Tuesday, 20 June 2017

OUR FORMAL EDUCATION IN TANZANIA




Mchangani school. Photo by Mary-Jane Matsolo.

Mary-Jane Matsolo    
Mary-Jane Matsolo recently visited Tanzania and met members of an extraordinary education activist movement called HakiElimu.
HakiElimu means the right to education in Swahili. This is the name of an organisation in Dar es Salaam, Tanzania dedicated to promoting education as a human right. Having an education system tainted with political interference, corruption and mismanagement, the organisation’s work is crucial to the survival of not only the educational system, but also the quality of education.
Teaching in Tanzania is not considered an attractive career. While it used to be a respectable occupation, it is now seen as a wasteland for failed high school graduates. Government introduced a system of sending high school graduates on seminars and workshops in an effort to turn these young graduates into qualified teachers.
HakiElimu took up a campaign against the enrolment of unqualified teachers, because the organisation believes children cannot become teachers.
Another big campaign this organisation is currently working on deals with the number of children passing school after seven years at primary level. After primary school, children go into secondary level being so illiterate, they can’t even write their own names.
Elizabeth Missokia, Executive Director of HakiElimu, told me that the problem is that there is too much political interference in Tanzania where politicians cannot separate politics from development. “Recently eight ministers have been sacked and we’re now seeing a lot of ministers resigning due to the communities being vocal about their dissatisfaction with the education system,” she explained.
HakiElimu has also influenced political parties. By giving out accurate information about the shortcomings in the education department, HakiElimu believes education and politics in Tanzania are inseparable issues. Unless there is democracy and transparency within the education system, people will continue to struggle. Everything is linked to education and, explained one staff member to me, the ruling party did not win this year’s election because of HakiElimu and the role they played in exposing the shortcomings in the education system.
Missokia explained to me that another huge problem in Tanzania is that the government keeps changing the curriculum without retraining teachers. This results in a number of different books being produced depending on which tender deal manufacturers manage to secure in certain districts. This causes books to have a lot of errors. Different companies publish text books with different information.
Another headache within the system is for the first seven years of a learner’s life in primary school, learners are taught in Swahili. After that, the last two years in secondary school are taught in English in a country that has 124 different languages.
Mchangani is a primary and high school. It receives 120 US Dollars towards the purchasing of school materials and stationary every four months. Despite the many challenges, this school is determined to provide quality education to their students. With class rooms that pack up to 110 learners at a time, the only way the teachers can cope is by dividing the class in half. Due to a lack of textbooks, teachers struggle to set assignments.
Marking and providing feedback to each learner is also very difficult. Mchangani’s primary school, however, is one of the few that is overcoming the problem of learners going to high school while still illiterate. This is because of the dedication from the teachers, despite government not recognising their efforts. The teachers have made special arrangements for classes to start at 06:00 until 18:30, without any extra pay. As a result of the extra effort, the high school has seen a steady rise in its pass rate.
The school itself is situated in a poor community that has a high HIV prevalence rate with many learners coming from single parent homes. Many parents do sex work to survive. The school also has a number of orphans that have lost their parents to HIV/AIDS.
HakiElimu established a library in the school that is also being used by neigbouring schools. The school does not have enough books in the library though, particularly for the young learners.
HakiElimu offers hope for the future education of Tanzania.

Sunday, 18 June 2017

Job at National Health Insurance Fund (NHIF), Database Administrator - [image: Job at National Health Insurance Fund (NHIF), Database Administrator] NATIONAL HEALTH INSURANCE FUND EMPLOYMENT OPPORTUNITIES INTRODUCTION *Nationa...

Ubalozi wa Tanzania Uingereza Wakana Kuwa na Taarifa za Mtanzania Aliyekamatwa Kwa Kuweka Picha za Marehemu Mtandaoni





 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


ABSTRACT

The following portfolio will comprise the INTRODUCTION TO COMPUTER NETWORK (TE121) on my way side it will cover at what extent I learned and enjoyed the course and the archived skills in (TE 121) are helpful in teaching and using ICT in schools, the topic covered are five and ten seminar questions are all in my work that we covered in the second semester of first year. This also was covered in time according to the timetable we had with two hours for normal class and an hour for practical where we did a presentation.







 








ACKNOWLEDGEMENT

First of all I would like to thank God for his glory and bless up this moment I’m done my task well as planed to be done, honesty I would like to give thanks to the university of Dodoma for providing a nice and suitable environment that helped in taking this course and today results in accomplishing this work.
Sincerely I would like to give more appreciation to my teacher Mr. KOMBA for his contribution during the whole process of learning in order to make sure that we reach the target and to develop the competence teacher.
I would also like to give a lot of appreciation to my fellows who presented their work and others who shared the views about the course also who provided advice about the work accomplishment.
I hope the hope the portfolio will meet the requirements of the university student academicians and common person has the interest in study of ICT, any suggestion or modification to the work script is welcomed
MUTASHOBYA ADRONICUS.

 

 




 

Declaration

This work I present is all concerned with the course of computer Network and I have prepared it on my own without the assistance of any but support of my teacher and my fellow students. So for any detail about this work I may be concerned for elaboration.

INTRODUCTION

These details contain all things covered in the course of TE 121 in the second semester also many things explained as well as brief explanation but each part thought the lecture, presentations and extra things related to the course. It analyses in this document things explained are network and computer network, transmission media,   network software, application of computer network and the satellites.
















Part ONE

2         MODULE ONE

2.1      NETWORK AND COMPUTER NETWORK

A network refers to the connection between two or more devices that enables them to share files, information or signals among users of that network. Computer network is the process of collecting and connecting different computing devices and enable them have the sharing of data or information.
In computer network any device that is being connected is called node and what is being shared among the devices is known as the services.                    
This concept of the computer network may be used or applied in many areas like in business, in education, at home, at military at hospitals and other social issues. In business the computer network may be used though the client server system whereby it involves the request and replies, where one person makes order of the things needed through the network and the other receives the order and makes the replies through the network. Through this people are able to do even business through online purchase and sale, make the view on the currency change in a particular day and time.  For example the value of a dollar compared to the Ural, buying a car online obtaining the book from internet and getting the ticket through a network.
Network is also applied at home where it help much in accessing the remote information, makes people be able to communicate among themselves also in sharing of the information from one colleague to another in the society. This also used in education whereby it computer network help much in finding out the teaching and learning materials in schools and colleges, it also help much in the communication among people in the education sector or among the education stakeholders. The good and well accessible computer network once available help in accessing much of the e-learning where by the student can be able to make the follow up on what is being taught in class while is far away from the area where teaching is taking place also the teacher may be able to access the student while is not in classroom, for example doing of the exam online. Help also in storage of resources that are used in teaching and learning process for the next use and also facilitate in management of the educational program and institution.  In hospitals it help in disease quire through finding different method of disease medicine and other medication related to the disease, it also assist in doing many scientific research on different kinds of disease that erupt or are virus affected. For example research on HIV/AIDs. People in the society are using networking in finding the information on many matters like politics, employment, marketing, schooling opportunity in the areas.

2.1.1                                 Advantages of computer network

a.       Sharing of resources among the computers that are connected together. For example sharing the modem, scanner, and printer.
b.      Faster sharing of information and files across the network, this enables most efficient communication among the users of the network.
c.       Helps much in serving the cost since the program may be in one computer and be shared by other computers and all get the access of that program.
d.      The information being stored in the computer network are reliable and up to date and be shared by different people in different location.

2.1.2    Disadvantage of computer network

                   I.            The individuals may fail to obtain the access of the network when the central system is destroyed or fail and this makes both hardware and software non-use.
                II.            Once the whole system is collapse it becomes difficult to trace the problem and make the recover to each computer and once done needs a lot of cost.
             III.            The whole computer network is highly dependent to electric current thus once it is not present the system cannot be archived by the user.

The network can be classified on basing on the geographical area, access restriction and according to the model employed by the node. In personal area network (PAN); a network sharing of the network is done by few people found in the area of few meters. This method can be conducted either being wired or wireless. In the local area network (LAN); the network sharing is done in the limited geographical area like home, school, hospital, working place and police station. Under LAN one computer may be served as the sever of other computer on which they share a network, where by those computer which shares a network from the central computer are called the working stations. This type is more efficient than the personal network since it accommodates more people in a system used. On metropolitan area network (MAN); is the network that is shared by many individuals in the given geographical area such as city or large companies and this make communication reliable. In the wide area network IS covered under the large area on which many individuals are found. WAN covers a large area such as a country and connects the world together and is more efficient than the all kinds of network although once a system is compromised a problem become difficult to be traced back also once is identified its maintenances becomes more closetful to care it.
The network category can be point to point or a broad cast model. In point to point model the information flows or moves in a specific direction across the network in order to get from one node to the other node. Under this people who communicate are those found in same direction or class whereby under the broadcast model the message sent the message sent or shared by all members in the network. In wireless local area network sharing of the information between the computers is well facilitated among the individuals although this kind involves the use of high cost in doing initial sharing of the information. During the initial stage of doing the computer connection involves the use of the devices that help in connection this involves the use of hubs, repeaters, bridges, switch and routers. Those devices when well connected in the manner series they lead to the network topology. Network topology is the way on how different computers and other devices in a network are arranged to each other and the way used by the signals to get transferred from one device to each other device. The route may be bus topology, ring topology and star topology. In bus topology the computer devices are connected in the liner way where the signals are being transferred in a continuation form from one device to the other device. In ring topology the signals being transferred are moving from one point to other point through the cycle form while in star topology the one computer is being connected to other computers which shares the signals from it and this uses the hub to connect the all devices in the network here each device has its own wire which is used to connect it in a central network. This mode has advantage of connecting many devices at a time and once a problem occurs it is easily to trace the problem and get fixed.


3         Module Two

3.1      TRANSMISSION MEDIA  

Transmission media refer to means through which the signals travel over a network. This method of transmission can be guided or unguided media. Conducted media or guided media refer to the one in which there is use of a wire or optical fiber in the transmission of the signals in a network from the sender to the receiver, in unguided or wireless uses the radio waves of different frequencies. Also the transmission media during developing depend on the bandwidth, transmission impairment, interferences and number of receivers. Guided transmission media thus depend on the distance to which signals travels and nature of the media weather is point to point or is multi- point. The twisted pair is highly susceptibility to interferences and noise and once damage occur the repair needs high cost to be used.     
In the unguided or wireless media the signals are being transmitted through all directions and can be received in all directions by many antennas. This kind of connections is much widely used for connecting laptops in the local area network. As many kind are this method is also having its limits such as it is more expensive poor security of data, slow in running the network when many users are present, this is also highly suspected to electrical interference from light and radios.  
The wireless transmission can be infrared transmission in which signals are sent using infrared light waves at a frequency too low of about  (1-4 megabits per second) for human eyes to receive and interpret. Infrared ports are found on laptop computers, wireless mice, printers TV remote -control units and cameras. For communication to take place between the sending and receiving device, the line of sight is required-i.e. there should be no obstacle between transmitter and receive Infrared transmission is confined to short range.
Wireless Fidelity (Wi-Fi). It is a new wireless technology for connecting portable devices and handheld computers to Ethernet LAN. This one it operates 2-25 gigahertz, wireless transmission used up to 300 feet. Allows wide variety of nearby device communicate with one another without physical connection. Bluetooth is a short range digital standard aimed at linking cell phones and is useful for short range communication only. Involves earthbound microwave systems which transmit high-speed radio signals in a line-of-sight path between relay stations spaced approximately 30 miles apart. Use the atmosphere as the medium through which to transmit signals. Cellular phone system is a radio communications technology that divides a geographic area into small areas or cells typically from one to several square miles in area.  This division depends much on the size or the number of users in the given geographical area. Each cell has its own low-power transmitter or radio relay antenna device to relay calls from one cell to another. This technology is used to support mobile phone service, and mobile voice and data communications. This technology is used to support mobile phone service, and mobile voice and data communications.
Digital data/signals are method of storing, processing and transmitting information through the use of distinct electronic or optical pulses that represent the binary digits 0 and 1. Computers and all electronic devices send and receive digital signals.
In analog data/signal wave form (or signal) is characterized by being continuously variable along amplitude and frequency is the number of times a radio wave repeats during specific time intervals. Communication modes, a communication mode specifies the capability of a device to send and receive data it does so by determining the direction of the signal between two connections and this may be simplex mode in which data goes in one direction only or half- duplex mode where the data goes in both directions but at time goes in one direction and in other direction at a next time and when the signals goes in both directions at a time is called full-duplex mode. Also in a computer the devices are not able to communicate to analogue lines and now is able to communicate over the digital signals where by the modem is able to be used and now is translating the analogue signals to digital signals by modulation process and by demodulation where it converts the digital signals to analogue signals which are sent to the network.





4         Module Three

4.1      Application of Computer Network

Web browser application is the application of software designed to enable users of the application to access, retrieve and view document and other resources to the World Wide Web (www). This help much in finding of many useful materials for example Operamin, Google chrome, safari, Firefox.  The primary purpose of the web browser is to bring information resources to the users of the browser in which the access of this depend on the correctly used URL (Uniform Resource Identifier) and the findings may be fining image, video, audio, pages, location and other pieces of content.
Google search engine are program in the browser application which help in searching of the document that are available in the system based on the words of the search terms. For example Google, Bing, and Yahoo although the mostly and commonly used search engine is Google. The searching engine is more efficiently through sing different search methods like use of key words of the search engine, using the correct URL of the certain website which reads to the opening of the relevant pages that are related to the certain search.
The use of Google search method involves the use of different technique search as Boolean And, Boolean Or and those methods helps much in finding of many resources that are more helpful in education and other sectors like business and other social aspects like journey. In education this help in finding of different teaching and learning material like books, stimulations like audio and videos also help in finding dictionary that gives the meaning of difficult words to learners. This search engine helps the parents to obtain the schools for their children and finding their results. In business the search engine also helps the people in business to find the areas where can find the market of goods, finding the stocks, converting of units, flight and searching maps. In the society the search engine may be used in weather forecasting, searching the sun rise and the sun set in different places, finding of the public data, searching movies and other packages. In public data it may be used to search different governmental data such as population, employment. Google hacking is the most method used by the hackers in finding things or webs to be exploited. Hackers are intelligent people with many computer skills and uses those skills to exploit the vulnerability that are present in computer system get compromised. Thus when those vulnerability are not controlled, this lead threats exploitation of the information and the whole system get compromised. The hackers uses different method on the process of hacking through phishing, drive dumping, ring, shoulder surfing , eavesdropping, in this process the attackers of hacking normally follow the procedure before and after hacking they start with reconnaissance, scanning, gaining access, maintain access and covering truck. Although other hackers try to exploit the information and does the disconnection from the internet and then after they reconnect again after installation of new.       
In this networking the page that help the person to view or interact with the page that is intended is called webpage the collection of many pages leads to website. Thus once need to access the certain website one need to know the collect URL which is needed to be used in making the access of the websites.

4.1.1     Advantages of website

  1. Website is more usefully in education, through finding books, journals and simulations.
  2. It is used in finding of job opportunities that are found on the area, foreaxample in private organizations and education sector.
  3. Finding education stakeholders.
  4. It minimizes the cost it is represented as whole.

4.1.2    Disadvantage of website

  1. It needs highly level of technology in developing it.
  2. Since has built up with many pages, it consumes a time in looking to the specific page.
  3. It can be accessed by hacker and study the vulnerabilities present and lead to loss of data.
  4. They need to be paid for its presence thus few of organization owns it.
An electronic mail is the established system that is used in communication among people where by the users of a mail is able to send and receive the massage from one individual to the other individual. During communication people can send and receive video, audio, photos, message, documents and other materials. The use of this network needs the internet connection and all users are supposed to have the mail account.
Important things needed during establishing the E-mail
·         The names to be used.
·         Date, month and year of birth. Here the person should be with age of eighteen years and above.
·         Place or the nationality of the individual.
·         Choosing of the strong password. A strong password is the one which cannot be gassed by anyone who use not the user of the mail although it is advised that names of the relatives or hobbies should not be used during creating the password because are the one prone to be hacked.
·         The mobile number to be used in notifications in a mail or during making restore of E-mail account.

4.1.3    Importance of the mail account

v  It enables the user or owner of the account to have a YouTube account.
v  The account helps much in making the blogger of an individual.
v  This help in the installation of the software in androids like watsap.
v  In computer communication it is a safe method which is not prone to viruses.
v  Enables most of people to communicate through this since few conditions are needed.
v  This method is highly prone to be attacked and the communication that is done through this method may be exploited by the hackers.

5         Module four

5.1      Network Software

Software is any application that is not manually in the system, in the computer network it involves all application program that are used in network system. In this category there is a protocol which is followed during doing the communication in a network. A protocol is a set of established and agreed system upon the certain need to enhance reliable and effective communication on a network. This protocol can be made by the vendor or by networking standard organization thus involves the set of rules and regulation and procedures for computers to exchange data or information.  For example two computers to exchange data must be in the same protocol and this involves.
Transport Control Protocol (TCP).
Internet Protocol (IP).
Protocol Suite (PS)
 In the Network protocol involves
Internet Message Access Protocol (IMAP)
File Transfer Protocol (FTP)
Hypertext Transfer Protocol (HTTP).
On the above level of communication network protocol one layer on the upper depends much on the lower layer of communication. For example the transfer of one type of the file to be transferred needs the hypertext transfer protocol (HTTP); also the internet message access protocol needs both the hypertext transfer protocol and the file transfer protocol. 

5.1.1    Importance of computer network software                                                                                                                             

v  It helps to send data over the internet.
v  Has an application in e-mail using through communication.
v  Is used in studies like being taught in schools
v  Helps in access of the information when the protocol is well designed
v  The knowledge about the network is used in requesting and delivery of webpage.

5.1.2    Advantages of computer network software

v  Help in communication system among the members of the society
v  Makes people in the areas to send and receive and send the information
v  Helps the students to send their file and other academic work through the e-mail
v  Through used protocol is easily to fix the problem once occurs.

5.1.3    Disadvantages of network software

v  It involves high cost on establishing it
v  Needs the expertise of controlling the whole system
v  The materials needs high cost in managing and maintaining them
v  The system become useless on the remove of the lower layer or network layer and makes the communication to difficult.
v  It has lead to increase of network climes especially for young.






6         Module FIVE

6.1         SATELLITE

6.1.1              Satellite communication

Satellites communicate by using radio waves to send signals to the antennas on the Earth. The antennas then capture those signals and process the information coming from those signals.
It is also used for TV broadcasting. Satellites uses microwave frequencies for communication with each other using inter-satellite links and with earth stations.
  Ø   Scientific data (like the pictures the satellite took),
  Ø   The health of the satellite,
  Ø   Where the satellite is currently located in space.
Services offered by satellite services in its types
v  Fixed services satellite (FSS).
Examples Point to Point communication
v  Broadcast services satellite (Direct BS).
Example TVs and Radios

6.1.2    Advantages of Satellite Communication

·         It is used for mobile and wireless communication applications independent of location.
·         It covers wide area of the earth hence entire country or region can be covered with just one satellite.
·         It co-exists with terrestrial microwave line of sight communication.
·         It is easy to install and manage the ground station sites.
·         It does not incur much of the costs per VSAT site.
·         It has small fading margin on the order of about 3dB.
·         It is used in wide variety of applications which include weather forecasting, radio/TV signal broadcasting, gathering intelligence in military, navigation of ships and aircrafts, global mobile communication, connecting remote areas
·         LEO and MEO satellite types have lower propagation delay and lower losses compare to GEO satellite. This will help them to be used for global coverage.

6.1.3    Disadvantages of Satellite Communication

  • Satellite has been constructed for years. Moreover satellite design and development requires higher cost.
  • Satellite once launched, requires to be monitored and controlled on regular periods so that it remains in the orbit.
  • Satellite has life which is about 12-15 years. Due to this fact, another launch needs to be planned before it becomes un-operational.
  • Redundant components are used in the network design. This needs more cost in the installation.
  • In the case of LEO/MEO, large number of satellites is needed to cover radius of earth. Moreover.



Part two

7         Further readings on Computer Networking

7.1      Introduction

A collection of two or more computers interconnected by the telephone lines, co-axial cable, satellite links, radio and microwave transmission and some other communication techniques.  A computer network is a group of computers that are connected together and that communicate with one another for a common purpose.
Although the computer industry is young compared to anther industries (e.g., automobiles air transportation), computer have made spectacular progress in a short time.  During the first two decades of their extrinsic, computer system highly centralized, usually a single large room.  A medium size company or university might have had one or two computers, while large instructions had at most a few dozen. The idea that within 20 years equally powerful computers smaller than postage stamps would be mass produced by the millions was pure science fiction.
The merging of computers & communications has had a profound influence on the way computer systems are organized. The concept of the computer center as a room with a large computer to which users bring their work for processing is now totally obsolete. The old model of single computer serving all of the organizations computational needs has been replaced by one in which a large number of separate but interconnected computers do the job. These systems are called computer networks.
Two computers are said to be interconnected if they are able to exchange information’s. The connection need not be via a copper wire; fiber optics, microwaves, and communication satellites can also be used. By requiring the computer to be autonomous, we which to execute from our definitions systems in which there is a clear master/slave relation. If one computer can forcibly starts , stop, or control another one, the computers are not autonomous. A system with one control unit and many slaves is not a network; nor is a large computer with remote printers and terminals.

There is considerable confusion in the literature between a computer network and a distributed system. The key distinction is that in a distributed system, the extended of multiple autonomous computers is transparent to the user. He can type a command to run a program. And it runs. It is up to the operating system to select the best processor, find and transport all the input files to the processor, and put the result in the appropriate place. In other words, the user of a distributed system is not aware that there are multiple processors; it looks like a virtual uni-processer. A location of jobs to processors and files to disks, moment of files between where they are stored and where they are needed, and all other system functions must be automatic.

With a network, user must explicitly log on to one machine, explicitly submit jobs remotely, explicitly move files around and generally handle all the network management personally. With the distributed system, nothing has to be done explicitly it is all automatically done by the system without the users knowledge.
In effect, a distributed system is a software system built on top of a network. The software gives it a high degree of cohesiveness and transparency. Those distinction between a network and a distributed system lies with the software rather than with the hardware. Nevertheless, there is considerable our lap between the two subjects. E.g., both distributed system and computers networks need to move file around. The difference lays in whom in vokes the movement, the system or the user.

7.1.1    Local Area Networks (LAN):

Local area network, generally called LANs, is privately-owned networks within a single building or campus of up to a few KM in size. They are widely used to connect personal computers and workstation in company offices and factories to share resources (e.g., printers) and exchange information. LANs are distinguished from other kinds of networks by three characteristics:
1.      Their size,
2.      Their transmission technology,
3.      Their topology.
LANs are restricted in size, which means that the worst-case transmission time is bounded and known in advance. Knowing this bound makes it possible to use certain kinds of designs that would not otherwise be possible. It also simplifies network management.

7.1.2    Metropolitan Area Networks (MAN):

A metropolitan area network, or MAN (plural: MANs, not MEN) is basically a bigger version of a LAN and normally uses similar technology. It might cover a group of nearby corporate offices or a city and might be either private or public. A MAN can support both data and voice, and might even be related to the local cable television network. A MAN just has one or two cables and does not contain switching elements, which shunt packets over one of several potential output lines.
Wide Area Networks (WAN):
A wide area network, or WAN, spans a large geographical area, often a country or continent. It contains of machines intended for running user (i.e., application) programs. We will follow traditional usage and call these machines hosts. The term end system is sometimes also used in the literature. The hosts are connected by a communication subnet, or just subnet for short. The job of the subnet is to carry messages from host to host, just as the telephone system carries words from speaker to listener. By separating the pure communication aspects of the network (the subnet) from the application aspects (the hosts), the complete network design is greatly simplified.
In most wide area networks, the subnet consists of two distinct components: transmission lines & switching elements. Transmission lines (also called circuits, channels, or trunks) move bits between machines.
The switching elements are specialized computers used to connect two or more transmission lines. When data arrive on an incoming line, the switching element must choose an outgoing line to forward them on.
In most WANs, the network contains numerous cables or telephone lines, each one connecting a pair of routers. If two routers that do not share a cable nevertheless wish to communicate, they must do this indirectly, via other routers.  When a packet is send from one router to another via one or more intermediate routers, the packet is received at each intermediate router in its entirety, stored there until the required output line is free, and the forwarded.  A subnet using this principle is called a Point to Point, store and forward or packet switched subnet.  Nearly all wide area networks (except those using satellite) have store and forward subnet.  When the packet are small and all the same size, they often called cells.

7.1.3    Wireless network:

Mobile computers, such as notebook computers and personal digital assistants (PDA) are the fastest growing segment of the computer industries.  Many of the owners of these computers have desktop machines on LAN’s and WAN’s back at the office and want to be connected to their home base even when away from home or en route.  Since having a wired connection is impossible in cars and airplanes, there is a lot of interest in wireless network.
Wireless networks come in many forms. Some universities are already installing antennas all over campus to allow students to sit under the trees and consult the libraries card catalogs.  Here the computers communicate directly with the wireless LAN in a digital form.  Another possibility is using a cellular (i.e. portable) telephone with a traditional analog modem.  Direct digital cellular service, called CDPD (Cellular Digital Packet Data) is becoming available in many cities.

7.1.4    Network Hardware

It is now time to turn our attention from the application and social aspects of networking to the technical issues involved in network design. There is no generally excepted taxonomy into which all computer network fit, but two dimensions stand out as important: transmission technologies and scale. We will now examine each of these in turns.
Broadly speaking, there are two types of transmission technologies:
  1. Broadcast networks.
  2. Point-to-point networks.
Broadcast networks: It have a single communication channel that is shared by all the machines on the network. Short messages, called packets in certain contexts, sent by any machine are received by all the others. An address field within the packet specifies for whom it’s intended. Upon receiving a packet, a machine checks the address field. If the packet is intended for itself, it process the packet, if the packet is intended for the other machine, it is just ignored.
Broadcast systems generally also allow the possibility of addressing a packet to all destinations by using a special code in the address field. When a packet with this code is transmitted, it is received and processed by every machine on the network. This mode of operation is called broadcasting. Some broadcast system also support transmission to a subset of a machines, something now has multicasting.
Point-to-point networks: It consists of many connections between individual pairs of machines. To go from the source to the destination, a packet on this type of network may have to first visit one or more intermediate machines. Often multiple routes, of different lengths are possible, so routing algorithm play an important role in point-to-point networks. As a general rule (although there are many exceptions), smaller, geographically localized networks tend to use broadcasting, where larger usually are point-to-point.
Whenever we want two devices – transmitting and receiving device to communicate with each other, we need hardware’s to achieve that.  We would be discussing about the various hardware such as:
1.      Sender and Receiver hardware
2.      Communication devices
3.      Communication channels
  Sender and Receiver Hardware:
Following hardware are used for handling communication messages, data transfer etc.

7.1.5    Nodes and workstations:

Data communication is done using various communication devices and softwares interconnected for information exchange.  The devices used to communicate a data in communication network are called Workstations.  These workstations may be computer, terminal, printer, telephones and other communication devices.  Each workstation is connected to something called a Data Communication Network Mode.
Multiplexer: As the name suggests, multiplexing is a form of data transferring which are communication channels and is used for several transmission.  For e.g. the telephone lines that we used for our daily conversation can carry 100’s and even 1000’s of conversations using multiplexing.  In other words multiplexing is a type of network which allows a number of simple, low cost terminals to share each communication lines introduces almost no delay and requires no special computer software.
Communication devices: There are several types of communication devices or interface used in data communication.  These interfaces are connection between receiver and sender hardware involved in data communication and the communication network.  Some of these interface or communication devices are discussed below:

1.        Modems: Modulator and Demodulators are devices which converts digital signals in to analog for transmission over the analog transmission facilities such as telephones.  At the receiving end, a modem performs the reverse function and converts analog signals into digital form.
2.        Codec performs the opposite function of a modem.  A communication port / adapter is a connector on the computer, which is used as an entry to departure point for data involved in data communication.  A common type of communication port is RS-232c.  This adapter is used for transfer of data between the computer and the telephone lines.
3.        Line Drivers are simple devices used to transmit digital signals over short distances.  These devices do not modulate or demodulate signals, but use filters to reduce the high frequency components and the modified signal is transmitted directly over the media. 

7.1.6    Communication channels:

The most basic hardware required for communication is the media through which data is transferred.  There are several types of media, and the choice of the right media depends on many factors such as cost of transmission media, efficiency of data transmission and the transfer rate.
Some of the following transmission Medias is as follows:
  1. Two wire open line:  This is the simplest of all the transmission media.  It consists of a simple pair of metallic wires made of copper or some times aluminums of between 0.4 and 1mm diameter, and each wire is insulated from the other.   There are variations to this simplest form with several pairs of wire enclosed in a single protected cable called a multi core cable or molded in the form of a flat ribbon.
This type of media is used for communication within a short distance, up to about 50 M, and can achieve a transfer rate of up to 19200 bits per second.
a.       Twisted Pair cable: A twisted pair consists of a pair of insulated conductors that are twisted together.  The advantages of a Twisted Pair cable over the Two Wire Open Lines are; it provides better immunity from spurious noise signals.  As the Two Wires are closed to each other, both pick equal interferences caused by extraneous signal sources and this reduces the differential signal added by the noise. Twisted Pair cable is used for communication up a distance of 1 KM and can achieve a transfer rate of up to 1-2 MBPS.  But as the speed increased the maximum transmission distances reduced, and may require repeaters.

 


Twisted pair cables are widely used in telephone network and are increasingly being used for data transmission.
v  Co-axial Cable: A co-axial cable consists of a solid conductor running co-axial inside a solid or braided our annular conductor.  The space between the two conductors is filled with a dielectric insulating material.  Larger the cable diameter, lower is the transmission loss, and higher transfer speeds can be achieved.  A co-axial cable can be used over a distance of about 1 KM and can achieve a transfer rate of up to 100 MBPS.


 



A co-axial cable is of two types- a 75 Ohm cable which is used by the cable TV operators and 50 Ohm cable which is used in high speed broad band networks and is low loss cables.
Fiber Optic Cables:



 
A fiber optic cable carries signals in the form of fluctuating light in a glass or plastic cable. An optical fiber cable consists of a glass or plastic core surrounded by a cladding of a similar material but with a lower refractive index. The core transmits the light while the change in refractive index. The core transmit the light while the change in refractive index  between the core and the cladding causes total internal reflection, thus minimizing the loss of light  from fiber.
As light waves gave a much wider wand width then the electrical then the electrical signal and are immune from electromagnetic interferences, this leads to high data transfer rate of about 1000 mega bites per second & can be used for long & medium distance transmission links.

8         Radio, Microwaves & Satellite Channels 

Radio, Microwaves & Satellite Channels use electromagnetic propagation in open space. The advantage of these channels lie in their capability to cove large geographical areas & being inexpensive than the wired installation.
The demarcation between radio, Microwave & satellite channels lie in the frequencies in which they operate. Frequency bellow 1000 MHZ are radio frequencies & higher the Microwave frequencies.
The radio frequency transmission may be bellowing 30 MHZ above 30 MHZ & thus the techniques of transmission are different. Owing to the characteristics of the ionosphere, frequencies bellow 30MHZ are reflected back towards the surface of the earth. Above 30Mhz propagation is on line of sight paths. Antennas are placed in between the line-of- sight paths to increase the distance. Radio frequencies are prone to attenuation and, thus, they require repeats along the path to enhance the signal. Radio frequencies can achieve data transfer rate of 100 Kbps to 400 Kbps.
Microwave links use line- of- sight transmission with repeaters placed every 100-200 Kms. Microwave links can achieve data transfer rates of about 1000 Mbps.
Satellite links use microwave frequencies is the order of 4-12 GHz with the satellite as a repeater. They can achieve data transfer rates of about 1000 Mbps.
Network Concept and Classifications:
Communication using computer has brought a revolution in the world of computer technology, particular in the field of computers.  We have always heard of networking or the term network, a network is a way or means of transmitting or receiving information one or more sources.  As an e.g. car salesman after years in the business, have developed a network of associates. When the car salesman needs a car to make a sale the car salesman calls out to his network to retrieve information on the location of the car. Employment agents also develop a network. Their customers become their network. Employment agents will frequently keep in touch with their clientele for possible openings or to locate a candidate for an opening. Without the capability of networking, these two people would have a difficult time. It is the same in computing. Networks provide the means for locating transporting information.
 In computing networks, the origin of the information request utilized the service of a network to locate & return the information. This is done with addresses. In the two previous examples of the car sales man & the employment agent, a telephone number can be considered the address of their associate or client. Addresses in computer networking are used in the same manner. These addresses identify the network resource. There are two popular architectures for networking – hierarchical & peer.
Hierarchical addressing is defined in a master slave relationship. In hierarchical network, the master controls the network & therefore assigns addresses to the network resource. This architecture has the mainframe as the master & all network resources as slave. The bases of this is that if the master does not know beforehand of a network resource existence through a pre- defined address then that resource cannot participate in the network.
Peer networking does not need pre- defined networking addressing. Instead, each resource on the network is seen as a peer. Each network resource is a peer to the other network resource. When a new network resource joins the network it introduced itself & notifies its peer to any other network resources that it knows about peer networks are share network information. The entire computer network can be classified into two board categories. They are (a) LAN (Local Area Network) (b) WAN (Wide Area Network) 

8.1      LAN (Local Area Network)

As numbers of system grow within an organization, a need is felt for sharing expensive resource and exchanging data and information between systems. This need of information exchange and resource and sharing with in a organization has given birth to a local area network or LAN.
A LAN is a data communication network, which connects many computers or workstation (Computer’s Terminals, Printer etc.) and permits exchange of data & information among themselves, with in a localized area, typically confined to a building, or a cluster of buildings. The distance between two communications prints connected on the same LAN channels is usually up to 02 to 05 kms.
LANs are not rigidly defined but tend to share most of all of the following characteristics.
§  The transmission media is shared by all the connected devices in the network.
§  Each device is connected in the network can either operate stand alone or in the network.
§  Area covered is small.
§  Data transfer rates are high, usually 1 Mbps- 100 Mbps (Million of bits per second).
§  Each device connected in the network can communicate with any other device in network.
§  Cost of setting up the network is usually low.

8.1.1    LAN Topology

A network topology refers to the physical lay out of the network in which all the devices are connected. This includes all the hardware that makes up the network. The points of the connection to the network by the station are calls Nodes or Link stations. There are several types of topographical design & strategies are used to implement LAN. The majority of these are based on three types of topologies.
            a) Star             b) Bus             c) Ring
Each topology has its advantages & disadvantages.

8.1.1.1       Star Topology

Star topology is shown bellow. In this topology. A number of stations are connected directly to a central station or controller. Communication on the connecting links between the stations & the central station of the star topology can be bi- directional and are point to point. A station on this type of network passes an information frame to the central controller, which then forwards the information to the destination station. The central controller manage and controls all communication between stations on the network.




 
                                                                                   




Star Network
Failure of a station on a star network is easy to detect and can be remove from the network. However, failure of the central controller will disable communication through out the whole network.

8.1.1.2  Bus Topology

 A bus topology is shown bellow all stations are connected to a single communication line. This single communication line is referred to a bus. Information frames originating at a station are propagated away from the station in both directions on the bus. Each station on the bus interrogates the information frame destination address failed for its on addresses. If the destination failed does not mach the station address, the station discards the information frame back on to the bus. If the destination address matches the station addresses, it accepts the information frame & processes the frame.
An extension to the bus topology is tree topology is in the following figure. Tree topology extends the branches of the bus topology allowing more stations to access the bus.















NODE
 

NODE

 

NODE

 

NODE

 
 





Bus Topology
On a bus or tree network there is no central point for management & control.  These function ions are distributed to each station on the bus. A brake in the bus can be difficult to locate but limits the outage to communications between stations that traverse the broken point.

8.1.1.3  Ring Topology

A ring topology is shown bellow. Local area network that have each station attached to an adjacent station using point to point links from a physical ring. Each station attached and active to the ring regenerate the information frame, then retransmits the information frame on the ring. The ring itself is logically circle and the information travels in one direction.











NDE

 



1.1.1.1  Ring Topology

 
 








Failure of a station in a ring topology disrupts the ring because the information frame is not regenerated. Additions or deletions of stations of the ring can be disruptive, if the changes are not managed properly.
LAN Hardware and Software
As we have seen so far, to realize a LAN process, several functions are to be performed. These are so specialized in nature the require hardware specially built for such purpose. Here we will discuss briefly the basic hardware components of LAN, these are:
(A)  Network Interface Unit (NIU)
(B)   Servers
(C)   Work Station
A)    Transfer mission Channels
Generally following four types of channels are used for data communication in a LAN. They are:
(i) Twisted Pair Cable
(ii) Coaxial Cable
(iii) Fiber Optic Cable

8.2      Network Interface Units (NIU)

Network interface units connect each device in the LAN network to shared transmission device. It contains the rules or logic to access the LAN. NIU is also used for to implement LAN protocols and for device attachments. Its functions depend on the type of topology used in LAN.
B)     Servers
One of the major benefits of implementation of LAN is sharing expensive resources such as storage device, printer etc. this is achieved through providing servers on the LAN. It is a dedicated computer that controls on or more resources. This contains both hardware & software for LAN. Three major categories of servers used in LANs are
(i)                 File Server
(ii)               Printer Server
(iii)             Modem Server
In a networking file server is used to share storage space for files. Beside providing storage space for files in a LAN environment, it is used for talking periodical backup, and also to provide gateway to other servers with in & between LANs.
Similarly printer server is use to handle printing works of all workstations connected in the network. In the LAN environment also modem is required to get connected to other network or simply to use a telephone. A modem server is used to share these expensive resources by all connected workstation in a networking ring.
LAN Software/ Operating System
As the name suggest LAN operating system is required to operate on the LAN system, manage the tremendous work load with a number of various types of server attached to it. It has basically two aspects (i) Server Software (ii) Work station Software. As case of other multi user operating system, LAN operating system also facilitate the sharing of expensive resources such as printer, storage space etc. among all LAN users, provides security of data permits connections to other network.

There are various types of LAN operating systems for example Novel Netware, LAN server, omni met, PC Net, IBM PC LAN, Etherlik plus etc.

8.3       WIDE Area Network

As the name suggest, WAN spread across countries and continents satellites being one of the transmission media.
A wide area network WAN is a network that links separate geographical location. A WAN can be a public system such as the Public Switched Telephone Network (PSTN) or one of the various packet switched services provided by the public telecommunication authorities. WANs can also use most other types of other types of circuit including satellite networks, ISDN, Value Added Networks (VANs/VADs). The network can be a private system made up from the local telephone company or set up using public systems as virtual private network. A virtual private network is one which operates in the same way as a private network but which uses public switched services for the transmission of information.
The main distinguishing feature between a LAN and WAN is that, the LAN is under the complete control of the owner, whereas the WAN needs the involvement of another authority like the telephone company. LANs are also able to handle very high data transfer rates at low cost because of the limited area covered. LANs have a lower error rate then WANs.
Communication Switching Techniques
In a WAN, two computing devices are not connected directly. A network of switching nodes provides a transfer path between the two devices. The process of transferring data blocks from one node to another is called data switching.
There are three switching techniques commonly employed and these are:
i)                    Circuit Switching
In circuit switching there is a dedicated communication path between the sending and receiving devices. The dedicated path is a connected sequence of links switching nodes. A conventional telephone network, where a dedicated path is set between the called parties for the duration of a telephone call is an example of circuit switching.
Communication viz. circuit switching involves three steps-circuit establishment; data transfer; and circuit termination. Circuit switching is mainly used for voice telephone network, but is not that effective for data communication network, as channel capacities are not fully utilized, as data communication equipments do not generate data continuously.
ii)                  Massage Switching
Massage switching is an alternative switching techni8que, where it is not necessary to establish a dedicated path between the sending and receiving devices. In massage switching, the sending device appends the destination address to the massage and passes to the network; the massage is then passed through the network from one node to another till it reaches the intended destination. Each switching are electronic mails, computer files, telegrams and transaction queries and responses. A complete exchange may consist of several messages.
The basic disadvantage of massage switching is the variable delay at intermediate switching nodes.
iii)                Packet Switching
Packet switching combines the advantages of message & circuiting switching. Packet switching is functionally similar to message switching, in which data is transmitted in blocks, stored by the first switching node it meets in the network and it forwarded to the next and subsequent downstream nodes until it reaches the destination. The length of data block is limited in packet switching network. Typical maximum length of packets is between 128 bytes to 4096 bytes. There are two approaches to packet switching:
In datagram approach, each packet is treated independently and may follow a different path through the network. Packets may be reordered, dropped or delivered in wrong sequence. The communication protocols provide the error recovery sequencing of packets at the receiving device.
In virtual circuit approach, a fixed logical path through the network from the sender to the receiver is established before any packets are sent. This path remains unchanged for the duration of the session. This is quite like circuit switching, but no resources are reserved along the path. Packets are buffered at intermediate nodes awaiting transmission.

8.3.1    WAN Devices / Hardware

The switching techniques utilized the routine technology of data transfer. Routing is responsible for searching a path between two computing devices that wish to communicate and for following the data packets on this path. Devices such as bridges, router and gateway provide this routing function.
i)                    Bridges
Bridges are used to connect two LANs that use identical LAN protocols over a wide area. The bridge acts as an address filter which picks up packets from one LAN that are identical for a destination on the another LAN and passes these packets on the network. Bridges operate at the data link layer (layer 2) of the OSI model. As all devices use the same protocols, the amount of processing required at the bridge is minimal. If the distance between the two LANs is large, the user would require two additional bridges at either end of the communication link.
ii)                  Routers
Routers can be used to connect networks that may not be similar. Routers provide connectivity between two LANs or two WANs over large geographical distance. Routers operate at the network layer (layer 3) of the OSI model. All routers participate in routing protocols to access the network topology, and based on this information routers computes the best route from a sender to the receiver,
For large wide area network spanning thousands of kilometers, the normal practice is to put network routers at suitable locations to minimize link cost for leased link and provide adequate reliability from link failures. Networks and other system are then connected to the nearest router.
iii)                Gateways
Gateways are used to connect to dissimilar LANs. The term gateway and routers are used interchangeably, though there is a subtle difference between the two. A router operates at the network layer (layer 3) of the OSI model, whereas a gateway operates on the application layer (layer 7) of the OSI model. A gateway is required to convert data packets from one protocol format to another before forwarding it, as it connects two dissimilar networks.

8.3.2    Public Networks

Public networks are those networks which are installed and run by the telecommunication authorities and are made available to any organization or individual who subscribe. Examples include Public Switched Telephone Networks (PSTN), Public Switched Data Network (PSDN), Value Added Service (VANs/ VADs) and the Integrated Service Digital Networks (ISDN). We would be discussing the main features of there services:

a)      Public Switched Telephone Network (PSTN)
The features of the PSTN are its low speed, the analog nature of transmission, restricted bandwidth & its wide spread availability. As PSTN is designate for telephones, modems are required when it is used for data communication.
b)     Public Switched Data Network (PSDN)
The term PSDN covers a number of technologies; all through currently it is limited to Public Packet Switch Networks available to the public. The main features of all PSDNs are their high label reliability and the high quality of the connection provided. The can support both high & low speeds at appropriate costs.
c)      Value Added Services (VANs/ VADs)
In value added services, the provider of such services must process, store and manipulate the data that is carried on the network, that add value to it. The technique can be used in specific types of business in which it is advantageous to be able to share information with other companies in the same line.
d)     Integrated Services Digital Network (ISDN)
 The ISDN is the networking concept providing for the integration of voice, video and data servicing using data service using digital transmission combining both circuits and packet switching techniques. The motivating force behind ISDN is that telephone networks around the world have been making a transition towards utilizing digital transmission facilities for many years.

8.3.3    Private Networks

The basic technique used in all forms of private WAN is to use private (or more usually leased) circuits to link the locations to be served by the network. Between these fixed points the owner of the network has complete freedom to use the circuits in any way they want. They can use the circuit to carry large quantities of data or for high speed transmission.
Private WIDE area network can be built using whatever standard technology is available. The way private networks have generally been set up has to specify .













Part Three

9         PRESENTATIONS

9.1      QUESTION 01

By using a modem in a laptop computer, explain practically how you can create a network account and share to other computers supporting Wireless Network.
M
odem is device or program that convert digital computer signal to analog signal to transmit data over telephone or cable line then to receive these signal and convert back to digital signal.
Computer information store digitally telephone transmitted over the telephone transmitted in the form of analogy. The modem sending modem modulates the data into a signal with phones line, and receiving modem demodulates the signal back into digital data.
Wireless modem convert digital data into radio signal and back. There part of connection modem of the main computer which receive the network for modem.
The steps that used before create new account
v  Insert subscriber identity module (SIM) into the modem.
v  Insert the modem into the computer through the universal serial bus port (USB).
NOTE: If modem is used for first time in the computer install the modem software.
The following are the steps creation a network a new account as follows by using modem.
click the start bar.
click the control panel.
Click network and internet.
Click network sharing and sharing center.
Then choose and click set up a new connection and network.
Click set up wireless ad hoc (computer to computer) network.
Then create account by naming network account and security key.
 The security must contain 8-63 characters.
Then save and click next for to allow internet connection sharing.
Then save and click next for to allow internet connection sharing.
Alternatively way.
Click network icon.
Click open network and network Centre.
Then choose and click set up a new connection and network.
Click set up wireless ad hoc (computer to computer) network.
Then create account by naming network account and security key.
Then save and click next for to allow internet connection sharing.
The follows are step of sharing the network to other computer.
Click the start bar.
Click control panel.
Click network and internet.
Click connect to network.
Choose the account name from host computer and connect.
Then write password from host computers
Now the computer is able to share the network with other computers.

9.2      QUESTION 02

What is blog? Practically explain how to create a simple blog (you can create a class blog) show a class how the blog owner will sign in the blog and add the information to it ? How others users can access your blog? What they can do and cannot do to your blog?
B
log can be defined as the place of express yourself to the world. OR It is a place to share your thoughts and your passions. Blogger is a person who keeps a blog. Also sometime can be a tool for creating a blog like Google blogger. Blogging is an action of writing a blog and adding information. For examples of common blogs in Tanzania are Maswayetu blog, Muungwana blog, millardayoblog, Mzalendo blog, Jamifolum blog, Mpekuzi blog, Massage blog. Requirements for creating blog E-mail account which could be used in signing up and in, this can be from gmail, yahoo and others.
 The needed procedures of creating a blog are
v  The first thing to do is to open the search engine such as a Google and then type the word ‘blogger’ then you click search
v  After obtaining the result then you select the option written “create a unique and beautiful blog. it's easy and free.”
v  After selecting an option of creating a unique and beautiful blog you will find an option written “create a blog” then select it.
v  When you select that option u will have to enter the gmail account then click next where you will enter the password of the gmail account.
v  Enter the recovery Email account and click next.
v  Till here you will have already a blog but you will not be able to post anything until you open the smallest blog within the largest one.
v  This will have option where you can enter the title of and the address of the blog then you will click continue then you will see Congratulation,, “Your blog has been created” on the screen then click  “start blogging now”.
TO SIGN OUT
  To sign out the owner can press or click the icon of email on the right Conner and select sign out. After then the owner will be already signed out of the blog. Also the group number one presented this as a unique feature of their work in a case of blog what people can do and can not do in my blog
o   People can add comments on a blog and you can restrict adding comment on blog.
o   You can set a blog to be viewed by public, private.
o   You can add author to your blog that will have the same authority with. He/she can add any information, edit, and post anything.












9.3      QUESTION 03

Searching information in a network is a skillful task that requires the searcher to have considerable techniques on searching information in a network. Basing on this clue, explain practically different search engine techniques
S
earch engine is the software system that is designed to search for information on worldwide web. (www). Example of search engine Google, Bing, Yahoo, Ask.com, Aol.com, Baidu, Internet archive, Chacha.com, search. The following are techniques of search information in network search engine.
Google scholar: This is the techniques which provide the simple broad search of scholarly literature, by using Google scholar one may search different material across many disciplinary such as books, articles and different scholar research from different academic publishers. Google scholar ranks the document from the way researcher do, means the full text for each document, where it was published, who has written it and how it was cited from other scholar research. In the Google search one have to type Google scholar and Google scholar search box will appear where one can type to search.
Google books: This is the technique used to search the full text of books that Google has scanned and store on it database. It allows users to view pages from book which appear in the search terms. Books can searched by typing the name of the book or the name of the author, also the genre of the book thus in Google search one have to type Google books and the Google book search box will appear here one can write the name of the book or author. In Google book, books which are public are available for full view and can be downloaded for free. Also there are books which can be full viewed only if the publisher has given permission. And there are preview books which are restricted to a limit number of pages to be viewed by users.
Google calculator: Google calculator' this technique enable us to perform different calculations through Google search engine. Calculations like addition, subtractions, multiplication and other mathematical problems can be solved by Google search engine. On how to use this technique go to Google then type you calculation 
Google map: A Google map is a web mapping service developed by Google. It offers satellite imagery, street map 360˚ panoramic views of street, real-time traffic condition and route planning for travelling by foot, car, bicycle or public transportation. The following are the procedure of Google mapping. First step go Google then write “Google map”, after that you may get many option, then click Google map.
Google  phet simulation: The suite of research based interactive computer simulation for teaching and learning physics, chemistry, math and other science subject. This can run online or downloaded free from the website. Google phet simulation is using of searching engine to search the different simulation.















9.4      QUESTION 04

What is Google hacking? Practically describe different Google hacking techniques
G
oogle hacking, also named Google docking, Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet. Google hacking involves using advanced operators in the Google search engine to locate specific strings of text within search results. Search for terms within the URL of a website inurl:           
       Ø   Search for a specific term or terms within the URL of a website. [ inurl:resume ] Tip: The query must be a complete or whole term, meaning that you cannot extract a term from a string of consecutive letters or numbers. Using the above example, the following demonstrates what is and is not possible when using the inurl: operator. Yes: [ my-resume-123 ] or [ my/resume/123 ] No: [ myresume123 ]
Google’s hacking techniques
1.         GOOLGLE MENTALPLEX: You have to use these technique of Google hacking to hack various page in Google, to do this you have type the word Google mentalplex in Google you will find the page if actually from a Google .. It was posted for April 2000 fool’s day.
If you click on it, it sends to another page with a lot of information making fan of you where you can choose and see its details. For example you can open the page which acquire to choose among of difference pages motioned or if your page which acquire you not mentioned above then you can turn back and type that kind of page which acquire you then place on it, then the page will open and start to peruse that kind of information on that page. for example you need the page of ‘Tasisiya Kiswahili Tanzania’, then will type these page above on given place to type then click on it then the page will be open then several information will happen then select what you want to see.
2. GOOGLE GRAVITY:  These is another technique in Google hacking which you may use to hack different information and other techniques like how to play Quitter, Terminals and snake games and other techniques which acquire you. Therefore if you want to use these technique to hack information in Google you have to type ‘Google gravity’ on Google then you will find a threat part web page clawer Google and you will see the simulating Google part of moving of phenomena these can be impressive for few second if you step away from you computer is well and see the reaction of someone who does not know this trick on the same note you can find on this web site few more tricks like play Quitter, snake game and packman.
3. MATH TOOL FORMULAS: If you type math formulas in Google then you will get more information about mathematic calculation/ problems and you can perform different calculation as well as drawing graphs using Google
4. ATARI BREAKOUT: These are few magic words that provide a search result with a games that you can play during working hours in order to refresh your mind. The trick is to click on the image result rather than word result then you can have some fun when playing this game.
5. GOOGLE DOODLES: If you do not search anything but still press the I’m feeling lucky button you will get all the Google’s doodles that Google has used in the past for specific event and for specific country. You need to understand that Google has different depend on the way you’re with different logos.










9.5         QUESTION 05

With examples, differentiate between website and WebPages. Explain practically how we can get different educational resources from different websites.
T
he websites and WebPages are too commonly used words that are always used interchangeably. However they are not the same at all and so it should be noted that there are many existing differences between the two words. The differences between the websites and the WebPages are in various aspects. The followings are the major aspect in which the two words differ from each other. The aspects are:
A website is a well grouped collection of various related WebPages. A website acts as a room of storing the WebPages. A webpage is a single part of a website carrying a certain document or a media file. A webpage is the interface that one opens when accessing the contents of the website.
 Example of website is the UDOM SRMS website while its WebPages are course evaluation webpage, course results WebPages as well as the course works WebPages.
2: Access address: A website is accessed by the address directly from the World Wide Website (www). A webpage is accessed from the world wide website via a Uniform Resource Locator (URL)
Example a website can be accessed by the address www.udom.comwhereas a webpage can be accessed by the address www.udom.ac.tz whereas a user will be directly directed to the log in interface. So the address of the website brings many results from the website while the address of the webpage opens a certain specific page of the website


3: DOMAIN NAME
A website has a unique domain name and no any website that shares a domain name with another.
WebPages however shares a domain name. Various WebPages shares a common domain name from the website.
Example, a domain name may be www.blogspot.com whereas the correspondent webpages domain names may be www.youtube.com/jally.jacky , www.facebook.com/gwajimalive, and many more.
4: CONTENTS
A website is multi-contented. This means that it comprises of many different files, documents, media contents just to mention a few of them
A webpage however contains a specific content such as files, documents, and media.
Example, in the website www.udom.ac.tz there are various contents such as about university of Dodoma, the almanac, academic timetable, and other while opening a webpage of academic timetable, what is found inside is the timetable only, in the almanac what is found inside is the year schedule of events of the university.
5: SHARING ADRESS
A website address cannot be directly shared to other user since it is always available
A webpage address can be directly shared to other users since it is uniform.
Example; sharing an address to the video uploaded to a certain YouTube account one uses a URL address to share the video to other user whereas a user opening that link will be directed directly to the specific video and not to the YouTube homepage.
6: AUTHENTICATION
In social websites such as Facebook and twitter, as well as in academic websites such as UDOM SRMS the user need to register to get access to the contents. This secures personal privacy.
In webpages however, authentication is merely available. But happens in some cases such as when one need to access the porn videos from YouTube, a user has to verify that he is aged 18 or above. But the case is strict in websites.
7: EDITORIAL ACCESS
In website, editing the contents can be accessed by many authentic different personnel/webservers.
In webpage, editing the contents can be accessed by a single authentic user.
Example, in the UDOM SRMS each webpage can be edited by the single authentic user. People with access to edit the results, course works, students’ details, course evaluation, and other webpages are different and each accesses a certain webpage only.
8: AVAILABILITY ON SEARCH ENGINE
Websites are always available on the search engine’s database the world wide website abbreviated as www. The WebPages are merely available on the search engine since the user should know the exact address to find out the webpage.
For Example; writing the word UDOM on the search engine may result on showing up the related to UDOM, but the user cannot be directed exactly to the certain webpage contained in the website.











9.6         QUESTION 06

Practically describe how to create different email accounts. Mention other accounts that come with Gmail account and explain how to use these accounts.
E
-mail is a system for sending messages from one individual to another via telecommunication links between computers or terminals. Email is used to send things like files, graphic images, video, text and sound. Examples of e-mail provider are Gmail, yahoo, msn, hotmail, Yandex, GMX, AOL, and outlook.
GMAIL ACCOUNT
Steps on how to create Gmail account.
        i.            Open Gmail in your Google search engine
      ii.            enter all the required information
    iii.             choose a username for your email address, choose your Gmail address
    iv.            Choosing a password for your email this help to protect your Gmail account with a security question.
Examples of accounts provided by gmail account
·         Google plus
·          Google drive
·          Google photos
·         Blogger
·          Google+ (plus)

How to use Google+?
·         Go to the Google+ home page
·          Sign in if you have already have a Gmail account
·         after sign in enter your name and select a profile picture to get started with Google+
·         Now you can use a Google+

How to use Google drive
ü  Go to drive.google.com
ü  Sign in into Google drive by using Gmail account
ü   Sign in now you can upload or create files.
YAHOO ACCOUNTS
Steps on how to create Yahoo account
a.       Open up your internet browser and go to the Yahoo home page: https://www.yahoo.com,
b.      Click on Mailat the top left corner of the page.
c.       Create Account, to set up your new account by filling your particular information
d.      Choose the username of your yahoo account.

















9.7      QUESTION 07

What is Carbon Copy (CC), Blind Carbon Copy (BCC), Sign in and Sign up as applied in emails? Using Gmail account explain practically how to attach different types of files while sending emails. What the maximum data size that can be attached and sent using Gmail?
S
igning In  is the process of logging into the E-mail account. And SIGN UP means opening new account in E-mail. They are done when a person needs to access an email account and also need to create a new account.
Electronic mail, or email, is a method of exchanging digital messages between people using digital devices such as computers, mobile phones and other electronics. Email operates across computer networks, which today is primarily the internet. Some early email systems required the author and the recipient to both be online at the same time, in common with massaging. Today's email systems are based on a store-and-forward model. Email servers accept, forward, deliver, and store messages. Neither the users nor their computers are required to be online simultaneously. Internet email messages consist of two major sections, the message header and the message body, collectively known as content. The header is structured into fields such as To, CC, BCC, Subject, Date, and other information about the email. The body contains the message, as unstructured text, sometimes containing a signature block at the end. The header is separated from the body by a blank line.
Common header fields for email include;
 TO…
 CC…
 BCC…
 SUBJECT…
To: The email addresses (es), and optionally name(s) of the message's recipient(s). Indicates primary recipients (multiple allowed), Cc stands for "carbon copy." Anyone you add to the cc: field of a message receives a copy of that message when you send it. All other recipients of that message can see that person you designated as a cc: recipient. To add an entry in the cc: field, click the Add cc: link under the To: field. Bcc: stands for "blind carbon copy." Anyone you add to the bcc: field of a message receives a copy of that message when you send it. But, bcc: recipients are invisible to all the other recipients of the message including other bcc: recipients. To add an entry in the bcc: field, click the Add bcc: link under the To: field.
Email body The email body is the main part of an email message. It contains the message’s text, images and other data (such as attachments).
Attachments An email attachment is a computer file sent along with an email message. One or more files can be attached to any email message, and be sent along with it to the recipient. Think! What does the attachment icon look in e-mail programs? All e-mail programs and services are different. However, the standard for the attachment icon is a paper clip icon. Below is a picture of the attach files icon in Google Gmail.
When referring to e-mail, an attachment is a file sent with an e-mail message. An attachment can be a picture, a word document, a movie, a sound file, an Excel document or any other file that requires another program to open it. Attachment is added just by clicking t he attachment icon. By clicking the icon the files in your computer will be open and allow you to search for the file you need to attach then double click it or right click and select to attach it.








9.8      QUESTION 08

Explain practically how can you use your laptop computer for video calling and conferencing? What are the software requirement(s) for video calling and/or conferencing?
V
IDEO CALL; is the audio and video communication process which uses a live internet connection between people in different locations. That communication including people such as : A. Family   B.  Friends
VIDEO CONFERENCING; is alive visual connection between two or more people residing in separate location for purpose of communication.
Requirement for video call and conferencing:
           Video input; web camera or video camera.
           Audio input; microphone.
           Audio output; loudspeaker associated with display device.
Software used on video call and conferencing are Skype, Google hangout, viber, imo, facebook messenger, i chat (macbook), tango.
Skype is software that enables the world's conversations. Millions of individuals and businesses use Skype to make free video and voice one-to-one and group calls, send instant messages and share files with other people on Skype. You can use Skype on whatever works best for you – on your mobile, computer or tablet. Skype is free to download and easy to use.
Try Skype today and start adding your friends, family and colleagues. They will not be hard to find; hundreds of millions of people are already using Skype to do all sorts of things together and get communicate easily and pass the needed information.



9.9      QUESTION 09

By using multimedia teaching materials describe communication satellites and its types.
S
attilate is an artificial body placed in orbit around the earth or moon or other planet in order to collect the information for communication.
A satellite is a solid object which revolves around some body due to the effect of Gravitation force. Satellites are classified into different type based on the purpose and size. The various types of satellite include; weather satellite, communication satellite, navigation satellite, earth observation satellite, astronomical satellite, miniaturized satellite.
In this work by using multimedia teaching materials, the communication satellites and its types are discussed in detailed.
Communication satellites: The communication satellite is a satellite that transmits the signals such as telephone, television, radio, internet signals over long distances.
In satellite communication, signal transferring between the sender and receiver is done with the help of satellite. In this process, the signal which is basically a beam of modulated microwaves is sent towards the satellite. Then the satellite amplifies the signal and sent it back to the receiver’s antenna present on the earth’s surface. So, all the signal transferring is happening in space. Thus this type of communication is known as space communication.
Also satellite communication is the method of transporting information from one place to another using the communication satellite in orbit around the earth. Example, Watching the English premier league every weekend with your friends would have been impossible without it.
Electrical signal is used to transmit the information through the wire. However, electrical signal or electric current is not transmitted wirelessly because air is a pure insulator. Hence, it resists the flow of electric current or electrical signal.


Types of communication satellites
1. Passive satellites.
2. Active satellites.
Passive satellites receive the electromagnetic signal from the source or transmitter and redirect it towards the receiver or destination; They are relay stations in space.  For example if you put a hydrogen balloon which has a metallic coating over it, in the air it is technically becomes a passive satellite.
It is divided into two types (Natural satellite and artificial satellite). A moon is natural satellite of earth. The electromagnetic signal transmitted from the source collides continuously with the atmospheric particles. Because of this continuous collision, the signal strength is reduced. Hence, the receiver will receive a weak signal.
Advantageous of Passive satellite,
a) Low cost
b) Work as a reflector
Disadvantageous of Passive satellite,
i)                    The large attenuation of signals.
ii)                  Earth stations require high power (10kw) to transmit the signals.
iii)                Large Earth station with tracking facilities was expensive.
iv)                Require a large number of satellites accessed randomly by different users.
v)                  Control of satellite not possible from ground.
An active satellite is a satellite that receives the signal from the source, amplifies the signal, and redirects the signal towards the receiver. Have Transponder that provide the action to incoming signal and prevent the interference between two signals. Amplify or modify and retransmitted the signal from the earth. Are satellites which can transmit powe.
These amplified signals are stored in the memory of the satellites, when earth properly faces the satellite. Then the satellite starts sending the signals to earth. Some active satellites also have programming and recording features.  Then these recording can be easily played and watched. Their amplification is done by the receivers themselves (AndersonP.et al(2007).
Advantageous of Active satellite,
       Ø   Require lower power earth station.
       Ø   Not open to random use.
       Ø   Directly controlled by operator from the ground.
Disadvantageous of Active satellite,
v  More expensive because use electronic devices.
v  Require skilled person.











10    QUESTION 10

Differentiate between cloud storage facilities and cloud backup facilities. Practically show how to use one selected cloud storage and backup facility.
C
loud backup or online backup is designed to make a copy of the files you store on your computer and save this copy on a secure online server. In the event that your laptop is stolen, destroyed, crashes or gets damaged in any other way that leads to the loss or corruption of your original data, you’ll only need to download the software client of the online backup service to your computer, and restore your backed up data to your new computer. These restored files will be the same as your original computer-stored files.
Apart from this backup automation feature, these services also offer what’s called a continuous backup, that is, every edit or change you make to your files gets automatically backed up as well. Online backup services will offer file restoring and file versioning too. If you edit a file that you shouldn’t have, you can go back a number of previous versions of the file. Similarly, if you accidentally delete a file from your computer, you can restore this file within a certain period. Other features may include mirror image backup offered by Carbonate or remote wipe feature offered by Sugar Sync that lets you wipe out data synced to a computer that is subsequently lost or stolen.
With cloud storage services you have to manually select the files you want to upload to the cloud and synced to all of your other devices. If you delete a file or somehow the file gets corrupted, this file can no longer be retrieved (again, the flash drive analogy is quite illustrative!).
With an online storage you can access your files directly in your sync folder a feature typical for Drop box and One Drive, or you can access them online through the host site
As a person may have already concluded from reading all of the above, the main difference between a cloud storage and a cloud backup is their purpose or finality – cloud backups are meant for automatically and continuously keeping all of your files safe, while cloud storage solutions are primarily used for storing a number of files always defined by the user, and as a collaborative tool via their excellent sharing capabilities.
Apart from this main and crucial distinction, the following differences also apply:
  • Automatic versus manual saving of data – cloud backup services like Just Cloud work automatically, that is, they automatically save and sync all your files that are stored on your computer. Cloud storage services like Drop box only save and sync the files that you’ve manually added to your sync folder;
  • Security – cloud backup services are very serious about security, thus, they encrypt files both on transfer and on storage with the latest in encryption technologies (256-bit AES encryption, TSL), and some services like Carbonate will even allow you to manage your own encryption key. This level of security makes sharing and collaboration features much more limited and file preview features much more tedious (files have to be decrypted before you can view them) than in the case of cloud storage services that usually only encrypt files on their servers without locally encrypting them on your computer;
  • Redundancy – online storage services don’t offer the same file redundancy offered by online backups. If a file is deleted or overwritten, the change will appear on all synced devices usually without the possibility to restore previous versions of a file or restore the backup of a file. An online backup service will retain several versions of a file and allow you to recover even deleted files. This file versioning and deleted file recovery feature may be available at some cloud storage providers as well (e.g. Drop box), but only in higher tier plans or only as an add-on service, while online backups contain these feature as a core element of their service.
Procedures for opening and storing data in cloud storage facilities
a)      Searching a sample cloud storage facility using search engine.
b)      Sign in if you do not have an account and log in if you have an account.
c)      To add any data to drop box go to file then upload file.
d)      It will come  note asking you choose a file from your device.
e)      After clicking CHOOSE FILE then you has choose file you want to store in drop box.




Reference

Kurose, James,Ross, & Kient;(2005). Computer networking. A top down approach: person
Simmonds, A; Sandilands, P; & Van E; (2004). project website.cernegie mellon university.
William, S. (2004). Computer networking with internet protocols and technology. Oxford press.

http://www.udakuspecially.com/2017/06/ubalozi-wa-tanzania-uingereza-wakana.html