually a small annual fee involved for this service, but it is a small price to
pay for peace of mind.
us
sa
in
The most common use of the Internet is to view web pages on the World Wide Web
and for this you need a software application called a 'web browser'.
A web browser will take in all the data coming down from the web site and convert
it into a format you can see (or listen to). After all, a web page is made up of many
pieces of data - text, images, video, and sound. The job of the browser is to
'render' the page into the correct format.
As a client/server model, the browser is the client run on a computer that contacts
the Web server and requests information. The Web server sends the information
back to the Web browser which displays the results on the computer or other
Internet-enabled device that supports a browser.
An information resource is identified by a Uniform Resource Identifier (URI/URL)
which may be a web page, image, video or other piece of content. Hyperlinks
present in resources enable users easily to navigate their browsers to related
resources.
us
ht
a
Web servers are computers that deliver (serves up) Web pages. Every Web server
has an IP address and possibly a domain name. For example, if you enter the URL
http://www.maxpapers.com/index.html in your browser, this sends a request to the
Web server whose domain name is maxpapers.com. The server then fetches the
page named index.html and sends it to your browser. Any computer can be turned
into a Web server by installing server software and connecting the machine to the
Internet.
M
-M
in
M
-M
us
ht
a
us
sa
HTML Structure
Presentation is the style you give the content. In most cases presentation is about
the way a document looks, but it can also affect how a document sounds not
everybody uses a graphical web browser.
Separate structure from presentation as much as possible. Ideally you should end
up with an HTML document which contains the structure and content, and a
separate CSS file which contains everything that controls presentation.
MAC addresses
M
-M
us
ht
a
us
sa
in
IP address
An Internet Protocol address (IP address) is a numerical label assigned to
each device (e.g., computer, printer) participating in a computer
network that uses the Internet Protocol for communication. An IP address
serves two principal functions: host or network interface identification and
location addressing. Its role has been characterized as follows:
"A name indicates what we seek. An address indicates where it is. A route
indicates how to get there.
Why was it developed?
Cookies
M
-M
us
ht
a
us
sa
in
If two machines are networked together, then it is pretty obvious that when
you send data from one machine it can only go to the other machine. So no
need for complicated addressing. But as soon as more and more machines
were added to networks, they needed to be identified by a unique address.
So IP addressing was invented. And it looks something like this
198.168.000.001
There are four sets of numbers because it is a 4 byte scheme - 32 bits. The
first three numbers tend to be used to identify the network while the last
number tends to pinpoint a particular computer on that network.
IP addresses are binary numbers, but they are usually stored in text files
and displayed in human-readable notations, such as 172.16.254.1 (for Pv4),
and 2001:db8:0:1234:0:567:8:1 (for IPv6).
An IP address can be static or dynamic. A static IP address will never
change and it is a permanent Internet address. A dynamic IP address is a
temporary address that is assigned each time a computer or device accesses
the Internet.
A cookie is a small text file that is stored on your computer when you visit
some websites. A cookie is used to remember settings from your last visit to
a website. For example Amazon.com uses cookies to help identify you when
you revisit the site. The website reads the cookie and can then look up
details such as you name, address, credit card number from their database.
This saves you from having to re-enter your data every time you visit.
Note: First, and contrary to popular belief, cookies are NOT programs. They dont do anything at all.
They are simple text files which you can read using the Notebook program on your own PC