Client Server and Multimedia Notes
Client Server and Multimedia Notes
Client Server and Multimedia Notes
The client/server model has become one of the central ideas of network computing. Most
business applications being written today use the client/server model. So does the
Internet's main program, TCP/IP. In marketing, the term has been used to distinguish
distributed computing by smaller dispersed computers from the "monolithic" centralized
computing of mainframe computers. But this distinction has largely disappeared as
mainframes and their applications have also turned to the client/server model and become
part of network computing.
In the usual client/server model, one server, sometimes called a daemon, is activated and
awaits client requests. Typically, multiple client programs share the services of a
common server program. Both client programs and server programs are often part of a
larger program or application. Relative to the Internet, your Web browser is a client
program that requests services (the sending of Web pages or files) from a Web server
(which technically is called a Hypertext Transport Protocol or HTTP server) in another
computer somewhere on the Internet. Similarly, your computer with TCP/IP installed
allows you to make client requests for files from File Transfer Protocol (FTP) servers in
other computers on the Internet.
Other program relationship models included master/slave, with one program being in
charge of all other programs, and peer-to-peer, with either of two programs able to
initiate a transaction.
2) The computer that a server program runs in is also frequently referred to as a server
(though it may be used for other purposes as well).
3) In the client/server programming model, a server is a program that awaits and fulfills
requests from client programs in the same or other computers. A given application in a
1
computer may function as a client with requests for services from other programs and
also as a server of requests from other programs.
Specific to the Web, a Web server is the computer program (housed in a computer) that
serves requested HTML pages or files. A Web client is the requesting program
associated with the user. The Web browser in your computer is a client that requests
HTML files from Web servers.
What is Client/Server?
As the name implies, client and server are separate logical entities that work
together over a network to accomplish a task.
Characteristics
All client/server systems have the following distinguishing characteristics:-
1. Service-Client/server is primarily a relationship between processes running on
separate machines
2. Shared resources-A server can service many clients at the same time and
regulate their access to shared resources.
3. Asymmetrical protocols-There is a many-to-one relationship between clients and
server. Clients always initiate the dialog by requesting a service. Servers are
passively waiting requests from the clients. Note that in some cases a client may
pass a reference to a callback object when it invokes a service. This lets the server
call back the client. So the client becomes a server.
4. Transparency of location-The server is a process that can reside on the same
machine as the client or on a different machine across the network. Client/server
software usually masks the location of the server from the clients by redirecting
the server calls when needed. A program can be a client, a server or both.
5. Mix-and-match-The ideal client/server software is independent of hardware or
operating system software platforms. You should be able to mix-and-match client
and server platforms.
6. Message-based exchange-Clients and servers are loosely coupled systems that
interact through a message-passing mechanism. The message is the delivery
mechanism for the service request and replies.
2
7. Encapsulation of service-The server is a “specialist”. A message tells a server
what service is requested; it is then up to the server to determine how to get the
job done. Servers can be upgraded without affecting the clients as long as the
published message interface is not changed.
8. Scalability-Client/sever systems can be scaled horizontally or vertically.
Horizontal scaling means adding or removing client workstations with only a
slight performance impact. Vertical scaling means either migrating to a larger and
faster server machine or distributing the processing load across multiple servers.
9. Integrity-The server code and server data is centrally managed, which results in
cheaper maintenance and guarding of shared data integrity. At the same time, the
clients remain personal and independent.
The client/server characteristics described above allow intelligence to be easily
distributed across a network.
3
An OS must allow the transparent redirection of interprocess calls to a remote
process over a network without the application being aware of it. The extension of
the interprocess co
mmunication across the machine boundaries is the key to the development of
application when resources and processes can be easily moved across machines.
6. Threads
These are units of concurrency provided within a program itself. Threads are used
to create event-driven server programs. Each waiting event can be assigned to a
thread that blocks until the event occurs. In the meantime, other threads can use
the CPU’s cycles productively to perform useful work.
7. Intertask protection
The OS must protect tasks from interfering with each other’s resources. A single
task must not be able to bring down the entire system.
8. Multiuser High-performance File System
The file system must support multiple tasks and provide the locks that protect
integrity of the data. Server programs typically work on many files without too
much deterioration in performance.
9. Efficient memory management
The memory system must be efficient to support very large programs and very large data
objects.
The idea of splitting an application along client/server lines has been used over
the last twelve years to create various forms of networked software solutions. Typically
these solutions are built on top of off-the-shelf middleware software packages.
Middleware is a vague term that covers all the distributed software needed to
support interactions between client/server systems.
File Servers
With a file server, the client typically a PC) passes requests for file records over a
network to the file server. This is a very primitive form of data service that necessitates
many message exchanges over the network to find the requested data.
File servers are useful for sharing files across a network. They are indispensable for
creating shared repositories of documents, images, engineering drawings, and other large
data objects.
5
Server
Transactions
Application
DBMS
server
Application
Database Servers
With a database server, the client passes SQL requests as messages to the database
server. The results of each SQL command are returned over the network. The code that
processes the SQL request and the data reside on the same machine. The server uses its
own processing power to find the requested data instead of passing all the records back to
a client and then letting it to find its own data, as was the case for file server.
Server
SQL Calls
Applicatio
n
DBMS
Application server
Transaction Servers
With a transaction server, the client invokes remote procedures (or services) that
reside on the server with SQL database engine. These remote procedures on the server
execute a group of SQL statements.
The network exchange consists of a single request/reply message (as opposed to
single/reply message for each SQL statement in a transaction). The SQL statements either
all succeed or fail as a unit. These grouped SQL statements are called transactions.
6
Server
Transactions
Application
DBMS
server
TP Monitors
Application
Groupware Servers
Groupware addresses the management of semi-structured information such as text,
image, mail, bulletin boards, and the flow of work. These client/server systems place
people in direct contact with other people.
Lotus Notes and Microsoft Exchange are leading examples of such systems,
although a number of other applications do exist.
Most cases applications are created using a scripting language and a form based
interfaces provided by the vendor. Typically the communication middleware between the
client and the server is vendor-specific. However, many groupware products now use e-
mail as their standard messaging middleware.
Application
Server
Groupware messages
Application
Object Application Servers
With an object server, the client/server is written as a set of communicating objects.
Client objects communicate with server objects using an Object Request Broker (ORB).
The client invokes a method on a remote object. The ORB locates an instance of that
object server class, invokes the requested method, and returns the results to the client
object.
ORB ORB
Application Remote Method
invocation
7
objects
object
HTML
CGI Server CGI Application
Forms
HTTP
Over
TCP/IP
Internet
Java
HTML Documents
Web Browser
FAT SERVERS OR FAT CLIENTS?
Client/server applications can also be differentiated by how the distributed application
is split between the client and the server.
The fat server model places more functions on the server. The fat client model does
the reverse.
Groupware, transaction, and Web servers are examples of fat servers; database and
file servers are examples of fat clients.
Client Server
8
2-TIER VERSUS 3-TIER
High-brow client/server pundits prefer to use terms like 2-tier, 3-tier, and N-tier
client/server architectures instead of fat clients and fat servers. But it’s the same basic
idea.
It’s all about how you split the client/server application into functional units that you
can assign either to the client or to one or more severs. The most typical functional units
are:-
ü The use interface
ü The business logic
ü The shared data
There are many variations of multi-tier architectures depending on how you split the
application and the middleware you use to communicate between tiers.
In the 2-tier client/sever architecture, the application logic is buried either inside the
user interface on the client or within the database on the server (or both). Examples of 2-
tier systems are:-
ü File servers and
ü Database servers with stored procedures
Let's suppose I'm going to write a piece of software that students at a school can use
to find out what their current grade is in all their classes. I structure the program so
that a database of grades resides on the server, and the application resides on the
client (the computer the student is physically interacting with).
When the student wants to know his grades, he manipulates my program (by clicking
buttons, menu options, etc). The program fires off a query to the database, and the
database responds with all the student's grades. Now my application uses all this data
to calculate the student's grade, and displays it for him.
1. Data server: the database serves up data based on SQL queries submitted by the
application.
2. Client application: the application on the client computer consumes the data and
presents it in a readable format to the student.
Now, this architecture is fine, if you've got a school with 50 students. But suppose the
school has 10,000 students. Now we've got a problem. Why?
Because every time a student queries the client application, the data server has to
serve up large queries for the client application to manipulate. This is an enormous
drain on network resources.
9
What is the advantage to this? Well, now when the student wants to know his final
grade, the following happens:
It's a much longer process on paper, but in reality it's much faster. Why? Notice step
6. Instead of serving up an entire recordset of grades, which has to be passed over a
network, the server application is serving up a single number, which is a tiny amount
of network traffic in comparison.
There are other advantages to the 3-tier architecture, but that at least gives you a
general idea of how it works.
Incidentally, this website is a 3-tier application. The client application is your web
browser. The server application is the ASP code which queries the database (the third
tier) for the question-and-answer you requested.
Resource Managers
SQL File
I/O HTTP
Tier 1 Tier 2
In the 3-tier client/server systems, the application logic (process) lives in the middle
tier; it is separated from the data and user interface. Examples of 3-tier client/server
systems are:-
ü TP monitors
ü Object Transaction monitors and
Web application servers.
Resource manager
Application
DBMS
10
SQL
RPC,ORBC DATA
MOM ACCESS
HTTP
services
Legacy
Browser/Beans/ActiveX
Tier 2
Tier 1
Tier 3
Scalability: The key 3-tier benefit is improved scalability since the application servers
can be deployed on many machines. Also, the database no longer requires a connection
from every client -- it only requires connections from a smaller number of application
servers. In addition, TP monitors or ORBs can be used to balance loads and dynamically
manage the number of application server(s) available.
Better Re-use: The same logic can be initiated from many clients or applications. If an
object standard like COM/DCOM or CORBA is employed (as discussed in tool
dependence), then the specific language implementation of the middle tier can be made
transparent.
Improved Data Integrity: since all updates go through the middle tier, the middle tier
can ensure that only valid data is allowed to be updated in the database and the risk of a
rogue client application corrupting data is removed.
Improved Security: Security is improved since it can be implemented at multiple levels
(not just the database). Security can be granted on a service-by-service basis. Since the
client does not have direct access to the database, it is more difficult for a client to obtain
unauthorized data. Business logic is generally more secure since it is placed on a more
secure central server.
Reduced Distribution: Changes to business logic only need to be updated on the
application servers and do not have to be distributed to all the clients.
Improved Availability: mission-critical applications can make use of redundant
application servers and redundant database servers. With redundant servers, it is possible
to architect an application so that it can recover from network or server failures.
Hidden Database Structure: since the actual structure of the database is hidden from the
caller, it is possible that many database changes can be made transparently. Therefore, a
service in the middle tier that exchanges information/data with other applications could
retain its original interface while the underlying database structure was enhanced during a
new application release.
INTRODUCTION TO INTERNET
Introduction:
11
By the turn of the century, information, including access to the Internet, will be the basis
for personal, economic, and political advancement. The popular name for the Internet is
the information superhighway. Whether you want to find the latest financial news,
browse through library catalogs, exchange information with colleagues, or join in a lively
political debate, the Internet is the tool that will take you beyond telephones, faxes, and
isolated computers to a burgeoning networked information frontier.
The Internet supplements the traditional tools you use to gather information, Data
Graphics, News and correspond with other people. Used skillfully, the Internet shrinks
the world and brings information, expertise, and knowledge on nearly every subject
imaginable straight to your computer.
The Internet is what we call a metanetwork, that is, a network of networks that spans the
globe. It's impossible to give an exact count of the number of networks or users that
comprise the Internet, but it is easily in the thousands and millions respectively. The
Internet employs a set of standardized protocols which allow for the sharing of resources
among different kinds of computers that communicate with each other on the network.
These standards, sometimes referred to as the Internet Protocol Suite, are the rules that
developers adhere to when creating new functions for the Internet.
The Internet is also what we call a distributed system; there is no central archives.
Technically, no one runs the Internet. Rather, the Internet is made up of thousands of
smaller networks. The Internet thrives and develops as its many users find new ways to
create, display and retrieve the information that constitutes the Internet.
History & Development of the Internet:
In its infancy, the Internet was originally conceived by the Department of Defense as a
way to protect government communications systems in the event of a military strike. The
original network, dubbed ARPANet (for the Advanced Research Projects Agency that
developed it) evolved into a communications channel among contractors, military
personnel, and university researchers who were contributing to ARPA projects.
The network employed a set of standard protocols to create an effective way for these
people to communicate and share data with each other.
ARPAnet's popularity continued to spread among researchers, and in the1980's the
National Science Foundation, whose NSFNet, linked several high speed computers, took
charge of the what had come to be known as the Internet.
By the late 1980's, thousands of cooperating networks were participating in the Internet.
In 1991, the U.S. High Performance Computing Act established the NREN (National
Research & Education Network). NREN's goal was to develop and maintain high-speed
networks for research and education, and to investigate commercial uses for the Internet.
12
The rest, as they say, is history in the making. The Internet has been improved through
the developments of such services as Gopher and the World Wide Web.
Even though the Internet is predominantly thought of as a research oriented network, it
continues to grow as an informational, creative, and commercial resource every day and
all over the world.
There is no clear answer to this question because the Internet is not one "thing", it's many
things. No one central agency exists that charges individual Internet users. Rather,
individuals and institutions who use the Internet pay a local or regional Internet service
provider for their share of services. And in turn, those smaller Internet service providers
might purchase services from an even larger network. So basically, everyone who uses
the Internet in some way pays for part of it.
The unique thing about the Internet is that it allows many different computers to connect
and talk to each other. This is possible because of a set of standards, known as protocols,
that govern the transmission of data over the network: TCP/IP (Transmission Control
Protocol/Internet Protocol). Most people who use the Internet aren't so interested in
details related to these protocols. They do, however, want to know what they can do on
the Internet and how to do it effectively.
The most popular Internet tools operate as client/server systems. You're running a
program called a Web client. This piece of software displays documents for you and
carries out your requests. If it becomes necessary to connect to another type of service--
say, to set up a Telnet session, or to download a file--your Web client will take care of
this, too. Your Web client connects (or "talks") to a Web server to ask for information on
your behalf.
The Web server is a computer running another type of Web software which provides
data, or "serves up" an information resource to your Web client.
All of the basic Internet tools--including Telnet, FTP, Gopher, and the World Wide Web-
-are based upon the cooperation of a client and one or more servers. In each case, you
interact with the client program and it manages the details of how data is presented to you
or the way in which you can look for resources. In turn, the client interacts with one or
more servers where the information resides. The server receives a request, processes it,
and sends a result, without having to know the details of your computer system, because
the client software on your computer system is handling those details.
The advantage of the client/server model lies in distributing the work so that each tool
can focus or specialize on particular tasks: the server serves information to many users
while the client software for each user handles the individual user's interface and other
details of the requests and results.
13
Every computer should be equipped with basic client software packages that allow you to
perform functions such as electronic mail, Telnet, Gopher, and FTP.
14
know what you are doing, who you are/ have done, and how. In addition to advertising,
the other critical functions that relate to provision of information are:-
Publishing-including full text articles, reports, illustrated articles, abstracts, computer
programs, and demonstrations.
Extensions-in which some of the delays associated with the printed media, may be
reduced.
The possibilities here include both distance learning and assistance for students.
INTERNET ACCESS
You connect to internet in one of the two basic ways, dialing into an Internet Service
Provider (ISP) computer, or with a direct connection to an Internet Service Provider. The
difference is mainly in the speed and cost. In most cases you connect to your ISP using a
telephone line and modem. This type of connection is called the Dialup connection.
Dial-up Connection
With a dial-up account, you use your modem to convert computer bits and bytes into
modulated (tonal) signals that the phone line can transmit. These signals are received by a
modem at your ISP and demodulated into bits and bytes for their computer. Dial-up
access is either by way of SLIP (Serial Line Internet Protocol) or PPP (Point to point
protocol).
To establish a conventional dial-up connection to the Internet, you will need the
following:
ü An account with an Internet Access Provider (In India BSNL, Satyam Online,
etc). the account can be either TCP/IP or Shell.
ü A telephone connection
ü A computer with serial port (for External modems) or an expansion slot (for
Internal modems)
ü A modem (External/Internal)
ü A communication (or terminal emulation) software SLIP/PPP (TCP/IP) account
holders will require a browser software (Internet Explorer, Netscape Navigator,
etc) and an e-mail software (Microsoft Internet Mail, Netscape Messenger,
Eudora etc) for Shell account holders the browser software (Lynx) and the E-mail
software (Pine) are usually available with Internet Access.
Direct Connection
You can also get a direct connection to your ISP, where you have a fixed cable or a
dedicated phone line to the ISP. Often the dedicated line is an ISDN (Integrated Services
Digital Network) line which is higher-speed version of the standard phone line that
requires two phone lines.
15
You can also get a dedicated line called a T-1 or T-3. A T-1 (Tee-one) line can handle
1280 kilobytes per second. A T-3 line can handle ten times that speed.
• Computer
• Connection –
• Modem
• Network Software - TCP/IP
• Application Software - Web Browser, Email, ...
• Internet Service Provider (ISP)
Internet Basics
For most people who are new to the Internet, the first experience is quite overwhelming.
However as one gets the feel of the Internet, it becomes clear that Internet is similar to
any medium of information and or/ communication.
Once you know how to send and receive electronic mail, subscribe to mailing lists, join
and participate in discussion groups and Internet chats, your power to communicate with
people anywhere in the world increases dramatically.
Web browsers are mainly used to access pages of the World Wide Web.
By clicking on the hypertext links on a page it is possible to jump from one Internet site
to another, regardless of its location. Hypertext links are usually highlighted or different
colored text, images or icons.
Given below is a list of activities that you could do with a web browser:-
16
Ø Visit Web sites
Ø Send and receive electronic mail
Ø Read and post articles in newsgroups
Ø Download files to your PC.
Ø Chat with other users on-line
Ø Play games with others on-line
Ø Access on-line multimedia including radio and video broadcasts
Ø Search the Internet for Information
Ø Subscribe to electronic newsletters, e-zines etc.
Ø Do on-line shopping
Ø Post your resumes on the Internet
Ø Create your own web sites
Ø Create an e-mail ID and account for you
Ø Find a person’s details
Ø Send flowers or gifts to others
INTERNET PROTOCOLS
v The most commonly used protocols are:-
v Transmission Control Protocol/Internet Protocol (TCP/IP)
v File Transfer Protocol (FTP)
v Hyper Text Transfer Protocol (HTTP)
v Telnet
v Gopher
v Wide Area Information Service (WAIS)
17
The specifics of each step will vary depending on the client program being used and the
type of Internet connection. There are a wide variety of files that are publicly available
through anonymous FTP.
Shareware-software that you can use for free for a trial period but then pay a fee for
Freeware-completely free software, for example fonts, clipart and games.
Upgrades & Patches-upgrades to current software and “fixes” for software problems.
Documents-examples include research papers, articles and Internet documentation.
HYPERTEXT
In a hypertext document, certain words within the text are marked as links to other areas
of the current document or to other documents
The user moves to a related area by moving his or her mouse pointer to the link and
clicking once with the mouse button
Links are used to point to another part of the same document, in which case clicking the
link will cause the browser to move to a new part of the currently displayed document
Telnet
Telnet is a protocol, or set of rules that enables one computer to connect to another
computer. This process is also referred to s remote login
The user’s computer, which initiates the connection, is referred to as the local computer,
and the machine being connected to, which accepts the connection, is referred to as the
remote, or host computer.
Telnet is the protocol used to establish a login session on a remote computer on the
network. While many computers on the Internet require users to have authorization,
others are open to the public and can be logged onto with telnet. Telnet is not a method to
transfer files from one machine to another, but rather is a way to remotely connect to
another system with privileges to run specific programs on that system. Some uses of the
Telnet protocol include:
connecting to a library catalog to search that library's collection connecting to a location
that allows public priveleges to search its campus information system connecting to a
location that gives you an up-to-the minute weather report
Gopher
Gopher is a protocol that is designed to search, retrieve, and display documents from
remote sites on the Internet.
It is also possible to initiate on-line connections with other systems via Gopher.
Information accessible via Gopher is stored on many computers all over the Internet.
These computers are called Gopher servers.
Users interact with Gopher via a hierarchy of menus and can use full-text searching
capabilities of Gopher to identify desired documents.
Gopher can work with the following internet tools or systems:-
§ Search local WAIS idiocies; query remote WAIS servers and funnel the results to
Gopher clients.
§ Query remote FTP sites and funnel the results to Gopher clients
§ Be queried by WWW clients either using native HTTP querying.
Gopher is a client/server system that allows you to access many Internet resources simply
by making selections from a sequence of menus. Each time you make a selection, Gopher
carries out your request to the computer that contains the information and "serves" it up.
For example, if you select a menu item that represents a text file, Gopher will get that
file--wherever it happens to be--and display it for you. As you use Gopher, some menu
items lead to other menus. If you choose one of these, Gopher will retrieve the new menu
and display it for you. Thus you can move from menu to menu, using only a few key
strokes or a mouse to navigate. The power of Gopher is that the resources listed in a
menu may be anywhere on the Internet. As Gopher connects to computers to comply with
your menu selection, you don't need to be preoccupied with the behind-the-scenes work
of connecting to and disconnecting from these various computers. Gopher does this for
you without your even needing to be aware of it. This automatic connecting makes
Gopher popular and useful.
"Born" in April 1991, gopher began as a project at the Microcomputer, Workstation, and
Networks Center at the University of Minnesota to help people on campus get answers to
computer-related questions. At the time, the computer center staff had accumulated
answers to thousands of questions regarding computers and software.
What was needed was an easy and efficient way to deliver this information to students,
faculty and staff. Thus, the creation of Gopher reaffirms the adage that necessity is the
mother of invention.
19
1. Just as a real gopher successfully navigates beneath the prairie, the Internet
Gopher tunnels
through the invisible paths of the Internet to help you find the information
you want.
2. The name refers to someone who fetches things or provides service for other
people.
3. The Golden Gopher is the mascot of the University of Minnesota.
INTERNET ADDRESSING
In general, Internet addressing is a systematic way to identify people, computers and
Internet resources.
IP Address
If you want to connect to another computer, transfer files to or from another computer, or
send an e-mail message, you first need to know where the other computer is-you need the
computer’s “address”.
An IP (Internet Protocol) address is an identifier for a particular machine on a particular
network e.g 202.54.1.6
The IP addresses have the following characteristics in common:-
• IP addresses are unique
• No two machines can have the same IP number.
• IP addresses are also global and standardized
• All machines connected to the Internet agree to use the same scheme for
establishing an address.
Domain Name
A domain name is a way to identify and locate computers connected to the internet. No
two organizations can have the same domain name e.g Microsoft.com, ibm.com,
nasa.gov etc.
The major categories for top-level domain names are:-
com-commercial entities
edu-educational institutions
net-organisations directly involved on Internet operations
org-miscellaneous organizatons that don’t don’t fit any other category, such as non-profit
groups
gov-united states Federal Government entities
mil-United states military
URL.
URLs consists of letters, numbers, and punctuation. The basic structure of a URL is
hierarchical, and the hierarchy moves from left to right:
Protocol://server-name.domain-name.top-level-domain:port/directory/filename
• URL structure
protocol://host.domain[:port]/path/file.extension [?optional stuff]
http://www.hellohelpme.com/index.html
http: protocol
//www. host
hellohelpme.com domain
/index.html the individual document
the extension html shows that it was coded with html (web documents frequently have
the extension html or htm)
• Protocol might be - http, file, gopher, wais, news, telnet, https, ....
• The CASE of URLs may be important! Use only lower case in URLs that you
build!
"optional stuff" - after a ? - is usually search parameters or values for variables. Often
used to pass parameters
Example includes:
http://www.lnl.net/alexis/index.html
21
gopher://gopher.state.edu
WEB BROWSERS
A browser is a piece of software that acts as an interface between the user and the inner
workings of the Internet, specifically the World Wide Web. Browsers are also referred as
web clients, or Universal clients because in the client/server model, the browser functions
as the client program.
The browser acts on behalf of the user. The browser:
§ Contacts a web server and sends a request for information.
§ Receives the information and then displays it on the user’s computer.
A browser can be graphical or text-based and can make the Internet easier to use and
more intuitive. A text-based shows the user only the textual matter. A graphical browser
allows the user to see more of what the WWW has to offer such as graphics, photographs
and multimedia.
A browser program enables your computer to extract information from remote computers
working on any platform through the WWW. The program on your computer is called
WWW client. The WWW program [usually] on another computer that the browser
"talks" to is called the server
Technically, a Web browser is a client program that uses the Hypertext Transport Control
Protocol (HTTP) to make requests of Web servers throughout the Internet on behalf of
the browser user
Examples of the browsers
WEB BROWSING
Internet browsing or ‘net surfing’, as it is often called, is the process of visiting different
web sites on the Internet hosted by various companies, organizations, educational
institutions, magazines, individuals, etc. the Internet contains a wealth of information that
can help your business. Armed with a good Internet browser, you can easily get around to
a myriad of sites, gathering competitive information, conducting market research, reading
publications, and staying in touch with what’s happening at your business associations.
Chatting:
Internet Relay Chat (IRC), the other method for Internet conversation, is less common
than talk because someone must set up the Chat before others can join in. Chat sessions
allow many users to join in the same free-form conversation, usually centered around a
discussion topic. When users see a topic that interests them, they type a command to
join and then type another command to choose a nickname. Nicknames allow people in
the session to find you on IRC Networks or Channels.
Search Engines
A web search engine is an interactive tool to help people locate information available via
the World Wide Web. Web search engines are actually databases that contain references
to thousands of resources. Users interact with database, submitting questions that ask the
databases if it contains that match a specific criteria.
There are many web search engines available on the web. A web search engine provides
an interface between the user and the underlying database. The interface presents the user
22
with a place to type in a search string, which may be a word, a phrase a date or some
other criterion and a way to submit the request.
The web search engines runs the search string against a database, returns a list of
resources that match the criteria and displays the results to the user.
Some of the most popular search engines are:
AltaVista (http://www.altavista.digital.com)
Excite (http://www.excite.com)
Lycons (http://www.lycons.com)
Yahoo! (http://www.yahoo.com)
The World Wide Web is "indexed" through the use of search engines, which are also
referred to as
"spiders," "robots," "crawlers," or "worms". These search engines comb through the Web
documents, identifying text that is the basis for keyword searching. Each search engine
works in a different way. Some engines scan for information in the title or header of the
document; others look at the bold "headings" on the page for their information. The fact
that search engines gather information differently means that each will probably yield
different results. Therefore, it's wise to try more than one search engine when doing Web
searching.
The list below lists several search engines and how each one gathers information, plus
resources that evaluate the search engines.
Alta Vista
Alta Vista, maintained by The Digital Equipment Corp., indexes the full text of over 16
million pages including newsgroups. Check out the Alta Vista Tips page.
Excite Netsearch
Excite includes approximately 1.5 million indexed pages, including newsgroups. Check
out the Excite NetSearch handbook.
Indexes full text of web pages, including selected newsgroups and electronic journals.
Just under one-half million pages indexed. Check out the InfoSeek Search Tips.
Inktomi
As of December 1995, the Inktomi search engine offers a database of approximately 2.8
million indexed Web documents and promises very fast search retrievals. Results are
ranked in order of how many of your searched terms are used on the retrieved pages.
Lycos
Lycos indexes web pages (1.5 million +), web page titles, headings, subheadings, URLs,
and significant text.
23
Search results are returned in a ranked order.
Magellan
Magellan indexes over 80,000 web sites. Search results are ranked and annotated.
Indexes full text of approximately 1.3 million pages. Check out the Open Text Help
pages for tips on using this search engine.
WebCrawler
Maintained by America Online, WebCrawler indexes over 200,000 pages on
approximately 75,000 web servers. URLs, titles, and document content are indexed.
Approximately 250,000 indexed pages; indexed content includes hypertext, URLs, and
document titles.
Yahoo
A favorite directory and search engine, Yahoo has organized over 80,000 Web sites
(including newsgroups) into 14 broad categories. Yahoo also maintains a comprehensive
list of links to Yahoo - Computers and Internet:Internet:World Wide Web: Searching the
Web other web search engines, indexes, and guides.
During his evolution journey from Neanderthals to Homo erectus and then to Homo
sapiens, man has come long way. Because of his continuous quest for more and more
amenities and facilities, the nineties have seen a major turn around with the invention of
computers. 10 years ago, the term internet was practically anonymous to most of the
people. And today internet has become the most ever powerful tool for man throughout
the world. The internet is a collection of various services and resources.
Although, many people still think e-mail and World Wide Web as the principle
constituents of internet, there is lot more in store than e-mail, chat rooms, celebrity web
sites and search engines. It also became the best business tool of modern scenario. Today
internet has brought a globe in a single room. Right from news across the corner of the
world, wealth of knowledge to shopping, purchasing the tickets of your favorite movie-
everything is at your finger tips. Internet has great potential and lot to offer… however,
24
like every single innovation in science and technology, internet has its own advantages
and disadvantages.
Advantages
Communication:
The foremost target of internet has always been the communication. And internet has
excelled beyond the expectations .Still; innovations are going on to make it faster, more
reliable. By the advent of computer’s Internet, our earth has reduced and has attained the
form of a global village.
Now we can communicate in a fraction of second with a person who is sitting in the other
part of the world. Today for better communication, we can avail the facilities of e-mail;
we can chat for hours with our loved ones. There are plenty messenger services in
offering. With help of such services, it has become very easy to establish a kind of global
friendship where you can share your thoughts, can explore other cultures of different
ethnicity.
Information
Information is probably the biggest advantage internet is offering. The Internet is a virtual
treasure trove of information. Any kind of information on any topic under the sun is
available on the Internet. The search engines like Google, yahoo is at your service on the
Internet. You can almost find any type of data on almost any kind of subject that you are
looking for. There is a huge amount of information available on the internet for just about
every subject known to man, ranging from government law and services, trade fairs and
conferences, market information, new ideas and technical support, the list is end less.
Students and children are among the top users who surf the Internet for research. Today,
it is almost required that students should use the Internet for research for the purpose of
gathering resources. Teachers have started giving assignments that require research on
the Internet. Almost every coming day, researches on medical issues become much easier
to locate. Numerous web sites available on the net are offering loads of information for
people to research diseases and talk to doctors online at sites such as, America’s Doctor.
During 1998 over 20 million people reported going online to retrieve health information.
Entertainment
Entertainment is another popular raison d'être why many people prefer to surf the
Internet. In fact, media of internet has become quite successful in trapping multifaceted
entertainment factor. Downloading games, visiting chat rooms or just surfing the Web are
some of the uses people have discovered. There are numerous games that may be
downloaded from the Internet for free. The industry of online gaming has tasted dramatic
and phenomenal attention by game lovers. Chat rooms are popular because users can
meet new and interesting people. In fact, the Internet has been successfully used by
people to find life long partners. When people surf the Web, there are numerous things
that can be found. Music, hobbies, news and more can be found and shared on the
Internet.
Services
Many services are now provided on the internet such as online banking, job seeking,
25
purchasing tickets for your favorite movies, guidance services on array of topics
engulfing the every aspect of life, and hotel reservations. Often these services are not
available off-line and can cost you more.
E-Commerce
Ecommerce is the concept used for any type of commercial maneuvering, or business
deals that involves the transfer of information across the globe via Internet. It has become
a phenomenon associated with any kind of shopping, almost anything. You name it and
Ecommerce with its giant tentacles engulfing every single product and service will make
you available at your door steps. It has got a real amazing and wide range of products
from household needs, technology to entertainment.
Disadvantages
Spamming:
Spamming refers to sending unwanted e-mails in bulk, which provide no purpose and
needlessly obstruct the entire system. Such illegal activities can be very frustrating for
you, and so instead of just ignoring it, you should make an effort to try and stop these
activities so that using the Internet can become that much safer.
Virus threat
Virus is nothing but a program which disrupts the normal functioning of your computer
systems. Computers attached to internet are more prone to virus attacks and they can end
up into crashing your whole hard disk, causing you considerable headache.
Pornography:
This is perhaps the biggest threat related to your children’s healthy mental life. A very
serious issue concerning the Internet. There are thousands of pornographic sites on the
Internet that can be easily found and can be a detrimental factor to letting children use the
Internet.
Spamming
Sometimes having an e-mail account can be very frustrating. People will fill up your
mailbox with advertisement, forwarded messages, product details, business offers, and all
sorts of unwanted junk.
Separating the messages you really want from the hundreds of unwanted mails is a
daunting task. This process is called spamming, makes people hate e-mail.
INTERNET SECURITY
26
Internet security involves the protection of a computer's internet account and files from
intrusion of an unknown user. Basic security measures involve protection by well
selected passwords, change of file permissions and back up of computer's data.
Security concerns are in some ways peripheral to normal business working, but serve to
highlight just how important it is that business users feel confident when using IT
systems. Security will probably always be high on the IT agenda simply because cyber
criminals know that a successful attack is very profitable. This means they will always
strive to find new ways to circumvent IT security, and users will consequently need to be
continually vigilant. Whenever decisions need to be made about how to enhance a
system, security will need to be held uppermost among its requirements.
Internet security professionals should be fluent in the four major aspects:
§ Penetration testing
§ Intrusion Detection
§ Incidence Response
§ Legal / Audit Compliance
Some apparently useful programs also contain features with hidden malicious intent.
Such programs are known as Malware, Viruses, Trojans, Worms, Spyware and Bots.
§ Bots are programs that take over and use the resources of a computer system over
a network \without consent, and communicate those results to others who may control
the Bots.
The above concepts overlap and they can obviously be combined. The terminology is
evolving.
Antivirus programs and Internet security programs are useful in protecting a computer or
programmable device / system from malware.
Such programs are used to detect and usually eliminate viruses. Anti-virus software can
be purchased or downloaded via the internet. Care should be taken in selecting anti-virus
software, as some programs are not as effective as others in finding and eliminating
viruses or malware. Also, when downloading anti-virus software from the Internet, one
should be cautious as some websites say they are providing protection from viruses with
their software, but are really trying to install malware on your computer by disguising it
as something else.
§ Malware is the most general name for any malicious software designed for
example to infiltrate, spy on or damage a computer or other programmable device or
27
system of sufficient complexity, such as a home or office computer system, network,
mobile phone, PDA, automated device or robot.
§ Viruses are programs which are able to replicate their structure or effect by
integrating themselves or references to themselves, etc into existing files or structures
on a penetrated computer. They usually also have a malicious or humorous payload
designed to threaten or modify the actions or data of the host device or system
without consent. For example by deleting, corrupting or otherwise hiding information
from its owner.
§ A computer virus is a small program written to alter the way a computer operates,
without the permission or knowledge of the user. A virus executes itself. It often
places its own code in the path of executable files with a copy of the virus
infected file.
§ Virus can infect desktop computers and network servers alike. Some viruses are
programmed to damage the computer by damaging programs, deleting files, or
reformatting the hard disk.
§ Viruses can be transmitted as attachments to an e-mail note or in a downloaded
file, or be present on a diskette or CD. The immediate source of the e-mail note,
downloaded file, or diskette you've received is usually unaware that it contains a
virus. Some viruses wreak their effect as soon as their code is executed; other
viruses lie dormant until circumstances cause their code to be executed by the
computer. Some viruses are benign or playful in intent and effect ("Happy
Birthday, Ludwig!") and some can be quite harmful, erasing data or causing your
hard disk to require reformatting. A virus that replicates itself by resending itself
as an e-mail attachment or as part of a network message is known as a worm.
§ Trojans (Trojan Horses) are programs which may pretend to do one thing, but in
reality steal information, alter it or cause other problems on a such as a computer or
programmable device / system.
§ Spyware includes programs that surreptitiously monitor keystrokes, or other
activity on a computer system and report that information to others without consent.w
§ Worms are programs which are able to replicate themselves over a (possibly
extensive) computer network, and also perform malicious acts that may ultimately
affect a whole society / economy.
§ Worms are programs that replicate themselves from system to system without
the use of a host file. This is in contrast to the viruses which require the spreading
of an infected host file. In a computer, a worm is a self-replicating virus that does
not alter files but resides in active memory and duplicates itself. Worms use parts
of an operating system that are automatic and usually invisible to the user. It is
common for worms to be noticed only when their uncontrolled replication
consumes system resources, slowing or halting other tasks.
§
28
In computing the system software, hardware and information is always under threat of
either being altered, destroyed, accessed illegally and stolen. These threats can be caused
by errors and by accidents, natural hazards, and crimes against information technology
crime using information technology or worms and viruses. Due to these threats there is a
great need to protect the computer system and its resources.
Measures and controls that ensure confidentiality, integrity, and availability of the
information processed and stored by a computer.
Symmetric-key algorithms are efficient; it takes less time to encrypt a message using a
symmetric-key algorithm than it takes to encrypt using a public- key algorithm. The
reason is that the key is usually smaller. For this reason symmetric-key algorithms are
used to encrypt and decrypt long messages.
Symmetric algorithms has two major disadvantages. Each pair of users must have a
unique symmetric key. This means that if N people in the world want to use this method,
there needs to be N (N-1)/2 symmetric keys. For example, for 1 million people to
communicate, 500 billion symmetric keys are needed. The distribution of the keys
between two parties can be difficult
PUBLIC-KEY CRYPTOGRAPHY
In public-key cryptography, there are two keys: a private key and a public key. The
private key is kept by the receiver. The public key is announced to the public.
Public-key cryptography also has two disadvantages. The big disadvantage is the
complexity of the algorithm. If we want the method to be effective, the algorithms needs
29
large numbers. Calculating the cipher text from plain text using the long keys takes a lot
of time. That is the main reason that public-key cryptography is not recommended for
large amounts of text.
Access control
Before using the computer resources a user can be required to use his or her credit card,
debit card or ATM card. These cards are used for identification purposes. The users can
also be given unique identification characters like pin, password or digital signatures.
Biometrics can also be used for identification purposes. This is where the characteristics
of an individual like fingerprints and voice are used.
Data encryption
This is where data is altered before storage or sending via the internet. In this state it
cannot be used until it is changed in to a form that can be read and understood.
Use of firewalls
This is a system of both hardware and software that blocks unauthorized users and
outside the organization from entering the intranet. The firewall all internets and other
network activity, a firewall identifies unauthorized users, searches for viruses and
implements other security measures.
Is a combination of hardware and software that enforces a boundary between two or more
networks for example between a corporate network and the internet to which it is
connected.
A firewall protects networks from unwanted traffic. The primary goal of a firewall is to
let good traffic pass though which bad traffic gets blocked. The most important part of a
firewalls its access control features that distinguish between goal and bad traffic. It
Provides a single point of entry and exist from the network to another.
PROXIY SERVER
A proxy server is a form of application server that works differently from firewall. Proxy
Service change the network addresses of the nodes on the other network.
For example in the internet would not know that other node exits behind the proxy server
nor the addresses of those nodes.
Audit control
This is a program which keeps a record of what computers are used, and the files that
are opened and who uses them. This creates a record of how transaction was carried out
from the input to the output stage. The record is also known as audit trail.
Recovery strategies
When the computer crashes or resources are lost suddenly special software can be used
to recover the lost resources.
Backup
All programs and data in the computer should also be backed up. This where copies of
others are also stored in a secondary device.
30
HACKER
Is a person who gains unauthorized access to computers or telecommunications
systems, for a reason only known to themselves. It is a threat to organizations information
is always punishable by law.
CRACKERS
Is a person who illegally breaks into computers for malicious purposes. It can be for
financial gain, to shutdown hardware, pirate software or to destroy or alter data. It is also
punishable by law.
ELECTRONIC MAIL
MAILING LISTS
Electronic mail is far more flexible and powerful than you might at first imagine.
E-mail can be used to run a program in a remote computer and have the results sent back
to you.
E-mail also offers a great way to stay in touch with special interest groups. A mailing list
is a way to share information via electronic mail with many people, usually on a specific
topic or for a special purpose.
People choose to be part of mailing list by subscribing to the list. Once you have joined
the list (or subscribing to the list), you will receive regular information by e-mail about
the subject that particular list is concerned with.
Mailing lists provide a way of keeping up with the developments and happenings in a
particular field of interest with minimum effort and cost.
The single, central e-mail address for the list is also referred to as a mail reflector.
Mailing lists originated on a network called BITNET. BITNET was created to connect
universities in the united states.
NEWSGROUPS
Newsgroups on the internet have little to do with ‘news’, but everything to do with
discussion and debate.
Newsgroups are essentially public e-mail discussion forums where participants ‘post’
their messages to be seen by all readers of the newsgroup.
Anyone reading the message can chose to reply either publicly (to the newsgroup) or
privately (to the originator of the message).
Newsgroups provide a forum for interested people to discuss topics of common interest.
Businesses must do their research and find out what people want, or figure out how to
make people want a product they are producing.
This needs to capture and record information about what people want has led to many IT-
based databases and data warehouses of which businesses are now boasting.
32
Introduction to network news:
Network News (sometimes referred to as Usenet News) is a service comprised of several
thousand electronic discussions providing users an effective way to share information
with others on just about any topic.
If you're unclear about the concept of Network News, it's helpful to think about a bulletin
board that you might see on campus.
Here, one might find posted messages advertising a futon for sale, asking for students to
join a math study group. In the newsgroup environment, the same kind of process take
place:
User X may access a newsgroup on a particular topic and post a message, question, or
respond to a previously posted message, and anyone accessing that newsgroup would
then be able to see User X's message.
Network News newsgroups provide this same kind of forum online, where users have
access to the messages posted by all other users of that newsgroup.
Network News has been described as an "international meeting place" where you're likely
to find a discussion going on just about anything.
How Does Network News work?
Messages posted on Network News newsgroups are sent from host computer to host
computer all over the world, using the network news transfer protocol.
Because Network News newsgroups are located on one server, Network News is a very
efficient way to share information that might otherwise be disseminated to several
individual users.
This way, several people can read a given newsgroup message, but the host system stores
only one copy of it.
E-MAIL ETHICS
e-mail messages are a lot like letters. Simplicity, directness, and brevity will make people
read your messages. Our e-mails says a lot about our values, our attention to detail, and
the reputation of the organization we represent. Like any form of communication there
are certain manners that you should follow when using the e-mail. Here are some
guidelines, which will help you in getting the most out of your electronic mailing system.
• Let your messages have a personal touch. Write it the way you would say it. Use
everyday language. Vary your sentence length.
• Be friendly, use humor to break up the tension of what you have to say.
• Be succinct and considerate of the recipient’s time and online charges, especially
with services that charge by the hour or by the size of the messages. E-mail
messages work best if they are short and to the point.
• Know your recipient. Different people have different ideas of what is acceptable.
Find out and respect each person’s wishes.
• Avoid sarcasm, unless you’re sure it will work, and think carefully before using e-
mail to express anger. With e-mail, once it’s sent, it’s gone.
• .Be careful about your use of irony or even some forms of humor, which can be
misinterpreted. Unlike face-to-face meetings or phone conversations, there are no
visual or oral clues to provide a sense of what is going on.
• Be brief. This not only saves bandwidth but also cuts down on eyestrain.
• Make the subject line precise.
33
• Don’t copy the full text of along message into your response. Copy only parts you
need to refer to.
• Don’t assume that everyone likes emoticons (emotional icons). Some people find
them annoying.
• Look sharp. Good writing is 90% clarity, and half of clarity is appearance. No one
likes facing a long unbroken block of text characters. Put a blank line between
paragraphs to help you organize your thinking.
• Use your technology. A memory-resident spellchecker or thesaurus will help you
avoid the embarrassment of a misspelled word or a word used incorrectly.
• Compose your messages off-line. A regular word processor is much more
powerful than the text editors used on most e-mail systems.
• Read the message before sending it, like your title and company name or other e-
mail addresses you have crept in.
• Most e-mail programs these days let you insert what’s called a signature at the
bottom of the message. This can be anything from a clever quote to some
additional information about you, like your title and company name or other e-
mail addresses you have.
• Configure your e-mail client to check all your accounts in one shot.
• If security is not a concern, configure your e-mail client to remember passwords.
• Get a free-mail account for personal e-mail or mailing lists.
• If you are sending large files as attachments, use some compression utility like
pkzip, WinRAR, before sending them.
• Don’t send copies of e-mail to people unless they need to be copied. In addition to
cluttering up their mailboxes, it can place them in an awkward position, making
them feel as if they have to do something with the information. It can also be
intimidating to the main recipient.
• Stay on the topic if you are posting to a public bulletin board, forum or news
group. Most are focused on a specific topic, and messages that stray too far from
the topic can be annoying.
• Briefly describe who you are if the recipient doesn’t already know.
• Be aware that e-mail can be archived and, under certain circumstances, may not
be secure. On-line services and public e-mail providers protect the confidentiality
of their subscribers’ e-mail, but some companies consider employee e-mail sent
over the office network to be company property and subject to security.
• Avid “Urgent” or “Priority” unless it really is.
• Avoid using all capital letters. IT’S THE EQUIVALENT OF SHOUTING! Also,
it is harder to read.
• You should check your mail regularly. Unlike a fax or normal mail, an e-mail
message in the most cases is not automatically delivered to your desk. You have
to log on to check your mail.
Advertising
v Do not post to lists or boards or newsgroups whose purpose states no advertising.
Use browsing services such as WAIS, Gopher and WWW to list products and services.
v Use e-mail enabled information services like mailing lists to which users can
subscribe or send email to obtain information.
Privacy
v Do not invade the personal privacy of others.
v Do not forward e-mail without permission.
v Do not deliberately break into computer systems.
Security
v Systems break-ins or aiding others to break into systems is illegal.
v Getting passwords or other access information fraudulently is unacceptable
Intellectual Property
v Copying or making available copies of protected works without the authors
permission is illegal.
Using a markup language designed for simplicity and with a flexible structure, Hypertext
Markup Language (HTML), allowed text and graphics to be displayed in web browser or
other suitably enabled application. Certain parts of the document could become
hyperlinks, which when clicked caused a different page or a different section of the page
to be displayed.
A markup language is simply a series of elements, each delimited with special characters,
that define how text or other items enclosed within the elements should be displayed e.g
<EM>this is some emphasized text</EM>.
HTML is a markup language broadly based on the standard Generalized Markup
Language (SGML). SGML is a way of describing languages, and is not itself a language
used to create pages.
35
From these simple beginnings, extra feature were added to build version 4.0 of HTML
that we use today. These extra features provided for more flexible text styling (such as
the <FONT> element), and more control over the final layout of the page (such as the use
of tables and frames).
As far as serving up these pages of information, text files and graphics can be delivered
to the user by a web server application, which simply reads them from the disk and
converts the output to the correct HTTP protocol for transmission across the network. At
the client user end, the browser takes the incoming stream and converts it into a page that
can be displayed.
The great strength of HTML and HTTP, besides university, is that the document can
contain information about the meaning of the content, and the way that writer intended it
to be perceived. It can be read by applications that don’t actually display visually: e.g,
blind people can use special application that converts it into speech.
Browser Chaos
As different browsers tried to attract market share, a set of proprietary HTML elements
evolved that centered around the use of each particular browser. E.g. <FONT> and
<CENTRE> elements, which specifically developed for Netscape browser.
Adding to this confusing compatibility issue are the elements that are strictly proprietary,
such as <MARQUEE> (Internet Explorer only) which creates scrolling text and
<BLINK> for (Netscape Navigator), which makes text to blink on and off. These
elements work only within the browser for which they were designed and are ignored by
other browsers.
36
HTML. XML provides a format of describing structured data that can be shared by
multiple applications across multiple platforms.
HTML
One of the greatest challenges facing HTML authors is designing pages that display
properly in multiple browsers. Every browser contains a program called a parser that
interprets the markup tags in an HTML file and display the results in the canvas area of
the browser interface.
The logic for interpreting the HTML tags varies from browser to browser, resulting in
many, possibly conflicting interpretations of the way the HTML file is displayed.
37
CUTTING-EDGE CODING
Another strategy to adopt when designing your web site is to stay at the cutting edge.
Some designers insist that their users keep up with them by requiring the latest browser.
This design strategy can result in visually exciting and interaction sites that keep pace
with the latest technology. One can use plug-in enhancements that render certain media
types such as macromedia Flash animations.
Plug-ins are helper applications that assist a browser in rendering a special effect.
Without the plug-in, your user cannot see the results of your work.
BROWSER-SPECIFIC CODING
A site coded only for one browser may alienate a significant number of readers who
immediately leave because they do not have the correct browser. On the web, you never
can be sure of the type of browser your user has. This method of browser specific coding
however may be viable on a company intranet, where you or you can specify that all
users have the same version and brand of browser.
BANDWIDTH CONCERNS
Access via cable modem is currently the most reliable high-speed connection to the Web
for home users, but less than 20 percent of American households have access to cable
modems. Corporations primarily rely on T1 or Integrated Services Digital Network
(ISDN) connections.
Electronic Commerce
Electronic commerce is commerce but it is commerce accelerated and enhanced by IT, in
particular, the Internet. It enables customers, consumers and companies to form powerful
new relationships that would not be possible without the enabling technologies.
For businesses, electronic commerce includes:-
1. Performing transactions with customers over the Internet for purposes such as
home shopping, banking, and electronic cash use.
2. Performing transactions with other organizations through the use of electronic
data interchange (EDI)-the direct computer-to-computer transfer of information.
3. Distributing information to prospective customers through interactive advertising,
sales, and marketing efforts.
MULTIMEDIA
Multimedia is, combination of text, graphic art, sound, animation, and video elements.
Alternatively multimedia can be described as woven combinations of digitally
manipulated text, photographs, graphic art, sound, animation, and video elements. When
an end user-the viewer of a multimedia project-to control what and when the elements are
delivered, it is interactive multimedia when you provide a structure of linked elements
through which the user can navigate, interactive multimedia becomes hypermedia.
Although the definition of multimedia is a simple one, making it work can be
complicated. Not only do you need to understand how to make each multimedia element
stand up and dance, but you also need to know how to use multimedia computer tools and
technologies to weave together. The people who weave multimedia into meaningful
tapestries are multimedia developers.
40
The software vehicle, the messages, and the content presented on a computer or
television screen together constitute a multimedia project. If the project will be shipped or
sold to consumers or end users, typically in a box or sleeve or on the Internet, with or
without instructions, it is a multimedia title. Your project may also be a “page” or “site”
on the World Wide Web, where you can weave the elements of multimedia into
documents with HTML (Hypertext Markup Language) or DHTML (Dynamic Hypertext
Markup Language) and play rich media files created in such programs as Macromedia’s
Flash, Adobe’s LiveMotion, or Apple’s QuickTime by installing “plug-ins” into a
browser application such as Internet Explorer or Netscape Navigator.
APPLICATIONS OF MULTIMEDIA
Multimedia in Business
Business applications for multimedia include presentations, training, marketing,
advertising, product demos, databases, categories, and networked communications. Voice
mail and video conferencing are provided on many local wide area networks (LANs and
WANs).
Multimedia at Home
From gardening to cooking to home design, remodeling, and repair to genealogy
software, multimedia has entered the home. Most of the multimedia projects will reach
the home via television sets or monitors with built-in interactive user inputs.
Multimedia in Public Places
In hotels, train stations, shopping malls, museums, and grocery stores, multimedia will
become available at stand-alone terminals or kiosks to provide information and help.
Such installations reduce demand on traditional information booths and personnel, add
value, and they can work around the clock, even in the middle of the night, with live help
is off duty.
Multimedia in Entertainment
One of the earliest applications of multimedia was for computer games. Multimedia is
being used in movie-making very extensively. With the help of multimedia, moviemakers
now have the capability of creating what they want-the imagination is the only limitation.
Utilities like Windows media player controls multimedia hardware devices and play
media sequences such as video clips, animations, and sound.
This phase establishes the project goals that are to be achieved by the end product. It
tends to outline the benefits of the multimedia developed to the end-user.
Its a summary of the project and it provides the reader a bigger picture of what is
expected in the next phases. It answers the following
The resources to be used are then identified by establishing the project plan. Lack of
planning resources can lead to lack of achievements of goal with wastage of time,
money and effort.
• Activity Schedule
42
Schedule the project tasks by breaking down the multimedia components into tasks.
Identify the critical path of the project so as to know the time for accomplishing the
project. Scheduling will also give the project milestone i.e. an identifiable point
which has been reached on the project through completion of certain activities.
Identify the hardware and software required in development of the multimedia e.g.
cameras, microphones, speakers, camera rail, animation development software e.g.
Macromedia FlashMx
• Human Resource
The identified tasks will show the expertise required. People with different
professions are often required in the multimedia process. These include:
After identification of the resources, they are associated with the different tasks
within the project. The activity schedule is therefore merged with the human resource.
Timings are usually dependent on the human resource i.e. person-days. Adjust the
person-day relationship in the most convenient way to ensure time maximization and
cut-down of costs. The cost budget should be within what is offered by the project
sponsors.
• Technical requirements
These generally translate to restrictions or constraints that will help guide in design.
This gives the versions of software and hardware to be used in the process’s design.
43
Carry out a feasibility study to identify the user or market requirements. These
include:
o Educational background
o Level of technical expertise
o Physical or mental limitations
o Language and common terminology
• Task analysis
Ensure you understand everything by putting yourself in the users’ position. Be able
to know:
o The user
o Tasks the user performs
o How are these tasks learned
o How often users perform these tasks
o The relationship between users and data
o How users communicate with one another
o The time constraints on the tasks
o What happens when things go wrong
Interface design
This is a design of how the system will interface with the user.
Functional design
Functional design describes how exactly the system will do what it is supposed to. It
includes:
• System architecture
• Data descriptions
• Unit-level code specification
• Collect assets i.e. legal and copyrights, text, sound, photographs, graphics and
video.
• Create the user interface
• Write the code
• Edit content
44
• Integrating the media pieces
• Waterfall
• Prototyping
V. Test
Testing includes the following:
o Unit-level testing, which ensures that system components i.e. sub-units work
as expected
o System-level testing, which ensures that the integrated system i.e. the whole
system works as expected
o Interface testing, which ensures that the system truly is consistent, easy to
use, and worth using
VI. Documentation
Documentation is important and it is done for different viewers and users. These include:
i. Client
o Give the statement of the problem and the solution
o Give problem solution revisions
o Final evaluation report unto how it has solved the problem.
o Future plans like extensions or upgrades.
ii. Shareholder
Documentation for stakeholders is kept at a minimum because all they have to know is
what is being done and for what purposes.
iii. User
This is the last phase and it gives a summary of the whole process by outlining:
It is important to note that some of the above phases can take place simultaneously or
through fast tracking. It all depends with planning and management of the process.
VIII. Deliver
When delivering the finished system, it is important to:
o Ensure that the correct end-users are aware of the new product
o Provide training, user manuals, or other support to make learning easier
o Gather feedback to help improve the next version and/or product
Summary
The Stages of a Multimedia Project
Most multimedia projects and Web projects must be undertaken in stages. Some stages
should be completed before other stages begin, and some stages may be skipped or
combined. Here are four basic stages in a multimedia project:
1. Planning and costing: A project always begins with an idea or a need that you
refine by outlining its messages and objectives. Identify how you will make each
message and objective work within your authoring system. Before you begin
developing, plan what writing skills, graphic art, music, video, and other
multimedia expertise will be required. Develop a creative graphic look and feel,
as a structure and navigation system that will let the viewer visit the messages and
content. Estimate the time needed to do all elements, and prepare budget. Work
up a short prototype or proof-of concept. The more time you spend getting your
arms around your project and defining its content and structure, the faster you can
later build it, and less reworking and rearranging will be required midstream.
Think it through before you start! Your creative ideas and “trys” will grow into
screens and buttons (the look and feel), and your proof-of-concept will test
whether your ideas work. You may discover that by breaking the rules, you can
create something terrific!
2. Designing and producing: Perform each of the planned tasks to create a finished
product. During this stage, there may be many feedback cycles with a client until
the client is happy.
46
3. Testing: Always test your programs to make sure that they meet the objectives of
your project, they work properly on your intended platforms, and they meet the
needs of your client or end user.
4. Delivering: Package and deliver the project to the end user.
In addition, we must also look at the hardware and software required by each
compression method.
47
processes- storage or transmission is why we need compression in the first place.
Therefore, we must evaluate the speeds of compression and decompression separately.
In most cases of storing still images, compression speed is less critical than
decompression speed- since we are compressing the image ahead of time to store it, we
can usually take our time in that process. On the other hand, decompression usually takes
place while the user is waiting for the result, and the speed is much important.
With motion video motion video in real time as it comes from a camera or VCR.
Interpolative Techniques
Interpolative compression at the pixel level consists of transmitting a subset of the pixels
and using interpolation to reconstruct the intervening pixels. The interpolation in that
48
case is simply a means for reducing the visibility of pixilation, but the output pixel count
is still equal to the subset. It can be used at the chrominance part of the image while the
luminance part is not interpolated. This is also called color subsampling, and is most
valuable with luminance-chrominance component images (YUV, YIQ etc.).
Interpolation can also be applied between frames of a motion sequence.
Reconstruction with 50% pixels taken Reconstruction with 10% pixels taken
49
Original scenery image
Predictive Techniques
Anyone who can predict the future has a tremendous advantage-that applies to video
compression as much as it applies to the stock market. In video compression, the future is
the next pixel, or the next frame.
Predictive compression techniques techniques are based on the fact that we can store the
previous item (frame, line, or pixel) and use it to help build the next item.
DPCM
The simplest form of predictive compression operates at the pixel level with a technique
called differential PCM (DPCM). In DPCM, we compare adjacent pixels and then
transmit only the difference between them. Because adjacent pixels often are similar, the
difference values have a high probability of being small and they can safely be
transmitted with fewer bits than it would take to send a whole a new pixel. For example,
if we are compressing 8-bit component pixels, and we use 4 bits for the difference value,
we can maintain the full 8-b dynamic range a long as there is never a change of more than
16 steps between adjacent pixels. In this case, the DPCM step size is equal to one
quantization step of the incoming signal.
In decompression, the difference information is used to modify the previous pixel to get
the new pixel. Normally the difference bits would represent only
50
ADPCM
The distortion from slope overload may be reduced by going to adaptive DPCM
(ADPCM). There are many ways to implement ADPCM, but one common approach is to
adapt by changing the step size represented by the difference bits.
After all the previous discussion, it shouldn’t be a surprise to say that DPCM or ADPCM
are not widely used by themselves for video compression. The artifacts of slope overload
and edge quantization become fatal as we try to achieve more than about 2:1
compression. The techniques however do find their way into more complex algorithms
that combine other more powerful techniques with some form of differential encoding.
(DPCM and ADPCM are widely used for audio compression.)
From this point of view, perceptual encoding is not essentially about discarding data, but
rather about a better representation of data.
51
Another use is for backward compatibility and graceful degradation: in color television,
encoding color via a luminance-chrominance transform domain (such as YUV) means
that black-and-white sets display the luminance, while ignoring the color information.
Statistical Coding
Another means of compression is to take advantage of the statistical distribution of the
pixel values of an image or of the statistics of the data created from one of the techniques
discussed above. The usual case for image data is that all possible values are not equally
probable-there will be some kind of no uniform distribution of the value. Another way of
saying that is: some data values will occur more frequents than the other data values. We
can set up a coding technique which codes the more frequently occurring values with
words using fewer bits, and the less frequently occurring values will be coded with longer
words. These results in a reduced number of bits in the final bitstream, and it can be a
lossless technique.
Another concept that comes into play with motion video systems is the idea of symmetry
between compression and decompression. a symmetric compression/decompression
system will use the same hardware for both compression and decompression and perform
both processes at roughly the same speed. Such a system will require hardware that is too
52
expensive for a single-user system, or else it will have to sacrifice picture quality in favor
of lower-cost hardware.
Objectives
As with the JPEG standard is intended to be generic, meaning that it will support the
needs of many applications. As such, it can be considered a motion video compression
toolkit, from which a user selects the particular features that suits his or her application.
More specific objectives are:
1. The standard will deliver acceptable video quality at compressed data rates
between 1.0 and 1.5Mbps.
2. It will support either symmetric or asymmetric compress/decompress applications
3. When compression takes it into account, random-access playback is possible to
any specified degree.
4. Similarly, when compression take4s it into account, fast-forward, fast-reverse, or
normal reverse playback modes can be made available in addition to normal
(playback).
5. Audio/video synchronization will be maintained.
6. Catastrophic behavior in the presence of data errors should be avoidable.
7. When it is required, compression-decompression delay can be controlled.
8. Editability should be available when required by the application.
53
9. There should be sufficient format flexibility to support playing o video in
Windows.
The processing requirements should not be preclude the development of low-cost
chipsets which are capable of encoding in real time.
MULTIMEDIA TOOLS
Introduction
Multimedia presentations range from simple slide shows to very sophisticated and
professional programs. Depending on the nature and complexity of the presentation, the
tools will also vary.
Bitmaps Images
Bitmap images are also known as matrix of pixels with different colors. Bitmap images
are defined by their dimensions in pixels as well as by the number of colors they
represent e.g a 640 * 480 image contains 640 pixels horizontally and 480 pixels
vertically.
Using 24-bit color, each pixel can be set to any of the 16 million colors.
To edit or modify these bitmap images you use a paint program.
Bitmap images suffer from following limitations:-
v They must be printed or displayed at a size determined by the number of pixels in
the image.
v Printing or displaying one at any other size can create unwanted patterns in the
image, thus distorting it.
v Bitmap images have very large file sizes that are determined by the image’s
dimensions in pixels and colors used. To create this problem, some graphic
formats such as GIF and JPEG store the images in compressed formats.
Vector Graphics
Vector graphics are really just a set of graphical objects such as lines, rectangles, ellipses,
arcs, or curves, called primitives that the program stores as numerical coordinates and
mathematical formulas specifying their shape and position in the image.
Draw programs, also called vector graphics programs, are a format widely used in CAD
programs to create detailed engineering and design drawings that have become popular in
multimedia 3D animation.
54
Input device
Device for entering information into a computer. Input devices include keyboards,
joysticks, mice, light pens, touch-sensitive screens, scanners, graphics tablets, speech-
recognition devices, and vision systems. A hardware device that sends information into
the CPU. Without any input devices a computer would simply be a display device and not
allow users to interact with it, much like a TV. Below is a listing of different types of
computer input devices.
Digital camera
A type of camera that stores the pictures or video it takes in electronic format instead of
to film. There are several features that make digital cameras a popular choice when
compared to film cameras. First, the feature often enjoyed the most is the LCD display on
the digital camera. This display allows users to view photos or video after the picture or
video has been taken, which means if you take a picture and don't like the results, you can
delete it; or if you do like the picture, you can easily show it to other people. Another nice
feature with digital cameras is the ability to take dozens, sometimes hundreds of different
pictures. To the right is a picture of the Casio QV-R62, a 6.0 Mega Pixel digital camera
used to help illustrate what a digital camera may look like.
Digital cameras have quickly become the camera solution for most users today as the
quality of picture they take has greatly improved and as the price has decreased. Many
users however are hesitant in buying a digital camera because of the inability of getting
their pictures developed. However, there are several solutions in getting your digital
pictures developed. For example, there are numerous Internet companies capable of
developing your pictures and send you your pictures in the mail. In addition, many of the
places that develop your standard cameras film now have the ability to develop digital
pictures if you bring them your camera, memory stick, and/or pictures on CD.
55
Joystick
A peripheral input device that looks similar to a control device you would find on an
arcade game at your local arcades. A computer joystick allows an individual to easily
navigate an object in a game such as navigating a plane in a flight simulator. The image
to the right of this text is an image of the Logitech Freedom 2.4 joystick and is an
example of what you would expect most computer joysticks to look like.
Keyboard
Keyboards, the most frequently used input devices, are used to enter instructions and data
via keys. There are many variations on the layout and labelling of keys. Extra numeric
keys may be added, as may special-purpose function keys, whose effects can be defined
by programs in the computer.
Today most users use the QWERTY style keyboards. Below is a graphic illustration of
where each of the keys are
on a U.S. QWERTY style
keyboard.
56
Microphone
Mouse
An input device that allows an individual to control a mouse pointer in a graphical user
interface (GUI). Utilizing a mouse a user has the ability to perform various functions
such as opening a program or file and does not require the user to memorize commands,
like those used in a text-based environment such as MS-DOS. To the right is a picture of
a Microsoft IntelliMouse and is an example of what a computer mouse may look like.
Optical scanner
Hardware input device that allows a user to take an image and/or text and convert it into a
digital file, allowing the computer to read and/or display the scanned object. A scanner is
commonly connected to a computer USB, Firewire, Parallel or SCSI port.
Webcam
57
A camera connected to a computer or server that allows anyone connected to the Internet
to view still pictures or motion video of a user. The majority of webcam web sites are still
pictures that are frequently refreshed every few seconds, minutes, hours, or days.
However, there are some sites and personal pages that can supply streaming video for
users with broadband. The image to the right is a picture of the Logitech QuickCam
Express and an example of what a webcam may look like. Today, most webcams are
connected to the USB or Firewire port on a computer.
Trackball
Type of input device that looks like an upside-down mouse. The onscreen pointer is
moved by the trackball with a thumb or finger. A trackball requires less arm and wrist
motion that a regular mouse takes. To the right is a picture of the Logitech Cordless
Trackman Optical and an example of a trackball mouse.
Magnetic card
Rectangular object that contains either a magnetic strip on the outside or a magnetic
object within the card that contains data. A magnetic card may contain information about
58
an individual such as available credit on a credit card, or contain information about an
employee that allows that employee into certain parts of a building.
Infra-red Remote
Infrared was discovered in the early 1800's by Sir William Hershel. He discovered upon
moving a thermometer across the spectrum of colors that the heat would increase towards
red. As he continued to move the thermometer past the red the heating continued to rise.
This area is what we call Infrared, or also known as "Below Red". The Infrared port
today or also commonly refereed to as the IRDA (Infrared Data Association) is a port
much like what you would find on your TV/VCR remote. This port allows two computers
or a computer and a device to communicate amongst each other without the use of wires.
Voice recognition
Graphics Tablet
Light pens
Light pens resemble ordinary pens and are used to indicate locations on a computer
screen. With certain computer-aided design (CAD) programs, the light pen can be used to
instruct the computer to change the shape, size, position, and colors of sections of a
screen image.
OUTPUT DEVICES
An output device is any piece of computer hardware equipment used to communicate the
results of data processing carried out by an information processing system (such as a
computer) to the outside world.
Inputs are the signals or data sent to the system, and outputs are the signals or data sent
by the system to the outside.
The most common output devices are monitors and speakers
A monitor or display (sometimes called a visual display unit) is a piece of electrical
equipment which displays images generated by devices such as computers, without
producing a permanent record. The monitor comprises the actual display device,
circuitry, and an enclosure. The display device in modern monitors is typically a thin film
transistor liquid crystal display (TFT-LCD), while older monitors use a cathode ray tube
(CRT).
PRINTERS
In addition, a few modern printers can directly interface to electronic media such as
memory sticks or memory cards, or to image capture devices such as digital cameras,
60
scanners; some printers are combined with a scanners and/or fax machines in a single
unit, and can function as photocopiers. Printers that include non-printing features are
sometimes called Multifunction Printers (MFP), Multi-Function Devices (MFD), or All-
In-One (AIO) printers. Most MFPs include printing, scanning, and copying among their
features. A Virtual printer is a piece of computer software whose user interface and API
resemble that of a printer driver, but which is not connected with a physical computer
printer.
Printers are designed for low-volume, short-turnaround print jobs; requiring virtually no
setup time to achieve a hard copy of a given document. However, printers are generally
slow devices (30 pages per minute is considered fast; and many inexpensive consumer
printers are far slower than that), and the cost per page is actually relatively high. The
printing press remains the machine of choice for high-volume, professional publishing..
The world's first computer printer was a 19th century mechanically driven apparatus
invented by Charles Babbage for his Difference Engine.
SPEAKERS
A loudspeaker, speaker, or speaker system is an electro acoustical transducer that
converts an electrical signal to sound
The part of a sound system that produces the actual sound that a person hears. The sound
is produced by the vibration of a paper or synthetic cone by an electrical voltage in a wire
coil.
PROJECTORS
• Video projector, a device that projects a video signal from computer, home theater
system etc.
• Movie projector, a device that projects moving pictures from a filmstrip
• Slide projector, a device that projects a still image with a transparent base
• Overhead projector, a device that projects a transparent image
• Opaque projector, a predecessor to the overhead projector
A video projector takes a video signal and projects the corresponding image on a
projection screen using a lens system. All video projectors use a very bright light to
project the image, and most modern ones can correct any curves, blurriness, and other
inconsistencies through manual settings. Video projectors are widely used for conference
room presentations, classroom training, home theatre and live events applications.
Projectors are widely used in many schools and other educational settings, connected to
an interactive white board to interactively teach pupils
MODEMS
Modem (from modulator-demodulator) is a device that modulates an analog carrier signal
to encode digital information, and also demodulates such a carrier signal to decode the
transmitted information. The goal is to produce a signal that can be transmitted easily and
decoded to reproduce the original digital data. Modems can be used over any means of
transmitting analog signals, from driven diodes to radio.
A cable modem is a type of modem that provides bi-directional data communication via
radio frequency channels on a cable television (CATV) infrastructure. Cable modems are
61
primarily used to deliver broadband Internet access in the form of cable Internet, taking
advantage of the high bandwidth of a cable television network. They are commonly
deployed in Australia, Europe, and North and South America. In the USA alone there
were 22.5 million cable modem users during the first quarter of 2005, up from 17.4
million in the first quarter of 2004.
ISDN
Integrated Services Digital Network is a telephone system network. Prior to the ISDN,
the phone system was viewed as a way to transport voice, with some special services
available for data. The key feature of the ISDN is that it integrates speech and data on the
same lines, adding features that were not available in the classic telephone system. There
are several kinds of access interfaces to the ISDN defined: Basic Rate Interface (BRI),
Primary Rate Interface (PRI) and Broadband-ISDN (B-ISDN).
ISDN is a circuit-switched telephone network system, that also provides access to packet
switched networks, designed to allow digital transmission of voice and data over ordinary
telephone copper wires, resulting in better voice quality than an analog phone. It offers
circuit-switched connections (for either voice or data), and packet-switched connections
(for data), in increments of 64 kbit/s. Another major market application is Internet access,
where ISDN typically provides a maximum of 128 kbit/s in both upstream and
downstream directions (which can be considered to be broadband speed, since it exceeds
the narrowband speeds of standard analog 56k telephone lines).
DSL
DSL digital subscriber line is a family of technologies that provides digital data
transmission over the wires of a local telephone network. DSL can be used at the same
time and on the same telephone line with regular telephone, as it uses high frequency
bands, while regular telephone uses low frequency
When you connect to the Internet, you might connect through a regular modem, through a
local-area network connection in your office, through a cable modem or through a digital
subscriber line (DSL) connection. DSL is a very high-speed connection that uses the
same wires as a regular telephone line.
• You can leave your Internet connection open and still use the phone line for voice
calls.
• The speed is much higher than a regular modem
• DSL doesn't necessarily require new wiring; it can use the phone line you already
have.
• The company that offers DSL will usually provide the modem as part of the
installation.
But there are disadvantages:
• A DSL connection works better when you are closer to the provider's central
office. The farther away you get from the central office, the weaker the signal
becomes.
• The connection is faster for receiving data than it is for sending data over the
Internet.
• The service is not available everywhere.
62
CABLE MODEMS
A cable modem is a type of modem that provides bi-directional data communication via
radio frequency channels on a cable television (CATV) infrastructure. Cable modems are
primarily used to deliver broadband Internet access in the form of cable Internet, taking
advantage of the high bandwidth of a cable television network.
AMPLIFIERS
Generally, an amplifier or simply amp, is any device that changes, usually increases, the
amplitude of a signal. The "signal" is usually voltage or current. It simply produces a
more powerful version of the audio signal
In popular use, the term usually refers to an electronic amplifier, often as in audio
applications to operate a loudspeaker that is being used in a PA system to make the
human voice louder or play recorded music. Amplifiers may be classified by the input
(source) they are designed to amplify (such as a guitar amplifier to perform with an
electric guitar), or named for the device they are intended to drive (such as a headphone
amplifier), or by the frequency range of the signals (Audio, IF, RF and VHF amplifiers
for example), or grouped by whether they invert the signal (inverting amplifiers and non-
inverting amplifiers), or by the types of device used in the amplification (valve or tube
amplifiers, FET amplifiers, etc.).
INTRODUCTION
Memory is defined as devices/technology used to store computer data and information
either permanently or temporarily.
Memory in this case refers to the space required on a floppy disk, hard disk or CD-rom
not the RAM.
To estimate the memory requirements of multimedia projects one must have a sense of
the projects content and scope. Features of multimedia: color, text, sound bites, video
clips and programming code used require large amounts of disk space and memory for
storage, the more the elements the more the memory required.
When making multimedia one has to allocate memory for storing and archiving working
files used during production, original audio and video clips, edited pieces and final
mixed pieces, production paperwork and correspondence and backup of the project and a
second backup in a different location.
It should also be noted that hardware requirements for production are more demanding
than those of consumption, sound, video and images need large storage space than the
finished product.
Ample storage for production of multimedia can be provided by large capacity hard
disks. Manufacturers are regularly increasing the size of hard disks or have several used
together to increase performance.
Speed of data transfer to and from large disk is a serious limiting factor especially for
digital video where transfer rates.
However there are interfaces developed that support higher rates e.g. FireWire 400and
FireWire 800 that offer speeds of upto 400MB and 800MB respectively. When a high
capacity disk is connected to FireWire to a dedicated computer it provides adequate
performance for multimedia production but if it is to share data between workstations
using a central server and a LAN, higher performance is required.
Hard disks contain much more than floppy disks and operate at greater data transfer rates.
Floppy disk is made of flexible mylar plastic coated in a layer of special magnetic
sensitive material. While a hard disk is a stack of hard metal platters with magnetically
sensitive material, with series of recording heads or sensors that however a hairbreadth
above the fast-spining surface, magnetizing spots along formatted tracks using
technology similar to that of floppies, audio and video tape recording.
Hard disks are the most common mass-storage device used on computers and with
change in technology makers of hard disks are challenged to build smaller profile, larger-
capacity, faster and less-expensive hard disks, while floppy disks are no longer “mass
storage devices and will soon be obsolete.
FLASH OR THUMBDRIVES
These technologies are about the size of a thin cigarette lighter and can be integrated with
USB of FireWire interfaces to store about 8MB to several GB of data.
Advantages
• Available in a variety of colors
• More reliable than disk drives because they have fewer movable parts
• Are extremely portable
• It is trendy
• Convenient to use.
Make up of flash drives: consist of a small printed circuit mother board encased in sturdy
metal or plastic casing with USB connector covered with a cap.
66
CD-ROM players have typically been very slow and transmit data but developments have
led to increased speed. Where we have 24X, 48x and 56x (spin rate) drives designed for
computer use.
24X spin rates imply that the CD spins 24 times faster than the original CD standard.
CD Recorders
With a compact disc recorder, one can make their own CD using special CD-Recordable
blank optical discs to create a CD in most formats of CD-ROM and CD- Audio.
CD-R discs are made from differently than normal CDs but can play in any CD-Audio or
CD-ROM player. They are write-once, enhanced CDs that make excellent high-capacity
file archives and are used extensively by multimedia developers for pre-mastering and
testing CD-ROM projects and titles.
They are inexpensive and used for short-run distribution of finished multimedia projects.
CD-RW
A CD-RW recorder can write 700MB of data to a CD-RW disc about 1000times.
CD-RW capabilities
• Able to totally erase a disc
CD-RW act similar to CD-Rs and are subject to same restrictions.
Writing sessions must be closed before they can read a CD-ROM drive or players and
though they can be extended, in most cases they cannot be overwritten. To use CD-RW,
you must first blank it.
TEXT IN MULTIMEDIA.
Definition of multimedia
Multimedia is any combination of text, art, sound and animation delivered by computer
or other electronic or digitally manipulated means.
Multimedia is the field concern with the computer-controlled integration of text,
graphics, still and moving images, animation and sound can be represented, stored,
transmitted and processed digitally.
Text
Text is the most widely used and flexible means of presenting information on screen and
conveying ideas.
Imagine designing a project that used no text at all. Its contents could not be at all
complex, and you will need to use many pictures and symbols to training your audience
how to navigate through project. Voice and sound could guide the audience, but users
would quickly tire of this. Greater efforts are required to pay attention to spoken words
than to browse text with the eye.
Text has been historically the major form of interaction between computers and
humans. It is also, together with recorded broadcasts and movies, the prime form of
asynchronous communication (communication deferred in time) between humans
(through books, newspapers, letters and more recently through electronic mail)
In multimedia, text is used for titles and headlines, for menus, for navigation and for
content.
67
If your messages are part of an interactive project or web site where you know the user
is seeking information, you can pack a great deal of text information onto the screen .
Seekers want dense material and while they travel along your navigational path-ways,
they will scroll through relevant text and study the details. Too little text on a screen
requires annoying page turns and unnecessary mouse clicks and waits; too much text can
make the screen seem overcrowded and unpleasant.
If you are creating presentation slides for public-speaking support, the text will be
keyed to a live presentation where the text accents the main message. In this case, use
bulleted points in large fonts and few words with lots of space.
68
In multimedia, buttons are the objects, such as blocks of text or photographs that make
things happen when they are clicked. They were invented for the purpose of pushed with
cursor, mouse, key and finger and to manifest properties such as highlighting or other
visual or sound effects to indicate that you hit the target. On the web, text and graphic art
may be buttons.
The automatic button-making tools supplied with multimedia and HTML page authoring
systems are useful, but in creating the text for you they offer little opportunity to change
the look of the text.
HTML DOCUMENTS
The standard document format used for pages on the web is called Hypertext Markup
Language (HTML).in an HTML document; you can specify typefaces, sizes, colors and
other properties by “marking up” the text in the document with tags. for example if you
want bold, <b>.
The neat paragraphs, indented lists and formats for text documents for which HTML
was originally intended are evolving into multimedia documents, not text documents. As
features and tags and plug-ins and special scripts ate tacked onto or embedded into
HTML to satisfy the demand for multimedia interfaces, at some point HTML will need to
be redesigned as a multimedia delivery tool, not just a text display tool with assorted
attachments.
ANIMATING TEXT
There are plenty ways to retain a viewer’s attention when displaying text. For example,
you can animate bulleted text and have it look nice on the screen. For speakers,
highlighting the important text works with as a pointing device. When there are several
points to be made, you can arrange keywords and flash them past the viewer in a timed
automated sequence.
69
Although text is an excellent device for delivering information, text can often be too slow
at getting the message across. If you only have 3 seconds to grab someone's attention as
they walk past your display, text is not going to get the job done.
TYPES OF TEXT
There are three types of text that are used to produce pages of documents:-
(a) Unformatted text
(b) Formatted text
(c) Hypertext
FORMATTED TEXT
Formatted text, also referred as rich text, enables pages and complete documents to be
created which comprise of strings of characters of different styles, size and shape with
tables, graphics and images inserted at appropriate points.
An example of formatted text is that produced by most processing packages. It’s also
used extensively in the publishing sector for the preparation of papers, books, magazines
and journals. It enables documents to be created that consist of characters of different
styles and of variable size and shape, each of which can be plain, bold or italicized.
A variety of documents formatting options are supported to enable an author to structure
a document into chapters, sections and paragraphs each with tables, graphics and pictures
inserted at appropriate points. To achieve each of these features, the author of the
document enters a specific command which, typically result in a defined format-control
character sequence- normally a reserved format- control character- being inserted at the
beginning of the particular character string, table, graphic or picture.
70
UNFORMATTED TEXT
This is also known as plaintext and it enables pages to be created which comprise strings
of fixed-sized characters from a limited character set. The appearance of text may be the
same as its appearance on printed pages.
The size of the characters is fixed and only one form and style is available.
HYPERTEXT
Hypertext is a type of formatted text that enables a related set of documents- normally
referred to as pages- to be created which have defined linkage points- referred to as
hyperlinks between each other. For example, most universities describe their structure
and courses and support services they offer, in booklet known as prospectus. Like most
such booklets, this is organized in hierarchical way and in order for a reader to find out
information about a particular course; the user would start at the index and use this to
access details about the university. In a similar way, hypertext can be used to create an
electronic version of such document. It enables a person
to browse through its contents in a user-friendly way.
71