9,066 1,447 121MB
English Pages [638] Year 2017
Table of contents :
2020_06_05_21_22_48
2020_06_05_21_36_38
NEW PERSPECTIVES
PARSONS ■■=i-
Computer Concepts 2018
J
;l:ntroductor^ }
mu
MINDTAP t%
From Cengage
Fit your coursework into your hectic life. Make the most of your time by learning
your way. Access the resources you need to succeed wherever, whenever. Study with digital flashcards, listen to audio textbooks, and take quizzes.
Review your current course grade and compare your progress with your peers. Get the free MindTap Mobile App and learn wherever you are.
Break Limitations. Create your
own potential, and be unstoppable with MindTap.
]Bi ray cengagexom/mindtap
Computer Concepts t-
2018
/;^CENGAGE Australia • Brazil ■ Mexico• Singapore • United Kingdom • United States
/>CENGAGE New Perspectives on Computer Concepts, 2018, Introductory JuneJamrich Parsons SVP, GM Science, Technology & Math: BalraJ S. Kaisi Senior Product Dlreaor: Kathleen McMahon
Product Manager: Amanda Lyons-Li
® 2018 Cengage Learning ALL RIGHTS RESERVED. No part Of this work covered by the copyright herein may be reproduced or distributed in any form or by any means, except as permitted by U.S. copyright law, without the prior written permission of the copyright owner. Some of the product names and company names used In this book have been used for Identification purposes only and may be trademarks or registered trademarks of their respective manufacturers and sellers.
Senior Director, Development:Julia Caballero Senior Content Development Manager: Leigh Hefferon Associate Content Developer; Abigail Pufpaff Senior Development Editor; Kate Russlllo Product Assistant; Cara Suriyamongkol Marketing Director Michele McTighe Marketing Manager: Stephanie Albracht Marketing Coordinator: Cassie Cioutier
Microsoft and the Office logo are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Cengage Learning is an independent entity from the Microsoft Corporation, and not affiliated with Microsoft in any manner. All screenshots are courtesy of Microsoft unless otherwise noted. All images are courtesy of MediaTechnics Corp. unless otherwise noted. Disclaimer: Any fictional data related to persons or companies or URLs used throughout this book is Intended for Instructional purposes only. At the
time this book was printed, any such data was fiCTlonal and not belonging to any real persons or companies.
Senior Content Project Manager:
Stacey Lamodi Cover Designer; Diana Graham
For product Information and technology assistance, contact us at Cengage Learning Customer & Sales Support,1-800-354-9706.
Compositor: Tensi Parsons, MediaTechnics Corp.
For permission to use material from this text or product, submit all
Cover image(s): wklOOSmike/Shutterstock.com
requests online at www.cengage.com/permlssions. Further permissions questions can be emailed to permissionrequest9cengage.com.
Notice to the Reader
Publisher does not warrant or guarantee any of the products described herein or perform any Indepen dent analysis in conneaion with any of the produa
Library of Congress Control Number: 2017934814
Information contained herein. Publisher does not
assume, and expressly disclaims, any obligation
Student Edition: ISBN: 978-1-305-95151-8
to obtain and Include Information other than that
Loose-leaf Edition: ISBN; 978-1-337-38854-2
provided to it by the manufacturer. The reader Is expressly warned to consider and adopt all safety precautions that might be indicated by the activities described herein and to avoid all potential hazards. By following the instructions contained herein, the readerwillingly assumes all risks in connection with such instructions. The publisher makes no repre sentations or warranties of any kind, including but not limited to the warranties of fitness for particular purpose or merchantability, nor are any such repre sentations implied with respect to the material set forth herein, and the publisher takes no responsibil
Cengage Learning 20 Channel Street
Boston, MA 02210 USA
Cengage Learning is a leading provider of customized learning solutions with employees residing in nearly 40 different countries and sales in more than 125 countries around the world. Find your local representative at;
ity with respect to such material. The publisher shall
www.cengage.com.
not be liable for any special, consequential,or exem plary damages resulting, in whole or part,from the readers'use of, or reliance upon,this material.
Cengage Learning products are represented in Canada by Nelson Education, Ltd.
For your course and learning solutions, visit www.cengage.com. Purchase any of our products at your local college store or at our preferred online store www.cengagebrain.com.
Printed in the United States of America
Print Number: 01
Print Year: 2017
J
ill
vill
X
TABLE OF CONTENTS
PREFACE
STUDENT RESOURCES
2
The Digital Revolution
4
Data Processing
6
Personal Computing
8
Network Computing
10
xlv
2
INSTRUCTOR RESOURCES
INTRODUCTION
16
MODULE 1: DIGITAL CONTENT
82
MODULE 2: DIGITAL DEVICES
158
MODULE 3; NETWORKS
240
MODULE 4: THE WEB
310
MODULE 5: SOCIAL MEDIA
376
MODULE 6: SOFTWARE
452
MODULE 7: DIGITAL SECURITY
520
MODULE PY: CODING WITH PYTHON
584
GLOSSARY
602
INDEX
616
ANSWERS
INTRODUCTIQN
3
Cloud Computing
13
Ubiquitous Computing
15
QUICKQUIZ
16
DIGITAL CONTENT
82
DIGITAL DEVICES
18
SECTION A: DIGITAL BASICS
84
SECTION A: DEVICE BASICS
19
Data Representation Basics
85
Computers
21
Representing Numbers
87
Circuits and Chips
22
RepresenlingTexl
89
Components
25
Bits and Bytes
91
Maintenance
26
Compressiort
94
29
SECTION B; DIGITAL SOUND
30
Digital Audio Basics
SECTION B: DEVICE OPTIONS
95
Enterprise Computers
96
Personal Computers
32
Digital Audio File Formats
98
Niche Devices
34
MIDI
99
Choosing a Digital Device
36
Digitized Speech
104
SECTIONC:PROCESSORSANDMEMORY
105
Microprocessors
39
Bitmap Basics
107
How Processors Work
42
Bitmap Data Representation
110
Performance
44
Image Compression
113
Random Access Memory
38
SECTION C: BITMAP GRAPHICS
46
Modifying Bitmap Images
114
48
Panoramic and 360 Images
116
49
Stereoscopy
117
Read-only Memory SECTION D; STORAGE
Storage Basics
119
Magnetic StorageTechnology
52
Vector Graphics Basics
121
Optical StorageTechnology
55
Vector Tools
122
Solid State StorageTechnology
56
3D Graphics
123
Cloud Storage
58
Vectors andVirtual Reality
125
Backup
51
60
SECTION D:VECTOR GRAPHICS
SECTION E: DIGITALVIDEO
129
SECTION E: INPUT AND OUTPUT
61
Digital Video Basics
130
Add-on Gadgets
65
Video Compression
131
Expansion Ports
66
Video File Formats
134
Bluetooth
68
DigitalVideo Variations
135
Device Drivers
70
ISSUE:WHATISFAIRUSE7
136
Display Devices
72
INFORMATION TOOLS;PHOTO FORENSICS
140
Printers
74
TECHNOLOGY IN CONTEXT: FILM
142
Things
76
MODULE ACTIVITIES
144
AutonomousVehicies
81
LAB:THE DIGITALWORLDWITH EYES SHUT
146
ISSUE: WHERE DOES ALLTHE EWASTEGO?
148
INFORMATIONTOOLS: FINDINGTHE RIGHT STUFF
150
TECHNOLOGY IN CONTEXT: MILITARY
152
MODULE ACTIVITIES
157
LAB: WHAT'S GOING ON INTHERE7
158
NETWORKS
240
THE WEB
160
SECTION A: NETWORK BASICS
242
161
Communication Systems
243
Web Overview
162
Communication Channels
244
Evolution
166
Network Topology
246
Web Sites
168
Network Nodes
247
Hypertext Links
170
Communication Protocols
249
URLs
172
SECTION B;THE INTERNET
264
SECTION A:WEB BASICS
SECTION B: BROWSERS
173
Background
255
Browser Basics
175
internet Infrastructure
258
Customization
176
Packets
262
Browser Cache
179
Internet Addresses
266
SECTION C: HTML
182
Domain Names
267
HTML Basics
269
HTML EditingTools
186
SECTION C:INTERNET ACCESS
187
Connection Basics
272
CSS
192
Cable Internet Service
274
Dynamic Web Pages
193
Telephone Network Internet Service
276
Site Creation
195
Satellite Internet Service
278
SECTION D: HTTP
196
Mobile Broadband Service
279
HTTP Basics
198
Wi-Fi Hotspots
281
Cookies
200
SECTION D: LOCAL AREA NETWORKS
284
HTTPS
201
LAN Basics
286
203
Ethernet
287
Search Engine Basics
205
Wi-Fi
292
Formulating Searches
207
Set UpYour Own Network
295
Search Privacy
211
Network Monitoring
296
Using Web-based Source Material
212
lot Networks
298
ISSUE: WHO ISTRACKINGYOU?
214
300
INFORMATIONTOOLS: CITATIONS
215
File Sharing Basics
302
TECHNOLOGY IN CONTEXT: FASHION
216
Accessing LAN Files
304
MODULE ACTIVITIES
219
Sharing Your Files
309
LAB: DESIGNYOUR HOME PAGE
222
Internet-based Sharing
224
SECTION E; FILE SHARING
SECTION E: SEARCH ENGINES
Torrents
226
ISSUE; WHO WILL CONTROL THE INTERNET?
228
INFORMATIONTOOLS: FACT CHECKING
230
TECHNOLOGY IN CONTEXT: EDUCATION
232
MODULE ACTIVITIES
237
UB; HACKYOUR NET
310
SOCIAL MEDIA
376
SOFTWARE
312
SECTION A:SOCIAL NETWORKING
378
SECTION A:SOFTWARE BASICS
313
The Social Media Mix
379
Essentials
316
Social Networking Evolution
382
Distribution
317
Social Networking Basics
384
Software Licenses
319
Geosocial Networking
389
Fake and Pirated Software
321
Social Network Analytics
390
SECTION 8;OPERATING SYSTEMS
391
Operating System Basics
325
Evolution
395
Microsoft Windows
327
Media Content Communities
398
macOS
329
Intellectual Property
400
iOS
Creative Commons
401
Android
402
Chrome OS
403
Linux
324
331
334
335
SECTION B: CONTENT COMMUNITIES
SECTION C:8L0GSAND MORE
Blogs
338
Microblogs
404
340
Wikis
405
344
SECTION 0:ONLINE COMMUNICATION
Virtual Machines
SECTION C:APPS AND APPLICATIONS
406
WebApps Mobile Apps
345
Communication Matrix
408
346
Email
409
Local Applicatiorts
351
Online Chat
413
Uninstalling Software
Voice andVideo over IP
414
352
354
355
SECTION E;SOCIAL MEDIA VALUES
Identity
SECTION D: PRODUCTIVITY SOnWARE
415
Office Suite Basics
416
Word Processing
357
Reputation
419
Spreadsheets
360
Privacy
423
Databases Presentations
364
ISSUE: WHEN DO ONLINE AVATARS DIE?
425
366
INFORMATION TOOLS: MEDIA ATTRIBUTION
426
368
TECHNOLOGY IN CONTEXT: JOURNALISM
427
File Basics
370
MODULE ACTIVITIES
430
File Management Tools
375
LAB: MY SOCIAL NETWORK
435
Application-based File Management
436
Physical File Storage
SECTION E: FILE MANAGEMENT UTILITIES
438
ISSUE: HOW SERIOUS IS SOFTWARE PIRACY?
440
INFORMATION TOOLS: DOCUMENTATION LITERACY
442
TECHNOLOGY IN CONTEXT: ARCHITECTURE AND CONSTRUCTION
444
MODULE ACTIVITIES
449
LAB: PUTYOUR FILE DUCKS IN A ROW
452 454
DIGITAL SECURITY
520 CODING WITH PYTHON
SECTION A: BASIC SECURITY
522
SECTIONA: "HELLOWORLD!"-PYTHON STYLE
455
Encryption
523 Coding Basics
456
Authentication
523 Introduction to Python
460
Passwords
524 Let's Start Coding
464
Password Managers
527 WorkingWith Strings
466
SECTION B: MALWARE
528
Using Python Keywords
467
MalwareThreats
529 Debugging
468
Computer Viruses
531
SECTION B:THEWACKVWORD GAME
470
ComputerWorms
532
Using Variables
471
Trojans
536
Objects and Classes
472
Antlvirus Software
538
Input
478
SECTION C: ONUNE INTRUSIONS
539 Wacky Word Game
479
IntruslonThreats
540 SharingYour Programs
483
Zero-day Attacks
541
SECTION C: BUILD YOUR OWN CALCULATOR
484
Netstat
542
Calculations
546
Selection Structures
485 488
489
Firewalls SECTION D: INTERCEPTION
Interception Basics
548 Comparison and Logical Operators 550 Comparing Strings
490
EvilTwins
552 SECTION DtASKTHE FORTUNETELLER
491
Address Spoofing
553 Repetition Control Structures
492
Digital Certificate Hacks
559
Lists
IMS! Catchers
563
SECTION E: DOGS AND CATS
564
Functions
569
Methods
494 496
SECTION E: SOCIAL ENGINEERING
497
Social Engineering Basics
499
Spam
575
MODULE ACTIVITIES
503
Phishing
579
LAB:ADVENTURE GAME
504
Pharming
506
Rogue Antivirus
507
PUAs
584 GLOSSARY
508
ISSUE: HOW SECURE IS DEMOCRACY?
602 INDEX 616
510
INFORMATIONTOOLS; YOUR OWN WORDS
512
TECHNOLOGY IN CONTEXT: LAW ENFORCEMENT
514
MODULEACTIVITIES
519
LAB: CHROME LOCKOOWN
ANSWERS
VI I I
NP2018
New Perspectives on Computer Concepts 2018 Preface
L O M0I V I T T
COLLEGE GRADUATES OF THE 21ST CENTURY
Computer Concepts 20i8
are expected to have a broad base of knowledge to intelligently address social, political, economic, and legal issues associated with rapidly evolving digital technology.
Today's students have a patchwork of knowledge, acquired from using various digital devices. New Perspectives on Computer Concepts (NP2018) helps students build a cohesive framework that organizes this acquired knowl edge and serves as a foundation for assimilating new
concepts essential to careers and lifestyles in our digital world.
FULLY REVISED. NP2018 has been newly revised and updated to increase learning effec tiveness and to reflect the wide scope of digital devices in use today, with an enhanced focus on the connectivity that pervades modern life and the security necessary to protect it.
TARGETED LEARNING SUPPORT. This award-winning textbook contains layers of targeted learning support for active learning that keeps students engaged and helps them succeed. Using the mindtap digital platform, students benefit from interactive feedback and new col laborative opportunities.
READING IN THE DISCIPLINE. Short paragraphs and a clear narrative style help students grasp concepts and learn how to read technical material.
RETENTION. What's the most effective study technique: Taking notes? Reviewing? According to researchers, students study most effectively by simply trying to recall the material they've read, seen, or heard. That's why NP2018 offers continuous assessment, Embedded QuickChecks on just about every page help students recall key concepts while reading and later while reviewing. QuickQuizzes and end-of-module reinforcement promote successful learning outcomes.
HANDS-ON. NP2018 contains plenty of practical information about how to use apps, manage files, create content, configure security software, and more. Try Itl activities throughout the book show students how to immediately apply concepts in real-world contexts.
FLIPPED CLASSROOMS. Flipping a course is easy with NP2018, which includes flipped class projects for critical thinking, cyberclassroom exploration, collaborative group work, multimedia integration, career building, and globalization. End-of-module features, such as Issues and Information Tools, offer additional topics for hands-on in-class activities.
PREFACE
IX
EXTENDED INTRO MODULE.The Introduction module puts technology into context with in-depth coverage of the multi-phased digital revolution. For NP2018. this introduction has been expanded to include virtual reality, augmented reality, and autonomous vehicles.
A FRESH APPROACH TO SOCIAL MEDIA.Sure, students use social media, but are they familiar with underlying concepts, such as the social media honeycomb, geolocation,and sociocrams? Are they up to speed with Creative Commons and intellectual properly concepts? Do they recognize fake news? And do they understand the relevance of online identity, PRIVACY, AND REPUTATION MANAGEMENT? Module 5 o^ers 3 fresh approach to social media that delves into concepts while also providing practical how-to tips.
NEW IMAGING TECHNOLOGIES. in an increasingly visual world, graphical imaging is becoming ever more sophisticated. Module 1 is packed with new information about 360-degree video, stereoscopic graphics, and spherical imaging popularized by copro cameras, youtube 360, POKEMON GO, AND GOOGLE CARDBOARD.
NEW SECURITY ISSUE, tvlodule 7 contains a new Issue, how secure is democracy?, that explores the challenges required to secure voting machines, voter registration data, cam paign Web sites, campaign email messages, fund-raising bank accounts, lists of campaign workers, and donor databases.
THE LATEST TECHNOLOGY. Digital technology evolves at a fast pace. NP2018 keeps stu dents up to bate with raspberry pi, 3D printers, smart appliances, lightning ports, USB-C, accelerometers, gyro sensors, magnetometers, macOS, windows io, virtual reality headsets, Microsoft Edge, hypervisors, two-factor authentication, Locky ransomware, and more!
HANDS-ON PROGRAMMING MODULE.Programming with Python provides highly inter active programming activities that introduce students to the world of programming without requiring any prior experience. Python is an easy-to-learn language that supports proce dural and object-oriented programs.
INFOGRAPHIC ILLUSTRATIONS. Illustrations based on popular infographic visuals are carefully integrated into the learning path to provide visual scaffolding that is so important to understanding technical concepts. INFOGRAPHIC-STYLE ILLUSTRATIONS
I tm
Back up hard
Back up hard disk
Back up handheld
Back up hand-
Back up cloud
disk to cloud
to external drive
to hard disk
held to cloud
to hard disk
jn
7
NP2018
Student Resources: The Book
WHETHER YOU USE THE PRINTED BOOK OR DIGITAL VERSIONS, NP201S GIVES YOU THE STRAIGHT STORY ON TODAY'S TECHNOLOGY.
EASY TO READ. Each module is divided into five sections, beginning with a CONCEPT MAP that provides a visual overview of topics, faqs answer commonly asked questions about technology and help you follow the flow of the presentation.
KEEPS YOU ON TRACK. As you read each page, watch for quickchecks. They'll help you gauge if you comprehend key concepts. And take some time to complete the try iti activities. They bring concepts to the real world and help you hone your digital skills, quickquizzes at the end of each section provide a chance to find out if you remember the most important concepts, end-of-module REVIEW activities such as Key Terms, Interactive Situation Questions, and Interactive Summary Questions are great for test prep.
HELPS YOU EXPLORE. The ISSUE section in each module highlights contro versial aspects of technology. In the technology in context section, you'll discover how technology plays a role in careers such as film-making, architecture, banking, and fashion design. The information tools section helps you sharpen your digital research techniques. Check out the labs at the end of each module for
some step-by-step exploration Into your digital devices.
FAQs break down concepts Into manageable chunks of Information.
I h It wfe lo >llov* my brcwwr (o Ltor« pMiwonlt' Wile evil be VygaaTT*. ■erdsWedniRenerflWleflnieirbaldmr nsnctittneygu IDQ ft le a •*, iQU imnci w locitr wnapvwio s8iM pBWwa ^ cwcilw >n»ie Pb riT»a»
ia What about the Web? When historians look back on the digitai revolution, they are certain to identify the Web as a major transformative infiuence. The Web (short for World Wide Web) is a coliection of iinked documents, graphics, and audio that can be accessed over the internet. A key aspect of the Web is that it adds content and substance to the intemet.
Without the Web, the internet wouid be iike a iibrary without any books or a raiiroad without any trains. Online storefronts, auction sites, news, sports,
travei reservations, and music downioads made the Web a compeiiing digi tai technoiogy for just about everyone.
► So what was computing like during this phase? From 1995 to 2010, computing was characterized by the increasing use of laptops (Figure 8} and the foiiowing elements:
QUICKCHECK The Web and the Internet are
not the same. Why? a. The Internet is a
communication network, but the Web consists of content
that is distributed by the internet.
b. The internet consists of sites
such as Twitter and Facebook, whereas the Web links devices such as iPods and
Sophisticated software. The network computing phase may have been the peak for productivity software. Computer owners amassed large collec tions of software, purchased in boxes containing multiple distribution CDs. Software such as Microsoft Office, Norton's Internet Security suite, and Corel Digitai Studio required local installation and provided more features than most people had any desire to use. This trend reverses during the next phase of the digital revolution, when applications become simpler and more focused on specific tasks.
computers.
Stationary Internet access. Even as laptop computers began to dis place desktop models, connecting to the internet required a cable that effectively tethered computers to a nearby phone jack or cable outlet, in the next phase of the digitai revolution, internet access breaks free from cables and goes mobile. Online communication. Email was the first widespread technology used to communicate over the internet. Online services such as CompuServe and AOL pioneered chat rooms, which were primitive versions of Google Hangouts. Early forums and message boards were similar to Facebook
timelines. A technology called Voice over IP allowed participants to bypass the telephone company to make phone calls over the internet. That technoi ogy eventually developed into Skype and similar video chat services. Muitiplayer games. Sophisticated computer games reached a peak dur ing the network phase of the digitai revolution. Audio and visual hardware components improved to support video-realistic game environments, arti ficial intelligence opponents, and multiple players logging in remotely and chatting with other players over headsets, in the next phase, mobile devices become popular gaming platforms, but hardware limitations restrict the feature set.
Music downloads. During the network computing phase, an online
business called Napster pioneered the concept of sharing and down loading music. Subscribers exchanged millions of music files, which they played through the speakers of their computers. The music was protected by copyright, however, making sharing and distribution illegal. This type of file sharing activity and rampant software piracy became one of the defining problems associated with the network phase of the digitai revolution. ITunes and other services for legally downloading music soon appeared, along with dedicated playback devices, such as the IPod. Video distribution over the internet lagged behind until con nection speeds increased in the next phase of the digitai revolution.
FIGURE 8: LAPTOPS
Laptop computers were the
primary devices for accessing
the Internet prior to 2010. User interfaces evolved to
include color, graphics, and mice.
10
INTRODUCTION
CLOUD COMPUTING Around 2010, the Information Age eased into a new phase called cloud computing, which provided access to information, applications, communi cations, and storage over the Internet.
t What did cloud computing change? Before cloud computing, most computers ran software based locally. For example, to use a word processor, you might fire up the latest edition of Microsoft Word, which you'd installed on your computer's hard disk. Prior to the cloud, you stored data locally, too. Email, documents, photos, and music all resided on your computer's hard disk or flash drive. With cloud computing, all that changed. In the cloud, you can use your browser to access word processing applications that run from the Internet instead of software that you have installed on your local hard disk. You can use online applications to manage your email, create floor plans, produce presentations, and carry out a host of other activities. You can store your data in the cloud, too, making it available on any of your digital devices that connect to the Internet.
The cloud gets its name from diagrams like the one in Figure 9, which shows Internet-based applications, storage, and other services outlined by a cloud-like shape designed to help you visualize the idea that cloud ser vices are "out there" somewhere on the Internet. FIGURE 9:THE CLOUD HOSTS APPLICATIONS,CONTENT, AND SERVICES
Data F las
Webmaii Ecommerce Movim Social Media Mufiic
Information
I Wait, this sounds familiar! If cloud computing sounds a bit like cen tralized computing, you're paying attention. The concept of applications and data residing somewhere other than on a local device is common to both centralized and cloud computing. The cloud concept reawakens the idea of monolithic computing facilities, as opposed to distributed architectures of the network era. The fact that your cloud-based data is not stored on devices under your direct control is a potential privacy and security con cern, which is a topic for later modules.
QUICKCHECK Which characteristic of cloud
computing most sets it apart from network computing? a. Internet access
b. Sophisticated software c. The migration of applications and data off of local devices
d. File sharing
11
THE DIGITAL REVOLUTION
I Are smartphones the signature device of the cloud comput ing era? The cloud itself is populated by commercial-grade high-speed computers and high-capacity storage devices. The consumer side is dominated by smartphones (Figure 10)and their dose cousins, tablet com puters. These handheld devices—a product of convergence—were the driving force for many cloud innovations.
FIGURE 10: SMARTPHONES
Cloud computing caters to smartphones and other mobile devices that are a product of convergence. They access and share data from the cloud
using apps.
^ What is convergence? The expansion of cloud computing Is due in part to convergence, a process by which several technologies with distinct functionalities evolve to form a single product. Convergence was important to the digital revolution because it created sophisticated mobile devices whose owners demanded access to the same services available from a full-
size desktop computer. Those services became available in the cloud.
Your computer plays movies. Your ceil phone has a camera. Your dock has a radio. Your watch functions as a communications device. You can store
data on your iPod Touch. Ail these are examples of technological conver gence.
Convergence worked its magic on ceil phones, computers, portable media players, televisions, digital cameras, GPSs, watches, and ebook readers. Now you get features from ail of them by purchasing a single digital device, such as a smartphone or tablet computer (Figure 11).
6) Q fa
FIGURE 11: SMARTPHONES ARE A PRIME EXAMPLE OF CONVERGENCE
Phone
Television
CO G.tmc console
Record player
Dictaphone
QUICKCHECK Camera
Clock
Fitness tracker
^ Why do these devices need the cloud? Smartphones are porta
Which of the following instigated the move to cloud computing?
ble. Compared to desktop and laptop computers, smartphones have small screens, lack a proper keyboard, and have limited space for storing apps and data. The cloud offers a convenient place to store data and applications.
a. Social media
Think of the cloud as a repository for streaming videos, music, photos, and
c. Touchscreens
apps. With that concept in mind, you will begin to understand the cloud's importance to today's consumers.
d. Music downloads
b. Mobile devices
INTRODUCTION
12
I Did the cloud kill the Web? A 2010 Wired magazine cover announced "The Web Is Dead." That pronouncement was premature. The cloud consumed the Web but did not kill it. As a legacy technology from the networking era, the Web continues to be a global marketplace where Amazon, Alibaba, and other retailers sell directly to consumers. That said, Facebook, Twitter, and Google Apps sent the Web in new direc tions. Once a collection of storefronts run exclusively by businesses and
corporations, the Web expanded into a global hub where content was cre ated by individuals, shared on social media sites, and uploaded to content sharing platforms. This grassroots Web of user-created content is some
TRY III In 20H,the United Nations declared that the Internet "is an
indispensable tool for realizing a range of human rights...." Visit the Internet World Stats site to
find out what percentage of the world's population has Internet access.
times referred to as Web 2.0.
i What role do social media play in the cloud era? Facebook. Twitter, and other social media turned the worry of social isolation on its
head; instead of computers decreasing human interaction, social media
encourage interpersonal communications and relationships. Social media are digitally mediated applications designed for communication, social inter action, and consumer-generated content.
Many factors influenced the popularity of these sites, but one important factor is their ease of use. Initially offered as Web sites, there was no soft ware to install and no updates to worry about. Getting started was as simple
as registering your name and creating a password. Now, access to social media is also available from mobile apps, which can be installed on a smartphone or tablet with a single touch. The connections that social media offer come at a price, and that price is
not just monetary. Today's digital citizens surrender a substantial amount of privacy, exposing information that can be used by predators. Privacy, or the lack of it, may be the defining challenge of cloud computing. Another challenge is the growing pervasive ness of advertising. Where social media was once a platform for exchanging infor mation between friends and colleagues,
FIGURE 12: THE UBER APP
.•vVifuon ITI
lltlDAH
UQER
intrusive advertising is now found on virtu ally every Web page, Facebook timeline,
JOSV/H.I'fjSSf
and Twitter stream.
I Cloud-enabled apps? A key char acteristic of the cloud computing era is globe-spanning sharing services. Cloudbased services such as Uber, Airbnb, and
Etsy are part of the sharing economy in which consumers offer goods and services to other consumers through a shared digital
0
c»
■ A..- ■
(,0. SET PICKUP LOCATION (7) C4'hecr»:cJ'.'
platform.
These sharing services use the cloud to communicate and process data. The apps
used by consumers may look simple {Figure 12), but behind the scenes an amazing amount of computer power handies the necessary data and logistics.
TO glc O KHCOUUAftiK
13
THE DIGITAL REVOLUTION
UBIQUITOUS COMPUTING As 2020 nears. a new phase of the digital revolution is taking shape. Ubiquitous computing is characterized by a focus on manipulating realworld objects instead of data. Earlier computing technologies used data to represent things in the real world. Photos represented people, fvlaps showed the location of places. Videos gave us a glimpse of events. Screenbased fantasy worlds and characters entertained us. But all of this was
conjured from data. None of it was tangible reality.
Virtual reality, augmented reality, the Internet of Things, and automated vehicles are shaping a new digital era in which technologies bring comput ing beyond the screen and into the world of tangible objects.
Terminology Ubiguicous computing is sometimes referred to as
pervasive computing. The
idea Is not new. In the 1990s, Mark Welser predicted that computers will "weave themselves into the fabric of
everyday life until they are indistinguishable from it."
► What is virtual reality? In the SfarTre/cseries, the starship Enterprise had a recreational facility called the holodeck. It was actually an empty room, but fictional "hard light" projectors created touchable and temporar ily solid objects to replicate indoor and outdoor spaces. The holodeck is a
futuristic version of virtual reality, the use of technology to create a simu lated three-dimensional world.
Today's virtual reality is far from a holodeck, but donning a virtual reality headset can give you the impression that you are in the middle of a three-
dimensional environment. You can look up and down and swivel your head to see your surroundings {Figure 13). FIGURE 13: VIRTUAL REALITY SIMULATES THE REAL WORLD
> How is augmented reality different than
virtual reality? Instead of creating a simulated world, augmented reality superimposes data over
the real world. Pok6mon GO popularized aug mented reality and provides a great example of how it works.
The reality of Pok6mon GO is the real world in
r
your vicinity. It can be shown on your smartphone screen as a map or as a pass-through image from the camera. Pokemon characters are superim posed on the landscape and can be seen through the camera lens. The characters are the augmen tation {Figure 14).
FIGURE 14: POK£MON GO IS AUGMENTED
REAL TV
INTRODUCTION
14
> What is the Internet of Things? The internet of Things (loT) con nects sensors embedded in machines, clothing, and other objects to the Internet, where they can report data and receive commands, it provides a
clear example of digital technology controlling objects In the real world. On a basic level, an loT device can report to a smartphone. Nest Protect is a smoke and carbon monoxide alarm that not only contains sensors but also contains circuitry that connects to a home Wi-Fi network. That WI-FI network can establish communication with a smartphone to report Its status
and accept commands. For example. If Nest Protect senses smoke when
you are away from home, it sends an alarm to your phone. The phone can be used to silence a false alarm—such as when your roommate burns a bagel In the toaster.
But the Internet of Things also connects multiple devices so that they can communicate with each other. The Nest Thermostat Is designed to control
a home's heating and cooling systems. These systems, when faulty, may
output dangerous carbon monoxide. Suppose the Nest Protect detects a high level of carbon monoxide. It can send a message to the thermostat to turn off the furnace (Figure 15). FIGURE 1S: THE INTERNET OF THINGS LINKS DEVICES WITH EMBEDDED SENSORS
Smoke detectors and thermostats send
signals to each other and connect to a
smartphone through a home network and the Internet.
I What about autonomous vehicles? Self-driving cars and robots are related to the Intemet of Things because they require sensor-equipped
FIGURE 16: AUTONOMOUS VEHICLES
EXEMPLIFY UBIQUITOUS COMPUTING
parts to communicate with each other. Autonomous vehicles, for example,
navigate without human Intervention using sensors to detect the surround ing environment, physical location, speed, and other parameters. They send data and receive commands from an onboard computer running sophisti cated artificial Intelligence software. Autonomous vehicles are clear examples of ubiquitous computing—the
use of digital technology to manipulate objects In the real world. Instead of abstract data. You'll delve Into some of these ubiquitous technologies In
future chapters. For now, try to guess the year In which you take your first ride in a self-driving car (Figure 16).
No
hands!
15
THE DIGITAL REVOLUTION
I Are there more changes to come? If we can learn one thing from the evolving information Age, it is this: Change is inevitable. Today, your favorite social media platform is Facebook; in the future, Facebook may go the way of CompuServe. Figure 17 summarizes changes through each era of the digital revolution. FIGURE 17: THE INFORMATION AGE EVOLVES
EXPIRED
TIRED
Data processing Big corporate and government computers
UNINSPIRED
Network computing
Cloud computing
Desktop computers
Laptop computers
Smartphones and
Autonomous
tablets
vehicles
applications
Cable and satellite
4G and Wi-Fi
Internet access
Internet access
ARPANET
AOL and CompuServe
The Web and email
Social media
Arcade games
20 action games
30 multiplayer
Touchscreen
games
microgames
Mouse
Touchscreen
Keyboard
Embedded apps
cloud-based apps
Dial-up Internet
Printer
Ubiquitous
Mobile apps and
Software suites
access
CB radios
ADMIRED
Personal computing
Standalone
Custom applications
DESIRED
• So what's the point? Learning about digital technology is not just about circuits and electronics, nor is it only about digital gadgets, such as computers and portable music players. Digital technology permeates the very core of modern life.
Internet of Things
Augmented reality
Virtual reality
Voice
QUICKCHECK According to Figure 17, AOL and CompuServe were popular when
Understanding how this technology works and thinking about its potential can help you comprehend many issues related to privacy, security,freedom of speech, and intellectual properly, it will help you become a better con
a. data processing was the main
sumer and give you insights into local and world events.
b. most people had dial-up
As you continue to read this textbook, don't lose sight of the big picture. On one level, you might be simply learning about how to use a computer and software in this course. On a more profound level, however, you are accumulating knowledge about how digital technology applies to broader cultural and legal issues that are certain to affect your life far into the future.
digital technology Internet access and used
desktop computers c. smartphones and tablets were introduced
d. people stopped using cioud computing
fNTRODUCTION
QUICKQUIZ 1.
2.
Data processing Is based on an
4.
Two major technologies that defined the network
-processing-output cycle.
computing era were the
In the personal computing phase of the digital
the Web.
revolution, data and software were stored on
devices, such as hard drives. 3. The idea that several technologies evolve into a
single device is called
5.
and
computing provides access
to information, applications, communications, and storage over the Internet.
Digital Content
Module Contents
I
SECTION A;
DIGITAL BASICS
Data Representation Basics Representing Numbers RepresentingText Bits and Bytes Compression SECTION B:
DIGITAL SOUND
Digital Audio Basics Digital Audio File Formats MIDI
So many aspects of life today are digital: music, photos, movies, news, and communications. How can all this
diverse "stuff" be accessed through one device, such as a laptop or an (Phone? It's all about digitization.
Digitized Speech SECTION C:
TRY IT! Apply what you learn.
BITMAP GRAPHICS
Bitmap Basics Bitmap Data Representation Image Compression Modifying Bitmap Images Panoramic and 360 images Stereoscopv
• Compress files containing various types of data, including text, photos, music, and videos. • Record audio files.
• Select an audio sampling rate and file format for high-
quality sound In files that won't use up all your storage space.
SECTION D:
• Convert audio files from one format to another.
VECTOR GRAPHICS
Vector Graphics Basics
• Use voice commands to control your digital devices.
Vector Tools
• Select the best file format for digital Images, such as
3D Graphics Vectors and Virtual Reality SECTION E:
DIGITAL VIDEO
Digital Video Basics Video Compression Video File Formats
Digital Video Variations
photos and scans, taking into account which formats reduce Image quality with lossy compression. • Convert a paper document into a digital file that can be edited using word processing software. • Work with RGB colors in decimal, hexadecimal, or binary notation.
• Use resolution to gauge the maximum size for an image.
• Use "photoshopping" techniques to enhance, colorize, ISSUE:
WHAT IS FAIR USE?
INFORMATION TOOLS:
clone, inpaint, clip, and merge photo Images.
• Capture 360-degree images on your smartphone. • Draw vector images for logos and infographics.
PHOTO FORENSICS
• Convert vector images into bitmaps. TECHNOLOGY IN CONTEXT: FILM
MODULEACTIVITIES LAB:
THE DIGITAL WORLD WITH EYES SHUT
• Render a 3D image from a wireframe. • Use video editing software to combine video footage with a soundtrack.
• Select output settings for a video,including aspect ratio, resolution, bit rate, compression level, and file format. • Transcode a video from one file format to another. • View vector and bitmap images in a VR headset.
16
Digital Content
C PRE-CHECK
Gauge your level of expertise. The answers are in the module.
6
((®))
How do you write it in binary?
A sound wave is digitized by
makes files smaller without
How do you write it in ASCII?
— its height thou sands of times per second.
any data loss?
§' Which type of compression
LOSSY LOSSLESS
List
FIVE
#EE82EE
bitmap
graphics formats: is the hexadecimal number for what color? BLACK
GREEN
What is the basic unit of sound
in speech synthesis?
VIOLET WHITE
\' /
f Bike.svg
List two popular video codecs:
Adding light and shadows is part of what process that creates an image from a wire
Bitmap or vector?
frame?
17
SECTION A, MODULE 1
Compression/ Extraction
Data Representation
Numenc
SECTION
Bits/Bytes
DIGITAL BASICS
TEXT, NUMBERS, MUSIC, VIDEOS,
Terminology
images, and speech; all of this "stuff" Is digital content. The amazing aspect of digital technol ogy is that it distills such diverse content into Os
data data representation digital data
and 1s and stores them as pulses of electricity. Understanding the data representation concepts
File file name extension file format
presented in Section A will help you grasp the essence of the digital world and get a handle on all the jargon pertaining to bits, bytes, megahertz,and gigabytes.
analog data binary digitization bit numeric data binary number system character data ASCII Extended ASCII Unicode UTF-8 ASCII text delimiter
OCR byte kilobit kilobyte megabit
megabyte gigabit gigabyte data compression lossless compression lossy compression
Objectives > List three technologies that digital devices use to physically store or transmit Is and Os. I Write the numbers 1 through 10 in binary.
t Decipher ASCII text. t Demonstrate how to use the terms bit, byte, megabyte, megabit, and gigabyte in the context of data storage and digital devices.
I Distinguish between data that would be
represented by binary numbers and data that would be represented by ASCII or Unicode.
I Explain how OCR relates to ASCII and Unicode. k Describe the difference between lossy and
lossless compression. I Demonstrate how to compress a file.
19
DIGITAL CONTENT
DATA REPRESENTATION BASICS Digital content, such as ebooks, documents, images, music, and video, is a compilation of data. Data refers to the symbols that represent people, events, things, and ideas. Data can be a name, a number, the colors In a
photograph, or the notes in a musical composition. ^ Is there a difference between data and information? In
everyday conversation, people use the terms data and information interchangeably. However, some technology professionals make a distinction between the two terms. They define data as the symbols that represent people, events, things, and ideas. Data becomes information when it is presented in a format that people can understand and use. As a general rule, remember that {technically speaking) data Is used by machines, such as computers; information is used by humans.
Terminology The word data can be correctly treated either as a plural noun or as an abstract mass noun, so the phrases "The data are being processed" and "The data
is being processed" are both correct usage, in this textbook,
I What is data representation? Data representation refers to the
the word data Is paired with
form in which data Is stored, processed, and transmitted. Devices such as smartphones, IPods, and computers store data in digital formats that can be handled by electronic circuitry. Today, digital data representation has
singular verbs and modifiers.
replaced the analog methods previously used for storing and transmitting photos, videos, and text.
> What's the difference between analog and digital? Digital data is text, numbers, graphics, sound, and video that have been con verted into discrete digits such as Os and 1s. In contrast, analog data is represented using an infinite scale of values. For a simple illustration of the difference between analog and digital, consider the way you can control the lights in a room using a traditional light switch or a dimmer switch. A dimmer switch has a rotating dial that controls a continuous range of brightness, it is, therefore, analog. A traditional light switch, on the other hand, has two discrete states: on and off. There are no in-between states, so this type of light switch is digital. A traditional light switch is also binary because there are only two possible slates. Technically, a digital device could represent data using more than
two states. Some of the earliest computers represented numbers using the decimal system. Today, however, most digital devices represent numbers and other data using the binary system.
QUiCKCHECK Which of the devices on the
left iifustrate analog data representation?
a. The speedometer and Vinyl record
YouTube
YouTube
b. The television and the vinyl
Television
record
c. All but the speedometer d. All but YouTube and the clock
LED ciock
Speedometer Film camera
SECTION A, MODULE 1
20
I How does digital data work? The process of converting informa tion, such as text, numbers, photos, or music, into digitai data that can be manipulated by eiectronic devices is called digitization.
imagine that you want to send a message by flashing a light. Your light switch offers two states: on and off. You can use sequences of ons and offs to represent various letters of the alphabet. To write down the representa tion for each letter, you can use Os and 1s. The Os represent the off slate of your light switch; the Is indicate the on state. For example, the sequence on on off off would be written as 1100, and you might decide that sequence represents the letter A. The Os and Is used to represent digital data are referred to as binary digits. It is from this term that we get the word b/f—binary digit. A bit is a 0 or 1 used in the digital representation of data.
Digital devices are electronic and so you can envision bits flowing within these devices as pulses of light. But digitai signals can take many forms, as shown in Figure 1-1. FIGURE 1-1: MANy WAYS TO REPRESENT DIGITAL DATA
ASCII codes
0
represent data as Os and 1s
1
110100010101010000
Circuit boards
carry data as pulses of current -2V0LTS
+5 +5 -.2 +5 -.2 -.2 -.2 +5 -.2 +5 -.2 +5 -.2 +5
CDs and DVDs store data as dark
and light spots
Disk drives store
data as magnetized particles
I How is digital data stored? Digital data is typically stored in files. A digital file, usually referred to simply as a file, is a named coilection of data that exists on a storage medium, such as a hard disk. CD. DVD, or flash drive. A file can contain data for a term paper. Web page, email message,or video, for example.
Every file has a unique name,such as Thriiler.mp3. Afile name extension,
such as .mp3, can be appended to the end of the file name after a period. This extension indicates the file format; the type of data in the file and the way it is encoded. Let's take a look at how numbers, text, images, sound, and video are encoded into digital formats that become computer files.
QUICKCHECK Digital devices work with bits in
all of the following ways except; a. voltage variations b. light and dark spots c. analog values d. orientation of magnetized particles
21
DIGITAL CONTENT
REPRESENTING NUMBERS Numeric data consists of numbers that can be used in arithmetic opera tions. For example, your annual income is numeric data, as is your age.That concept seems obvious, but some data that looks numeric is represented differently. Social Security numbers, telephone numbers, street numbers, and similar data are not represented by numeric data. These "numerals" are not considered numeric data because they are never used in mathemati cal calculations. This numeric quirk is a key concept in the digital world and turns up when you work with spreadsheets, databases, and computer pro gramming.
QUICKCHECK Which one of the following is considered numeric data?
a. Passport number 47756902231
b. Telephone number 906-222-3450
The S28.99S.00 cost of a car
> How do digital devices represent numbers? Digital devices rep
c.
resent numeric data using the binary number system, also called base 2. The binary number system has only two digits: 0 and 1. No numeral like 2 exists in this system, so the number "two" is represented in binary as 10 (pronounced "one zero"). You'll understand why if you think about what happens when you're counting from 1 to 10 in the familiar decimal system. After reaching 9, you run out of digits. For ten, you have to use the digits 10—zero is a placeholder and the 1 indicates one group of tens.
d. The address 22 E. Main Street
In binary, you just run out of digits sooner—right after you count to 1. To get to the next number, you use 0 as a placeholder and 1 indicates one group of twos. In binary, then, you count 0(zero), 1 (one), 10(one zero), instead of counting 0, 1, 2 in decimal. If you need to brush up on binary numbers, refer to Figure 1-2. FIGURE 1-2: BINARY EQUIVALENT OF DECIMAL NUMBERS
DECIMAL(BASE 10)
BINARY (BASE 2)
0
0
1
1
2
10
3
11
4
100
5
101
6
110
7
ill
8
1000
9
1001
10
1010
11
1011
1000
1111101000
The important point to understand is that the binary number system allows digital devices to represent virtually any number simply by using Os and Is. Digital devices can then perform calculations using these numbers. The
ability to perform rapid and accurate calculations was the key feature of the first computers, and it now provides the foundation for online banking, ecommerce, and many other number-crunching applications.
QUICKCHECK Figure 1-2 shows the binary equivalent for numbers 0 through 11 and 1000. What is the binary equivalent for the number 12? a.
10111
b. 1100 c.
10000
d. nil
SECTION A, MODULE 1
22
REPRESENTING TEXT Character data is composed of letters, symbols, and numerals that are not used in calcuiations. Examples of character data include your name, address, and hair color. Character data is commonly referred to as "text."
QUICKCHECK
I How do digital devices represent text? Digital devices employ
Write out Hi! in Extended ASCII
several types of codes to represent character data, including ASCII, Unicode, and their variants. ASCII(American Standard Code for Information Interchange, pronounced "ASK ee") requires seven bits for each charac ter, For example, the ASCII code for an uppercase A is 1000001. ASCII provides codes for 128 characters, including uppercase letters, lowercase letters, punctuation symbols, and numerals.
code.(Hint: Use an uppercase
H, but a lowercase /.)
H
Extended ASCII is a superset of ASCII that uses eight bits for each char acter. For example. Extended ASCII represents the uppercase letter A as 01000001. Using eight bits instead of seven bits ailows Extended ASCII to provide codes for 256 characters. The additional Extended ASCII charac ters include boxes and other graphical symbols. Unicode (pronounced "YOU ni code") uses sixteen bits and provides codes for 65,000 characters—a real bonus for representing the alphabets of mul tiple languages.
UTF-8 is a variable-length coding scheme that uses seven bits for common ASCII characters, but uses 16-blt Unicode as necessary.
Take a lookat the ASCII codes in Figure 1-3. Notice there is a code for the
space character in addition to codes for symbols, numerals, uppercase let ters, and lowercase letters. FIGURE1-3: ASCII CODES 00100000
Space
00110011
3
01000110
F
01011001
Y
01101100
00100001
I
00110100
4
01000111
c
01011010
z
01101101
m
00100010
"
00110101
5
01001000
H
01011011
(
01101110
n
00100011
n
00110110
6
01001001
1
01011100
\
01101111
0
00100100
$
00110111
7
01001010
J
01011101
)
01110000
p
A
01110001
q
01110010
r
01110011
s
00100101
%
00111000
8
01001011
K
01011110
00100110
&
00111001
9
01001100
L
01011111
t
00111010
00101000
(
00111011
00101001
)
00101010
•
00101011 00101100
'
01001101
M
01100000
t
01001110
N
01100001
a
01110100
t
00111100
01010001
Q
01100100
d
01110111
w
00111111
?
01010010
R
01100101
e
01111000
X
/
00101101
01000000
@
01010011
s
01100110
f
01111001
y
00101110
01000001
A
01010100
T
01100111
s
01111010
z
01000010
B
01010101
u
01101000
h
01111011
{
01000011
c
01010110
V
01101001
1
01111100
1 }
00100111
00101111
/
00110000 00110001
1
01000100
D
01010111
w
01101010
i
01111101
00110010
2
01000101
E
01011000
X
01101011
k
01111110
-
23
DIGITAL CONTENT
• Why are there ASCII codes for numbers? While glancing al the table of ASCII codes in Figure 1-3, you might have wondered why the table contains codes for 0, 1, 2. 3. and so on. Aren't these numbers represented
by the binary number system? Yes, the binary number system is used for representing numeric data, but these ASCii codes are used for numerais,
such as Sociai Security numbers and phone numbers that are not used for caiculations. For example, 475-6677 is a phone number; it is not a formula
QUICKCHECK If your address Is 10 B Street, what are the first three bytes in ASCII?
that means subtract 6677 from 475. a.
00110001 OOllOOOO 01000010
> Where is digital text used? Digital text is everywhere. It is the foun dation for ail kinds of digital documents, Web sites, social media sites, games, and email. It Is also the basis for ebooks designed for Kindies and
b- 00110001 OOllOOOO 00100000 c.
OOllOOOl 00110111 00100000
other ebook readers.
Documents produced on a digital device are stored as a string of Is and Os encoded as ASCII, Unicode, or UTF-8. Some kinds of documents stmpiy contain this piain text, whereas other documents contain formatting codes to produce boid fonts, columns, and other effects.
► What is plain text? Piain. unformatted text is sometimes caiied ASCII text and is stored in a so-cailed "text fiie" with a name ending in .txt. On Appie devices, these flies are labeled "Plain Text." In Windows, these files are labeled "Text Document," like this;
RollerCoasters.txt
Text Document
2 KB
ASCII text files can be created with text editors, such as TextEdit and
Notepad. They are typically used for writing computer programs because
executable program code cannot include formatting such as underlining and special fonts. They can also be used for creating Web pages. Text files can usually be opened by any word processing software regard less of the type of device, in that sense, they are universal. Figure 1-4 illustrates an ASCII text file and the actual binary code that is stored for it. FIGURE 1-4; ASCII TEXT FILES CONTAIN NO FORMATTING CODES 01010010 01101111 01101100 01101100 01100101 01110010 OOlOOOOO
OlC^Oll 01101111 01100001 01110011 01110100 01100101 01110010 oiimSff WTTOWft^lOlOlll
01101000 01101111 OOlOOOOO 01110111
01100001 01101110
1110100 01110011 OOlOOOOO 01110100 oiionii
00100000 01110011
1100001 01110110 01100101 OOlOOOOO 01100001
01101110 OOlOOOOO
iioini 01101100 01100100 ooiooooo oinooio
OllCllll 01101100
iioiio,ojijpoioi.oii.iooip.ogiooo.eojU2Qp.u
01101111 01100001
1110' .■? umiiiefl - No»Ma
00100000 01001100
1100
01101000 OllOOIOl
n^^oller Coasters Uho wants to save an old roller
-
□
X
Edrf Foimft Vim hHp
QUICKCHECK
00100000
01101001011101 coaster? Leap-the-Oips is the world's oldest
00100000
01110111 01101'""Oiler coaster and, according to a spokesperson
What ii tlie seventh byte in the
00100111
01110011 OOlOO'
Roller Coasters file?
01110011
01110100 OOlOOC®"®
01100101
01110010 OOIOOF^" "-eap-the-Dips is "the sole survivor of 01100101 OiiiQr® technology that was represented in OOlOOOOO onoo.""^® ithe early years of the amusement industry.
01110100 00101100
01100100 01101001 OllOl;
Leap-the-Dips Preservation Foundation,
historically significant. Built
a. Uppercase C (01000011) b. Lowercase c (01100011) c. Space (OOlOOOOO) d. Carriage return (OOOOllOl)
r
SECTION A, MODULE 1
24
> How does formatting get added to documents? ASCII text files contain no formatting. They have no bold, italics, underlining, or font colors. There are no margins, columns, bullets, headers, or page numbers.
Suppose you want the title of the Roller Coasters document to be centered and shown in a large, bold font, like this: y
• O 4* > twun
T
«:ds ra wciS
«'Mit LAnrc'T
u.ciii«^/S
» -
n
X
cjv.rw
Roller Coasters Who ¥fOf>ts to savo on oW rofltr eooittr? Le«p-th«*Oips is the world's oldest roitef eoister srtd,
accerdiOB to a spokesperson for the Leap-the-Dips Preservation foundation^ one of the most historically
signiflcarTt. SuHt In 1902. Leap*the*Dlps Is 'the sole survivor of a style and technolo|v that was represented in more then 2S0 parks In North America slone In the early years of the amusement industry.'
To create documents with styles and formats, formatting codes have to be embedded in the text. There are many techniques for doing so, and each
one produces a unique file format. These formats can be opened by the software that produced them. Opening those files with other kinds of soft ware requires conversion.
Microsoft Word produces formatted text and creates documents in DOCX format, whereas Apple Pages produces documents in PAGES format. Adobe Acrobat produces documents in PDF format- The HTML markup lan
guage used for Web pages produces documents in HTML format. Ebooks
Terminology
are created using the EPUB format.
A delimiter is a special character
Formatting codes can be added to documents directly within the text
used to separate commands or formatting characters from the
stream, using some sort of delimiter to signal the beginning and end of the formatting command. When the document is displayed, the formatting
rest of the text in a file. Slashes
codes are hidden. What do those hidden codes look like? Figure 1-5 gives
// and angle brackets < > are commonly used delimiters.
you a behind-the-scenes look at the Roller Coasters document with all the embedded formatting codes revealed. FIGURE 1-5: FORMATTING COOES WITHIN A DOCUMENT
Here is the document
Coasters.DOCX
title. The formatting codes that make it bold
xmlns;wps-'http://s are delimited by < and
fice/word/2010/wordprocessingShape" mc:lgnorable="w14
w15 wp14"> angle brackets.
49" w:rsidRPr="003E2449" w;rsldRDefault="003
E2449">Who wants to save an old roller coaster? Leap-
the-Dlps is the world's oldest roller coaster and. according to a spokesperson for the Leap-the-Dips Preservation Foundation, one of the most historically significant. Built in 1902, Leap-the-Dips is "the sole survivor of a style and technology that was represented in more than 250 parks in North America alone in the earty years of the amusement industry."
25
DIGITAL CONTENT
I What happens when I scan a document? When using a scanner to digitize a document, you may have a choice between graphics formats and OCR- Graphics formats, presented later in the module, essentially cap ture a photo of the document. Individual letters and punctuation marks are not encoded as ASCII. A document scanned into a graphics format cannot be edited using a word processor.
OCR (optical character recognition) is a process that interprets individual characters during or after a scan. It assigns the appropriate ASCII code to each letter and outputs the document in a format that can be edited using word processing software. OCR software is available for most scanners and is handy when you have a printed copy of a document that you want to
modify, but would prefer not to retype.
QUICKCHECK Which one of the following would most likely require OCR?
a. A two-page bibliography of award-winning books from 1945 that you would like to annotate
b. An excerpt from a magazine article that you want to
include in a term paper c. A football poster containing the home game schedule
BITS AND BYTES
All of the data stored and transmitted by digital devices is encoded as bits. Terminology related to bits and bytes is extensively used to describe stor age capacity and network access speed. As a digital-goods consumer, you'll want to have this terminology handy.
d. A page from a handwritten diary that you want to include in a historical
biography
• What is the difference between bits and bytes? Even though the word bit is an abbreviation for binary digit, it can be further abbreviated,
usualiy as a lowercase b. A group of eight bits is called a byte and is usually TRY IT!
abbreviated as an uppercase 6. Transmission speeds are expressed in bits, whereas storage space is expressed in bytes. For example,a cable Internet connection might transfer
data from the Internet to your computer at 50 megabits per second. In an iPad ad, you might notice that it can store up to 60 gigabytes of music and video.
Scan a one-page document using a scanner or a multifunction
printer. The default format for
the scan is probably a JPEG or
PNG graphic. Try using your scanner's OCR feature or a free
• What do the prefixes kilo-, mega-, giga-, and tera- mean?
online OCR service to convert
When reading about digital devices, you'll frequently encounter references such as 90 kilobits per second, 1.44 megabytes, 2.4 gigahertz, and 2 tera
the scan into a document
bytes. Kilo, mega, giga, tera, and similar terms are used to quantify digital
that can be edited using word processing software.
data as shown in Figure 1-6. FIGURE 1-6: DIGITAL QUANTITIES Bit
One binary digit
Gigabit
Byte
8 bits
Gigabyte 2^0 bytes
Kilobit
1,024 or 2^0 bits
Terabyte 2^0 bytes
Kilobyte
1,024 or 2^f bytes
Petabyte 2^0 bytes
Megabit
1,048,576 or 220 bits
Exabyte
2^0 bits
2®0 bytes
Megabyte 1,048,576 or 2^'^ bytes
Terminology What's a kibibytel Some computer scientists have
proposed alternative terminology to dispel the ambiguity in terms such as kilo that can mean 1,000 or 1,024. They suggest the
I Why such odd numbers? In common usage, kilo, abbreviated as K,
following prefixes:
means a thousand. For example. $50K means $50,000. In the context of
Kibi = 1,024
computers, however, 50K means 51,200. Why the difference? In the deci mal number system we use on a daily basis, the number 1,000 is 10 to the
Mebi = 1,048,576
third power, or 10^. For digital devices where base 2 is the norm, a kilo is precisely 1,024, or 2^^. Mega is derived from 22" and giga from 23°.
Gibi = 1,073,741,824
26
SECTION A, MODULE 1
I When do I use bits and when do I use bytes? As a general rule, use bits for data rates, such as Internet connection speeds and movie
download speeds. Use bytes for file sizes and storage capacities. Figure 1-7 provides some examples. FIGURE 1-7: BITS OR BYTES?
ZT"
c II
104 KB
50 Mbps
Kilobit {Kb or Kbit) can
56 Kbps
Kilobyte (KB or Kbyte)
Megabit(Mb or Mbit)
be used for slow data
is often used when
is used for faster
rates, such as a 56 Kbps (kilobits per second)
referring to the size of small computer files.
data rates, such as a 50 Mbps (megabits
per second) Internet
dial-up connection.
connection.
QUICKCHECK My iPhone has 8.
of
storage space; i uploaded
a high-resolution 8graphic; and I am going to download a small 8 file. a. GB, MB, Mbps 100 Gbit
16GB
Gigabit (Gb or Gbit) is used for really fast network speeds.
Gigabyte(GB or GByte)
3.2 MB
Megabyte (MB or MByte) is typically used when referring to the size of files containing
is commonly used to refer to storage capacity.
b. MB, GB, KB c. GB, MB, KB d. Mbps, MB, G8
photos and videos.
COMPRESSION All those 1s and Os can quickly expand the size of digital files. Whereas
an "A" is simply one character in a printed document, it requires seven bits when represented as ASCII and sixteen bits when represented as Unicode. That "1" in "1st place" seems like it could be represented by a simple 1 bit, but it requires multiple bits when encoded- Numeric data also requires lots of bits. The number 10 is 1010 in binary and requires four bits. To reduce file size and transmission times, digital data can be compressed.
Data compression refers to any technique that recedes the data in a file so that it contains fewer bits. Compression is commonly referred to as "zip
ping." Many compression techniques exist. They can be divided into two categories; lossless and iossy.
> What is the difference between lossless and lossy compression? Lossless compression provides a way to compress data and reconsti
tute it into its original state. Character data and numeric data in documents and spreadsheets are compressed using lossless techniques so that the uncompressed data is exactly the same as the original data.
Lossy compression throws away some of the original data during the
compression process. After the data is uncompressed, it is not exactly the same as the original. This type of compression is lypicaliy used for music,
images, and videos because the human ear or eye cannot discern minor changes. Later in the module, you'll learn more about the compression techniques used to shrink the size of music, image, and video files.
QUICKCHECK Which one of the following
requires lossless compression? a. A very large document that
you intend to send as an email attachment
b. A photo of your class reunion that you intend to
post on your Facefaook page c. An ITunes track saved to
your iPod that you want to back up on your computer
27
DIGITAL CONTENT
I How do I compress data? The software for compressing data is sometimes referred to as a compression utility or a zip tool. Most computers
include software for compressing data, but tablets and smartphones may require a third-party app for working with compressed data. On laptops and desktop computers, the compression utility is accessed from the same screen used to manage files. You can compress the data in a single file or you can combine multiple fifes to create a single zipped file that is reconstituted to the original files when unzipped (Figure 1-8).
TRY IT!
Experiment with compressing files to see how much they
shrink. Try compressing a document, then try a graphic.
FIGURE 1-e: COMPRESSING FILES I • nn««r
IM
Edi
V>r-
Cd
fooer wii
2. Select one or
$*»
more files, then
right-click
K2*5
5* 8ooLMuS< *»
a single small file
^ 0 fiJuetcxiCh devue ' I Ccfltgmaa aiopgg
b. enlarge a file to increase its resolution
lA Oocunvnci
c. zip a single file to decrease Its
M^reoeM
4^ 05 CO lO'lems
isia
■ Omie^ (crMTF meivut)
« Oo«tVO«K
A
iLV'st o
f *< g sc«.
ft Oetiisee
> MiAie
Compression uiiiiues can be
3. Select th ese options
R«5ejrcn mc90
''."f—
size
{0}
PE4pcn>n gn IS
d. extract a file to Its original size and content
Compressing files using File Explorer on a PC
SECTION A, MODUIE 1
> How do 1 return files to their uncompressed state? The process of reconstituting files is called extracting or unzipping. As with compression, most laptops and desktop computers include extraction and unzipping soft ware; tablets and smarlphones may require a third-party app. Compressed files usually have .zip at the end of the file name and are rep resented with specialty icons. Compressed files may also end with .gz, .pkg, or .tar.gz. These files have to be extracted or unzipped before you can
view the data they contain. The process is easy. To extract a file on a Mac, simply double-click the zipped folder. With Windows (Figure 1-9), use the Compressed Folder Tools or Extract All option. FIGURE 1-9; EXTRACTING FILES IN WINDOWS »c™tr»n«3 »CIj Which audio formats are most popular? Digital audio is stored in a variety of file formats. The table in Figure 1-12 provides an overview of the most popular digital audio formats, which Include AAC, MRS, Ogg
Make a short audio recording
using your favorite digital device. What are the default
file format and sampling
rate? if you record at a higher sampling rate, can you tell the difference in sound quality?
Vorbis, WAV, Fl-AC, and WflflA. FIGURE 1-12; POPULAR AUDIO FILE FORMATS
AUDIO FORMAT
EXTENSION
AAC (Advanced Audio Coding)
,aac, .m4p, or
.mp4
MP3 (also called MPEG-1 Layers)
.mp3
Ogg Vorbis
-ogg
ADVANTAGES
DISADVANTAGES
Very good sound quality based on
Files can be copy protected
MPEG-4; lossy compression; used
so that use Is limited to
for itunes music
approved devices
Good sound quality; lossy compres
Might require a standalone player or browser plugln
sion; can be streamed over the Web Free, open standard; lossy compres sion; supported by some browsers
Slow to catch on as a
popular standard; part of Google's WebM format Audio data is stored In raw,
WAV
,wav
Good sound quality; supported in browsers without a plugln
FLAG (Free Lossless Audio Compression)
.flac
Excellent sound quality; lossless compression
Open source format sup ported by many devices
WMA (Windows Media Audio)
Lossy or lossless compression; very
Files can be copy protected;
.wma
good sound quality; used on several
requires an add-on player
music download sites
for some devices
noncompressed format, so files are very large
33
DIGITAL CONTENT
> What are the best sources for digital music? There are several options for obtaining audio content,such as music, soundtracks, narrations, and sound effects.
TRY iTl
Live recording is an option for obtaining digitai sound fiies from concerts or lectures. For casual recording. Voice Memos and similar apps work well. Professional recordings require more sophisticated software and hardware tools. A device called an audio interface accepts input from a standalone microphone and feeds it into a computer. Ripping CD tracks is handy for someone who inherits a stack of old CDs and wants to convert the music into a format that plays on a smartphone or other mobile device. Ripping is a siang term that refers to the process of importing tracks from a CD or DVD to your computer's hard disk. The tech nical term for ripping music tracks is digital audio extraction.
find the names of two live
streaming music services and the names of two on-demand
streaming services.
QUiCKCHECK You've selected a music track
Downloading is popular for saving audio fiies on local devices. A down load copies a file from a private network or Internet server to a local device. The file is transferred as an unit and cannot be played until the entire file
on your smartphone, but there is a pause before it begins. This pause is associated with
has arrived.
Streaming offers yet another way of obtaining audio content. Unlike some
digitai content, such as photos, that must be accessed as a whole piece, audio content plays back over a period of time. Audio files can be acquired as a live stream or on-demand stream In addition to downloads (Figure
a. downloading audio tracks b. live streaming audio
c. on-demand streaming
1-13). FIGURE 1-13: DOWNLOADING AND STREAMING
0
Live stream A live stream sends media from a
Download A download transfers an audio file
from a server to your local device. You can play back the file even
server to your local device, where
4'V On-demand stream
it is played, but not stored.
An on-demand stream sends the
This method is also known as
media to your local device, where it is stored temporarily, or "buffered,"
Webcasting.
until there is enough data to begin
when your device is not online.
You have to be online while listen
The file can be played with any
ing.
compatible software or player.
The content stream cannot be
You can fast-forward to any point in the stream without waiting for the
paused, stored, or rewound.
entire file to download.
playback.
34
SECTION 6, MODULE 1
I What type of software is required to work with digital audio files? To play a digital audio file, you must use some type of audio software. Whether you can use general-purpose audio software, a speciai-purpose player, or a browser plugin depends on the source and type of audio. Audio piayers. An audio piayer is a smaii standalone software appiication or mobile app that offers loois for iistening to digitai audio and managing
QUICKCHECK The term lifjping epplfes to: a. converting CD tracks to formats such as MP3 and AAC
playlists. but may not provide toois for making your own recordings. Audio
piayers might be inciuded with your computer's operating system, pack
b. downioading MP3 files
aged with your sound card, instaiied in a handheld device, or available as a download.
Audio piugins. An audio plugin is software that works in conjunction with your computer's browser to manage and play audio that you are
illegally from the Internet
c. compressing AAC files with digitai audio extraction
accessing from a Web page. Each audio plugin tends to work with only
one audio format, so multiple piugins are necessary when you have audio files in several formats.
Audio software. General-purpose audio software and apps provide toois
for recording, playing, and modifying audio files. Popular audio software includes ITunes, Windows Media Piayer, and Audacity (Figure 1-14). FIGURE M4:AUDACITY AUDIO SOFTWARE A
W
Wrw
Ttanaport
Ttacn
AjWjtt
Wieoow
Hito
Srafifrnltfi Q ft -5
J
•'>
0-4»II
o
j2_' ® A CtntM 044 •M
.n
0
'o
'
^
BuO-n MkmC 0 2 iSMiWl U
W
44
IM
1.11
0
U0 14$ im
HM
Clip out sec tions of a track to remix
Tools for record
ing and playback.
X4I iM
Work with more than one track for stereo and
mixing
fUl
w« What's the difference between speech synthesis and speech recognition? Speech synthesis is the process by which machines pro duce sound that resembles spoken words. Speech recognition (or voice
recognition) refers to the ability of a machine to understand spoken words.
> How does speech synthesis work? A basic sound unit, such as "reh' or "gay," is called a phoneme. Most speech synthesizers string together phonemes to form words. For example, the phonemes "reh" and "gay" produce the word "reggae." Phonemes are usually derived from recordings of human voices reading specially prepared passages of text. Text-to-speech software analyzes the words in a section of text, finds corresponding phonemes, and combines them into sentences for output.
QUICKCHECK Which one of the follovwing requires digitnl-to-nnnlog conversion?
a. Speech synthesis b. Speech recognition
c. Entering a Google Voice command
d. Voice dialing
I How does speech recognition work? On a personal computer or smartphone, a speech recognition system collects words spoken into a microphone that's connected to sound processing circuitry. This circuitry's analog-to-digital converter transforms the analog sound of your voice into digital data. This data is then processed by speech recognition software. Speech recognition software analyzes the sounds of your voice and con verts each word into groups of phonemes. Next, the software compares the groups of phonemes to the words in a digital dictionary that lists pho neme combinations along with their corresponding English (or French, Spanish, and so on) words. When a match is found, the software can dis play the word on the screen or use it to carry out a command. Most digital devices offer a way to use spoken commands (Figure 1-16). FIGURE 1-16: MICROSOFT CORTANA SPEECH RECOGNITION
TRY IT!
1. Open the Windows Speech Recognition application. Mst mjtch
U
windCMsSpMchRMogmtion
if vou have a laptop with Windows 10, it includes 2. After following the setup instructions, the Listening Mode con trol appears. Ctrl+the Windows key turns it
a comprehensive speech recognition system called
on. Saying "stop listen
apps, navigate menus, and dictate text for email messages
Ing" turns it off. Snipping Tool
0 Sellir>gs Q Sicyp« vi^ □ Store
O SpCNU Settings Web
Cortana. Try it out. Vou can
speak commands to launch
and documents.
37
DIGITAL CONTENT
I How does Siri work? Devices of the Speak & Spell generation had robotic voices and were not responsive to a wide variety of commartds and queries. What makes modem technologies like Siri so much more versatile and lifelike? Figure 1-17 provides an overview. FIGURE 1-17: HOW SIRI WORKS
TRY IT
Are you wondering what a Speak 6c Spell is? Go to YouTube and search for "Speak & Spell" to see a demonstration.
-It is located near a busy street
•«|
located
"one two buckle , , my shoe" ittches
The voices of Siri were created by live actors, but they couldn't record every possible response to user queries.
Instead they recorded the words and sentences from a script. Although the script may appear nonsensical, the sen tences are rich in phonemes.
When the recordings are complete, a team of linguists analyzes and tags various speech components and loads them into a database. The process Is called concatenative speech synthesis.
Where is ttie nearest Starbucks?
Q.
3. Search algorithms look for an answer to the query, then 1. Queries are encoded
s£
into digital audio, relayed to a nearby cell tower, and
access the speech database to assemble a response.
forwarded to an Apple
2. Apple's voice recognition
server.
•=1)0101
►«c|HO)I 001100^
system identifies words and
located
T
looks for patterns similar to common queries.
SECTION B
QUICKQUIZ 1.
2.
3.
rate refers to the number
4.
files store a series of
of times per second that a sound is measured
instructions that specify which notes to play,
during the recording process.
their duration, and their volume.
Audio formats such as fvlPS, Ogg Vorbis, and
5.
The audio components for Siri and similar ser
AAC have good sound quality even though
vices are obtained by recording real voices
they use
and then applying 1
compression.
The process of ripping tracks from an audio CD to a digital format such as MP3 is called digital audio
synthesis.
I speech
38
SECTION C, MODULE 1
Bitmap Graphics Digitize
Image Compression
Color Models
WEQgS
SECTION
BITMAP GRAPHICS iT^rai^'^TP
IMAGES ARE EVERYWHERE.Photos
Terminology
plaster Pinterest boards like so many posters on a Paris kiosk. Facebook feeds offer a continu
ous stream of vacation pics. Colorful icons dot the screens of every digital device. Infographlcs use images to convey information, and Web sites would be much less interesting if not for the col
orful graphics they display. Section C explains the technology that powers this polnt-and-shoot world to help you harness the power of digital graphics.
cuinputer grnphlcs still images motion graphics
bitmap graphic pixel scanner CCD
photosites BMP RAW TIFF JPEG GIF PNG RGB color model color depth TrueColor
image resolution resolutloD dependent pixelation pixel interpolation image compression
run-length encoding Image histogram
cloning Inpalnting digital compositing clipping path alpha blending image stitching stereoscopic imaging stereo pair stereogram anaglyph
Objectives I Describe the differences between bitmap and vector graphics file formats.
I Describe how cameras and scanners produce
I Explain how pixel color is represented in
I Explain how 3D images are created.
decimal, hexadecimal, and binary. I Calculate the size of a bitmap file given its resolution.
t Decide which graphics format to use for school,
digital Images.
t Describe the RGB and CMYK color models.
I Explain what a color histogram represents and how to use one.
I Provide examples of image stitching.
work,or personal projects. I Describe two types of stereoscopic imaging. i List six popular bitmap file formats.
39
DIGITAL CONTENT
BITMAP BASICS As digital devices gained the ability to display images, two types of com puter graphics evolved: bitmap and vector. These graphics can produce still Images, such as photographs and diagrams, or motion graphics,
Terminology The term 3D is used today to
refer to a variety of commercial products that should be called stereoscopic. For example, those so-called "30" glasses
such as videos and animations.
Computer graphics can produce two-dimensional flat images and stereo scopic images with visual depth that makes close-up objects appear near
with blue and red lenses are
enough to grasp.
technically stereoscopic, not 3D.
Despite their similarities, bitmap and vector images are quite different. Bitmap graphics may be the most common, but they are less flexible than vector graphics and cannot be used to model three-dimensional objects. To find out why, let's take a look at the characteristics of bitmaps.
As you continue in this module, pay attention to the difference
between 3D and stereoscopic.
I What is a bitmap graphic? A bitmap graphic, also called a ras ter graphic or simply a bitmap, is composed of a grid of tiny rectangular cells. Each cell is a picture element, commonly called a pixel. Each pixel is assigned a color, which is stored as a binary number. Figure 1-18 illustrates these basic characteristics of a bitmap graphic. FIGURE 1-18: BITrvlAP GRAPHICS ARE PIXEL BASED
One gray pixel stored as lOOlOllOlOOlOllOlOOlOllO
r ■ ■■■■IBM
Bu--csaBBBaa
»mmumc"r ■■■■■■ •■BaiLj
BBBBBIBB BBBBBBB^n rmmmmum-a rBBBBBB i LBBIBB. . I■■IBBU
> Where would I encounter bitmap graphics? Bitmap graph ics are used to create realistic images, such as photographs. You might also encounter bitmaps in the form of cartoons, images that appear in computer games, the desktop images displayed by your computer or smartphone, and photorealistic images derived from 3D graphical
QUICKCHECK Bitmap graphics are based on: a. codecs
objects.
When you use a digital camera or camera-enabled ceil phone, your pho tos are stored as bitmaps. A scanner also produces bitmaps. The photos you send or receive as email attachments are bitmaps, as are most Web page graphics.
b. pixels c.
rasters
d. vectors
40
SECTION C, MODULE
I How do I create bitmap images? You can create a bitmap graphic from scratch using the tools provided by graphics software—specifically a category of graphics software referred to as paint software. You might be familiar with paint software such as Adobe Photoshop, Apple Photos {included with Apple computers), and Microsoft Paint (included with Windows). Other alternatives, such as AutoDesk Pixir, are available online and as downloads for smartphones and laptops.
• How do I convert a printed image into a bitmap? When you have a printed image, such as a photograph, a page from a magazine, or a picture from a book, you can use a scanner to convert the printed image into a bitmap graphic.
TRY IT!
Check the features of the photo
app on your smartphone. Which of the following does it provide? Retouch
Crop Special effects
Exposure adjustment
A scanner essentially divides an image into a fine grid of cells and assigns a digital value for the color of each cell. As the scan progresses, these values are transferred to your digital device and stored as a bitmap graphics file. Scanners, such as the one pictured in Figure 1-19, are inexpensive and easy to use. FIGURE 1-19; SCAN IMAGES
To scan an image, turn on the scanner and start your scanner software. Place the image face down on the scanner
glass, then use the scanner software to initiate the scan. The scanned image
is saved in memory and can then be
saved on your computer's hard disk or in another storage location.
> How does a digital camera capture bitmap images? The lens
FIGURE 1-20: CAMERA CAPTURE
camera, the lens focuses light from the image onto a small image sensor
A digital camera's CCD converts the image captured by the camera lens into a grid of col ored pixels, which are stored
called a CCD (charge-coupled device). This technology is used in stand
as bits.
of a film camera captures the light from an image onto a light-sensitive roll of film, which is developed to produce a photographic print. In a digital
alone digital cameras and smartphone cameras. A CCD contains a grid of liny light-sensitive diodes called photosites. The number of photosites depends on the size of the CCD. A one-half-inch square CCD can contain more than 500,000 photosites. Each photosite detects the brightness and color for its tiny piece of the image (Figure 1-20). A CCD's photosites correspond to pixels. The more pixels used to capture an image, the higher its resolution, and the better the resulting picture. Cameras with larger CCDs produce higher quality images. Some cam eras contain multiple CCDs, which enhance the color quality of a camera's output.
TTfi
fviiNausv.
i .]
/'
41
DIGITAL CONTENT
► What are the most common bitmap file formats? Cameras, scanners, and graphics software may offer a choice of bitmap formats, such
as BMP, RAW, TiFF, JPEG, GIF, and PNG. Seiecting the best graphics file format to use depends on what you intend to do with the image. Figure 1-21 summarizes popuiar bitmap formats and their uses. FIGURE 1-21: BITMAP FORMATS
BITMAP FORMAT
BMP. pronounced "bee-em-pee" or "bump," is the native bitmap graphics file format of the Microsoft Windows environment- Microsoft Paint, Included as part of Microsoft Windows, creates BMP graphics files. The BMP format supports True Color and can be used for a wide variety of graphics applications, such as photographs, illustrations, and graphs. BMP files are often too large for email attach ments. BMP graphics are not supported by most browsers, so they are not used on the Web. RAW Image formats contain the unprocessed pixel data
Graphical elements, such as buttons and other controls for
graphical user inter faces
generated directly by a digital camera's sensor. Up to
Photographic images before they are stored
12 bits of data can be storedfor eachof the red, blue,
in other formats
and green values for a pixel, so RAW files are very large. Cameras that offer a RAW format also supply proprietary software to convert RAW data to JPEG or TIFF.
TIFF (Tagged Image File Format), or TIF, is a flexible and
platform-Independent graphics file format supported by most photoediting software packages. Scanners and digital cameras commonly store bitmaps in TIFF format because ft supports True Color and can be easily converted Into other graphics file formats.
JPEG (pronounced "JAY-peg"). which stands for Joint Photographic Experts Group, is a graphics format with built-in compression that stores True Color bitmap data very efficiently In a small file. The JPEG format Is popular for Web graphics, smartphone photos, and for photos
Desktop publishing and any projects that require highresolution graphics; not supported by browsers
General use, such as desktop publishing or Web pages, where flexibility In file size Is Important
attached to email messages. When creating a JPEG or con verting an Image to JPEG format, you can control the level
of compression and the resulting file size. The compression
process eliminates some image data, however, so highly compressed fries suffer some quality deterioration. GIF (Graphics Interchange Format), pronounced "gif" or "jiff," was specifically designed to create Images that can be
Web graphics and simple animations
displayed on multiple platforms, such as PCs and Macs. GIF
graphics are limited to 256 colors, but the format supports simple animations. Once a popular format for Web pages, GIF is being replaced by JPEG and PNG. PNG (Portable Network Graphics), pronounced "ping," is a graphics format designed to Improve on the GIF format. A
PNG graphic can display up to 48-blt True Color (trillions of colors). Unlike JPEG, PNG compresses bitmap files without losing any data, so compressed Images retain the same high quality as the originals. PNG was developed as a public domain format without any restrictions on its use.
Web graphics and other general uses
42
SECTION C. MODULE 1
BITMAP DATA REPRESENTATION
The fad that bitmap images are formed by a grid of pixels controls not only how those images are stored, but also how they can be modified. Color and resolution are key elements in bitmap data representation.
> How does each pixel get a color number? Today's color display devices represent color using the RGB color model. The color displayed for a pixel Is based on the Intensity of red, green, and blue signals received by the screen's color elements. Each red. green, and blue signal is assigned a value ranging from 0 to 255: 0 represents the absence of color, and 255 represents the highest intensity level for that color. A pixel appears while if the red, green, and blue signals are set to maximum intensity. If red, green, and blue signals are equal but at a lower intensity, the pixel displays a shade of gray. A pixel appears violet if it receives high red and blue signals andjust a bit of green (Figure 1-22).
Terminology The CMYK color mode! defines
four color values: cyan, magenta, yellow, and black. It is a subtractive system, whereas RGB is an additive system. In
CMYK, white is 00000000; but in RGB, 11111111 is white.
CMYK is typically used for
projects that require color printing.
FIGURE 1-22: RGB COLOR
White Red Green Blue 255
255
255
Violet Red 238
Green Blue 130
238
#FFFFFF
#EE82EE
111111111111111111111111
111011101000001011101110
Look at the center where the circles intersect to see the color that is gen erated. Color numbers are shown in decimal, hexadecimal, and binary.
I How are colors specified? Color values can be specified in decimal
(base 10), hexadecimal (base 16), or binary (base 2). Even artists need to know their way around number systems! Decimal notation tends to be used
QUICKCHECK
within graphics software, and hexadecimal(hex) notation is common on the
To represent the color violet In
Web. Whichever notation is used, however, color data is ultimately repre
sented as binary digits when it is stored and transmitted.
Figure 1-22, the decimal value for green is 130. What are the
In decimal, a pixel color is specified with values such as Red 238, Green
equivalent hexadecimal and binary values for green?
130, and Blue 238. In hexadecimal, each pair of digits refers to a color value. For example, the hexadecimal number for violet is #EE82EE. That
a, 82 and 10000010
means Ee(hex)= 238 Red,82(hex)= 130 Green, and EE(hex)= 238 Blue. You can find lists of colors and their hexadecimal triplets on the Web. In
binary, eight bits are used to represent the red value, another eight bits are used for the green value, and eight more bits are used for blue.
i How much data is required for each pixel color? With eight bits used to represent each color value, one pixel requires 24 bits. Because each R, G, and B can have 256 values, the number of possible colors is
16.7 million (256 x 256 x 256). The number of colors available in a graphic is referred to as color depth, images that use 24 bits for each pixel have a color depth of 24. 24-bit coior depth is also called True Color.
b, 255 and 11111111 c, EE and 11101110
43
DIGITAL CONTENT
The dimensions of the grid that forms a bitmap graphic are referred to as image resolution. The resolution of a bitmap is usually expressed as the number of horizontal and vertical pixels it contains. For example, a small FIGURE 1-23: PIXELATION
graphic for a Web page might have a resolution of 150 x 100 pixels—150
The enlargement of this bal loon appears pixelated because it was a small part of a photo that had few pixels.
pixels across and 100 pixels high.
I How does resolution relate to image quality? High-resolution graphics contain more data than low-resolution graphics. With more data,
it is possible to display and print high-quality images that are sharper and clearer than images produced using less data.
► Can I shrink and enlarge bitmaps? Bitmap graphics are resolution dependent because each element is a discrete pixel. Imagine that a bitmap image and its grid come on a surface that you can stretch or shrink. As you stretch the surface, the grid maintains the same number of horizontal and vertical cells, but each cell becomes larger, the grid becomes more visible, and the image develops an undesirable jagged appearance referred to as
pixelation. Simply stretching a bitmap to enlarge it doesn't produce highquality results (Figure 1-23).
► Can I change a bitmap's resolution? Graphics software offers options for changing the resolution of bitmap images. Suppose you reduce the resolution from 2160 x 1440 to 1080 x 720. The image grid becomes a quarter of its original size, but every fourth pixel was removed from the image, which typically reduces image quality.
If you attempt to enlarge a bitmap by increasing its resolution, your com puter must somehow add pixels because no additional picture data exists.
But what colors should these additional pixels become? Most graphics soft ware uses a process called pixel interpolation to create new pixels by averaging the colors of nearby pixels.
For some images, pixel interpolation produces an enlargement that appears
very similar to the original. Other images—particularly those with strong
TRY IT
curved or diagonal lines—may appear pixelated.
Open an image with Photoshop or similar graphics software.
I So how much resolution does a bitmap need to be printed
Check its size and its ppi. At 300
as a poster? Graphics software, such as Adobe Photoshop, can help you gauge how large an image can be printed before the quality begins to dete
ppi, how large can the image be printed before its quality begins
riorate. The minimum resolution for printed output is 72 pixels per inch (ppi).
to deteriorate?
Suppose that a photo taken with a smartphone has a resolution of 1936 x 2592.
At 72 ppi. the photo can be printed up to a size of 26" x 36".
To print the same photo but with a better resolution of 150 ppi, the poster would be
Pixel Dimensions: 14.4M' Width: 1936
pixels
Height: 2S92
pixels
much smaller: about 12" x 17" as shown
in Figure 1-24.
Auto... — Document Size: Width:
12.907
Height: 117.28 Resolulion:|150 FIGURE 1-24: IMAGE SIZE
Check these specifications to determine maximum
print size.
Cancel
inches Inches
pixels/inch
]'
V Scale Styles Resampling an Image requires pixel interpolation and may O Resample Image: decrease the image quality. To I Bicubic (best for smc maintain quality, do not resample. Constrain Proportions
44
SECTION C. MODULE
IMAGE COMPRESSION Bitmap files are big. An image with a resolution of 1936 x 2592 contains 5,018,112 pixels. Each pixel requires 24 bits, so the RAW image file could be as large as 120,434,688 bits (12,434,696 bytes or 12 megabytes). By any measure, that's a lot of data to store and move. Various image com pression techniques can be used to shrink bitmap files.
i What is image compression? Image compression refers to any technique that recedes the data in an image file so that it contains fewer bits. Many bitmap file formats automatically apply compression to an image
QUICKCHECK Run-length encoding is a typo of . a. bitmap digitization
b. RLE graphics format
when it is saved.
I Which formats apply lossless compression? TIFF, PNG,and GIF graphics formats offer lossless compression. Images stored in these for mats do not lose any quality when compressed.
c. lossless compression d. pixelation
I How does lossless compression shrink a file without throw ing away data? Various techniques exist for lossless image compression. As a simple example, consider a type of lossless compression called run-
length encoding. Run-length encoding (RLE)replaces a series of similarly colored pixels with a binary code that indicates the number of pixels and their colors.
Suppose that a section of a picture has 167 consecutive white pixels, and each pixel is described by three bytes of data. RLE compresses this series of 167 bytes into as few as four bytes, as shown in Figure 1-25. FIGURE 1-25; RUN-LENGTH ENCODING
The data for the first 167 white
pixels can be compressed as
NUMBER
NUMBER
OF PIXELS
OF PIXELS
(DECIMAL)
(BINARY)
PIXEL PIXEL
COLOR
COLOR
(BINARY)
White
llllllll 1111111111111111
00000101
Biack
00000000 00000000 00000000
QOQIIOIO
While
111111111111111111111111
1
OOOOOOOl
Black
00000000 00000000 00000000
5
00000101
Yeilow
llllllll llllllll 00000000
00000000 OOOOOOOQ 00000000
167
lOlOOlll
11111111. The first byte is the binary representation of 167. The next three bytes are the
5 26
code for white.
10100111 11111111 11111111
1
OOOOOOOl
Black
23
00010111
White
llllllllllllllllllllllll
2
00000010
Black
OOOOOOOQ 00000000 00000000
7
00000111
Yellow
111111111111111100000000
18
OOOIOOlO
Biack
00000000 00000000 00000000
5
00000101
White
llllllll 1111111111111111
1
OOOOOOOl
Biack
00000000 00000000 00000000
25
00011001
Yeilow
llllllll 1111111100000000
1
OOOOOOOl
Biack
OOOOOOOQ OOOOOOOO 00000000
1
OOOOOOOl
White
llllllllllllllllllllllll
OOOOOOOl 11111111 11111111 00000000
QUICKCHECK
00000011 11111111 11111111 11111111 Is this the correct RLE for the OOOOOOOl 00000000 00000000 00000000
row shown below?
00011001 11111111 11111111 00000000 OOOOOOOl 00000000 00000000 00000000
a. Yes
OOOOOOOl 11111111 11111111 00000000
b. No
□:
1 1 1 1 1 1 1 1 1 1 1 1 1
rr
45
DIGITAL CONTENT
► Which formats apply lossless compression? JPEG files are com pressed using lossy compression, so some quality is lost when the file is saved. When saving an image as a JPEG, you may be able to select a com pression level. Take care with lossy compression to ensure that your image is not further compressed every time you save it (Figure 1-26). FIGURE 1-26: JPEG COMPRESSION
Matte:
Selected com
None
pression level
— image uptions -
«
Quality; f? smzl) fi k
| 1 Medium
;'
1
OK
[
Cancel
i The original file was 14 MB.
0 Preview
With Medium
compression, the
U/ge ftit 7S9.8X
size shrinks to 759.8 KB.
> What happens during lossy compression? Lossy compression techniques discard some data from an image to shrink its file size. JPEG is
a lossy version of run-length encoding that can be applied to images, such as photographs, that don't have large areas of solid color.
TRY IT!
A True Color photograph might not have any adjoining pixels of the same
color. Applying RLE to such a photo would not result in any compression whatsoever. JPEG preprocesses an image by tweaking the colors in adjoin ing pixels so that they are the same color whenever possible. After this preprocessing is complete, run-length encoding can be applied with more success.
For many images, lossy compression results in only a minor reduction in the sharpness of the image. The reduction in quality can be unnoticeable in many circumstances. Figure 1-27 illustrates a section of a noncompressed
image and a section of that same image after JPEG compression has been
Open a JPEij image, use the
Save As command or Duplicate command to make a copy of the image with a name different from the original. As you save the copy, apply as much compression as possible. Close both files and then
reopen them. Is there a visible
difference in quality?
applied. Can you see any difference? FIGURE 1-27: COMPRESSED IMAGE QUALITY
Noncompressed JPEG imugc
JPEG iinu
I Can 1 compress images using general compression tools? The same compression tools used to shrink text and numeric data can be used
with bitmaps. Images stored in file formats such as JPEG and PNG, which are automatically compressed, may not shrink much, whereas RAW files,
BMPs, and noncompressed TlFFs may shrink quite a bit.
v.iiii jSLo comprusiiuit
46
SECTION C, MODULE 1
MODIFYING BITMAP IMAGES
"Photoshopping" has become an everyday term for fixing up photos that are underexposed, are marred by red eye effects, or display an awkward object in the background. Photoshop software and a host of iocal and online apps make it easy to modify digital images.
I What characteristics of a bitmap can I modify? Because bit map graphics are coded as a series of bits that represent pixels, you can use graphics software to modify or edit this type of graphic by changing the
QUICKCHECK When modifying a JPEG image, which of the following is true?
a. It Is stored in a compressed format b. It cannot be modified until
you unzip it
color of pixels.
In the early days of digital Imaging, primitive photoediting was limited to
c. You can no longer edit
changing the color of individual pixels, or roughly cropping out objects to
individual pixels in the
delete them or paste them elsewhere.
image
Today, photoediting software includes sophisticated tools based on graph ics algorithms that produce amazing transformations of digital images. Knowing how to use the available toolset can improve the images you pro duce. Understanding the extent to which photos can be edited also builds awareness of the "tricks" that can be used to alter images in news stories and other information sources.
Noise reduction. In an image,"noise" refers to artifacts such as spots, dust, and scratches that may be produced when old photos are scanned.
TRY IT
Some Images have undesirable speckles resulting from low light conditions.
Histograms can perform miracles! Open a photo using
Noise reduction tools can remove these noisy artifacts.
software such as Photoshop,
Image enhancement.A mediocre photo can benefit from image enhance ment techniques that correct brightness, improve color saturation, and
sharpen the focus. Beyond one-click enhancement tools, image editors provide an image histogram that can be used to adjust the brightness val
Apple Photos, or Photo Galiery. Locate the histogram control and experiment to see what you can reveal In the shadows.
ues for various ranges of dark, mid-range, or light pixels (Figure 1 -28). FIGURE 1-28: HOW IMAGE HISTOGRAMS WORK
A Levels
Dark
Mid-range
& Lcvc
100111
Light
The histogram for the original photo shows lots of dark pixels (the buildings) and a few light ones (the sunset).
Dark
Mid-range
Light
By sliding the Levels bar, more pixels become mid-range and the details of the buildings begin to emerge.
47
DIGITAL CONTENT
Selective color change. The mannequin at an online store displays a red dress, which is also available in other colors. How would it look In blue?
The photographer did not have to take a photo of the dress In every color. Photoediling software can outline the dress in the original photo and then apply the new color. Similar algorithms are used to colorize black-and-white photos.
Correcting image distortion. The human eye compensates for per spective, but the camera does not. When a rectangular object in a photo appears distorted, reconstructing the straight edges is easy with photo edit ing software (Figure 1-29). FIGURE 1-29; CORRECTING IMAGE DISTORTION
Lens distortion makes the
computer unit appear angled.
Correcting image distortion straightens the sides.
Cloning. Cloning employs algorithms that pull pixels from one area of an image and then apply them to another area. Cloning can be used to remove small blemishes as shown In Figure 1-30. FIGURE 1-30: ERASING ARTIFACTS WITH CLONING
Cloning works well to remove natural blemishes
and photo artifacts, such as the white spot under
the subject's eye.
I
r
1
inpainting. Reconstructing lost, unwanted, or deteriorated areas In a
photo is called inpainting. Using information from nearby pixels, and tak
ing into account the overall structure of the image, Inpainting algorithms essentially scrub out designated areas and miraculously replace the miss ing pixels with a background or an object that fits with the rest of the image (Figure 1-31). FIGURE 1-31: INPAINTING WITH CONTENT-AWARE FILL
~r-..
The original photo Includes a man in the foreground.
Photoshop's Content-Aware Tiil algorithm creates a
Removing the man leaves a blank area.
background to fill the blank area.
SECTION C. MODULE 1
48
Digital compositing. Have you seen the photo of a great white shark attacking a U.S. Air Force helicopter? That image and many more bizarre
photos are a product of digital compositing, which assembles several images into one. Compositing is achieved using two tools: clipping paths and alpha blending.
A clipping path essentially cuts an object out of an image and knocks out the background to make it transparent. This object can then be superim posed on a background. Alpha blending alters the pixel colors where the edges of the object and the background meet, so that the object appears to
TRY IT!
You can see digital compositing
in action by going to YouTube and searching for ConfenrAware Fill. If you have access to Photoshop, open a few of your own photos and see what kind of crazy composite you can create.
merge with the background (Figure 1-32). FIGURE 1-32: DIGITAL COMPOSITING
The object is straightened and resized before
A clipping path cuts out an
object from the background.
being merged into the photo.
PANORAMIC AND 360 IMAGES
Photos are no longer limited to flat rectangles. They've gone beyond the box to become panoramic views, 360-degree images, and immersive
photo spheres. These image formats are made possible by a technology called image stitching.
I What is image stitching? Image stitching (or photo stitching) cre ates a panoramic image by combining two or more separate photographs that have overlapping edges. The photos are captured from a fixed loca tion. The photographer stands in one place and may rotate, but cannot
QUICKCHECK Image stitching knits photos into panoramic, cylindrical,
and spherical images, but what technique is used to insert
parts of one Image into another
step forward, back, or to the sides.
image?
i What kinds of images does stitching produce? Stitching uses photos in standard bitmap formats, such as JPEG and PNG.The stitching process is based on sophisticated algorithms that match pixels near the edges of each image to determine how they fit together. Stitching con nects the photos and produces various kinds of images called projections (Figure 1-33)that can be viewed on flat screens or with VR headsets.
a. Cloning b. Inpainting
c. Compression d. Compositing
FIGURE 1-33: IMAGE STITCHING
Rectilinear projections are viewed
Cylindrical projections produce
in a two-dimensional plane, typi
a 360-degree image similar to the view from a merry-go-round.
cally 3S a long horizontal photo. These images can be produced
Images are captured from the
using the panoramic feature of a
front, back, and sides, and then
digital camera.
stitched together.
Spherical projections include images from the 360-degree verti cal view as well as the 360-degree horizontal panorama.
49
DIGITAL CONTENT
i Are special software and equipment required to capture photos for stitched images? A series of photos can be manually stitched together using software such as Autopano and AutoStitch, but many digital cameras take care of stitching automatically. Most smartphones include a camera app with a panoramic function for capturing a rectilinear projection. Panoramic functions are also available on most standalone digital cameras.
For producing 360-degree cylindrical projections with a smartphone, a third-party app might be required. Apps, such as Google Street View and Photo Sphere, guide photographers through the rotational process to cap ture a 360-degree view, which is then stitched together into a continuous image.
Special cameras are also available for capturing and stitching photos for cylindrical and spherical projections. These cameras typically use a fisheye lens to capture a half-sphere (think of an upside-down cereal bowl) of images. Two of these fish-eye lenses can be linked to capture a full sphere of images. STEREOSCOPY
Cylindrical and spherical projections can give viewers the sense of being immersed in a scene, but elements within the image remain flat and twodimensional. Computer graphics technology can produce images with the
illusion of depth that make some objects seem close enough to touch. These images are sometimes referred to as 3D, but technically they are stereoscopic.
► What is stereoscopic imaging? Stereoscopic imaging (or stereoscopy) is a graphical technique used to produce an illusion of spatial depth from flat, two-dimensional images. The technique dates back to the 1800s and the use of simple stereoscopes (Figure 1-34). FIGURE 1-34: STEREOSCOPIC IMAGING
Image
Most cameras capture a photo using only one lens, so the image does not convev spatial depth. Two
Simply looking at two similar pho
Because human eyes are spaced
cameras, or a camera with two
apart, they project two slightly different images onto the reti nas. Those images are processed by the brain, which constructs
front-facing lenses, can produce two photos called a stereo pair that mimic the dual Images captured by human eyes. Two images from
viewed with only one eye. A ste reoscopic viewer, or stereoscope,
an Image of the world that cor responds to a three-dimensional environment with spatial depth.
a stereo pair displayed side by side
away from the eyes and required
are called a stereogram.
a partition between the lenses to
n
Brajn
tographs does not produce a 3D
experience. Each Image must be
provides this differentiation using lenses. Old-fashioned stereoscopic viewers placed images 5-11"
separate overlapping views.
50
SECTION C, MODULE I
► What's the modern version of stereoscopic imaging? Modern stereoscopic imaging uses digital images and viewers. Apps for capturing a stereo pair with a single lens camera are available, but somewhat tricky to use. As more cell phones sport dual front-facing cameras, creating ste
QUICKCHECK Name two techniques for creating stereoscopic images.
reo pairs becomes easier.
a. Anaglyphs and stereograms
A stereoscopic viewer, such as Google Cardboard, displays images gener ated by mobile devices. A smartphone simply slides into the device where
b. Compositing and overlays
an app displays a digital stereogram (Figure 1-35).
c.
Blue and red
d. Steganography and depthing FIGURE 1-35; DIGITAL STEREOSCOPY
Google Cardboard stereoscope
Digital stereogram
I What about those red and blue stereo
FIGURE 1-36; ANAGLYPHIC IMAGE
glasses? An anaglyph Is a graphic composed of two images, one that is tinted red and the other that is tinted blue. The two images are printed on top of each other to produce a stereoscopic effect (Figure 1-36). Viewing anaglyph Images requires red-green or red-blue glasses. Usually, the red lens on the left filters out blue and green, while the blue- or green-colored lens on the right filters out red. As a result each eye sees a slightly different image. The two images are processed in the brain to give the impression of three dimensions.
SECTION C
QUICKQUIZ 1.
A digital camera captures images on the pho-
tosiles of a(n) I
bits for each pixel. 4.
so
Two images from a stereo pair displayed side by side are called a(n)
A characteristic of bitmap graphics Is that they are resolution
Graphics stored in True Color format require
1. (Hint: Use
the acronym.) 2.
3.
5.
The most popular True Color formats for Web
that reducing the resolution also reduces the
graphics include 1
Image quality.
JPEG. (Hint: Use the acronym.)
! and
51
DIGITAL CONTENT
Vector Graphics Charactenstics
Digitize
SECTION
VECTOR GRAPHICS tS-U-
IF YOU'VE PLAYED any computer games
Terminology
recently or watched an animated movie, you've seen computer-generated graphics. This section begins with two-dimensional vector graphics. You'll find out how they differ from bitmaps and
vector vector graphic SVG rasterization
why you might want to use them. After covering the basics for two-dimensional graphics,the sec tion progresses to static 3D graphics and concludes
3D graphics wireframe rendering ray tracing vector animation frame
keyframe pre-rendermg CGI real time rendering game engine
with a look at vector motion graphics for virtual reality videogames and instructional modules.
Objectives I Identify vector graphics used on Web sites and social media.
I Based on the characteristics of vector graphics, determine when they are more suitable for a project than bitmaps.
> Draw simple vector shapes and outlines using drawing software.
I Convert a vector drawing into a bitmap.
I Explain the process of rendering a 3D wireframe into an image.
I Identify the key difference between rendering 3D graphics for computer games and creating special effects for movies.
i Explain how vector graphics relate to augmented reality.
I Describe the type of graphics commonly used for virtual reality.
52
SECTION D, MODULE 1
VECTOR GRAPHICS BASICS
The first graphics that appeared on computer screens were not photos, but simple shapes consisting of lines and curves, each referred to as a vector. This type of graphic evolved in sophistication as the shapes became Tilled, then shaded, and then textured (Figure 1-37). FIGURE 1-37: VECTOR LINES AND SHAPES
Lines
Shape
Filled shape
/ Gradient-filled
3D shape
2D shape
Gradient-filled
3D shape
I What is a vector graphic? A vector graphic consists of a set of instructions for creating a picture. Instead of storing the color value for each pixel, a vector graphics file contains instructions that a computer uses to create the shape, size, position, and color for each object in an image.
QUICKCHECK Vector commands in the
example at left are written using .
Vector drawing instructions are similar to those a drafting teacher might give students: "Draw a line of width 3 beginning at coordinates 20, 20 and
a. Flash
extend the line to coordinates 20, 60. Color the line with #OOBFOO (green)."
b. Basic
The command in "computerese" using an XML script would be:
c. WOOBFOO
d. XML scripts
Vector graphics include standard shapes such as circles and rectangles, so they don't have to be built from scratch. The green square in Figure 1-37 was created by specifying a rectangle beginning at coordinates 100,100 with a width of 400 and a height of 400, filled with #006F0O, like this:
QUICKCHECK What kind of shape would the following vector command create?
What is a computer? Most people can formulate a mental picture of a computer, but computers do so many things and come in such a vari ety of shapes and sizes that it might seem difficult to distill their common characteristics into an all-purpose definition. At its core, a computer is a multipurpose device that accepts input, processes data, stores data, and produces output, ail according to a series of stored instructions.
1940, you might be surprised to find a computer defined as a person who performs calculations. Prior to 1940,
machines designed to perform calculations were usually referred to as calculators and
Input is whatever is typed, submitted, or transmitted to a computer. Output is the result produced by a computer. Input and output can be handled by components contained within the computer or by add-on, such as keyboards and printers, that are attached to the computer with cables or
use of the term computer emerged in the 1940s, when
connected wireiessly.
the first electronic computing
Computers process data by performing calculations, modifying docu ments and pictures, drawing graphs, and sorting lists of words or numbers. Processing is handled by the computer's central processing unit(CPU). The CPU of most modern computers is a microprocessor, which is an electronic component that can be programmed to process data.
devices were developed.
tabulators, not computers. The modern definition and
Computers store data and the software that processes data. Most computers have temporary holding areas called memory in addition to long-term storage housed on hard disks or flash drives. Figure 2-1 illus trates the IPOS (input, process, output, store) activities characteristic of computers. FIGURE 2-1: THE IPOS MODEL DEFINES COMPUTERS
calculate sort
draw
manipulate words generate sound
PROCESS
INPUT
OUTPUT
QUICKCHECK Where does sorting fit into the
words and symbols numbers
dates
photos temperatures
documents
0
locations
audio recordings video footage
music
IPOS model?
graphs images
a. Input
movies
b. Process
schedules
c. Store
maps
STORE data files
software
text messages
d. Output
SECTION A, MODULE 2
86
I What's so significant about a computer's ability to store instructions? The instruclions Lhat tell a digital device how to carry out
processing tasks are referred to as a computer program, or simply a program. These programs form the software that sets up a computer to do a specific task. When a computer "runs" software, it performs the instruc tions to carry out the task.
QUICKCHECK The stored program concept turns computers into
The first computers were "programmed" to perform a specific task by con
necting wire circuitry in a certain way. Changing tasks meant rewiring the
a. calculators
circuits. The term stored program means that a series of instructions for a computing task can be loaded into a computer's memory. These instruc tions can be replaced easily by a different set of instructions when it is time
b. smartphones
for the computer to perform another task. This ability to switch programs
c. multipurpose devices d. software
makes computers multipurpose devices (Figure 2-2). FIGURE 2-2: STORED PROGRAMS MAKE COMPUTERS VERSATILE MACHINES
The stored program concept
allows you to use a computer for one task, such as word process
ing, and then easily switch to a
different type of computing task, such as editing a photo or play ing music. It is the single most Important characteristic that dis
tinguishes computers from other simpler and less versatile digital devices, such as digital clocks, Word processing
Music
software
software
I What kinds of software do comput ers run? Computers run three main types of software: application software, system soft ware, and development tools (Figure 2-3). A
calculators, and cameras.
FIGURE 2-3: SOFTWARE CATEGORIES
computer can be applied to many tasks, such as writing, number crunching, video editing, and online shopping. Application software is a set of computer programs that helps a per
son carry out a task. Application software is sometimes referred to as an app.
Whereas application software is designed to help a person carry out a task, the primary purpose of system software is to help the computer system monitor itself in order to function efficiently. An example of system soft ware is a computer operating system (OS), which is essentially the master controller for all the activities that take place within a computer. Development tools are used for cre ating software applications. Web sites,
operating systems, and utilities. Examples of development tools include computer program
ming languages, such as C++, and scripting languages, such as HTML,
Operating
Programming
systems
languages
Mobile epps
CPU monitor
Scripting languages
Sproadsheet
Device drivers
Word
software
Debugging tools
DIGITAL DEVICES
CIRCUITS AND CHIPS
The first computers were closet-sized devices filled with wires, vacuum tubes, transistors, and other bulky components. As digital electronics evolved, components became smaller and smaller. Open up a digital device. You won't see clumps of wires and gears. Instead, you'll see small circuit
boards and integrated circuits. These tiny components are the essence of
QUICKCHECK In Figure 2-4, the fiery bit
digital electronics.
> What are digital electronics? Digital electronics represent data bits as electrical signals that travel over circuits in much the same way that electricity flows over a wire when you turn on a light switch. To represent data, such as 01101100, high-voltage signals are used for 1 bits, and lowvoltage signals are used for 0 bits. All the calculations performed by digital devices take place in a maze of electronic circuitry (Figure 2-4).
a. represents a 1 b. is heading toward a resistor c. is a low-voltage signal d. represents a 0
FIGURE 2-4: A SIMPLE CIRCUIT
This little circuit is
o
composed of electrical pathways (lines), tran sistors (circles), and resistors (rectangles). The electronics for
digital devices require millions of similar
circuits. Today, this circuitry is condensed into integrated cir cuits.
i What's an integrated circuit? An integrated circuit (IC) Is a set of microscopic electronic components etched onto a thin slice of semi conducting material. The terms computer chip, microchip, and chip are commonly used to refer to integrated circuits. Some integrated circuits are devoted to collecting input, while others might be devoted to processing tasks, output, or storage. The first computer chips contained fewer than 100 miniaturized components, such as resistors and transistors. The chips for today's digital devices contain billions of transistors.
QUICKCHECK There is an abundant supply of materials for fabricating semiconductors because:
Semiconductors, such as silicon and germanium, are substances with properties between those of a conductor (like copper) and an insulator (like wood). To fabricate a chip, the conductive properties of selective parts of the semiconductor can be enhanced to essentially create min iature electronic pathways and components, such as transistors, as shown in Figure 2-5.
a. They are made from purified silicon (sand). b. They are basically insulators made from wood.
FIGURE 2-5: COMPUTER CHIPS ARE MADE FROM SEMICONDUaORS
Blank semiconductor
Chip etched with circuits
Chip ready for packaging
88
SECTION A, MODULE 2
I Aren't chips black? Integrated circuits are packaged in protec tive carriers that vary In shape and size. Figure 2-6 iiiuslrates some chip carriers, including small rectangular DIPs (dual in-iine packages) with caterpiiiar-iike legs protruding from a black, rectangular body, and pincushion-iike LGAs (land-grid arrays). FIGURE 2-6; CHIPS ARE HOUSED IN CERAMIC PACKAGES
TRY IT!
DIPs have two rows of pins that connect the chip to a circuit board.
An LGA is a square chip package, typicaily used for microprocessors, with
The chips on a circuit board have identifying numbers that
pins arranged in concentric squares.
you can look up online. Suppose you've opened the system unit
> How do chips fit together? The electronic components of most digital devices are mounted on a circuit board called a system board, motherboard, or main board. The system board houses all essential chips and provides connecting circuitry between them. Figure 2-7 illustrates the main chips on the front and back sides of a laptop system board.
of a Microsoft Surface tablet and
you're looking at a chip labeled Atme! MXT154E. Can you find out what it does?
FIGURE 2-7: A SYSTEM BOARD HOLDS CHIPS AND OTHER COMPONENTS
Processor
Input and output
From
Control
chips
Audio processing
Rear
Memory |
89
DIGITAL DEVICES
COMPONENTS
When you acquire a new digital device, your first step is to locate the power button and all the other hardware components. The devices we use today
have a fairly predictable collection of features, depending on the device's form factor.
I What is a form factor? in the computer industry, the term form factor refers to the size and dimensions of a device or components, such as circuit boards and system units. The term system unit is tech speak for the part of a digital device that holds the system board, it can apply to the body of a smartphone or laptop, as well as to the tower unit of a desktop computer. Digital devices are available in ail sorts of form factors; some of the most popular include component, ciamsheii, and slate.
► What are the features of a component system?Acom-
QUICKCHECK How many on/off buttons would you expect on a component system like the one in Figure 2-8?
a. One on the system unit
ponent device is composed of various standalone parts, such as a display unit, system unit, and keyboard. Components can be connected
using cables or wireless signals. Most of the first personal computers were component systems. Today, this form factor is much less popular because of the effort required to assemble the components. Figure 2-8 illustrates the hardware features of a typical component system.
b. One for each standalone device
c. One on the system unit and one on the display device
FIGURE 2-8: A TYPICAL COMPONENT SYSTEM
Camera
Display device
Display on/off button
System unit
Hard disk dnve
and system board
(inside system unit)
CD/DVD drive
Computer on/ off button
Keyboard Mouse
90
>
SECTION A, MODULE 2
What are the features of a clamshell device? Clamshell
devices have a keyboard as the base and a screen on the hinged cover. The system unit on these devices contains all of the basic components required for input, processing, storage, and output {Figure 2-9). FIGURE 2-9; A TYPICAL CLAMSHELL DEVICE
MkrophonJ
Camera
QUICKCHECK Display screen How many components are typically housed on the top half of a clamshell device? a. One
System unit
b. Two c. Three
d. Four On/off button
CD/DVD drive
Touchpad
Hard disk drive, battery, artd system board (inside system urtit)
• What are the features of a slate device? Devices config ured in the slate form factor feature a touchscreen that covers most of
the device's surface. The screen can display a virtual keyboard for text and numeric input. An additional control, such as a Home button or a circular control pad, is featured on some slate devices. The system unit also includes controls for commonly used features, such as volume and airplane mode (Figure 2-10).
TRY ITt Chock out the devices thdt
you own. Can you find all of the components listed in the figures?
FIGURE 2-10: A TYPICAL SLATE DEVICE Camera
RIng/sllent switch
CaiicpI
button']
Volume buttons
Battery, antenna,
and system board Display screen
Q
I
Iq w e r Virtual keyboard
(Inside system unit)
iSt ^ & ffw t y u I 0 p
s d f g h j k
1
|0 zxevbnm0 1123 ® Home button
Speaker I
91
DIGITAL DEVICES
MAINTENANCE
Digital devices can be costly. You can extend their life (with a bit of regu lar maintenance. There are four components of digital devices that require
maintenance: the system unit, keyboard, screen, and battery,
i How do I start? Before you undertake any maintenance, turn the device off—that's off, not just asleep—and disconnect any power cables.
Doing so will prevent random screen swipes or key presses from altering your device settings.
► Which cleaning products are safe to use? The products you can use depend on the component you are cleaning. What might work well to scrub out stubborn stains on the system unit case could permanently cloud or scratch your touchscreen. Always follow the manufacturer's advice for cleaning procedures and products (Figure 2-11). FIGURE 2-11: CLEANING GUIDELINES
harsh
Never immerse a device
cleaning products;
Don't
use
in liquid; water and
follow manufacturer
electronics don't mix.
Do not allow cleaning agents to drip on key boards or touchpads.
recommendations.
Do not spray cleaning agents directly on the
device; spray them onto a cleaning cloth.
> What kind of maintenance does the system unit require? Basic system unit maintenance is simple. You want to keep the unit clean, prevent it from overheating, shield it from damage, and protect it from electrical surges (Figure 2-12). FIGURE 2-12: BASIC SYSTEM UNIT MAINTENANCE
Dust with a clean
Use a low vacuum
Use a protective case
Only plug into a surge-
microfiber cloth and
setting to remove
or carrying bag.
protected outlet.
disinfect with anti
dust from fan vents.
bacterial wipes.
i How can I safely clean and disinfect a touchscreen? Touchscreens collect fingerprints and are a breeding ground for bacte
ria, so it is a good idea to clean them periodically. Many touchscreens are made from Gorilla Glass, which Is designed to resist scratching and cracking. Damaged screens can be replaced, but that can cost close to
$100, so a few preventive measures may help you avoid costly repairs. A plastic screen protector is the first line of defense against scratches
QUICKCHECK What is the first step for hardware maintenance?
a. Wipe It with a soft clothb. Remove the screen protector.
and cracks. These films can be cleaned using water and a soft cloth, or a
c.
disinfecting wipe. When the screen protector gets grubby, simply peel it
d. Vacuum the fan vents.
off and replace it with a new one.
Turn the device off.
92
SECTION A. MODULE 2
Without a screen protector, you will have to carefully clean the screen itself. Many touchscreens have an oteophobic coating designed to repel the oils deposited by fingertips. When alcohol is used to clean these screens, each application degrades the coating. Non-alcohol wipes are available, or use eyeglass cleaner.
> What about my keyboard? Keyboards quickly build up grime, gather dust, and collect crumbs. To start the cleaning process, turn the keyboard upside down and shake it gently to dislodge debris. Most manu facturers suggest using an antibacterial wipe to clean key surfaces. Take a moment to test the cleaning product on a small unnoticeable spot just to make sure it will not discolor the keys or leave a residue. Use cotton swabs to clean between the keys.
I What is the best way to clean up spills? Liquids and elec tronics don't mix. If you spill liquid on a device, turn it off immediately. With luck, that step will prevent electrical shorts that would permanently damage circuit boards. Once the device is off, you can assess the dam age. If the spill is water, dry off the device, shake out the moisture, and set it in a warm, dry place where there is good air circulation. A fan or hair dryer set on low can help drive out moisture. Allow the device to dry for at least 72 hours.
Sticky spills are another matter. If the goo has penetrated the interior of the device, it is best to leave the cleanup to a professional. If you think the spill only affected the surface, you can wipe the device with clean water and allow it to dry for 24 hours (Figure 2-13). FIGURE 2-13: DO NOT SET LIQUIDS NEAR A KEYBOARD
QUICKCHECK When liquid spills on a digital device, what should you do? a. Shut off the device
immediately.
b. Back up all your data before turning off the device. c. Rinse the device with clear water.
d. Call *611.
> How do I maintain the battery for a device? You know how it goes. It happens to everyone. The battery on your device dies
just when you really need it. Battery life is the time your device operates before it must be recharged. Battery lifespan is the amount of time a bat tery lasts until it must be replaced. Good maintenance extends the life of your battery and Its lifetime, so your digital devices are ready when you need them.
Most of today's battery-powered digital devices contain a lithium ion (Li-ion) battery. Unlike batteries of the past, Li-ion batteries contain no toxic compounds and operate efficiently, but they are sensitive to heat.
93
DIGITAL DEVICES
Li-ion batteries can occasionally overheat, and in the worst case, they can explode. Most devices today contain circuitry to prevent heat-trig gered damage, but smart consumers don't operate devices that are hot to the touch.
Batteries have a discharge rate at which they lose charge even when not in use. The discharge rate for Li-ion batteries is quite low—about 1.5% per month—so the batteries in your devices basically discharge
i
only as they are used.
Device manufacturers often advertise battery watts per hour (Wh). A 60 Wh battery will last 60 hours if it expends 1 watt per hour. A typical laptop uses about 30 watts per hour, however, so a 60 Wh battery can power the
device for two hours(60 Wh + 30 watts = 2 hours). Some applications require more battery power than others. Locationbased apps that keep track of your whereabouts are constantly using extra power to check cell towers or Wi-Fi networks. Push applications,
such as autoretrieving email, make your device continually check for new messages. To extend battery life, disable these kinds of apps when you are not using them. Figure 2-14 summarizes good practices for charging
and using Li-ion batteries. FIGURE 2-14: EXTEND THE LIFE OF THE BATTERIES IN YOUR DEVICES
QUICKCHECK Charge when the low battery indicator comes on. Suppose your smartphone has a battery rated at 5.2 Wh. When
Avoid totally discharging the battery.
Remove the device from the charger when it's fully charged.
you use map guidance, the phone draws 1.3 watts per hour. How long can you travel before your phone runs out of juice? a. One hour
If your device becomes hot while in use, turn it off. b. Four hours
Disable unused apps that constantly connect to the Internet.
c. Eight hours d. Ten hours
Switch to airplane mode when in an area with no cell coverage.
SECTION A
QUICKQUIZ 1.
A computer is a multipurpose device that accepts
input, processes
4.
I , stores
data, and produces output, all according to the
Three form factors for digital devices are component,
5.
Touchscreens on many digital devices have a(n)
instructions of a stored program. 2.
An operating system is an example of software.
3.
A(n)
circuit is a set of
microscopic electronic components etched onto a thin slice of semiconducting material.
, and slate.
coating that resists finger prints.
94
SECTION B, MODULE 2
Digital Devices Enterprise Computers
\ Personal
Computers
SECTION
« DEVICE OPTIONS
WHEN SHOPPING for a new device, the choices may seem overwhelming. Section B helps
you sort out the devices that are on the market by function and price. It addresses the tricky issue of
Terminology supercomputer mainframe SCrver
personal computer desktop computer
compatibility and other factors important to con
portabio computer laptop computer
sumers.
Chromebook tablet computer slate tabiut 2-in-1 smartphones
PDA wearable computers microcontrollers compatible
Objectives List three types of computers that are commonly used in businesses,serve multiple simultaneous users, and offer very fast processing speeds. Draw a hierarchy chart showing the classifications of personal computers.
List two applications that would tend to require a desktop computer.
List the devices that typically support cellular voice and texting. List devices that can support cellular data plans.
Specify three operating systems that are common in each of the following categories: desktops,laptops, tablets, and smartphones.
95
DIGITAL DEVICES
ENTERPRISE COMPUTERS At one time, it was possible to define three distinct categories of computers. Mainframes were housed in large, closet-sized metal frames. Minicomputers were smaller, less expensive, and less powerful, but they
FIGURE 2-15:"BIG* COMPUTERS
could support multiple users and run business software. Microcomputers were clearly differentiated from computers in other categories because they were dedicated to a single user and their CPUs consisted of a single micro processor chip.
(
Today, microprocessors are no longer a distinction between computer
categories because just about every computer uses one or more micropro
cessors as its CPU.The term minicomputer has fallen into disuse, and the
terms m/crocompuferand mainframe are used with less and less frequency.
t What are the most powerful computers? Today's most power ful computers include supercomputers, mainframes, and servers. These devices are generally used in businesses and government agencies. They have the ability to service many simultaneous users and process data at very fast speeds(Figure 2-15).
Supercomputer
Supercomputers. A computer falls into the supercomputer category if it is, at the time of construction, one of the fastest computers in the world. Because of their speed, supercomputers can tackle complex tasks that just would not be practical for other computers. Typical uses for supercomput ers include breaking codes, modeling worldwide weather systems, and simulating nuclear explosions. Computer manufacturers such as IBM, Cray, and China's NRCPC have in recent years held top honors for the world's fastest computer. Supercomputer speeds are measured in petaflops(PFLOPS). One petaflop is an astounding 1,000,000,000,000,000 (quadrillion) calculations per sec ond. That's about 20,000 times faster than your laptop computer. Mainframes. A mainframe computer (or simply a mainframe) is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users. Its main processing circuitry is housed in a closet-sized cabinet like the one shown at left; but after large components are added for storage and output, a mainframe installation can fill a goodsized room.
Mainfreme
Mainframes are generally used by businesses and government agencies to provide centralized storage, processing, and management for large amounts of data. For example, banks depend on mainframes as their com puter of choice to ensure reliability, data security, and centralized control. The price of a mainframe computer typically starts at several hundred thou sand dollars and can easily exceed $1 million. Servers. The purpose of a server is to "serve" data to computers con nected to a network. When you search Google or access a Web site, the information you obtain is provided by servers. At ecommerce sites, the store's merchandise information is housed in database servers. Email,
chat, Skype, and online multiplayer games are all operated by servers. Technically, just about any computer can be configured to perform the work of a server. However, computer manufacturers such as IBM and Dell offer devices classified as servers that are especially suited for storing and distributing data on networks. These devices are about the size of a desk Servers
drawer and are often mounted in racks of multiple servers.
SECTION B, MODULE 2
95
PERSONAL COMPUTERS FIGURE 2-16; PERSONAL COMPUTERS
A personal computer is designed to meet the comput ing needs of an individual. These computers were originally referred to as microcomputers. Personal computers provide access to a wide variety of computing appiications, such as word processing, photo editing, email, and Internet access. The term personal computer is sometimes abbreviated as PC. However, PC can also refer to a specific type of personal
computer that descended from the original IBM PC and runs Windows software. In this book, PC refers to IBM PC descen
dants. It is not used as an abbreviation for personal computer.
► What are the options for personal computers? Desktop
Personal computers can be classified as desktop, portable, or mobile devices. The lines that delineate these categories are sometimes a bit blurry, but the general characteristics of each category are described below and common configurations are shown in Figure 2-16.
Desktops. A desktop computer fits on a desk and runs on power from an electrical wall outlet. The keyboard is typically a separate component connected to the main unit by a cable. A desktop computer can be housed in a vertical case or in a horizontal case. In some modern desktops, called all-in-one units, the system board is incorporated into the display device. Desktop computers are popular for offices and schools where portability is not important. Their operating systems include Microsoft Windows, macOS, and Linux. The price of an entrylevel desktop computer starts at S500 or a bit less.
Laptop
Portables. A portable computer runs on battery power. Its screen, keyboard, camera, storage devices, and speakers are fully contained in a single case so that the device can be eas ily transported from one place to another. Portable computers include laptops, tablets, and smartphones.
Slate tablet
Laptops. A laptop computer (also referred to as a note book computer) is a small, lightweight personal computer designed like a clamshell with a keyboard as the base and a screen on the hinged cover. Most laptops use the same oper
ating systems as desktop computers, with the exception of Chromebooks, which use Google's Chrome OS as their oper ating system. A Chromebook is a special category of laptop, designed to be connected to the Internet for most routine computing activi ties. Chromebook owners use Web-based software and store all their data in the cloud rather than on a local hard disk.
Chromebooks use a standard clamshell form factor, so they look very much like a laptop. Their sub-$300 price lags are attractive to consumers who primarily browse the Web and 2-ln-l tablet
use Web-based apps.
97
DIGITAL DEVICES
Tablets. A tablet computer is a portable computing device featuring a touch-sensitive screen that can be used for input as well as for output.
Tablet computers use specialized operating systems, such as iOS and Android, or special operating system modes, such as Windows 10 Tablet mode. Some models support cell phone network data plans but require apps such as Google Voice or Skype for voice calls. A slate tablet configuration is basically a screen in a narrow frame that lacks a physical keyboard (although one can be attached). The Apple IPad and Samsung Galaxy Tab are popular slate tablets. A 2-ln-1 (or convertible
tablet) can be operated using its touch-sensitive screen or with a physical keyboard that can be folded out of the way or removed.
Smartphones are the most commonly used digital device in the world. A smartphone features a small keyboard or touchscreen and is designed to fit into a pocket, run on batteries, and be used while you are holding it in your hands (Figure 2-17). FIGURE 2-17: SMARTPHONES ACCEPT INPUT FROM A TOUCHSCREEN OR MICROPHONE
Sotne things you can ask me:
What
•«
rrd • oed
neWr
r«fM ui
toi
lOT tn>
Mr
e W •' f X V u -f'S9 « % rf r e 1?
V
t ■ < V (> •m **
!«■ I-'»
S
How many digital devices do you own? Which do you use most often? Make a list of
Smartphones. Smartphones are mobile devices that have features simi lar to tablet computers, but also provide telecommunications capabilities over ceil phone networks. They can make voice calls, send text messages, and access the Internet. Unlike a basic mobile phone, smartphones are programmable, so they can download, store, and run software.
t
TRY IT
T «
Smartphones are equipped with built-in speech recognition that allows you to ask questions and control the device using spoken commands. Smartphones also include GPS capability so that apps are able to provide location-based services such as a route navigation map or a list of nearby restaurants.
Smartphones evolved from basic cell phones and PDAs. A PDA (personal digital assistant) was a handheld device used as an electronic appointment book, calculator, and notepad. Modem smartphones include a similar suite of applications, but they also have access to a huge variety of mobile apps that help you calculate tips, play your favorite music, and entertain you with games.
The operating systems for smartphones are similar to those used for tab let computers. IDS is used on the IPad and iPhone. Microsoft Windows
10 Mobile Is used on smartphones that offer a similar user experience as Windows laptops. The Android operating system used on Samsung tab lets is also used for Samsung Galaxy and Motorola Droid smartphones.
your devices and their serial numbers, and tuck it away in a
safe place In case one of your devices is lost or stolen.
98
SECTION B, MODUEE 2
FIGURE 2-18; SPECIALIZED DEVICES
NICHE DEVICES
The list of digital devices is long. Many devices, such as fitness traclcers, cameras, and handheld GPSs, are dedicated to specific tasks. Other devices perform a wider variety of tasks.
I What about other digital devices? Niche devices ail have one thing in common: They contain a microprocessor, Some of these devices, such as smartwatches and fitness trackers, can be classified
as wearable computers. Which of the devices in Figure 2-18 do you Raspberry Pi
own?
Raspberry Pi. A full computer system unit that is just a tad larger than a deck of cards, the Raspberry Pi can be connected to a keyboard and screen for a full computer experience. These little powerhouses cost less than $50 and provide an inexpensive platform for experiment ing with programming, robotics, and just about any creative computer application you can imagine.
Videogame console
Game consoles. Devices for playing computer games include Sony's PiayStation, Nintendo's Wii, and Microsoft's Xbox. They fea ture powerful processing capability and excellent graphics, but they are generally used for dedicated game playing and streaming videos rather than running application software. Portable media players. Media players, such as the iPod Touch, revolutionized the music industry by providing consumers with a handheld device that can store and play thousands of songs. These devices are controlled by touchscreens or simple click-wheel mecha nisms.
Portable media player
Smartwatches. Watches and clocks were some of the first devices
to go digital. Mass produced in the 1970s with a price as low as $10, these watches were limited to time and date functions. In 2013,
Samsung, Google, and Quaicomm introduced a new breed of digital watch. Dubbed smartwatches, these multifunction devices can include
a camera, thermometer, compass, calculator, cell phone, GPS, media player, and fitness tracker. Some smartwatch functions are onboard the device, whereas other functions require access to the Internet or Smartwatch
to the wearer's smartphone. Activity trackers. To monitor activity throughout the day, you can wear a fitness tracker. These devices, worn on the wrist or clipped to a pocket, monitor your steps and heart rate. They can calculate calo ries, graph your fitness achievements, and share information with your Facebook friends.
Titness irncker
Smart appliances. Modern refrigerators, washing machines, and other appliances are controlled by integrated circuits called microcontrollers that combine sensors with processing circuitry. Microcontrollers can monitor energy efficiency, offer programmed start
times, and may be controlled remotely from a smartphone or laptop.
PI
Smart appliances
99
DIGITAL DEVICES
CHOOSING A DIGITAL DEVICE
The process of selecting a digital device is all about choices, and there can be an overwhelming number of them. Do you want a tablet or a laptop? Do you need a super-light device? What size screen? Mac or Windows? Is the most powerful and most expensive processor necessary? Understanding the choices is the key to getting the right device at the right price.
Which tasks tend to require the fastest processor?
I How do ! get started? Whether you are replacing an outdated
b. Social media and Web
device or adding to your digital collection, the following activities can get you started:
QUICKCKECK
a. Email and photo editing
browsing
Consider how you plan to use your device.
c. Desktop publishing and video editing
Choose the type of device.
d. Accounting and budgeting
Decide on a budget and stick to it. Select a platform.
Check out the device's specifications.
> Why is it important to figure out how I'm going to use my new device? Some digital tasks require specific devices, processing power, storage capacity, and connectivity. Therefore, if you consider the usage guidelines in Figure 2-19, you're more likely to buy the right device and not have to purchase expensive upgrades later. FIGURE 2-19: USAGE GUIDELINES
USAGE PLAN
PURCHASE RECOMMENDATION
You plan to use your computer for email
A mid-priced computer with standard features
and Facebook, browsing the Web. playing games, managing finartces, downloading
might meet your needs.
digital music, and writing school papers. You're buying a new computer to replace an
a. €
•
oid one.
If you have a big investment in software, you should select a new computer that's compatible with the old one.
You plan to work on accounting and budget
Consider one of the business systems offered
ing for a small business.
by a local or an online computer vendor.
You spend lots of time playing computer
Buy a computer with the fastest processor and
games.
graphics card you can afford.
You plan to work extensively with video editing or desktop publishing.
lots of hard disk capacity, a large screen, and a
Select a computer system with a fast processor, graphics card loaded with memory.
h-
Someone who will use the computer has special needs.
You plan to use specialized peripheral devices.
Your work at home overlaps your work at
'h school or on the job. You want to work with specific software, such as a 3D graphics tool.
Consider purchasing appropriate adaptive equipment, such as a voice synthesizer or onehanded keyboard. Make sure the computer you purchase can accommodate the devices you plan to use.
Shop for a computer that's compatible with the computers you use at school or work. Select a computer that meets the specifications listed on the software box or Web site.
i
100
SECTION B, MODULE 2
► What are the pros and cons of the most popular consumer devices? The most popular digital devices are desktops, laptops, tablets, and smartphones. Figure 2-20 can help you choose the one that best meets your needs. FIGURE 2-20: CHOOSE THE RIGHT DEVICE
a Desktop- ■ Most power per dollar
Can make repairs and upgrade components yourself (except for all-in-one units) Full-size keyboard with numeric keypad for data entry
Large screen for multiple windows and detail work
Adjustable placement of compo nents means less strain on eyes, back, and wrists
Bottom Hne^ The choice for dedicated
gamers, serious designers, desktop publishers, and video editors
^Laptop All components in one unit Easy to move
Battery powered for portability Energy efficient means low operating cost Connects to WI-FI networks for Internet access
Lightweight models have higher price tags and may not have a
CD/DVD player
Bottom line Adequate for most digital tasks that are not dependent on cellular connections The choice for students and
Small and easy to carry fl attery powered Connects to Wi-Fi networks
Cellular data plans available for mobile Internet access
Convertible units with keyboards
available for writing long docu ments and creating other content Might not use software designed for desktop and laptops
Which device is best if you want to consume and create content
using a device that is portable?
a. Desktop
on-the-go professionals who
b. Laptop
want to create content and
c. Tablet
be productive, in addition to
□ Tablet
QUiCKCHECK
consuming content
D Smartphone Cellular connection for voice and
texting Add a cellular data connection for Internet access
Connects to Wi-Fi networks
Longer battery life than tablets and laptops Larger sizes offer bigger, essier-to-
Small screen limits multitasking
read screens
Bottom line
Bottom linc'^
Great for consuming content,
Great for communications and
such as ebooks, music, and
mobile apps
videos
Adequate for watching occasional
Adequate for browsing the Web and managing social media
videos and for mobile access to social media
Works for some specialized tasks, such as business presentations
Not optimal for creating text-based content, but excellent for voice
calls, texting, and Web browsing
d. Smartphone
101
DIGITAL DEVICES
I How important is compatibility? Suppose that you want to work on some assignments at home using the same software provided by your school lab. Maybe you want to transport data back and forth between your job and home. Or, perhaps your children want to use a computer at home that is similar to those they use at school. Computers that operate In essentially the same way and use the same soft ware are said to be compatible. They can also be described as having the same "platform." To assess whether two computers are compatible, check their operating systems. Computers with the same operating systems can typically use the same software and peripheral devices. Figure 2-21 pro vides an overview of popular platforms. You'll learn more about operating systems In a later module. FIGURE 2-21: COMPATIBILITY IS RELATED TO OPERATING SYSTEMS
Apple microsoft Google nucUS
Wincjows
"Mac'
0
M
QUfCKCHECK Do Apple and Android tablets use the same software and apps as laptops? a. Yes
b. No
VVlM'jl)'. y,
d ► Should I stick to one family of devices? As you can see from
Terminology
Figure 2-21, operating systems and the devices that use them are grouped
Desktops and laptops that
into families. Apple produces macOS and ICS. Microsoft produces Windows and Windows Mobile. The open source community produces Linux for desktops and servers: and with the support of Google, it produces Chrome
run Windows are sometimes
OS and Android.
as Macs.
The operating systems within a family have similarities In the way they look and function. So if you are familiar with macOS on your laptop, then you might find It easier to work with an IPhone rather than an Android phone.
Working within an operating system family can have other benefits. For example. If you are storing your photos, documents, and other data In
Apple's ICIoud, you'll have easier access to them from devices running ICS and macOS than from a device running Windows. Finally, you might find that synching and backing up data between devices Is easier If they have operating systems from the same family.
referred to as PCs. Computers that run macOS are referred to
102
SECTION B, MODULE 2
I What can t expect to pay for a personal device? The price tag for a smartphone is $200-$900, whereas tablet computer prices range from $200 to $1,200. Desktop and laptop computers usually cost a bit more, with price points roughly grouped Into three categories: above $1,200, $500$1,200, and under $500.
Computers priced above $1,200 contain one or more fast processors, a generous amount of RAM, and a copious amount of disk space. These computers contain state-of-the-art components and should not have to be replaced as quickly as less expensive computers. Computer game enthusi asts and anyone planning to work extensively with video editing, graphics, and desktop publishing are likely to require a high-end computer.
TRY IT! Visit the Dell Web site. What is
the price of the least expensive desktop computer?
A majority of buyers select desktops and laptops that retail for between $500 and $1,200. These popular computers lack the flashy specifications of their state-of-the-art cousins but provide ample computing power to meet the needs of an average user. In the computer industry, the equivalent of a compact car is a sub-$500 computer. The technology in these computers is usually a year or two old, and you can expect reduced processor speed, memory capacity, and drive capacity. You might have to replace a budget computer sooner than a more expensive computer, but it should be serviceable for typical applications.
QUICKCHECK The majority of desktop and
laptop buyers spend how much
P What are the factors that have the biggest effect on device
on a computer?
prices? A microprocessor is one of the most expensive components in a digital device, The newest, fastest microprocessor is likely to add several hundred dollars to the price tag.
a. $100-5250
Memory is another factor that affects price. For example, doubling the amount of memory in a smartphone could raise the cost from $199 to $299. Large screens cost more to manufacture and raise the price of digital devices. An iMac—Apple's version of an all-in-one desktop unit—with a 27-inch screen costs $700 more than the 21-inch version.
For laptops, size and weight make a difference in price. Thinner and lighter laptops are priced higher, not necessarily because they cost more to manu facture. but because they are more desirable to consumers. QUICKCHECK Which one of the following statements is correct about computer classifications?
a. The speed of supercomputers is measured in petaflops, which makes them the ideal platform for ecommerce stores that are accessed by millions of people.
b. The fact that features of small tablets overlap with features of large smartphones is an example of how the lines between categories of computers can be a bit blurry.
c. The main distinction between desktop computers and laptops is the inclusion of processing circuitry in the display device. d. Portable computers and laptops have similar characteristics when it comes to accessing cellular voice and data.
b. S250-S500 c. $500-51,200 d. $800-Sl,500
103
DIGITAL DEVICES
I How can I make sense of all the jargon in computer ads? Computer ads are loaded with jargon and acronyms, such as RAM, ROM, GHz, GB, and USB. You're sure to spot lots of this computer lingo in ads
like the one in Figure 2-22. The remaining sections of Module 2 delve into specifications for digital com ponents, You'll see how these components work and how they affect the way you work. By the end of Module 2, you should be able to understand the terminology in computer ads and use your knowledge to evaluate vari ous digital devices. FIGURE 2-22: COMPUTER A[)S ARE FULL OF JARGON
POWERFULLY LIGHT DO EVERYTHING YOU LOVE.
■ 7th Generation Intel Core 17 processor 3.5 GHz 1066 MHz FSB ■ 4 MB cache ■ 8 GB D0R3 1866 MHz RAM ■ 512 GB solid state drive
■ 13" high QHD LCD display screen ■ Intel integrated graphics ■ Integrated speakers ■ Integrated lOSOp megapixel webcam ■ 1 USB 3.0 port
■ 1 USB 3.0 port with PowerShare ■ 1 USB Type C port ■ Thunderbolt 3 port ■ SO card reader
■ Wireless networking 802.11 BGN ■ 52 Wh, 4-cell battery ■ Windows 10 64-bit operating system ■ Home/small business sotlware bundle
■ 2-7 pounds ■ l-year limited warranty
SECTION B
QUICKQUIZ 1.
Google and other Web service providers use
banks of| 2.
3. A(n)|
j 1o process and
I computer is the only
type of personal computer that must remain
manage data.
plugged into an electrical source during opera
Windows is the operating system used on
tion.
desktop and laptop PCs. What is the equiva
are the most popular digital
4.
lent operating system for Apple computers?
devices worldwide. 5.
Compatibility is primarily controlled by a device's
I system.
1 04
SECTION C, MODULE 2
System Board Components
Microprocessors
SECTION C
Memory
PROCESSORS AND MEMORY
ARCHITECTURE•That's how techies
Terminology
refer to the inner workings of digital devices. Sure, you can use a digital device
x86 ARM Instruction set
without understanding its architecture.
programming language machine language ALU
But to intelligently discuss the opportu nities and controversies of your digital world, you need more than a vague notion about microprocessors. Section C will help
registers control unit instruction cycle instruction
^
pointer microprocessor clock gigahertz multi-core processor serial processing pipetine
you keep your head above water when the
processing parallel processing cpu cache WORD SIZE
talk gets technical.
CISC RISC RAM capacitors volatile dynamic RAM
virtual memory rom boot loader
Objectives I Distinguish between the x86 and ARM processor standards.
I List at least three items that would be found in
» Describe the significance of microprocessor
I List three events that occur during the boot
instruction sets.
k Trace an instruction through RAM,the control
unit, and ALU as it Is processed. I List seven factors that affect microprocessor performance. I Use the pizza analogy to explain serial, pipeline,
and parallel processing.
RAM while you are using a digital device.
process.
t Explain why digital devices have ROM in addition to RAM.
I List four reasons for flashing ROM.
105
DIGITAL DEVICES
MICROPROCESSORS A microprocessor is an integrated circuit designed to process instructions.
It is the most important, and usually the most expensive, component of a digital device. The specifications for a microprocessor include the manufac turer's name and the chip model.
¥ Which processors are popular for desktops and laptops? Intel Corporation is the world's largest chipmaker and supplies a sizeable percentage of the microprocessors that power desktops and laptops. In 1971, Intel introduced the world's first microprocessor—the 4004. Intel's 8088 processor powered the original IBM PC, and chips in Intel's 8086 fam ily powered subsequent models of PCs manufactured by IBM and other companies.
The 8086 chip family set the standard for processors used in today's desk top and laptop computers, as well as servers. This standard is sometimes referred to as x86 because it includes chip models that originally ended in 86, such as the 8086, 80286, and 80386.
Modern processors no longer follow Intel's original numbering sequence, but x86 is still used when referring to the modern descendants of the 8086.
Processors found in today's desktops and laptops are x86 compatible,such as the Intel 13, i5, and 17 microprocessors (Figure 2-23), as well as Athlon and A-series processors manufactured by AMD.
QUICKCHECK What does x86 mean? a. It is the model of an Intel
chip. b. It designates low-power chips suitable for tablets and
smartphones. c. It Is used to refer to a
standard family of processors used in most desktop and laptop computers. d. It means the chip was manufactured by Intel.
FIGURE 2-23; INTEL PROCESSORS FOR DESKTOPS AND LAPTOPS
> Which processors are popular for tablets and smartphones? Whereas processors based on x86 technology are inside just about all
desktop and laptop computers, processors based on ARM technology dominate tablet computers and smartphones. ARM technology was origi nally designed by ARM Holdings, a British technology company founded by Acorn Computers, Apple Inc., and VLSI Technology. Today, ARM proces sors are designed and manufactured by companies that include NVIDIA, Samsung, and Nintendo.
QUICKCHECK Which processor would you be likely to find in an iPhone?
ARM-based processors are energy efficient—an important characteristic for devices that run primarily on battery power. ARM processors are found
a. Intel x86
in Microsoft's Surface tablets, Apple's iPads and iPhones, and Samsung's
b. ARM
lineup of Galaxy phones. The processors go by brand names such as Cortex and Apple A10. For Surface 2-in-1 tablet computers, Microsoft uses
c. Intel Core M3
Core M2 processors specially designed for low-power mobile devices.
d. 8088
SECTION C, MODULE 2
106
I Which microprocessor is best? The microprocessor that's best for you depends on your budget and the type of work and play you plan to do. The microprocessors marketed with the current crop of desktops and laptops can handle most business, educational, and entertainment applica tions. You'll want to consider the fastest processor offerings if you engage In processing-hungry activities, such as 3D animated computer games, desk top publishing, multitrack sound recording, and video editing.
> What microprocessor is in my favorite device? If you know the make and model of a digital device, you can generally find processor specifications by searching online. For example, searching for processor specifications iPhone 7 reveals that the phone contains an A10 chip with 64-bit architecture.
Although phones and tablets require an online search, desktops and lap tops offer an easier way to discover exactly what's inside (Figure 2-24). FIGURE 2-24: FIND THE PROCESSOR SPECIFICATIONS FOR A DESKTOP OR LAPTOP
TRY IT!
Find the processor specifications fcr»»g»
for your favorite desktop computer, laptop, or
Processor 2.13 GHz Intel Core 2 Duo macOS Sierra
smartphorre. How are the specs similar to or different from the
tmmm JU&Qw&anjOA
processor specifications shown
gi Mini NyeuMo-nusMmHt wwibpw caf
in Figure 2-24?
On a Mac desktop or laptop, selecting the Apple icon and then choosing About This Mac displays processor specifications, along with memory capacity.
-
□
X
XPS13 9360
© Home rind .1 ^-MitK]
O DHpUy
PC none
SaahUptDpPC
Organution
WORKGROUP
Connect to worK ot school
i? Apps & lodUffes
Editioc^^^^ VetS)
:5 Default apps □ Nolifkalions & actjons O
Powcf& sleep
o ftanery
lntel( R} Core(TM) i5-T2007U CPU @ 2
OSBuiW
Miy999
Picduct 10
009 2S 96024- 74 3
Processor
irrteflK) Co What happens inside a compLiter chlp?Amicroprocessorcon tains miles of microscopic circuitry and millions of miniature components divided into different kinds of operational units, such as the ALU and the control unit.
The ALU (arithmetic logic unit) is the part of the microprocessor that performs arithmetic operations, such as addition and subtraction. It also performs logical operations, such as comparing two numbers to see if they are the same. The ALU uses registers to hold data that Is being pro cessed. As an analogy, registers are similar to a mixing bowl you might use to hold the ingredients for a batch of cookies. The microprocessor's control unit fetches each instruction, in the same way you might get ingredients for cookies out of a cupboard or the refrig
QUICKCHECK When the control unit swings into action, which step comes first? a. Perform arithmetic
operations.
erator. Data is loaded Into the ALU's registers, just like you add all the
cookie ingredients to the mixing bowl. Finally, the control unit gives the ALU the green light to begin processing, just the way you flip the switch on your electric mixer to blend the cookie ingredients. Figure 2-26 illus trates a microprocessor control unit and its ALU preparing to add 5 + 4.
b. Load data into the ALU. c. Fetch an instruction. d. Execute the Instruction.
FIGURE 2-26: THE MICROPROCESSOR'S CONTROL UNIT AND ALU
Control Unit
♦►ADD
ADD
The control
unit
loads data into the The control unit
ALU for the addi
fetches the ADD
tion operation.
instruction.
QUICKCHECK Of course, the processor in Figure 2-25 would be using binary for the instruction and data. What is the binary
5"4
machine language instruction for ADD? (Hint; Look back at Figure 2-25.)
Microprocessor
a- 0000 0000
I What happens when a computer executes an instruction? The term instruction cycle refers to the process in which a computer exe cutes a single instruction. Some parts of the instruction cycle are performed by the microprocessor's control unit; other parts of the cycle are performed by the ALU. The steps In this cycle are summarized in Figure 2-27. FIGURE 2-27: THE INSTRUCTION CYCLE
1, Fetch an instruction.
2. Interpret the instruction.
4. Go to the next instruction.
3. Execute the instruction.
b. 0101 0100 c.
11101110
d. 11111111
109
DIGITAL DEVICES
> What role does the control unit play? The machine language instructions for a particular program are held in memory. When the program begins, the memory address of the first instruction is placed in a part of the
microprocessor's control unit called an instruction pointer. Figure 2-28 shows how the control unit can then go to the memory address (A) and fetch the instruction by copying data from that address into its instruction register {B). Next, the control unit interprets the instruction and executes it (C). FIGURE 2-28; PROCESSING AN INSTRUCTION
Memory
Control Unit
ALU QUICKCHECK
M1
i
Load 5 in Register 1
Instruction Pointer ll REG1 »
Ml
II
5
In Figure 2-28, what happens next?
M2
a. The control unit adds 2.
Load 4 in Register 2
Load 5 in Register 1
b. The instruction pointer
changes to M2. c. The processor checks AcGumu ator
M4 Put result in M5
register 2. d. 5 is added to 4.
instruction Register
I When does the ALU swing into action? The ALU is responsible for performing arithmetic and logical operations. As shown in Figure 2-29, the ALU uses registers to hold data that is ready to be processed. When it gets the go-ahead signal from the control unit (A), the ALU processes the data and places the result in an accumulator (B). From the accumulator, the data can be sent to memory or used for further processing. When the com puter completes an instruction, the control unit increments the instruction pointer to the memory address of the next instruction, and the instruction cycle begins again. FIGURE 2-29: THE ALU ADOS, SUBTRACTS, AND COMPARES
Memory Ml
Load 5 in Register 1
Control Unit Instruction Pointer
MS
ALU
■■ REG1
II
QUICKCHECK _
5
When the processor has
completed the instruction In M4,
M2
where is 9?
Load 4 in Register 2
a. In the accumulator
b. In the control unit c. In MS
Accumulator M4
9
Put result In M5
Instruction Register
d. In MS and the accumulator
SECTION C, MODULE 2
1 10
PERFORMANCE Now lhal you have some background on how microprocessors work, you can begin to appreciate what makes some microprocessors perform bet ter than others. A microprocessor's performance is affected by several factors, including ciock speed, number of cores, processing techniques, cache size, word size, and instruction set.
I What does GHz have to do with processor performance? A processor specification, such as 3.4 GHz, indicates the speed of the microprocessor clock—a timing device that sets the pace for executing instructions. Most computer ads specify the speed of a microprocessor in gigahertz. Gigahertz(GHz) means a biliion cycies per second. A specifi cation such as 2.13 GHz means that the microprocessor's ciock operates
at a speed of 2.13 biliion cycies per second. A cycle is the smallest unit of lime in a microprocessor's universe. Every action a processor performs is measured by these cycies. it is customary to equate clock cycles with the number of instructions a processor can execute per second. There is not always a one-to-one correspondence, however. Some instructions are processed within one ciock cycle, but other instructions might require multiple cycies. Some processors can even execute several instructions in a single clock cycle.
QUICKCHECK Which one of the following statements is true?
a. A microprocessor executes
You might expect a computer with a 2.13 GHz processor to perform
one instruction for each ciock
slower than a computer with a 3.4 GHz processor. This is not necessar ily the case. Ciock speed comparisons are only valid when comparing processors within the same chip family. A 2.13 GHz processor could outperform a 3.4 GHz processor. Why? Because factors other than clock speed contribute to the overall performance of a microprocessor.
cycle.
► What's a multi-core processor? The "core" of a microprocessor consists of the control unit and ALU. A microprocessor that contains circuitry for more than one processing unit is called a multi-core processor. Having more cores usually equates to faster performance. The 2.4 GHz Intel i5 pro cessor has two cores, giving it the equivalent of 4.8 GHz performance (2.4 x 2). The 1.6 GHz Intel 17 processor has four cores, giving it the equivalent of 6.4 GHz perfotmance (1.6 x 4). Figure 2-30 illustrates a microscopic view of a processor with multiple cores.
b. A 2.4 GHz Intel 15 processor is faster than a 1.6 GHz Intel 17 processor.
c. Clock speed is the most important factor that affects
processor performance. d. A multi-core processor can outperform a single-core processor that has a faster clock speed.
FIGURE 2-30: FOUR CORES OF AN INTEL FOURTH-GENERATION MICROPROCESSOR
Terminology The thin wafer of silicon and
the microscopic circuitry it contains is called a die.
I, .
vr.l Kr - V>;; —
...
Figure 2-30 Illustrates a microprocessor die with four
!;n ~
-
l| •
I i Core 1
Core 2
Core 3
Core 4
cores.
111
DIGITAL DEVICES
I Can a microprocessor execute more than one Instruction at a time? Some processors execute instructions "serially"—that is. one instruction at a time. With serial processing, the processor must complete all steps in the instruction cycle before it begins to execute the next instruction. To use an analogy, visualize a pizzeria with one small oven. The pizzas are instructions; the oven is the microprocessor. Pizzas (instructions) are processed one at a time.
QUICKCHECK Many of today's digital devices are capable of parallei processing because:
Now, what if the pizzeria rigs up a conveyor-belt through the oven. A pizza (instruction) starts moving along the conveyor belt into the oven; but before it reaches the end, another pizza starts moving along the belt. When a pro cessor begins to execute an instruction before it completes the previous
a. Their processors have
instruction, it is using pipeline processing.
c. They can run more than one program at a time.
A pizzeria might also have large ovens that hold multiple pizzas. Just as these ovens can bake more than one pizza at a time, parallel process ing executes more than one instruction at a time. This efficient processing technology is possible with today's multi-core microprocessors. Pipeline and parallel processing offer better performance than serial pro cessing (Figure 2-31). FIGURE 2-31: SERIAL. PIPELINE. AND PARALLEL PROCESSING
Instruction 3
Instruction 2
Instruction 1
Serial Processing The CXi'CUtiOii LYCle for iresch instruction muit he? completed bt'fcre the ncvi fn'ilructior^ i& ••xecuted.
Instruction 3
Instrud
Pipeline Processing ;.)f.' .ill four
CPU
of the
rxt'cution cycle for Instruction 1 .)tf iiic C?0 begins to
bn 1 ninni kio'Oim
t'xvdJlo Inslfuclion 2.
Instruction 3 oioAtoTpiemiitt
Instruction 4
CPU t:. 'm . I I ►. i r. ^ r'
Parallel Processing The CPU oxucuies multiple instructions at the same time.
oioonooiooioitn
multipie cores.
b. They have pipelining.
d. They have high GHz specifications.
SECTION C, MODULE 2
1 12
I How does cache size affect performance? CPU cache (pronounced "cash") is special high-speed memory thai allows a micropro cessor to access data more rapidly than from memory located elsewhere on the system board. A large cache can increase processing performanceCPU cache is structured Into several levels. Level 1 cache (LI) Is the fast est, whereas Level 2(L2)and Level 3(L3)are slightly slower but still faster than accessing main memory or disk storage. Cache capacity Is usually measured in megabytes,
I What impact does word size have on performance? Word size refers to the number of bits that a microprocessor can manipulate at one time. It corresponds to the size of the registers used by the control unit and ALU. A processor with a 64-blt word size, for example, has regis ters that can process 64 bits at a time. Word size controls the amount of memory that the processor can access. Processors with a 32-blt word size can access a maximum of 4 GB of
memory, whereas processors with a 64-blt word size can potentially access many terabytes of memory. A large word size gives processors the ability to handle more data dur ing each processing cycle—a factor that leads to Increased performance. Today's digital devices typically contain 32-blt processors or 64-blt pro cessors. In a computer with a 32-blt word size, registers that hold data and those that hold Instructions all have capacity for 32 bits(Figure 2-32).
TRY IT! Take another look at the
processor specifications for your favorite desktop or laptop
computer. Can you tell if its processor has a 32-blt or 64-bit word size?
FIGURE 2-32: A REGISTER HOLDS A 32-BIT WORD
Oil
101100100101111
The bits in this 32-bit register could be an instruction or an Item of data that Is waiting to be processed.
I How does an instruction set affect performance? As chip designers developed various Instruction sets for microprocessors, they added Increasingly complex instructions, each requiring severai clock cycles for execution. A microprocessor with such an instruction set uses
QUICKCHECK x86 processors use
CiSC (complex Instruction set computer)technology. A microprocessor with a limited set of simple instructions uses RISC (reduced instruction set com puter) technology.
A RISC processor performs most instructions faster than a CISC processor. It might, however, require more of these simple Instructions to complete a task than a CISC processor requires for the same task. Most processors In today's desktop and laptop computers use CISC tech nology. Many processors In handheld devices, such as smarlphones and tablets, use ARM (Advanced RISC Machine)technology.
a. RISC technology b. CISC technology c. ARM technology
113
DIGITAL DEVICES
RANDOM ACCESS MEMORY
RAM (random access memory) is a temporary holding area for data, application program instructions, and the operating system, RAM can be packaged in a chip carrier that is wired to the system board or it can be located on small circuit boards that plug into the system board.
I How much RAM does a device need? When purchasing a digi tal device, you may have a choice of RAM capacity. Higher RAM capacity adds to the expense of a device. RAM capacity is expressed in gigabytes. Today's desktop and laptop computers typically feature 2-8 GB of RAM. Handheld devices usually have 1-3 GB of RAM.
TRY IT! Find out how much RAM is in
your favorite digital device. If you're working with a laptop or desktop, you can access RAM
specs the same way you found the processor specifications.
> But my smartphone has 64 GB, right? Your smartphone has RAM, but not 64 GB. The specifications for smartphones that describe "memory" capacity are not referring to RAM, but to another kind of storage that is more permanent. You'll learn more about this type of storage in the next section. For now, let's focus on RAM and why it is such an essential
component of your favorite digital devices.
► Why is RAM so important? RAM is the "waiting room" for the microprocessor. It holds raw data waiting to be processed as well as the program instructions for processing that data. RAM also holds the results of processing until they can be moved to a more permanent location such as an internal drive, flash drive, or cloud storage. In addition to data and application software instructions, RAM also holds operating system instructions that control the basic functions of a com puter system. These instructions are loaded into RAM every time you turn on a digital device, and they remain there until you turn off the device (Figure 2-33). FIGURE 2-33: RAM HOLDS THE ELEMENTS FOR CURRENT TASKS
WORD Operating SYSTEM
ProrcsstnfJ Software
ALDIO Software
J tic ijtikV jimipi'il ttio
du:'
Kilty iVm Koai
O
I How does RAM work? In RAM. microscopic electronic parts called capacitors hold the bits that represent data. You can visualize the capaci tors as microscopic lights that can be turned on or off. A charged capacitor is "turned on" and represents a "1" bit. Adischarged capacitor is "turned off' and represents a "0" bit. A RAM address on each bank helps the computer
locate data, as needed, for processing.
QUICKCHECK
The programs and data in RAM disappear when .
Unlike disk storage, most RAM is volatile, which means it requires electri cal power to hold data. If the device is turned off, if the battery runs out of juice, or If a desktop computer is accidentally unplugged or experiences a power failure, all data stored in RAM instantly and permanently disappears.
a. the device goes to sleep
This type of RAM is technically classified as dynamic RAM (DRAM), but it is commonly referred to simply as f3AM.
d. all of the above
b. the device is turned off
c. you close a program
1 14
SECTIOf^ C, MODULE 2
► Can a device run out of memory? Suppose that you want to work with several programs and large graphics at the same time. Will your device eventually run out of memory? The answer Is probably not. If a program exceeds its allocated space, the operating system uses an area of the hard disk or other storage medium as virtual memory to store parts of programs or data files until they are needed. By selectively exchanging the data in RAM with the data in virtual mem
ory, your computer effectively gains almost unlimited memory capacity. Too much dependence on virtual memory can decrease performance, however, especially if virtual memory is located on a relatively slow mechanical device, such as a hard disk drive.
READ-ONLY MEMORY ROM (read-only memory) is a type of memory circuitry that is housed in a single Integrated circuit on the system board. Whereas RAM is tempo rary and volatile, ROM is more permanent and non-volatile. The contents of ROM remain in place even when the device is turned off.
I Why do digital devices have ROM? When you switch on a digi tal device, there is a waiting period while the device gets ready for use. While you are waiting, ROM is performing its role to "boot" the device. The boot process varies from one kind of device to another; but in gen eral. it begins when you press the power button and ends when the
Terminology A ROM chip, along with its instructions, Is commonly referred to as firmware because it is a combination of hardware and software.
device is ready to useROM contains a small set of instructions and data called the boot loader.
The boot loader instructions tell a digital device how to start. Typically, the boot loader performs self-tests to find out if the hardware is operating properly and may also verify that essential programs have not been cor rupted. It then loads the operating system into RAM.
I Why isn't the boot loader stored in RAM? RAM requires power to hold data. When a device is off, RAM Is empty. When you turn on the device, RAM is still empty and doesn't contain any instructions for the microprocessor to execute. ROM, on the other hand, holds data even when the power is off. As Figure 2-34 shows, when you press the power button (A), your device can immediately access the instructions in ROM and proceed with the startup routine (B). Only when the startup is com plete can you access apps and data (C).
QUICKCHECK While you are waiting for a digital device to boot, all of the following occur except:
a. The microprocessor fetches data from the ALU.
b. The boot loader checks hardware functions.
FIGURE 2-34: WHY THE WAIT?
c. Instructions in ROM verify
E>(!) 0
RAM
that essential programs have
When you power
not been corrupted.
on a device, you
d. The operating system is
have to wait for
loaded into RAM.
the boot loader program.
Operating system
ROM Ready!
Boot Loader Check hardware
Verify software Load the operating system
1 15
DIGITAL DEVICES
> Can I change the contents of ROM? The process of changing the contents of ROM is sometimes called "flashing" because it is similar to the way a camera flash helps the camera capture an image. There are sev eral reasons that you might want to change the contents of ROM and boot loader instructions.
Repair. Electrical surges and other hardware problems might corrupt the contents of ROM, which would prevent the device from powering on prop erly. Flashing the ROM to restore the boot loader instructions might correct the problem.
Terminology There are many types of nonvoiatile memory, such as EEPROM and NAND, but for convenience the term ROM Is
used for all of them. Technically, the contents of ROM cannot
User modification. The boot loader may limit the programs that can be
be changed. The EEPROM and
downloaded and run on a device. Flashing the ROM with a modified boot loader can bypass these limitations. The process is sometimes called "jail-
NANO chips that hold the boot loader programs for modern
breaking" on iOS devices and "rooting" on Android devices. These ROM modifications may cause more problems than they solve and may void the
flashing.
computers can be changed by
device's warranty.
Forensics. Tricky criminals may hide incriminating data in ROM, or they may alter the boot loader so that it deletes incriminating files when the device is powered on by an unauthorized person, investigators may want to
examine the BIOS for hidden data, and they may have to flash the BIOS to restore it to a non-destructive state.
Updates. Device manufacturers offer updates to the boot loader as neces sary to patch security weaknesses. Such updates are performed by running a program supplied by the manufacturer. Be sure to back up your device before flashing, and carefully follow instructions for this procedure. If the flash fails, your device will not start until you get the ROM chip replaced. After a successful update (Figure 2-35), your device should boot normally.
TRY IT!
What does Apple have to say about jailbreaking iPhones
and iPads? You can find out by conducting an online search for
support apple jailbreak.
FIGURE 2-3S: ROM UPDATE
Soot Instructions v 2.0
The ROM chip con taining the boot
The process of flashing
loader is located on
of ROM and replaces
the system board.
it with a new set of
erases the contents
instructions.
SECTION C
QUiCKQUiZ 1.
A laptop with an Intel Core i7 microprocessor
operates at a speed of 3.4|
.
(Hint: Use the abbreviation.) 2.
3.
4.
Because RAM is
, it cannot
retain data in a device that is turned off.
g
The instructions for loading the operating system
8088, i7, and Athlon A6 are
into RAM when a device is Rrst turned on are
compatible microprocessors.
stored in
The two main parts of a microprocessor include
acronym.
the
and the control unit.
. (Hint: Use the
1 16
SECTION D, MODULE 2
Cloud
Storage Options Magnetic
Optical
Solid State
SECTION
STORAGE
HARD DRIVES, CDS,dvds,flash drives, memory cards. What's the point of having so many storage options? As it turns out, none of today's storage tech nologies are perfect. In this section, you'll find guidelines that can make you a smart storage technology buyer and owner.The storage technologies you'll learn about are used in a variety of devices —from
digital cameras to player pianos —so an understanding of storage technology can be useful even outside the boundaries of
Terminology local storage magnetic storage hard disk drive hard disk platter read-write head head crash access time data transfer rate
optical storage read-only recordable rewritable solid state storage non-volatlle
memory card card reader solid state drive
USB flash drive remote storage cloud storage BACKUP recovery drive file synchronization disk Image
personal computing.
Objectives t List five criteria for comparing storage options. t Describe the relationship between storage and memory.
t Identify the technology used for hard disk
I Explain the significance of ROM,R,and RW for optical storage. ¥ Evaluate whether to use local or cloud storage for various projects.
drives, DVDs, USB drives, and other storage
I List at least four common backup pairings.
accessories.
I List four backup tools available to Windows
I Inteipret the storage specifications given for digital devices. I State the advantages and disadvantages of devices that use magnetic storage technology.
t fMame three types of optical storage media.
users.
I Explain the process of restoring a Windows
computer after a hard drive failure. I Describe the backup options for macOS and iOS devices.
DIGITAL DEVICES
117
STORAGE BASICS
Storage is the term used for the components of a digital device designed to hold data permanently. Unlike RAM, storage is non-voiatile and retains data even when the device is powered down. Storage is used to save doc uments, photos, and piayiists. it also houses software and the operating system.
Today's digital devices may use local storage and remote storage, but they are not interchangeable. To find out what gets stored where, let's look at local storage first, then expand into remote storage.
t Which local storage technology is best? Local storage refers to storage devices and media that can be directly attached to a computer, smartphone, or appliance. Local storage options include hard drives, CDs, DVDs,flash drives, solid state drives, and memory cards. Most digital devices have some type of local storage that is permanently available as you use the device. Built-in storage can be supplemented by removable storage, such as flash drives and memory cards. Each of these local storage options has its advantages and disadvantages,
if one storage system were perfect, we wouldn't need so many storage devices connected to our digital devices! To compare local storage options, it is useful to review their durability, dependability, speed, capacity, and cost (Figure 2-36). FIGURE 2-36: EVALUATING STORAGE OPTIONS
Durability Resistance to damage from handling and
environmental factors such as dust, humidity, heat, and cold. Can be measured in lifespan or in write cycles [the number of times data can be written and revised).
Dependability Available when needed; not subject to breakdown,
malfunction, network outages, or service interruptions. Can be measured by mean time between failures(MTBF is the time a device is
expected to function before failing). Cloud storage service dependability can be measured by uptime
(the percent of time the service is accessible).
Speed The rate at which data can be stored or accessed.
Faster is better. Can be measured by data transfer rate (the number of megabytes per second that are read or written by the storage device).
Capacity The amount of data that can be stored,
usually measured in gigabytes(GB)or terabytes (TB).
Cost The price of the storage device and media,
usually expressed per gigabyte(GB).
A
SECTION D, MODULE 2
1 18
I How much Storage do I have? The amount of local storage avail able on a digital devices depends on the capacity of each storage device and the amount of data that is currenliy stored. Avaiiabie storage space is sometimes referred to as "free space." The process of finding the amount of
free space depends on the device. Figure 2-37 can get you started. FIGURE 2-37: ARE YOU RUNNING OUT OF STORAGE SPACE?
macOS(Macs)
Windows(PCs)
1. Right-click the
HQ®
Macintosh HD icon.
1. Enter storage in the Windows Start menu, then
select the Storage option.
B«st mauh
CS
2. Select Get Info. SflRin9s
■S Slonge Space
Open
^ Default save locations
Get Info i Manage Stonge Spaces
Rename
Manage Storage... Duplicate
2. Select a storage device,
Make Alias
Quick Look "Macintosh HD"
such as C;.
® Storage Storage Otfow a
Macintosh HO Info
TRY IT!
ft MacfntQahHD
.1 of 2J5GB
How close are you to running
Hov 6.201B.9:10 AM
Owige
yCMf afpi. OetufBCMv muffe piduPM wid ^Ueos
▼ Genwak HnS: Ve 1
V»raiMi- 10171
:OS Extendeo I
'CVMitv: 250.14 CO Avai!aei«: 65.23 GB(846J MB p(?eesble) used: 164,906,050,077 Bytes 1184.91 GB on disk)
out of storage space on your favorite digital device? Check now to find out. For laptops and desktops, follow the steps In Figure 2-37. For IDS
tablets and phones, select Settings->General->About. For Android devices, select Settings-^More-^Storage.
"SUIEUIlMf
• How do storage technologies work? You can think of your computer's storage devices as having a direct pipeline to RAM. Data gets copied from a storage device into RAM, where it waits to be processed. After data is processed, it is held temporarily in RAM, but it is usually copied to a storage medium for more permanent safekeeping. As you know, a computer's processor works with data that has been coded into bits that can be represented by Is and Os. When data is stored, these Is and Os must be converted into some kind of signal or mark that's fairly permanent but can be changed when necessary.
Obviously, the data is not literally written as "1"or"0." Instead, the Is and Os must be transformed into something that can remain on a storage medium. Exactly how this transformation happens depends on the storage technol ogy. For example, hard disks store data in a different way than CDs. Three types of storage technologies are commonly used for personal computers: magnetic, optical, and solid state.
Terminology The process of storing data is often referred to as writing data
or saving a file because the storage device writes the data on the storage medium to save It for later use.
The process of retrieving data
Is often referred to as reading data, loading data, or opening a file.
1 19
DIGITAL DEVICES
MAGNETIC STORAGE TECHNOLOGY Those big reels of tape that you see on computers in classic science fic tion movies are an example of magnetic storage technology used on data processing era mainframe computers. The first personal computers used cassette (apes for storage, though floppy disk storage was soon available. Today, magnetic storage technology is the foundation for the hard disk drives in desktop computers, laptops, and enterprise servers.
► What is magnetic storage technology? Magnetic storage represents data by magnetizing microscopic particles on a disk or tape surface. The particles retain their magnetic orientation until that orienta tion is changed, providing permanent but modifiable storage for data. Data stored magnetically can be easily changed or deleted simply by changing the magnetic orientation of particles on the disk surface. This feature of magnetic storage provides lots of fiexibility for editing data and reusing areas of a storage medium containing unneeded data. •
How does a hard disk drive work? A hard disk drive contains
one or more platters and their associated read-write heads. A hard disk platter is a fiat, rigid disk made of aluminum or glass and coated with mag netic iron oxide particles.
Terminology You might hear the term fixed disk used to refer to hard disks. You often see the terms hard disk and hard disk drive
used interchangeably, though technically hard disk refers to the platters sealed inside the hard disk drive.
The platters rotate as a unit on a spindle, making thousands of rotations per minute. Each platter has a read-write head that hovers just a few microinches above the surface. A read-write head mechanism in the disk drive
magnetizes particles to write data, and senses the particles' polarities to read data (Figure 2-38).
FIGURE 2-38; ORIENTING PARTICLES ON A HARD DISK
QUICKCHECK Disk surface
What is the purpose of a readwrite head?
Read-wnte head
a. It puiis particles up as data is read.
Magnetized particles
b. It etches a track on the disk surface.
Randomly scattered
particles
c. It orients partides north or south depending on If they represent Os or Is.
Before data Is stored on a hard disk, particles on the disk surface are scattered in random patterns. The disk drive's read-write head orients them in a positive (north) or negative (south) direction to represent 0 and 1 bits, respectively.
I What are the advantages of hard disk drives? Hard disk drives can be installed inside a device or attached externally for additional stor age capacity or backup. Hard disk technology has three advantages. First, it provides lots of storage, with capacities ranging from 40 GB to 8 TB. Second, it provides fast access to files. Third, hard disk drives are economi
cal. The cost of storing 1 gigabyte of data is about two cents.
1 20
SECTION D, MODULE 2
> What's the downside of hard disk storage? Data stored on magnetic media can be unintentionally altered by magnetic fields, dust, mold, smoke particles, heat, and mechanical problems with a storage device. Over time, magnetic media gradually lose their magnetic charge. Some experts estimate that the reliable lifespan of data stored on magnetic media is about three years. They recommend that you refresh your data every two years by recopying it. The read-write heads in a hard disk drive hover a microscopic distance above each platter. If a read-write head comes into contact with the platter, the head crash is likely to damage the platter and corrupt the data con
tained on it. The causes of a head crash are explained in Figure 2-39. FIGURE 2-39: WHAT CAUSES A HEAD CRASH?
Dropping a device may cause the read-write head to bounce off the surface of the platter, scraping off particles tiial represent data.
dust particles or other contaminants
seep into the drive case, they may come to rest on a platter where the read-write head will crash into them.
I What should I know about hard disk drive specifications? Computer ads commonly specify (he capacity, access time, and speed of a hard disk drive. For example,"2 TB 8 ms 7200 RPM HDD" means a hard
disk drive with a 2 terabyte capacity, an access time of8 milliseconds, and a speed of 7,200 revolutions per minute.
QUICKCHECK if you see an ad for a computer with a 6 ms hard drive, you can assume that 6 ms refers to the
drive's
.
Access time is the average time it takes a computer to locate data on the
storage medium and read it. Hard disk access times of 6 to 11 ms are not
a. access time
uncommon. Hard disk drives have much faster access times than CDs,
b. capacity
which take about 500 ms to spin up to speed and find data.
c. rotational speed
Hard disk drive speed is sometimes measured in revolutions per minute (rpm). The faster a drive spins, the more rapidly it can position the readwrite head over specific data. For example, a 7,200 rpm drive is able to access data faster than a 5,400 rpm drive.
d. data transfer rate
When comparing hard disk drives to other storage technologies, data trans fer rates can be useful. Data transfer rate is the amount of data a storage device can move per second from the storage medium to RAM. Higher
numbers indicate faster transfer rates. The average data transfer rate for a hard disk drive is about 57,000 KBps (also expressed as 57 MBps or MB/s).
TRY IT! Check online. What's the
average price for a 2 TB hard drive?
121
DIGITAL DEVICES
OPTICAL STORAGE TECHNOLOGY Devices that store data on CDs, DVDs, and Bio-ray discs may seem out
dated, yet optical technologies remain useful for archival storage because they can provide a permanent home for collections of documents, music,
QUICKCHECK
and photos that you might not trust to less robust storage technologies.
Optical storage devices read and record data using ..
I How does optical technology work? CD, DVD. and Biu-ray(BD)
a. a read-write head
technologies are classified as optical storage, which represents data as microscopic light and dark spots on the disc surface. An optical drive con tains a laser that directs a beam of light toward the underside of the disc. Reflected light is collected by a lens and converted into Os and Is that rep
b. a laser lens
c. dark and light spots d. electron microscopes
resent data.
ft How do CD, DVD, and B!u-ray technologies differ? A single optical drive typically handles CDs, DVDs, and Biu-ray discs, but the costs and capacities of these discs vary (Figure 2-40). FIGURE 2-40; OPTICAL STORAGE OPTIONS
CD
DVD
Blu-ray
650 MB 15e
4.7 GB 25(1;
25 GB 504;
CD (compact disc): Designed
DVD (digital video disc or digital versatile disc): Designed with the
Biu-ray (BD): Designed to hold
to hold 74 minutes of recorded
high-definition lOSOp video by offering 25 GB storage capacity. the blue-violet colored laser used
to 80 minutes of music or 700 MB
capacity to hold a feature-length film. A single-sided DVD offers 4.7 GB (4,700 MB) of data storage. A double-layer DVD has two record able layers on the same side and
of data.
can store 8.5 GB of data.
near Infrared laser.
music, then adapted for computer
storage with capacity for 650 MB of data. Later improvements iri CO standards increased the capacity
The name Biu-ray is derived from to read data. DVD technology uses
a red laser; CD technology uses a
ft What's the significance of ROM, R, and RW? Optical technolo
Terminology
gies are grouped into three categories;
Writing data on a CD, DVD,or BD is often called burning because the laser essentially burns a pit
Read-only (ROM). CD-ROMs and DVD-ROMs are mass produced. Their contents cannot be changed; their lifespan is estimated to be 100 years.
in the disc.
Recordable (R). Data can be written on a recordable disc by consumer devices, but once written, the data cannot be changed. Lifespan: 100 years. Rewritable (RW). Data can be written on the disc and later changed. The estimated lifespan of data is about 30 years.
ft How durable are optical discs? Optical discs are not disrupted by humidity, fingerprints, dust, magnets, or spilled soft drinks. Some optical discs have an estimated lifespan of at least 30 years, while other types of optical discs can probably hold data securely for up to 100 years. When using optical technology for archival purposes, the archive should include an optical drive as well as the media containing data. The drive that recorded the data will have the best chance of reading it as the years go by.
QUICKCHECK Which cplical technology
performs most similarly to a hard disk drive? a. RAM
b. ROM c. R
d. RW
122
SECTION D. MODULE 2
SOLID STATE STORAGE TECHNOLOGY If you're a typical digital device owner, you use solid state storage every day. You carry a flash drive and you might swap memory cards in a camera or tablet. The main storage for your smartphone is also based on solid state technology, as is the storage for many of today's laptops.
I What is solid state storage? Solid state storage (sometimes called flash memory) stores data in erasable, rewritable circuitry, rather than on spinning disks or streaming tape. Each data bit is held in a gate-like circuit that can be open or shut. Very little power is required to open or close the gates, which makes solid
state storage ideal for battery-operated devices, such as digital cameras and media players. Once the data is stored, it is non-volatile—the circuits retain data without the need for an external power source. Solid state storage provides fast access to data because it includes no QUICKCHECK
moving parts. This storage technology is very durable—it is virtually imper vious to vibration, magnetic fields, or extreme temperature fluctuations. It Is also dependable. With no mechanical parts, it is less likely to fail than a
and RAM similar?
hard disk drive.
a. They are volatile.
I When should I use memory cards? A memory card is a flat, solid
b. They are non-volatile.
state storage medium commonly used to transfer files from digital cameras and media players to computers. The term memory card might lead you to believe that it is similar to random access memory (RAM). However, these cards are non-volatile, so they retain data even when they are disconnected from computers and other devices. The formats for memory cards include CompactFlash, MultlMediaCard,
In what way are memory cards
c. They are for temporary storage. d. They are solid state.
TRY IT!
Secure Digital (SD), and SmartMedia. A card reader is a device that reads and writes data on solid state storage. Sometimes referred to as 5-in-1,
Check the device you are currently using. Does it have a
7-in-1, or all-in-one card readers, these combination devices work with mul
built-in card reader?
tiple types of memory oards (Figure 2-41),
FIGURE 2-41: SOLID STATE MEMORY CARDS
card roader
Memory cards are available in
Many difjital devices are equipped with a card reader for
several formats and capacities.
transferring data to and from solid state memory cards.
123
DIGITAL DEVICES
I Do I need a solid state drive? Asolid state drive(SSD)is a pack
age of flash memory that can be used as a substitute for a hard disk drive. An SSD is instaiied inside the system unit and is not meant to be removed except for servicing. Some soiid state drives are about the same size as
a microprocessor chip; others are about the size of a smali deck of cards (Figure 2-42). FIGURE 2-42: SOLID STATE DRIVES
35 What is cloud storage? Storage that is built into a digital device or that can be plugged directly into a device is classified as local storage. In contrast, remote storage is housed on an external device that can be accessed from a network. Remote storage may be available on a home, school, or work network. It can also be available as an Internet service, in
which case it is called cloud storage. Cloud storage is provided to individuals by services such as Apple iCIoud, Microsoft OneDrive, Google Drive, and Dropbox. The basic concept is that files can be stored in a subscriber's cloud-based storage area and accessed by logging in from any device. In a simple implementation, cloud storage functions just like a local drive (Figure 2-43). FIGURE 2-43: DROPBOX IS IN THE CLOUD BUT ACCESSED LIKE A LOCAL DRIVE to Orvba
•'.• >
li
tf DitpMx. S Ail WyFliM
A AepHcitoofw B OWctOp
3OeeumeKS O Oowfioedi
0-
■
> h Pholo* * li FfntM loSher* ■ VACdtionI png
V-
a
aCH-it.
SIM
N«P«
faventes
^ AUOrop
rr.i
P P 6SKR
feiQp
?32PM
fo'dp'
7 34 PM
f^(Abi« fiflTwork Gr9brdc« iiuga
It;i7n6
QUICKCHECK Which of the following is a good substitute for a hard disk drive? a. An SSD
b. A memory card c. A USB flash drive d. ADVD-RW
124
SECTION D, MODULE 2
Some cloud implementations offer a synchronization feature that automati cally dupiicates fiies stored on a local device by aiso saving them in the cioud (Figure 2-44), FIGURE 2-44: CLOUD SYNCHRONIZATION
Motocross.docx •••••••••
Files stored while offline are added to
Fina Scores.x sx
the cloud the next
time you go online.
When you're offline, files are
files are saved on
saved on a local
a local drive and to
drive.
the cloud-
When you're online,
•Motocross.docx
FinalScores.xisx
I What shouitJ I know about cloud storage? The term c/oud storage refers to a set of technologies for transporting, synchronizing, and managing data stored on banks of high-performance hard disk drives housed in the service provider's data center.
Most cloud services offer a generous amount of free storage space, so the price is right. If you regularly use several digital devices and want to access
your files from all of them, then cloud storage is an exceiient soiution. Also, if you procrastinate about backing up your devices, files stored in the cioud remain there even if a iocai device maifunctions. That being said, cloud storage has several drawbacks. Security and privacy risks. The more places your data is stored and the more networks on which it traveis, the more susceptible it becomes to inter
cepts from hackers and government spying agencies. Carefuliy consider what you store in the cloud. QUICKCHECK
Service outages. When a cloud storage site has an outage, aii the data stored there becomes temporariiy inaccessibie. if you have a term paper due in two days, it wouid be best not to trust the only copy to cioud storage
Cioud services generally use
where a two-day outage couid make your files inaccessible until after the
a. Magnetic
what type of storage devices?
due date.
b. Optical
Discontinuation of service. Some cioud storage providers have shut
tered their storage services with little warning to customers. Cloud storage may offer a convenient option for backing up your fiies, but don't depend on it as the oniy backup.
c. Flash d. Cloud circuits
125
DIGITAL DEVICES
BACKUP
TRY IT!
Storage devices fail. Cloud storage services go dark. When they do, the data they contain might not be recoverable. To protect your data, you need backups. Do you have them? Do they contain the files you'll need to resume work without a hitch?
How many GB of data would be stored in a backup of the entire contents of your desktop or
more files that Is made in case the originals become damaged. Although
laptop computer? (Hint; Figure 2-37 showed you how to check the amount of space that is used
the best practice might seem to be "back up everything," that is not always
on a local hard disk.)
► What do I really need to back up? A backup Is a copy of one or
practical. Your files are often scattered—some on a local hard disk, others on USB
drives, some on your phone, and even others on cloud storage. Simply copying all of your files from one device to another or to the cloud requires lots of space and lots of time. Plus, there are some sticky technical Issues that make It difficult to actually get a complete backup. To understand the problem, consider what a typical hard disk contains (Figure 2-45). FIGURE 2-45; WHAT CAN YOU AFFORD TO LOSE?
.«os
ACOS
Operating system: The operating system Is required to start your device, but a backup copy might not run if It Is unauthorized.
Software: Most devices are populated with prelnstalled software, and you've probably downloaded and
Installed many additional apps. If these are wiped out when a storage device fails, the process of downloading and reinstalling them can be time consuming.
A—I A—I A—I Data files: Your documents, photos, music, videos—all
r=: f^= r^= the goodies that you've created and gathered—can be I ^^1 I ^^1 difficult or impossible to reconstruct from scratch.
ooo ooo
Settings, accounts, and profiles: How much time did you spend customizing your home screen, entering con
tacts, choosing passwords, and setting preferences for your favorite apps? No one wants to have to do that all over again!
• Then what should I do? The best advice is this: Know what's Impor tant and ensure that current versions exist on more than one storage device. The easiest pairings of devices for backups are illustrated In Figure 2-46.
FIGURE 2-46: BACKUP PAIRINGS
Back up hard
Back up hard disk
Back up handheld
1
Back up handheld
Back up cloud
disk to cloud
to external drive
to hard disk
to cloud
to hard disk
■7
1^
1 26
SECTION D, MODULE 2
I What tools do I need for backups? The lools you'll need depend on what you are backing up and where you are putting the backups. If you are a typical consumer with a laptop and a smartphone, you will need a cloud storage account, an external hard disk drive, synchronization soft ware, a blank USB flash drive, and backup or disk imaging software.
I I've got a Windows PC, What should I do? Windows users have access to several backup tools and will need to use more than one of them. Recovery drive. A recovery drive (or system repair disc) contains parts of the operating system necessary to boot your computer and diagnose system problems after a hard drive faiiure or software malfunction. Files
for creating a recovery drive are usually preinstalled on the hard disk drive, but they won't do you any good there when the hard disk fails. Follow the
manufacturer's instructions to move the recovery files to a blank USB flash drive, which you can store until it is needed. Copy command. As you are working on important projects, make cop ies of essentiai files. You can store the copies on the same device as the originals using versioning techniques, such as adding 'mT and "vS" to the file names of versions. And for safety, periodically copy a version to a USB drive or to cioud storage. You can manualiy create copies of your data files
using the Copy option in Windows File Explorer. File History. Data file backup can be automated using File History, which is included with Windows 8.0 and subsequent versions. File History uses file synchronization to make copies of files from your Documents, Music, Pictures, and Videos foiders, aiong with any files that were created or mod ified whiie OneDrive was offline. File History is useful if a data file goes missing, but it requires the System image Backup option for system files, software, and settings. File History is easy to set up (Figure 2-47). FIGURE 2-47: ACTIVATE FILE HISTORY
9File Klfloiy
-
V O
- T e" Smw" i"*! Setuflty'FileHistoiy
□
X
Search Coriirol - P
Control Panel Home
Keep a history of your files
Restore personal files
File History saves copies of your liles so you can gel them back If ihe/te lost or damaged.
Select drive
Lzdude folders
1. To activate File History,
V File History is ofl
connect an external drive and then click the Turn
Advanced settings Copy rues from:
on button.
Utxaries. t
Removable Disk (W SaOGBIreeofS&aOB
Tun on
See also
Recovery ' System Image Sactup
2. Select the System Image Backup option, then follow the
prompts to select a location.
File History can be configured to store backups on an external hard drive, a high-capacity USB flash drive, or a cloud storage service. The system image requires more space than is available on most USB flash drives.
QUiCKCHECK Which backup tool can be used to boot a Windows computer after a hard drive maifunction?
a. A recovery drive
b. The Copy command c. File History d. A cloud drive
127
DIGITAL DEVICES
System image, A disk image is a bit-for-bit copy of the data from all sec tors of a hard disk. Windows includes a disk imaging option called System
Image that creates an exact clone of the original disk, including the oper ating system, your software, and all your settings. Be sure to select the System Image Backup option In the File History window to activate it.
I If my computer's hard drive fails, how do I proceed? First, a new hard drive has to be installed. Then, as shown in Figure 2-48,(A) use
the recovery drive to boot the computer. Then,(B) attach the backup drive containing your system image. Respond to the prompts displayed on the
screen to copy the system image to the new hard disk. After the system image is installed, recover your files by using the File History utility. FIGURE 2-48: RESTORING WINDOWS AFTER A HARD DISK CRASH
QUICKCHECK in Figure 2-48, what is stored on the USB flash drive? a. All the files that the user has
backed up b. Parts of the operating system
needed to boot the computer Recovery drive
c. A system Image
Backup drive
I I have a Mac. What's my best backup option? MacOS offers a comprehensive file synchronization utility called Time Machine, which backs up the entire hard disk, including system files, applications, accounts, preferences, email messages, music, photos, movies, and docu ments. Make sure that Time Machine is set to run in the background at all times while your computer is turned on. If you need to restore a single file, you can open Time Machine, choose a file, and then select the Restore option. To restore an entire backup, make
sure the backup drive is connected and hold down the Command and R keys as the computer starts. Figure 2-49 illustrates the Time Machine. FIGURE 2-49: TIME MACHINE BACKUPS
Each window rep
You can select a day or
resents an hourly update of files.
time to view files as they existed on that date.
Tufie-.
osirtv
A1 WyfBcs D'o;
^ Adpl^at... ij Dttklep ^ Oocym* .
O OCMmlo«H
> ^ Albwn ArTv*wk >
Yoli can select a file
iTonn Wetia
from the list and click
•i
< iTuM tjeV4l>C«rtlu1 rf dD ^ iTtfficf *
Restore to copy it to
iTl
your current system.
U>»ur libra
UcdMatft HO »
^
TiMlay tNow)
M'M • iz iTvfx*
d. A synchronized backup
128
SECTION 0, MODULE 2
I What about backing up my smartphone and tablet? Many Android devices include backup software, which is usually accessible from the Settings icon. Generally, backups from Android devices are stored in the cloud on Google servers. If your Android device accepts SD cards, you may also be able to make backups of individual Hies. Owners of ICS devices can back up to a local computer using iTunes or to iCIoud. The process is usually referred to as synchronization because it updates the files on the backup device with newer versions of files found on the smartphone or tablet. To activate iCfoud backup, you can access Settings for your iOS device, tap iCIoud. and then select Backup. Slide the iCIoud Backup button to On. To sync to a local drive using iTunes, simply connect the device to a desktop or laptop using a USB cable. Make sure iTunes is open. Choose File, select Devices, and then select Backup (Figure 2-50). FIGURE 2-50: SYNC YOUR iPHONE OR iPAD TO BACK IT UP i fTm— F*» tan viri CaNroli
•'.I• ^ ^ W
Q. ^ M
To back up files to a local storage device, choose This Computer from the list of options.
•
*
tIS HI*!
A'
T
toot«« IMM Mc< C.S |c« •tva ■ •«0(L«Ne>
r. —«
B
a •mmi
♦*« ler* i-Mclperux Ml 0* A Sri B*c«M Af YM
«■ b* ■t«r«4 a* |F«(
O
CetAuti
UOfllMlW W
tM rvffVtMn b»c««d ■rtP
>if twXit
(|> IM r,^
B kMM Couni m'
ere MAM
h ««Mai«
wui'ttisn _„w
Synching is usually initiated by tethering your handheld device to a desktop or laptop computer using a USB cable.
SECTION D
QUICKQUIZ 1.
A magnetic storage device uses a readhead to magnetize particles that represent data.
2.
3.
4. A(n) I
age technology as a USB flash drive but is not designed to be removable. (Hint; Use the acro
I storage technology,
nym.)
such as CDs and DVDs, is used for archiving
5. A disk
Today,
I uses the same stor
i is a bil-for-bit copy
data.
of the contents of a hard disk, created as a
Cloud storage, such as OneOrlve and iCioud,
backup in case of a hard drive failure.
is classified as | opposed to local storage.
1 storage as
129
DIGITAL DEVICES
Expansion Devices
Ports
Bluetooth
SECTION E
INPUT AND OUTPUT M
GADGETS.Those fitness trackers, VR
Terminology
headsets,credit card readers,and other gad gets are basically input and output devices. Section E focuses on the technology that
peripheral device expansion ports data bus
makes it possible to expand a host device
by connecting input and output devices, such as displays and printers.The section winds up with a look at the amazing array
hot-plugging USB hub BiuetOOth
device driver LCD LED response rate dot pitch screen resolution touchscreen
virtual keyboard resistive technology
of sensors that collect data for the Intemet
capacitive technology integrated graphics
of Things and self-driving vehicles
dedicated graphics graphics processing unit
ink jet printer laser printer additive manufacturing smart sensors sense-plan-act algorithms accelerometer
gyro sensor magnetometer lldar
Objectives I Categorize devices as input, output, or mixed.
Explain the purpose of a device driver and why
i Diagram the path of data from external devices
one might have to be installed or updated manually.
to the CPU.
I Identify common expansion ports and connectors, such as USB,VGA, HDMI, DVI, DisplayPort.Thunderbolt, and Ethernet.
> State which types of devices should not be unplugged without notification.
I List at least three examples of devices that might be connected using Bluetooth.
List four factors that affect display quality. Explain the role of a GPU and list the applications for which one is most useful.
Explain how resolution settings affect the size of objects and text on the screen.
List five types of sensors that provide Input to autonomous vehicles.
130
SECTION E, MODULE 2
ADD-ON GADGETS
If you have a basic smartphone, tablet, laptop, or desktop, then you know there is a tempting list of add-on gadgets to accompany these devices: for example, that fine set of Beats by Dr. Dre wireless headphones, a Nike FuelBand, an external optical drive, or an Oculus Rift VR headset. There
are lots of options.
> What should I know about add-on gadgets? You'll want to know what a gadget does and how well it works. You can discover relevant information from product reviews and customer ratings. You'll also want to
QUICKCHECK
find out if the gadget will work with your devices, and you'll need to know how to connect the gadget and get it working. A little general background about peripheral devices will smooth the way to successful gadget use.
Which of the following are not considered peripheral devices?
I What is a peripheral device? The term peripheral device Is tech-
a. RAM and CPU
speak for devices such as printers, display devices, storage devices, mice, and headsets that are connected to the system unit of a computer. Although the term is falling out of use. It still pops up here and there, so it is worth knowing. Some modern nontechnical terms for peripheral devices include gadgets, add-ons, and accessories. Peripheral devices are classified as input, output, or mixed devices, as shown In Figure 2-51. FIGURE 2-51: PERIPHERAL DEVICES
© © ® Keyboards
Fitness trackers
Printers
Mice
Touchscreens
Headphones
Touchpads
Home security systems
Speakers
Game controllers
MIDI instruments
Projectors
Scanners
Home control systems
Monitors
Microphones
Audio headsets
Robots
Credit card scanners
VR headsets
Barcode readers
Haptic gloves
Biometric scanners
I m iiii
I
I What can 1 connect to my devices? Many gadgets, such as earbuds, work with a wide variety of devices, including smartphones, smartwatches, tablets, laptops, and desktops. Other gadgets are designed to
work only with IPhones, for example. When shopping for gadgets, read the specifications and make sure they include your device. k What about connections? Add-on gadgets can connect to laptops, desktops, and handhelds using a cable or a wireless connection. Let's take a look at commonly used connectors so that you can identify them on your devices.
b. Speakers and headsets c. Hard disk drive and memory cards
d. Touchscreen and keyboard
131
DIGITAL DEVICES
EXPANSION PORTS
Like an ocean liner's portholes, many digital devices have ports in the sys tem unit for connecting cables and various add-ons. Because these ports expand the options for input, output, and storage, they are commonly called expansion ports. When you plug in a USB flash drive or insert a memory card, you are using an expansion port.
> How do expansion ports relate to the rest of the circuitry in a device? Ail of the components on the system board are connected by circuitry. The main circuits that carry data are called the data bus. These circuits carry data at lightning speeds as pulses of electrical voltages. The part of the data bus that runs between the microprocessor and RAIvl is called the local bus or internal bus. This is the fastest part of the data bus because it has to keep up with the data demands of the microprocessor.
The part of the data bus that stretches from RAM to various expansion ports is called the expansion bus. This part of the bus has several branches to accommodate data traveling to and from various ports (Figure 2-52). FIGURE 2-52: THE EXPANSION BUS
QUICKCHECK How does data flow from an
external storage device to the processor? a. Data first travels on the The local bus carries data
expansion bus, and then
at high speeds between the processor and RAM.
switches to the data bus.
b. Data begins on the internal
The expansion bus carries data between RAM and
bus, and then ends up on the
external devices that are
local bus.
connected to ports on
c. Data from the expansion bus
the system unit.
reaches RAM, and then it is transferred to the processor. d. Data starts on the network
bus, is processed in the CPU, and then is sent to RAM.
Internal storage Display devices
(Tik Audio gear
•t
• i"
□C
Memory cards
USB devices TTTTTIT'TTr I I I I I I I I I I IT
Networks
External storage
132
SECTION E, MODULE 2
I What should I know about expansion ports? When making a connection between a peripherai device and a computer, the cable must connect to the proper expansion port. Ports are sometimes marked by tiny symbois that are difficult to see. You'ii want to be able to identify ports by their size and shape.
From Section D, you are already familiar with the storage ports used for memory cards. You'ii also want to be able to identify general-purpose, video, audio, and network ports (Figure 2-53).
TRY IT Take a look at your laptop or desktop computer. Can you
make a list of ai! Its ports?
FIGURE 2-53: EXPANSION PORTS
Thunderbolt
USB
Mini USB
USB 3.0
USB-C
Lightning FIreWire
General-purpose ports are used to connect a variety of gadgets. Small devices, such as smartphones, might use a single Lightning connector that does double duty as a recharging cable and a connector for peripheral
devices. The Lightning port resembles a USB-C port, but their cables are
Terminology
not interchangeabfe.
An adapter converts one type of connector to another. For
example, a projector might
VGA
DVi
HDMi
Mini DisplayPort
have a DVI connector; but if your laptop has only a Mini DisplayPort, you can use an
adapter to change the DVi plug
Some display devices, such as external display screens and projection devices, are designed to connect to USB ports, but other display devices
to a Mini DisplayPort plug.
use specialized video ports, such as HDMi. DVI, VGA,and DisplayPort. Using
a specialized video port leaves USB ports free for other gadgets.
O QUICKCHECK Which port would be the first choice for connecting a display Ethernet Audio in
Audio Out
Wireless antenna
Most devices have at least one
An Ethernet port handles wired
Audio Out port for a headset or earbuds. There may be an
work connections are usually built
additional Audio In port for connecting a microphone.
In, but an antenna can be inserted In a USB port.
network connections. Wireless net
device? a. DVi b. USB
c. Thunderbolt d. Etherr^et
133
DIGITAL DEVICES
• What is hot-plugging? When a peripheral device is connected or disconnected while the host device Is operating, it is called hot-plugging. Although it is unnecessary to turn devices off before disconnecting them, some devices should not be disconnected while In the middle of data trans
QUICKCHECK When you're ready to put your laptop In your backpack, which
fers. Before unplugging a device, such as a USB flash drive, your computer
of the following do you need to
might require notification. Figure 2-54 shows how to safely remove a USB
eject?
a. A printer that's connected
drive.
with a USB cable FIGURE 2-S4: HOW 70 SAFELY EJECT USB FLASH DRIVES
b. A USB flash drive
1
With Windows, use the File Explorer folder Icon to view the flash drive icon. Rightclick it. then select Eject. You can remove
> I# Network
i
the flash drive when the "Safe to Remove
> *4 Homegroup
• ;
> 'i.OS(C) > ^ USB DRIVE {Od
c. The mouse d. All of the above
Hardware" message appears.
V
.
Safe To Remove Hardware
Ihc'IISH nuivi (I):)'ilevlce carr now
83 Items
lie Siilely iitriioveil lioiti Die cuinpnli'i.
sa
o
e
Ri
DEVICES
^ Mac
Q Lexar Flash D Q ^ TimeMachine — © Remote Disc Q Adobe Flash Player Installer ~
Wifvlows lioM |i;nc[*,s [Kimdll32)
With macOS, use
TRY IT!
Finder to view the flash drive icon. Select the
round Eject icon. It is safe to remove the
Do you have any devices connected to your computer that require notification before they are removed? {Hint: Use
flash drive when its
one of the methods in Figure
listing disappears.
2-54 to find out.)
• What if I run out of USB ports? If you wanf to conned more devices than the available number of USB ports, you can use a USB hub. A USB hub is an inexpensive device that turns one USB port into multi ple ports. It also saves wear and tear on USB ports caused by repeatedly inserting and removing USB devices (Figure 2-55). FIGURE 2-55:A USB HUB IS HANDY FOR CONNECTING LOTS OF GADGETS
USB hub
134
SECTION E, MODULE 2
BLUETOOTH
Increasingly, gadgets are going wireless, instead of exchanging data through a cabie, devices can send signals through the air—no cable required. A common wireless technology for connecting peripherals is Bluetooth.
► What kinds of devices use Bluetooth? You'll find Biuetooth options for connecting wireless keyboards and mice to iaptops and desk tops. Nintendo and Wii game controliers aiso use Biuetooth.
Bluetooth is a low-power technology, so it is ideal for mobile devices that don't have big batteries. Bluetooth is used to connect wireless headsets to
smartphones. And if you're Into fitness, then your armband or smartshoes may transmit data to your phone or computer using Biuetooth technology.
QUICKCHECK Which of the following would be least likely to connect through a Bluetooth port? a. A wireless headset
I What are the range and speed of Bluetooth? Bluetooth devices
b. An external hard drive
must be within 30 feet of each other. The peak data transmission rate is 3 Mbps, which is suitable for sending small bursts of data rather than large
c. A keyboard
files. Compared to wired connections, Biuetooth is quite slow {Figure 2-56).
d. A game controller
FIGURE 2-56: DATA TRANSFER RATES OF POPULAR CONNECTIONS
Thunderbolt 10 Gbps
|USB3.0 5Gbps FireWire 800 Mbps USB 2.0 480 Mbps
Bluetooth 3 Mbps
► Can I tell if a device is equipped with Bluetooth? Bluetooth is
TRY IT!
built into many smartphones, tablets, laptops, and desktops, but there is no corresponding physical port on the system unit. Look for the Bluetooth logo
Does your favorite device
on the Windows taskbar or the Mac menu bar (Figure 2-57). For handheld devices, check Settings. If a device is not equipped with Biuetooth, you can
for the Bluetooth icon or
piug a Biuetooth antenna into a USB port. FIGURE 2-S7: DOES THIS DEVICE HAVE BLUETOOTH?
^ 0 Wll © 0
^
Jane
Q i
Bluetooth Icon on Mac menu bar
O
Q
]
have Bluetooth? Look
settings to find out.
135
DIGITAL DEVICES
DEVICE DRIVERS Many gadgets have associated software. For example, there's an iPhone app for your fitness wristband that graphs your progress and shares it with
your training buddies. These applications help you get the most out of your gadgets. In addition to application software, devices also require a type of software called a device driver.
I What's a device driver? A device driver is software that helps a peripheral device establish communication with its host device. For exam
ple, the device driver for an HP printer sets up data streams from RAM to the printer and makes sure that the data is formatted in a way that the printer can work with.
► When do I have to install device drivers? Operating systems include built-in drivers for standard expansion ports. This feature, some
times called Plug and Play, makes it easy to connect devices without manually installing device drivers. When you connect a new peripheral device, the operating system looks for an appropriate driver. If the device is unable to use a standard driver, you'll be prompted to install the device
QUICKCHECK Suppose you just got an
operating system update and now your printer has stopped
working. What can you do to
driver supplied by the peripheral device manufacturer.
solve the problem?
• Where do I get device drivers? Device drivers, updates, and
a. Go online and check for a
instructions for installing them can also be downloaded from the manufac
printer driver update.
turer's Web site.
> When do I need a device driver update? Device drivers work directly with the host device's operating system. A printer or other con nected gadgets might work perfectly—until the operating system gets an update. Then some device drivers might stop working correctly and the devices they control could malfunction.
In addition to checking cables, trying a different port, and rebooting, one of the first steps in troubleshooting a malfunctioning peripheral device is to access the manufacturer's Web site and look for a driver update. Updated driver downloads are usually available from the Support link (Figure 2-58). FIGURE 2-58: DEVICE DRIVER UPDATES ARE AVAILABLE ONLINE S
Wwt
Fm*
Efiif
v:»a
hkIos
Far««rt
f
Drivers & Downloads
Drivers a Downloads
LCijj Troubleshooting
Find my product
Support Forums
Detect my product U
What factors affect image quality? Image quality is a factor of screen size, response rate, dot pitch, and screen resolution. Screen size. Screen size is the measurement in inches from one corner
of the screen diagonally across to the opposite corner. Screen sizes range from 1" for smartwatches to 60" or more for home entertainment systems. Response rate. Response rate is the time it takes for one pixel to change from black to white then back to black. Dispiay devices with fast response rates display a crisp image with minimal blurring or "ghosting" of moving
objects. Response rate is measured in milliseconds (ms). For gaming sys tems, a response rate of 5 ms or less is desirable.
is
137
DIGITAL DEVICES
Dot pitch. The LEDs that form an image on the screen are spaced In a grid. Dot pitch (dp) is the distance in millimeters between like-colored LEDs (Figure 2-60),
QUICKCHECK Which of these 4-inch
smartphone displays would produce the sharpest image quality?
FIGURE 2-60: DOT PITCH
a. Di =.26 mm, ppi = 200 b. Di =.50 mm, ppi = 500
0.26 mm Dot pitch is the dis tance between two
c. Di =.08 mm, ppi = 326 d. Di =.06 mm, ppi = 200
LEDs of the same color.
Screen resolution. The number of horizontal and vertical pixels that a device displays on the screen is referred to as screen resolution. The
iPhone 7, for example, features a resolution of 750 x 1334. Another way to express resolution is pixels per inch (ppi). The 4.7-inch screen on an
iPhone 7 with Apple's Retina display technology has a resolution of 326 ppi.
I Should I set my computer on its highest resolution? Most dis plays have a recommended resolulion at which images are clearest and
text is crispest. On laptops and desktops, however, you can change the resolution, in Windows, you can use the Control Panel or right-click the desktop and select Screen Resolution. In macOS, use the Apple icon to
TRY IT!
What is the current setting for the resolution on your laptop or desktop? Is it the highest possible resolution?
open System Preferences and choose Displays.
At higher resolutions, text and objects may appear smaller, but the desk
top appears more spacious. The two screens in Figure 2-61 help you compare the same display set at two different resolutions. FIGURE 2-61: SCREEN RESOLUTION AND WINDOW SIZE
Savannah Environmental Study •ImWMII
Mi ka
~—rf-'n —i~ri~ It r(# M*-«atw
a
rill ^'iI ' III i M(«W a'
J
V • •I
A' ®
56
i• A
Savannah Env. l!ack«mund The Iftfpnutlona) Pspet Sav.^jr
m
a
•» 0
At 1280 X 800 resolution, the text and other objects
19.'5 TliPCfififl*! BiHfn Mwvm Uojoo Bj; it tttf Vaknt Da^Castp Catap COfjwVfcc. Tbp iLten CcvTMsNart la 1999 c^r
What is a GPU? Display devices require graphics circuitry to gener ate and transport the signals for displaying an image on the screen. One type of graphics circuitry, referred to as Integrated graphics, is built into a computer's system board. A second option, caiied dedicated graphics, is graphics circuitry mounted on a small circuit board called a graphics card (or video card)iike the one in Figure 2-63. FIGURE 2-63; GRAPHICS CARD The GPU Is a micro
processor that may generate enough heat to require a cooling fan.
A graphics card plugs Into the system board Inside the case of a
desktop computer.
The video port protrudes from the back of
the system unit so that the port is accessible for plugging in a display device.
A graphics card contains a graphics processing unit(GPU)and special video memory, which stores screen images as they are processed but before they are displayed, A fast GPU and lots of video memory are the keys to iightning-fast screen updating for fast action games, 3D modei-
ing, and graphics-intensive desktop publishing (Figure 2-64). FIGURE 2-64: CPU VS. GPU
tn a device with integrated graphics, image data is processed by the main CPU,
then sent to the graphics circuits that stream the
image to the display device.
r
o
in a device with a GPU,image data is processed by the GPU, freeing the CPU for other tasks.
SECTION E, MODULE 2
140
PRINTERS
The importance of printers has declined as digital distribution becomes more prevalent and cloud-based print services become more popular. Yet a printer can come in handy for creating printed documents, handouts,
posters, and photos. Today's best-selling multifunction printers use ink jet or laser technology and can also serve as scanners, copiers, and fax machines.
i How does an ink jet printer work? An ink jet printer has a nozzle-like print head that sprays ink onto paper to form characters and
graphics. The print head in a color ink jet printer consists of a series of nozzles, each with its own ink cartridge (Figure 2-65). FIGURE 2-65: INK JET CMYK CARTRIDGES
B ack
cartridges
Most ink jet printers use CMYK color, which requires only cyan (blue), maeenta (pink), yellow, and black Inks to create a printout that appears to contain thousands of colors.
Ink jet printers outsell all other types of printers because they are inexpen sive and produce both color and black-and-white printouts. They work well for most home and small business applications. Inkjet technology also pow
ers many photo printers, which are optimized to print high-quality images
QUICKCHECK
Which type of printer is slower but less expensive to operate?
produced by digital cameras and scanners.
a. Laser printer
» How do laser printers compare to ink jet printers? A laser
b. Ink jet printer
printer like the one shown in Figure 2-66 uses the same technology as a photocopier to paint dots of light on a light-sensitive drum. Electrostatically charged ink is applied to the drum and then transferred to paper. A laser printer
prints faster than an ink jet printer, but laser technology is more complex than ink jet technology, which accounts for the higher price of laser printers. A basic laser printer produces only blackand-white printouts. Color laser printers are available, but they are somewhat more costly than basic black-and-white mod els. Laser printers are often the choice for business printers, particularly for applica tions that produce a high volume of printed material.
Toner cartridge
FIGURE 2-66: LASER PRINTER
DIGITAL DEVICES
141
t What about 3D printers? The technology that deposits ink on paper is the foundation for 3D printers that deposit layers of plastic, resin, or metal that build into a three-dimensional object. 3D printing is technically called additive manufacturing.
Consumers can use 3D printers to produce small toys, ornaments, and even simple electronic devices. These printers have been used to create wear able items, such as shoes, and replacement parts for household appliances. An important industrial use for 3D printers is prototyping new products, such as automobile headlights, smartphone cases, firearms, and even full-scale bicycles.
Additive manufacturing is used to produce hearing aids and other medical devices that are custom fit or in other ways unique. Dental laboratories use 3D printing to produce crowns, bridges, and other dental appliances.
> How do 3D printers work? There are several additive manufactur ing technologies, but most consumer-grade 3D printers use a technology called filament deposit modeling (FDM) that melts a coiled filament and
deposits it in layers that harden and form an object(Figure 2-67). FIGURE 2-67:3D PRINTING
A coil of filament is
melted and depos
ited by the printer's extrusion nozzle.
I What are the filaments made from? Several types of filament are available. Poiylactic acid (PLA)filament is versatile, and biodegradable
because it is made from com starch. Acrylonitrile butadiene styrene (ABS)
filament is more durable and heat-resistant, making it suitable for printing objects that need to withstand some wear and tear. Polycarbonate (PC) filament is even sturdier and is used primarily for items that will be used in
high-impact situations. Filaments cost about $10 per pound.
t What controls the printout? A 3D printed object is based on a 3D model that is essentially a 3D vector graphic. The model can be created
using graphics software or it can be derived from a 3D scan of a real object. Modules are often stored in the STL file format. Several Web sites offer col
lections of STL files for 3D printing.
i
SECTION E, MODULE 2
142
THINGS
The Utopian vision for the Internet of Things (loT) is a busy hive of smart sensors that work behind the scenes to collect data and use it to
improve—welt—just about everything. All types of "things" equipped with smart sensors can monitor our homes, cars, and workplaces. They can also monitor our habits and physical fitness and communicate with each other while doing so.
I What are the basic features required for loT devices? loT devices require some way to communicate with other sensors and devices. That communication is handled by network technology, which is covered in the next module.
loT devices may include a microprocessor and memory if the device must
process data, make decisions, or Initiate an activity. A basic loT circuit board contains one or more sensors, a power source, a transmitter, and an antenna (Figure 2-68). FIGURE 2-68: ANATOMY OF AN lOT THING
Transmitter Antenna
Batteries (connected to the back of the
circuit board)
I What types of smart sensors are available? The most popular loT sensors send alerts based on data they collect(Figure 2-69). FIGURE 2-69: SENSORS
Your basement floor seems to be wet."
'A window on your house just broke."
Your swimming pool needs more chlorine."
Your dog is barking." The club is busy (noisy)." Sound
"Your dog is out of your yard."
©
"Your car is not in your driveway." "You hiked a 2.5-mile circuit."
"Your front door isn't locked."
©
"Your doorbell just rang,"
"Your child just got home from school."
Contact
GPS
"A person or animal approached your cabin last night." "Your cat is at the litter box."
"You've walked 10,000 steps today."
(D
I "The baggage handlers just dropped your suitcase."
Accelerometer
Motion
"It's 10 pm; your porch light isn't on." "Do you want to dim the lights?" "Your UV exposure has reached the limit." Light
Your plant needs water." Water
"Your oven Is on."
©
"Your apartment Is unusually hot." "It's below zero; remote start your car."
Temperature
DIGITAL DEVICES
143
> What are the most popular sensors? Many smartphones, VR
^
headsets, and automobile internal navigation systems incorporate three sensors: an acceieronneter, a gyroscope, and a magnetometer. Figure 2-70 illustrates an IMU (inertial measurement unit) that packages these sensors into a single unit. FIGURE 2-70: IMU SENSORS
An accelerometer measures the rate at which a device
accelerates. It can sense.
For example, if a laptop computer is dropped or if a
vehicle brakes suddenly.
A gyro sensor gauges angu lar velocity: the change in
rotational angle, it can help a drone remain level in the
air and helps a VR headset track head movements.
A magnetometer measures magnetic
fields and can be used as a compass to determine orientation relative to mag netic north. Magnetometers provide data about the direction of travel for vehicles and handheld devices.
I Where can I get loT devices? Smart sensors are available In elec tronics stores, hardware stores, and online, Sensors can be purchased
individually or in packages. Popular home monitoring packages, such as Apple's HomeKit, include cameras, thermostats, light bulbs, water sensors, door locks, and VOC air quality sensors.
I Do sensors have security risks? Sensors themselves are not generally a security risk, but the data they collect can be used for unauthor ized purposes.
A smart thermostat can be used legitimately by a homeowner to remotely track and adjust the temperature of a house or apartment. With approval, data from the thermostat might even be collected by the local power com pany and used to gauge usage levels.
QUICKCHECK Which one of the following aspects of smart sensors on the
loT would be the least likely to
Because the thermostat communicates using a wireless network, the signal
pose a security risk?
is subject to interception. An unauthorized person might monitor the signal to determine when a homeowner leaves the house (heat is turned down),
3. Anonymlzed data
arrives home (heat is turned up), or goes on vacation (heat remains down
b. Data transmitted without encryption
for several days). When considering smart sensors, take care to understand where their data can be stored, who can access the data, and who can control the device. To
maximize security, select sensors that store data locally or on a secure site. In addition, confirm that all data is encrypted before it is transmitted and stored, and ensure it can be controlled only by you.
c. Data stored on 3 Web site
d. Temperature sensors supplied by your electric service provider
SECTION E, MODULE 2
144
AUTONOMOUS VEHICLES There are drones in the sky, Roombas crisscrossing the floor, and cars
speeding down the highway in Supercruise mode. The technology that allows these vehicles to operate autonomously or semi-autonomously requires an array of sensors communicating with an onboard computer.
TRY ITI
Autonomous vehicles, such
> Exactly what is an autonomous vehicle? Cars, trucks, trains,
as self-driving cars, have
drones, planes, and machines that are usually piloted by humans become autonomous as the vehicles, rather than the humans, take over control of
limitations. Can you discover what type of pre-mapping is
speed, braking, and steering. Fully autonomous vehicles operate without a person at the controls. Semi-autonomous vehicles provide assistance to a
takes to the road?
required before a Google car
human operator.
Features available in semi-autonomous automobiles include adaptive cruise control, in-iane steering control, automatic parking, and collision avoidance
systems, which take over some, but not all, driving tasks. I How do autonomous vehicles make control decisions? In
general, autonomous vehicles use sense-plan-act algorithms that emerged with the development of robotic systems. These algorithms may be classi fied as artificial intelligence {A!) because they make decisions and carry out activities without human intervention.
Sense-plan-act algorithms gather data, analyze it, and then carry out the required actions. Multiple sense-plan-act loops operate simultaneously. For example, in a seif-driving car one loop may be sensing lane markings,
while another loop is monitoring the distance to the vehicle ahead, and yet another loop is watching for suddenly appearing objects. Figure 2-71 pro vides additional details pertaining to sense-plan-act. FIGURE 2-71; SINSE-PIAN-ACT ALGORITHMS FOR SELF-DRIVING CARS
BRAKE? REDUCE SPEED?
HONK? Sense. Sensors on the vehicle
gather raw data about the nearby environment and the status of the vehicle itself. Environmental data
Plan. Based on its interpreta tion of sensor data, the onboard
comes from sensing nearby vehi
computer applies a series of rules
cles, people, animals, and other objects, as well as the roadway
to determine the best course of
itself. Vehicle status data includes
indicates that the vehicle ahead is
speed, direction, angle, and alti
slowing down, the computer must decide whether to adjust its speed or change lanes. The decision
tude.
Sensor data is delivered to an
action. For example, if radar data
onboard computer, where software quickly processes the input to identify road hazards and naviga
is based on rules such as "If the
tional points.
move to the left lane."
vehicle ahead slows down gradu
ally, and the left lane is clear, then
Act. After the computer deter mines a course of action, it sends
signals to the vehicle's control sys tems. A signal to the car's steering system can initiate a lane change. Signals could also be sent to the car's throttle or braking system to achieve a change in speed.
145
DIGITAL DEVICES
I What kinds of sensors keep an autonomous vehicle on the road? Lidar (light detection and radar) is a key input for the computer algorithms that steer an autonomous vehicle, but radar, sonar, infrared, GPS, cameras, and internal navigation systems also supply essential data (Figure 2-72). GPS uses orbiting satellites to determine a FIGURE 2-72: AUTONOMOUS VEHICLE SENSORS
vehicle's position. The coordinates received from the GPS are cross-referenced with
Lidar systems determine distance to obsta
digital road maps. Civilian GPS is accurate to
cles using laser range finders. This device
about ten feet, but augmentation technology
calculates the distance to objects based on
improves location accuracy. Soon, augmented
the time it takes for the laser beam to reach
GPS systems should be able to calculate posi
an object and return. The range for this
tion with accuracy of one inch.
device is about 650 feet(200 meters), and Infrared sensors can be used
360-degree Lidar arrays can gather millions of data points per second to map objects in a
to sense the heat signatures of pedestrians and animals, par
65-foot radius of the vehicle.
ticularly when it is dark.
Internal navigation systems(INS) Include gyro scopes and accelerometers that continuously calculate position, orientation, and speed of the vehicle. These systems can monitor position if GPS signals are temporarily blocked by the
Radar adds more data about the nearby environment. Radar, which uses sound
waves, does a good job of sensing metallic objects, but does not sense pedestrians and other non-metallic objects. It is primarily used to track nearby vehicles. It is currently used In adaptive cruise control systems to
signals, which are analyzed by image recogni
maintain a safe distance to the car in front.
tion software.
structures in a dense urban area.
Cameras collect images of road signs and traffic
SECTION E
QUICKQUIZ 1.
The
bus carries data from
4.
The two most common technologies used for touchscreen displays are resistive and
an external device to RAM.
Is a slow wireless technol
2.
ogy used to connect devices within a radius of
handles image data.
freeing the CPU for other processing tasks.(Hint; Use the acronym.)
The most commonly used general-purpose tech nology for connecting gadgets to laptop and
about 30 feet.
3. A(n)
5.
desktop computers is a(n) I port.(Hint: Use the acronym.)
IN THE WEST AFRICAN nation of Ghana, of donations arrive every day in port cities, such as smoldering piles of discarded computers and moni tors ring a mucky river, polluted beyond recovery. Teenage boys play soccer in a toxic haze. When their break is over, they get back to work smashing moni tors, ripping out the innards, and tossing the plastic cases onto a smoking pyre of oozing plastic. In Guiyu, China, thousands of women huddle over primitive stoves "cooking" circuit boards to retrieve trace amounts of gold. Toxic fumes from the cooking process cloud the air; a toddler showing symptoms of lead poisoning plays listlessly with the carcasses of discarded mice and cell phones.
It is called ewaste, e-garbage, or teohnotrash—all unwanted and outdated computers, monitors, print ers, cell phones, disk drives, disks, CDs, and DVDs.
According to the United Nations, an estimated 65 mil
Hong Kong, where they follow a shadowy route to unregulated workshops and dump sites. Some illegal ewaste originates in legitimate recycling centers, where consumers assume electronic com
ponents will be handled in environmentally friendly ways. Many recycling centers do not process malerials on site. Instead, they ship the ewaste to third parties. Without careful monitoring, that ewaste can be diverted to offshore locations where it piles up, waiting to be disassembled by backstreet laborers ungoverned by environmental protection regulations. Developed countries have strict environmental regu lations designed to prevent toxic substances from polluting air, land, and water. Proper disposal is expensive, however.
Some illegal ewaste originates countries with high , .. _ _ labor costs and strinIft legitimate recycling centers^ gent environmental regulations, the value
lion metric tons of ewaste are
discarded worldwide every year. About 10 million tons of that total are discarded by U.S. consumers. More than 7 million tons are discarded in China.
Computers and other electronic gear contain toxic substances such as lead, cadmium, and mercury.
When discarded equipment is buried in landfills, these substances can leach into groundwater and streams. When burned, electronic components can emit toxic dioxin.
Ewaste is a global problem. As countries struggle to deal with discarded electronic components, an
alarming amount of ewaste is shipped to developing countries where villagers, working for pennies a day, are exposed to toxic chemicals as they attempt to reclaim resalable metals from discarded equipment.
of compounds retrieved from ewaste does not cover the cost of extraction.
The high cost of properly processing ewaste makes gray market options attractive. Ewaste can be han dled more cost-effectively in emerging countries where environmental regulations are ignored, wages are pitiful, and workers are not covered by health and safety laws. So, who is responsible for ewaste sweatshops and pollution? Is it consumers in developed countries who deposit unwanted gear at recycling stations that don't carry out the recycling process in-house, or is it the recycling firms that ship ewaste to third parties? Is it the firms that ship ewaste to emerging countries or the governments that can't close the loopholes on
Throughout the emerging world, ugly ewaste dumps defile the landscape and have yet unknown health
ewaste transhipping?
effects.
tries that are unable to control ewaste sweatshops
Where does all this ewaste originate? Every coun try generates ewaste, but the bulk of it comes from prosperous, technology-forward countries such as
and ignore the resulting environmental and human
the United States, Great Britain, Germany, Japan.
of the problem can become more responsible in the way they dispose of unwanted gear to keep it out of
France, and China. Despite laws that ban ewaste transhipping, loopholes allow discarded but work ing electronics to be shipped as "donations." Tons
Perhaps the responsibility lies with emerging coun
casualties.
Wherever the blame lies, consumers who are aware
landfills at home and offshore.
147
DIGITAL DEVICES
TRY IT! Explore the ewaste issue. Watch a video of the Ghana crisis and explore the steps you can take to minimize the number of electronic components that end up in landfills and toxic waste dumps.
Q A group of graduate journalism students from the University of British Columbia investigated the illicit ewaste industry. Their story is presented in a Frontline World report located at www.pbs.org/ fror]tlineworld/stories/gharja804/video/videojndex.html. Watch the video. Where do the researchers drop off the ewaste, and where does it end up?
^ An environmental advocacy group, Basil Action Network, secretly planted 200 tracking devices in elec tronic items donated to recycling centers in the U.S. Read about the project at hltp://tinyurl.com/j34655t and follow the link to the interactive online map. What does this map tell you about the recycling chain? Many computers, mobile phones, and other electronic components pile up in landfills because their own ers are unaware of potential environmental hazards and simply toss them in the garbage. Use Web sites such as Earth911.com, or search for recycling computers and add your city name, as in recycling compub ers Chicago. Where is the nearest drop-off location for old laptop computers? Would you be charged a fee, and if so, how much?
o Before donating or discarding a computer, you should erase all the data it contains. Simply deleting files is not sufficient to prevent data from being recovered. Search online for information about deleting or "wip ing" the data from a hard drive. What are three ways you can securely prevent access to the data on a hard disk?
0 Consumers can select "green" products and purchase equipment from environment-friendly manufac turers. Check out Greenpeace's Green Ranking. What is the ranking for the company that manufactured your computer?
0 You might wonder if the computer you are currently using is environmentally friendly. The Green Electronics Council rates specific computer models as bronze, silver, or gold. Connect to the EPEAT site (www.epeaf.nef), use the Search for Products links, choose the Full Search option, and then fill in the fields to find the rating for your computer brand and model.
Total
Desktops
1
83
132
216
Displays
0
352
308
660
Integrated Desktop
0
51
27
78
Computers li)
Notebooks
50
635
1010
Thin Clients
0
21
4
Workstation Desktops
0
0
20
20
Workstation Notebooks
0
2
7
9
Totals
51
1144
1516
1703 25
2711
What Do You Think? 1. Have you ever thrown away an old computer or other electronic device?
2. Do you research products before purchasing them to find out if they are environmentally friendly throughout their life cycle?
3. Would it be fair for consumers to pay a recycling tax on eiectronic equip ment that they purchase?
ISSUE
f^jtk O'SYK^irRerstncir com
You're looking for information. Where you start depends on how you plan to use the information. The sources
you need for a class research paper often differ from information sources for personal use. information sources can be roughly divided into two categories: those that serve academic audiences and those that serve consumers.
SCHOLARLY AND ACADEMIC SOURCES OWritten by experts D Intended for academic or professional readers Find ttiese
sources using Google Scholar and academic databases/ directories such as DOAJ.
O Peer-reviewed by other experts before publication OContaIn original research, theoretical analysis, or best practices
O Carefully documented by footnotes or endnotes
Use these sources for class
papers, theses, essays,and dissertations.
O Published by academic publishers, professional asso
ciations, or university presses D Include academic books,academic Journals, papers,
conference proceedings, dissertations, textbooks, and monographs In printed or digital format
CONSUMER-LEVEL SOURCES
^Written by reporters, bloggers, or practitioners 3Intended for the general public Use these Find these
sources using Google Web, Google News, and product
0 Usually reviewed by an editor before publication
O Sometimes open to public WngfUM comment after publication
3Printed or displayed In color with included photos
sources
for product information,
troubleshooting. news, and topic overviews.
Web sites.
3 Often published in for-profit publications that Include advertising
3Include trade books, magazines,encyclopedias, press releases, trade Journals, blogs, news sites, and online forums
HELP! Can't access what you need for a research project? Here are some common problems encountered by stu dents, and solutions that help you find the resources you need for a paper that earns you an A.
PROBLEM: Web search engines, such as Google, sometimes miss many of the articles most relevant for a
college-level research project because articles are often locked behind paywalls or firewalls that don't allow search engine access. SOLUTION: Go directly to a journal's Web site and search there. PROBLEM: Many scholarly journals display only abstracts to the general public; viewing the full text of articles
requires a subscription or download fee. SOLUTION: Use your library's online database to locate articles that are included in the physical collection. You might have to go to the library to read the articles or ask for the full article from inter-library loan.
PROBLEM: Access to academic search engines and databases, such as LexisNexis, requires subscriptions.
SOLUTION: Your school might provide registered students with free access to journal databases if you log in from a computer on the school network or from within the library.
149
DIGITAL DEVICES
TRY IT! Research aboul computers and technology relies on information from a broad base of sources. Let's explore these sources by comparing what they offer. Some searches will produce information suit able for academic projects, such as term papers, while other searches tend to produce Information suitable for personal use, such as figuring out if
COMPUTER AND TECHNOLOGY
ACADEMIC DATABASES
someone Is hacking into your home network.
To record the results of this comparison, write down (or screen capture) one example that you get from each source, and then describe an aca demic project or personal use for which that information would be suitable. As an example, suppose that you search for cloud computing using Google Scholar and one of the results Is; Introduction to parallel algorithms and architectures
T LeigMon-see,uhcl.edu ... Catalog Description: This course covers parallel compulations using popular Interconnection networks such as arrays, trees, hypercubes. and pennutation networks such as the star and the pancake networks, as well as grid and cloud computing.... Ciieri hv 2n9fi • Reiarcd articles ■ View as HTML ■ Lihrarv Search ■ All 5 versions
This information is academic and could be a suitable source for a term
DOAJ (Directory of Open Access Journals)
Science.gov TDG Scholar
Microsoft Academic Search
IEEE Xplore CiteSeerX
ACM (Association for
Computing Machinery) Digitai Library
paper about cloud computing in a computer science course. Okay, now see what you can do with the rest. TECHNOLOGY NEWS
Q Check Wikipedia for general information about cloud computing and
SITES
then look at the list of references.
Huffington Post Tech
Search for academic and trade books aboul cloud computing at
Engadget
Amazon Books.
TechCrunch
0 Search for conference proceedings aboul cloud computing at the ACM Digital Library.
Q Search an open access database such as DOAJ (see sidebar) for a recent paper about cloud computing.
0 Search an academic database (see sidebar) for an abstract about cloud computing. Search Science.gov for a full text article about cloud computing.
0 Search an online computer magazine, such as Wired, for a recent arti cle about cloud computing.
0 Use a search engine, such as Google or Bing, to locate a recent press release about cloud computing.
© Search Amazon Electronics for cloud computing products and cus tomer reviews.
© Search a technology news site (see sidebar) for the latest industry news about cloud computing.
ArsTechnica
Google News Sci/Tech WSJTechnology CNET News Tom's Hardware
'Y-j I-J «•
f ••
-
TECHWOtOGYdNtCQII IN ENGINES OF THE MIND, Joei
data was distributed to terminals at other locations
Shurkin writes, "If necessity is the mother of invention, then war can be said to be its grandmother." The mili tary, an early pioneer in computer and communication technologies, continues to be the driving force behind technologies that have revolutionized everyday life.
through rudimentary networks. Because all data communication flowed through the
by hand, each table required weeks of grueling calcu
mainframe, a single point of failure for the entire sys tem was a possible risk. A malfunction or an enemy "hit" could disrupt command and control, sending the military into chaos. Therefore, the armed forces cre ated the Advanced Research Projects Agency(ARPA) to design a distributed communications system that could continue operating without a centralized com
lations.
puter.
Project PX produced ENIAC (Electronic Numerical Integrator And Computer), one of the first generalpurpose electronic computers. When ENIAC was completed in 1946, the war was over, but ENIAC's
The result was ARPANET, which paved the way for
During World War II. the U.S. military Initiated a clas sified research program, called Project PX, to develop an electronic device to calculate artillery firing tables;
versatile architecture could be used for other calcula
tions, such as designing hydrogen bombs, predicting weather, and engineering wind tunnels. ENIAC's tech nology evolved into the computers used today.
the data communications system we know today as the Internet. ARPANET was activated in 1967, but the
.mil domain that designates U.S. military Web sites was not implemented until 1984, The U.S. Department of Defense (DoD) currently maintains several data communications networks,
including SlPRNet, a classified (secret-level) network, and NIPRNet, which provides unclassified services. The DoD's public Web site provides official informa tion about defense policies, organizations, budgets, and operations. Computers and communications technology have also become an integral part of high-tech flight oper ations. U.S. Apache helicopters, for example, are equipped with computer-based Target Acquisition Designation Sights, laser range flnder/deslgnators, and Pilot Night Vision Sensors. Networks are also crucial for combat operations, and
a new generation of communication tools is evolv ing for soldiers deployed to battlefields. Networked communication devices offer immediate situational
After Project PX, the military continued to support computer research. Like most large corporations, the military used mainframe computers to maintain per sonnel. inventory, supply, and facilities records. This
awareness by providing critical information such as orders, imagery, graphics, and maps. The U.S. Army's $150 million Nett Warrior program is essen tially a smartphone carried by the dismounted soldier that displays the locations of friendly troops and facili tates text messaging when verbal communication is not possible.
151
DIGITAL DEVICES
Combat equipment for today's soldiers includes
Autonomous vehicles are another area of research.
"software-defined" radios that are less vulnerable to
Collaboration with the private sector produced technology for unmanned convoys In which a lead vehicle, piloted by a human driver, conducts a string of unmanned trucks through potentially dangerous
cyberthreats than conventional radios. Soldiers can use these radios to communicate voice and data. A small handheld device with a touchscreen allows soldiers to control unmanned robots and drones. A
solar backpacl^ supplements the battery-powered
device. Combat equipment also includes wearable devices, such as helmet-mounted displays and com munications devices.
The military has conducted research in computer simulations that are similar to civilian computer games. "Live" military training is dangerous— weapons are deadly and equipment
territory. Today, a growing cadre of computer and communi cations specialists is needed to create and maintain
Increasingly complex military systems such as the Defense Department's Distributed Common Ground System (DCGS) for sharing surveillance imagery and intelli gence.
In the past, armies
depended primarily on their infantry divi
costs millions of dollars. With com
puter simulations, however, troops
sions, but today's high-tech armies also
can train in a true-to-life environment
without physical harm or equipment damage.
depend on database designers, computer programmers, and
Flying an F-16 fighter, for example, costs thousands of dollars an hour,
but flying an F-16 simulator costs only a few hundred dollars per hour. The military uses simulators to teach Air Force pilots to fly fighter jets, Navy submarine officers to navi gate in harbors, and Marine infantry squads to handle urban combat. Military trainers agree that widespread use of computer games helps prepare troops to adapt quickly to simulations.
A 24-year-old prefllght student at Pensacola Naval Air Station modified the Microsoft Flight Simulator game to re-create a T-34C Turbo Mentor plane's
controls. After logging 50 hours on the simulator, the student performed so well on a real plane that the Navy used his simulation to train other pilots.
The military is quick to borrow civilian technologies that make combat teams safer and more effec
tive. Soon after Google Glass was released to the general public, the U.S. Navy contracted with a
multinational eyewear company to integrate highdefinition display technology into standard military goggles. Hands-free data access and video record
ing capabilities permit sailors to perform tasks without pausing to deal with communications equip ment.
The U.S. Navy also seeks help from civilian devel opers—even college students. In the annual International RoboBoat competition, a $20,000
prize is awarded for the best-designed ships that can operate without crews In harsh environments or dangerous situations.
network specialists.
Even previously lowtech military jobs, such as mechanics
and dietitians, require some computer
expertise. Happily, new recruits are finding military computer systems easy to learn based on their knowledge of civilian technologies, such as the Internet and computer games.
Although most citizens recognize that an adequate national defense is necessary, the cost of defenserelated equipment, personnel, and cutting-edge research remains controversial. In a 1961 speech, President Dwight Eisenhower warned, "We must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military-industrial complex."
Some socially motivated citizens and pacifists tried to withhold tax dollars from the military-industrial complex that Eisenhower cautioned against. In ret rospect. however, military funding contributed to many technologies we depend on today. For example, detractors tried to convince the gov ernment that Project PX was doomed to failure; but without ENIAC research, computers might not exist today. Skeptics saw no future for the fruits of ARPANET research; but it led to the Internet, which
has changed our lives significantly.
i
MODULE 2
FLIPPED CLASS PROJECTS
Critical Thinking
Multimedia Project
For many years, personal computers were desktop models designed around four main components: system unit, monitor, keyboard, and mouse. Today,
Imagine that you are a high school teacher and you have to design materials to teach a unit on how microprocessors work. To kick off the unit, create a 30- to 60-second video showing the control unit, registers, and ALU and how an instruction like ADD
more than half the devices we use are slate form
factors without physical keyboards. Some Indus try analysts speculate that the move away from physical keyboards signals a fundamental change
9 + 2 would be processed. Be creative and make it interestingi
in the use of digital devices. Whereas computers
were once seen as tools for producing, they are now becoming tools for consuming. How significant is a physical keyboard to the creative and produc tive use of digital devices? What kinds of evidence would help to support your opinion?
Group Project For this project, work in groups of three or four. The group should select a trending digital device,
Resume Builder Use the Web and other resources to learn about
the digital devices and other technologies used in your career field. Format the Information you find in a style similar to the Technology In Context sec tion of each module in this textbook. Be sure to
select two photos to accompany your narrative and include a list of relevant citations for your sources.
such as a fitness wristband, a smartwatch, smart-
glasses, a home security system, or a just-released smartphone. If a member of your group owns the device, that's a plus. Create promotional materi als for a tradeshow booth featuring your device.
You might include a product photo, a list of speci fications, and a short instruction manual. If time
permits, your instructor might ask your group to present your sales pitch or a demonstration to the rest of the class.
Cyberclassroom Work in pairs to set up a cloud-based storage loca tion where you can share files. Experiment with the following scenarios to find out what happens; 1) Two people access the same file at approxi mately the same time; neither person changes the file contents.
2) While one person is modifying a file, another person tries to access the file but does not try to modify it.
3) While one person is modifying a file, a second person attempts to access it and change it.
Globalization Digital device ownership is growing worldwide and providing access to productivity tools and a global communications Infrastructure. For this project,
look for statistics and graphs showing the increase in device ownership around the world over time. How does it compare to telephone, television, and radio ownership? Are any aspects of this data unexpected or surprising? Gather your graphs and analysis into a two- to three-page executive summary.
DIGITAL DEVICES
KEY TERMS
2-ln-1 97
head crash 120
read-write head 119
accelerometer 143
recordable 121
recovery drive 126
additive manufacturing 141
hot-plugging 133 Inkjet printer 140 input 85
ALU 108
instruction cycle 108
remote storage 123
application software 86 apps 86
instruction pointer 109
resistive technology 138
instruction set 107
response rate 136
integrated circuit 87 integrated graphics 139
rewritable 121
ROM 114
boot loader 114
laptop computer 96 laser printer 140
screen resolution 137
capacitive technology 138
LCD 136
semiconductors 87
sense-plan-act algorithms 144
access time 120
ARM 105
backup 125 Bluetooth 134
registers 108
RISC 112
capacitors 113
LED 136
card reader122
lidar 145
serial processing 111
central processing unit 85
lithium ion 92
server 95
Chromebook 96
Iocs! storage 117 machine language 107 magnetic storage 119 magnetometer 143
CISC 112
cloud storage 123 compatible 101 computer 85 computer program 86 control unit 108
mainframe 95
memory 85 memory card 122
CPU cache 112
microcontrollers 98
data bus 131
microprocessor 85 microprocessor clock 110 multi-core processor 110
slate tablet 97 smart sensors 142
smartphones 97 software 86 solid state drive 123
solid state storage 122 storage 85 stored program 86
non-volatile 122
supercomputer 95 system board 88 system software 86 system unit 89
oleophobic 92 operating system 86
touchscreen 138
discharge rate 93
optical storage 121
USB flash drive 123
disk image 127
output 85
USB hub 133
dot pitch 137 dynamic RAM 113 expansion ports 131 file synchronization 126
parallel processing 111
virtual keyboard 138 virtual memory 114
data transfer rate 120
dedicated graphics 139 desktop computer 96 development tools 86 device driver 135
PDA 97
form factor 89
peripheral device 130 personal computer 96 pipeline processing 111
gigahertz 110 graphics processing unit 139 gyro sensor 143
portable computer 96 process data 85 programming language 107
hard disk drive 119
RAM 113
hard disk platter 119
read-only 121
tablet computer 97
volatile 113
wearable computers 98 word size 112
X86105
SECTION A: A computer is a multipurpose device
the master controller for all the activities that a digital device
that accepts Input, processes data, stores data, and
performs. Digital devices are constructed using tiny electronic
produces output, all according to a series of stored
components that represent data bits as electrical signals. The
system unit houses the system board, which contains several
The
I circuits made from semiconduct
processing unit of most modern computers is a(n) The instructions that tell a
ing materials. Computers come In three popular form factors;
computer how to carry out a task are referred to as com
component,|
puter
today's digital devices operate on battery power supplied by
I , which are distributed
| . and slate. Many of
as software. Computers run three main types of software:
ion batteries. Battery life and life-
software, system software, and
span can be extended by following good battery management
development tools. An example of system software Is a com
puter!
practices.
[system, which Is essentially
SECTION B: Today, there are many computer cat
egories. A(n) I
I Is the category for
digital device requires consumers to select a platform based on form factor and operating system. MacOS Is the operating sys
tem that runs on Apple laptops and
the world's fastest computers,
computers are large, expensive devices capable of simulta
computers. The operating system for IPhones and iPads Is The
neously processing data for thousands of users. Computers used by Google and Web service providers are classified as
I. Personal computers come in sev I computer fits on
eral varieties. A(n)|
a desk, runs on power from an electrical wall outlet, and can be housed in a horizontal case or vertical case. Three categories
of portable computers include tablets, smartphones, and clam
shell style I
operating system from Microsoft runs on laptop and desktop PCs, whereas a derivative version Is designed for phones.
The open source community produces Linux for desktops and servers. This family of operating systems also includes
Chrome OS, and I
j. which Is popular
for tablets and smartphones.
I computers. Selecting a
SECTION C: The microprocessor Is a(n) Include word size, cache size, and Instruction set complex circuit, which is designed to pro cess data based on a set of instructions. Most desk
ity. Most digital devices contain only one microprocessor chip, but today's multl-
processors contain
top and laptop devices contain a microprocessor based
circuitry that supports parallel processing. Computers con
on the
tain various kinds of memory. Random
standard. Ivlost tab-
jets and smartphones contain processors based on technology. A microproces
memory Is a special holding area for data, program Instruc
tions, and the|
1 system. It stores data
sor's circuitry Is designed to perform a limited number of
on a temporary basis until the processor makes a data
tasks contained in its
i set. During
request. RAM Is different from disk storage because it is
processing, an instruction is loaded Into the processor's
I , which means that It can hold data
j] unit. Data Is loaded Into registers
only when the computer power Is turned on. Computers also
in the processor's|
where arith
contain read-1
|memory, which is a type
metic and logic operations are performed. Microprocessor
of non-volatile memory that provides a set of "hard-wired"
performance can be measured by Its
instructions, called the|
speed. Other factors affecting overall processing performance
a computer uses to boot up.
loader, that
155
DIGITAL DEVICES
state storage technolo
SECTION D: Today's digital devices use a variety of
DVD, or BD.
storage technologies.|
gies, such as USB flash drives, store data by activating elec
|storage tech
nologies, such as hard disks, store data as particles ori
trons in a microscopic grid of circuitry. A backup Is a copy
ented north or south. A hard disk drive provides multiple
of one or more files that have been made In case the original
for data storage that are sealed inside
files become damaged. A good backup plan allows you to
the drive case to prevent airborne contaminants from inter
restore a device's operating system, software, data files, set
fering with the read-write heads. Hard disks are less durable
tings. accounts, and profiles in case of a massive hardware
than many other types of storage, so It is important to make
failure or virus infection. Personal computer backups are typi-
stor-
a copy of the data they contain.
hard drives, USB
caiiy recorded on
age technologies store data as a series of dark spots and
flash drives, network servers, and online storage services. An
light spots on the surface of CDs, DVDs, or BDs. Storage
easy way to get a backup of important data files is to use the
technologies, such as CD-
|, are often
command to make duplicates and store
used for distributing software, but you cannot alter the disc's
them on a USB drive. Backup utilities such as File History and
technology allows you to
contents.
write data on a CD. DVD, or BD, but you cannot delete or
Time Machine use a technique called file to make sure that files on two devices are the same. A disk
change that data. Rerecordable or
is a bit-for-bit copy of the data from ail
technology allows you to write and erase data on a CD,
sectors of a hard disk.
SECTION E: Inside a digital device, a data
tion. Touchscreens use either
connects the processor to RAM, and
itive technology to process gestures. Display devices receive
images from graphics circuitry. A(n)
connects RAM to a series of expansion
or capac-
and
There are four technologies commonly used for general-
special video memory can enhance graphics processing and
purpose ports: Thunderbolt, FireWire, Lightning, and
free the main processor for other tasks. For printed output,
I . For video devices, the most com
most personal computer owners select| 1 , and Mini jet printers, though| |printers are a popu
mon ports are VGA, DVi,|
DIsplayPort. Peripherals can be inserted or removed while
lar option when low operating costs and high duty cycle are
the host device is on, but storage devices should not be
important. The internet of
removed without notification. To connect additional peripher
nology that links smart sensors. Some of these sensors can
als when all USB ports are full, it Is possible to use a USB
also be found In smartphones and autonomous vehicles.
1 . Some peripherals can be connected
wirelessly using
|technology. The soft
A(n) I
is a tech
I can sense if a laptop computer is
droppedorif a car brakes suddenly. A(n)
ware that helps a peripheral device establish communication
sensor measures angular velocity. A(n)
with its host device is called a device| Most devices Include a(n) |
can be used as a compass for navigation and map displays.
. |crystal dis
Autonomous vehicles use sensor data as Input to sense-plan-
play. Image quality for a display device Is a factor of screen size, response rate, dot
, and resolu-
algorithms processed on an onboard computer.
MODULE 2
INTERACTIVE SITUATION QUESTIONS
1. Suppose you're reading a computer magazine and you
SUP-R GAME DESKTOP
come across the ad pictured to the right. By looking
MODEL EEXL
at the specs, you can tell that the microprocessor was
manufactured by which company?
I Intel® Core™ i7
2. The capacity of the hard disk drive In the ad is
i6GBTri-Channel DDR3
GB and the memory capacity is
1500 GB SATA-II (7200 rpm) GB.
121.5" HD widcscreen monitor
iNVIDIA® GeForce™
3. Your friends are chatting about a low-cost laptop that
I Creative Sound Blaster X-Fi Titanium
"runs Google." You figure that they are actually talking about a device called a(n}
I Altec Lansing speakers • Gigabit Ethernet port '3-year limited warranty
that runs
Google's Chrome OS as Its operating system. 4. Looking over the specs for a new clamshell-style device,
'Windows 10
you notice that It contains an A10 ARM-based processor. Is this device more likely to run macOS or ICS?
$549 5.
At the beginning of an update for your smartphone, you notice a warning that says "Make sure your device Is connected to a wall outlet and do not turn the device off
until the update Is complete." You suspect that the update
Is going to|
I the ROM boot loader to
fix a security vulnerability.
8.
After purchasing a new Windows computer, your first step is to get ail your backup tools in order, beginning with
a(n) I
i drive that you can use to boot
your computer In case of a hard drive failure. 9, One of the ports on your laptop is rectangular and the
6. You've decided to archive your vast photo collection on
Inside of It Is blue. It Is a(n)
port.
DVDs. You want the longest possible llfespan. When
10, You need an external keyboard for your Android device,
you go to purchase blank DVDs, you see that some are
and thankfully you can add a wireless one because II has
marked DVD-R, whereas others are DVD-RW, Which should you choose?
capability. 11. Suppose that you volunteer to produce a large quantity
7. You're working on a group project. Each person has to
of black-and-white leaflets for a charity organization, II is
access a dataset and use it to create several graphs.
fortunate that you have access to a(n)
You'll be compiling the graphs Into a final report. Rather
printer with a high duty cycle and low operating costs.
than emailing graphs back and forth, you suggest using Dropbox, a(n)
storage service where
members of the group can access a shared folder.
DIGITAL DEVICES
LAB:WHAT'S GOING ON IN THERE?
l:'"
^.
THE MiCROPROCESSOR CLOCK IS TICKING. Data bits are flying in and out of RAM and zooming over the data bus to a storage device. All that seems invisible, but wait! You can get an idea of what's going on inside the system unit. Who needs to know? You might. If you suspect your computer has a virus, if you think your computer might have been compromised by a botnet. If your computer seems sluggish. Windows and macOS include monitoring utilities that pro vide ail kinds of information about your computer's status.
REQUIREMENTS: For this lab, you'll need a desktop or laptop computer running either Windows or macOS.The instructions are general ized: they provide helpful guidelines, but not specific steps. You may have to explore a bit to find all the tools needed to complete the assignment, but that is all part of the learning experience.
ASSIGNMENT:
o Open your computer's monitoring utility.
Q Check for malware.
On a Mac, select the Applications folder from the dock. Select the Utilities folder, then select Activity Monitor. Use
Some processes are launched by the operating system rather than application software. If you don't recognize a process, you can find out if it is legitimate by checking
the View menu to select All Processes.
A.On a PC with Windows, make sure you are at the Home
online.
screen. Use the Search box to find and launch Task
Select a process with an unusual name and search for it
Manager. It might be necessary to select More Details.
online. What is its name and what does it do?
Examine your computer's CPU usage.
0Check memory.
On a Mac. select the CPU button; on Windows,select the
On a Mac, select the Memory tab: on Windows, remain
Performance tab-
on the Processes tab.
CPU utilization is expressed as a percentage of total pro
As you know, RAM holds the operating system, pro
cessing capability. If CPU utilization exceeds 10% when
grams, and data, but the amount of stuff that's actually in
you are not using software, it might signal a security
RAM is pretty surprising.
breach. Temporary spikes are normal: and when you are playing 3D games or using compute-intensive software, the usage could remain above 70%. What is the current CPU utilization on your device?
Find the listing for Kernel_task (Mac) or System (Windows). That process is part of the operating system. How much memory is it using? What is the name of the software application that uses
@ Check processes.
the most memory?
On a Mac, processes are listed on the CPU tab; on
0 Check storage.
Windows, select the Processes tab.
A process corresponds to a program. Any programs that are currently running put a load on the CPU.
What is the process with the highest CPU usage? Do you recognize the program associated with this process? If not, look it up online.
On a Mac, choose the Disk tab; on Windows, remain on the Processes tab.
Programs send data to storage even when you are not in the process of manually saving files. Some programs cre ate autorecovery files as temporary backups, and Web pages write cookies.
Find a process that is writing data to disk even when you are not actively using it. What is the name of that process and what is its purpose?
Networks
Module Contents SECTION A; NETWORK BASICS
Communication Systems Communication Clianneis
Network Topology Network Nodes Commurtication Protocols SECTION B: THE INTERNET
Background
Networks let us reach out to the world.
But they also let the world into our
personal space. In this module you'll explore how to create and use net works that don't expose your darkest secrets.
internet infrastructure Packets Internet Addresses
Domain Names
TRY IT!
Apply what you learn.
SECTION C; INTERNET ACCESS Connection Basics Cable internet Service
Telephone Network Internet Service
Choose when to use wired connections and when to use wireless connections-
Check the signal strength of a wireless connection.
Satellite Internet Service
Find your router's IP address.
Mobile Broadband Service
Find the private IP address for your device.
Wi-Fi Hotspots Differentiate between IPv4 and IPvG addresses. SECTION D: LOCALAREA NETWORKS
Obtain a domain name.
LAN Basics
Find the owners of domain names and IP addresses.
Ethernet
Find the address of your DNS server and change it if
Wi-Fi
Set UpYour Own Network Network Monitoring loT Networks SECTION E:
FILE SHARING
File Sharing Basics Accessing LAN Files SharingYour Files Internet-based Sharing Torrents ISSUE: WHO WILL CONTROLTHE INTERNET?
necessary.
Check the speed of your Internet connection and com pare it to the speed advertised by your ISP.
Determine the latency, jitter, and packet loss on your Internet connection and gauge whether it affects the quality of streaming services. Use Traceroute to troubleshoot a slow Internet connection.
Select an Internet service provider. Reduce your security risks when connecting to Wi-Fi hotspots.
INFORMATiONTOOLS;
Construct a local area network that allows devices to
FACT CHECKING
share files and an Internet connection.
TECHNOLOGY IN CONTEXT:
Configure and secure a router for a local area network.
EDUCATION
Piece together a small loT network for home monitoring.
MODULE ACTIVITIES LAB: HACK YOUR NET
Access files from other devices on a LAN.
Activate file sharing and use permissions to limit how your files can be used. Obtain files from internet-based services, such as FTP, Dropbox, and Bitlorrent.
158
Networks
PRE-CHECK
Gauge your level of expertise. The answers are in the text.
11=^ What type of network topol ogy does the diagram above
m
Before speeding over the
The major problem with satel
Internet, files are divided Into:
lite Internet access is excessive:
illustrate?
List five types of fixed Internet
LTE
access:
Which is more secure:
Broadband or narrowband?
WEP or WPA
wmv.course.com
What's the top-level domain?
TCP
WPA2
IP
WEP
Which one is the Internet
protocol stack?
To protect the files on your computer when connecting to a Wi-Fi hotspot, what should you turn off?
1 59
160
SECTION A, MODULE 3
Channels
Equipment Communication
Systems
Topologies
SECTION
A NETWORK BASICS
NETWORKS ARE EVERYWHERE.
Terminology
They are an indispensable part of our lives. When there are outages, things go haywire. When there
communication network PAN LAN WAN
are slowdowns, we get frustrated. What do you
communication channel wired channels
need to know about networks7The building blocks
in Section A will get you started.
wireless channels RF signals transceiver TTllcrOWaveS bandwidth
broadband narrowband topology point-to-point topology star topology mesh topology bus topology node DTE dce router modem
communication protocol handshaking protocol stack error correction
Objectives I Replicate Shannon's diagram of a general communication system,including all nine labels.
I Give two examples of PANs,LANs,and WANs. > List four examples of wired channels used for
I Draw a diagram showing how data from a smart thermostat could travel over several networks with different topologies.
I Compare and contrast mesh and star topologies based on dependability, security, capacity, expandability, control, and monitoring.
networks.
I State the two wireless channels most
commonly used for communication networks. I List two advantages and four disadvantages of
I List two examples of PTEs and two examples of DOES.
I Explain the difference between a modem and a router.
wireless channels.
t State what differentiates broadband from narrowband.
I List five tasks that are handled by
communication protocols.
161
NETWORKS
COMMUNICATION SYSTEMS
You use many networks for communication, research, and entertainment. Some networks are large and some are small. The largest networks offer little control to consumers. Smaller networks that you set up can be com
pletely under your control, but they are also your responsibility. Networks can be classified in many ways; as a network user, you'll want to keep in
QUICKCHECK In Shannon's model, signals
(
mind the idea of control and how it affects your privacy and security.
traveling along a communication
I What is a network? A network links things together. A communica
channel can be disrupted by
tion network (or communication system) links together devices so that data and information can be shared among them.
a. a source
In 1948. Claude Shannon, an engineer at Bell Labs, published an article
b. a transmitter
describing a communication system model applicable to networks of all types. His diagram illustrates the essence of a network, so it is a good place to begin this module. Shannon's model (Figure 3-1) is easy to understand.
c. a receiver d. noise
FIGURE 3-1: COMPONENTS OF A GENERAL COMMUNICATION SYSTEM
Noise J y
s„„„ /f ° ■ Communication | channel
Source
Transmitter
Receiver
Destination
\ How are computer networks classified? Networks can be classi fied according to their size and geographic scope, as shown in Figure 3-2. FIGURE 3-2: NETWORK CLASSIFICATIONS
aa a a PAN (personal area network)
LAN (local area network)
WAN (wide area network) WANs cover a large geographi
PANS connect smart devices or con
LANs are data communication
sumer electronics within a range of about 30 feet (10 meters) and with
networks that connect personal cal area and usually consist of computers within a very limited several smaller networks, which geographical area—usually a single might use different computer building. School computer labs and platforms and network technolo home networks are examples of gies. The Internet is the world's
out the use of wires or cables. The
reference to persona/ indicates that the network serves a single indi vidual, rather than multiple users. A
PAN could be used to sync data from a handheld device to a desktop com puter, ship data wirelessly to a printer, or transmit data from a smartphone to a wireless headset.
LANs. Wi-Fi networks that you can
largest WAN. Other public WANs include telephone systems, cable other public places are LANs. The in- television systems, and satellitehouse networks operated by most based communication systems.
access in airports, coffee shops, and
businesses are also LANs,
162
SECTION A, MODULE 3
> Why is geographic scope important? Localized nelworks nor mally include a small number of computers, which can be connected using basic equipment. As the area of network coverage expands, the number of
QUICKCHECK
devices grows, specialized devices are sometimes required to boost sig nals, and the diversity of devices requires sophisticated management tools
Internet access to students in
and strategies.
classrooms is operating what
t What about the Internet of Things? The Intemet of Things (loT)
type of network?
is an evolving concept that may be difficult to classify as a PAN, LAN, or WAN. The loT has the potential to become a global collection of smart devices transmitting to other devices over the Internet. Today,smart devices
a. PAN
are more often grouped into small local pods that report to a centralized device, which in turn exchanges data with local networks and the Intemet.
c. loT
A univeriity that offers wireless
b. LAN
d. WAN
COMMUNICATION CHANNELS
Do you suppose it is easier for a snooper to surreptitiously access your computer when your device is connected to a Wi-Fi hotspot or cabled to a
LAN? Some connections are more secure and more dependable than oth ers, so it pays to understand the ins and outs of communication channels. I What is a communication channel? A communication chan nel is the medium used to transport information from one network device
to another. Data transmitted over a communication channel usually fakes the form of an electromagnetic signal—waves of light, electricity, or sound. These waves can travel through the air or through cables, so channels are divided into two general classifications: wired and wireless. Wired chan
nels transport data through wires and cables. Wireless channels transport data from one device to another without the use of cables or wires.
TRY IT! Are you using a network right now? Is It wired or wireless?
> What are the options for wired channels? Wired channels
If It is wired, can you identify
include twisted pair wires used for telephone land lines, coaxial cables used for cable television networks. Category 6 cables used for LANs, and fiber optic cables used for high-capacity trunk lines that provide main routes for telephone, cable, and Internet communications(Figure 3-3).
the type of cable that connects your computer to the rest of the
FIGURE 3-3: NETWORK CABLES
Telephone cable
Network
cable
Coaxial cable
FIfaer-optIc cabfe
network?
163
NETWORKS
► What are the advantages of wired channels? Before wireless technologies became available, local area networks were exclusively wired. Today, wired connections are used less frequently for home, school, and business networks. They remain the network technology of choice, how ever, for segments of the Internet and local area networks that require fast and secure connectivity. When you set up a wired connection, you don't have to worry about hackers Intercepting your data from the sidewalk outside your house, or your neigh bor stumbling across personal files when your wireless signal reaches past your property line. Yes, there are ways to tap into a wired network, but they require physical access to the cable or fairly sophisticated snooping equip ment. The advantages of wired channels are summarized in Figure 3-4. FIGURE 3-4: ADVANTAGES OF WIRED CHANNELS
QUICKCKECK connections
Data traveling on a wired
Cables can be shielded
Wired
against interference and
are dependable. Their
more secure than their
channel tends to be more secure
encased In protective
carrying capacity and
wireless counterparts
than data traveling on a wireless
casings for installations
speed are not affected by airborne interference
because a device can
channel. True or false?
that are outdoors and
join a wired network
underground-
from rain, snow, or elec
only if it is physically
a. True
trical devices.
connected by a cable.
b. False
Wired connections are
• What are the disadvantages of wired connections? The cables that offer speed and security for a wired connection are also the main weakness of this type of connection. The disadvantages of wired channels include cost, lack of mobility, and installation hassles. Figure 3-5 provides more details. FIGURE 3-5: DISADVANTAGES OF WIRED CHANNELS
QUICKCHECK In WANs, wired instal
LAN devices connected
Cables are unsightly,
Which of the following situations
lation can be costly
by cables have limited mobility. Desktop com puters tend to be better
tend to get tangled, and collect dust. Running cables through ceilings,
that connects most devices with
poles or buried under ground. They can be
candidates for wired connections, whereas
walls, and floors can be challenging. Cables
a. A university campus
damaged by weather events and digging in the wrong place. Repairs
laptops, tablets, and
can also carry electri
b. A bank branch office
handheld devices can
cal surges that have the
retain their mobility
to underground cables
when they are not teth
potential to damage network equipment.
require heavy equip
ered to a cable.
because cables have
to be suspended from
ment to locate, access, and fix the break.
Is most suitable for a network cables?
c. A private home d. A coffee shop
164
SECTION A, MODULE 3
I What are the options for wireless channels? The most wide
spread wireless channels for communication networks are radio signals and microwaves.
i How do radio signals transport data? Most wireless channels transport data as RF signals, commonly called radio waves. RF chan nels are typically used for Bluetooth connections, Wi-Fi networks, and
wide area wireless installations such as WIMAX. It is also the technology used to carry voice and data between a smartphone and a cell tower. RF signals are sent and received by a transceiver (a combination of a trans mitter and a receiver) that is equipped with an antenna (Figure 3-6).
Terminology RF stands for radio frequency.
FIGURE 3-6: TRANSCEIVER-EQUIPPED DEVICES
Terminology Although we use the term wireless connection, there is no
physical connection between wireless devices in a network.
Their connection is conceptual Devices used with wireless connections are equipped with transceivers that
in the sense that data can
include a transmitter for sending data and a receiver for collecting data. A
travel between "connected"
transceiver has an antenna, which may be visible or may be housed out of sight
devices.
within a device's system unit.
I How do microwaves transport data? Microwaves (the waves themselves, not your oven!) provide another option for transporting data wirelessly. Like radio waves, microwaves are electromagnetic signals, but (hey behave differently. Microwaves can be aimed in a single direction and have more carrying capacity than radio waves. However, microwaves can not penetrate metal objects and work best for line-of-sight transmission when a clear path exists between the transmitter and receiver. Microwave installations usually provide data transport for targe corporate networks. They are also used to transmit signals between towers In cellular and wide area wireless installations.
► What are the advantages and disadvantages of wireless? The main advantage of wireless connections is mobility. Wireless devices
QUICKCHECK
are not tethered to network cables, so battery-operated laptops, tablets,
What type of wireless channels
and smartphones can be easily moved from room to room, or even out doors. With wireless networks, there are no unsightly cables, and power spikes are much less likely to run through cables to damage equipment. The main disadvantages of wireless channels are speed, range, security,
are most typically used for networks in homes and coffee
shops? a.
RF
and licensing, b. Coax
► Why is wireless slower than wired? Wireless signals are sus ceptible to interference from devices such as microwave ovens, cordless telephones, and baby monitors. When interference affects a wireless sig nal, data must be retransmitted, and that takes extra time.
► What limits the range of a wireless connection? The range of a wireless signal can be limited by the type of signal, the transmitter strength,
and the physical environment. Just as radio stations fade as you move away from their broadcasting lowers, data signals fade as the distance between network devices increases. Signal range can also be limited by thick walls, floors, or ceilings.
c.
Microwave
d. WIMAX
155 NETWORKS
As signal strength decreases, so can speed. A weak signal usually mearis slow data transfers. You can get a rough idea of signal strength for your
desktop, laptop, tablet, or smartphone by checking the network signal strength meter {Figure 3-7).
TRY HI
Your digital devices may connect to various networks with
differing signal strengths. Check the wireless signal strengths for
FIGURE 3-7; WIRELESS NETWORK SIGNAL STRENGTH METER
any devices you have handy.
10:23 AM ^rah Smith ^ ® Network signal strength meter Network signal strength
on the Windows desktop
meter on the Mac desktop
I What's the problem with wireless security? Wireless signals float through the air and penetrate walls. The signals that carry your wire less data can be accessed from outside your premises. Someone outside
of your house, for example, could surreptitiously join your network, access files, and piggyback on your Internet connection. To make wireless data useless to Intruders, it should be encrypted. Later in this module, you'll
learn how to use encryption to secure data sent over wireless connections.
I How does licensing affect wireless connections? Government agencies, such as the Federal Communications Commission (FCC), regu late signals that are sent through the air. To broadcast at most frequencies, including those used by radio and television stations, a license is required. Wireless connections use unlicensed frequencies that are available for pub-
Terminology
tic use. These frequencies include 2.4 GHz and 5 GHz. Of the two, 5 GHz is subject to less Interference from other devices, but it has a more limited
Hz Is an abbreviation for hertz,
range.
of times a wave oscillates, or
I What's bandwidth? Network channels must move data and move
peaks, per second. Telephone signals are transmitted in the 1,200 Hz range. Many wireless
it quickly. Bandwidth is the transmission capacity of a communication channel. Just as a four-lane freeway can carry more traffic than a two-lane street, a high-bandwidth communication channel can carry more data than a low-bandwidth channel. For example, the coaxial cable that brings you more than TOO channels of cable TV has a higher bandwidth than your
which refers to the number
networks transmit a 2.4 GHz
signal that peaks 2.4 billion times per second.
home telephone line.
The bandwidth of a channel that carries digital data is usually measured in
bits per second (bps). For example, your wireless LAN might be rated for an average speed of 27 fvlbps. The bandwidth of a channel carrying analog
QUICKCHECK You have a choice of network
data is typically measured in hertz (Hz). For instance, the copper wires that carry voice-grade telephone signals are often described as having a
connections. Which one of the
bandwidth of 3,000 Hz.
following Is broadband?
As of 2015, the FCC defines networks that are capable of moving at least 25 megabits of data per second (25 Ivlbps) as broadband. Channels slower than 25 Mbps are classified as narrowband. Broadband capacity is essential for networks that support many users and those that carry lots of
a. A 56 Kbps phone link
audio and video data, such as music and movie downloads.
b. A 2.4 GHz cordless phone c. A
cable connection
d. A 1.2 Mbps satellite link
166 SECTION A, MODULE 3
NETWORK TOPOLOGY
A spider weaves a web by making silky connexions between leaves, branches, and other surfaces. Most spiderwebs have a structure, and the same can be said for communication networks. The topologies of the net
works you use have an effect on their dependability, security, and scope. i What is network topology? in the context of communication net works, topology refers to the structure and layout of network components, such as computers, connecting cables, and wireless signal paths. When
QUICKCHECK
you envision how devices are connected by communication channels, you
In the full mesh network
are creating a picture of the network's topology.
illustrated in Figure 3-8, how
Module 2 explained how peripheral devices can connect to a host device
many possible paths are there
using expansion ports, USB cables, or Bluetooth. These connections are
between any two points?
an example of point-to-point topology. When connecting several devices,
a. 1
two network topologies are popular. Star topology connects multiple b. 5
devices to a central device. Mesh topology connects multiple devices to each other, either as a full mesh or as a partial mesh. The less popular
c. 9
bus topology connects devices in a linear sequence. Figure 3-8 illustrates
d. 10
these network topologies. FIGURE 3-8; NETWORK TOPOLOGIES
VS\ AV Point-to-point
Star
Full mesh
Partial mesh
Bus
> Can a network use more than one topology? Data can flow over multiple networks that have different topologies. As shown in Figure 3-9, data from a fitness wristband connects to a laptop via a point-to-point con nection (A). The laptop is part of a home network configured as a star (B). The home network uses Comcast, so it is part of a larger star network (C). Finally, the data is passed to the Internet, which has a mesh topology (D). FIGURE 3-9: MULTIPLE TOPOLOGIES
Comcast
LAN
167
NETWORKS
> Which topology is best? Every topology has strengths and weak nesses, so there is no best network topology. Figure 3-10 compares strengths and weaknesses of the two most popular network topologies based on dependability, security, capacity, expandability, control, and monitoring. FIGURE 3-10: STAR OR MESH?
vs\ as ■a
c u
a 9i
Q
If the central point fails, data cannot flow anvwhere on the
There is no central point of failure;
network. If one of the other
can be used to bypass failed devices.
redundant paths between devices
devices fails, however, the rest of the network remains operational.
vs\ u
between the sender and desti
a u V
nation. The threat area for any transmission encompasses only
Within a mesh, data travels through several devices and over multiple channels. Each leg presents a poten tial security risk. The chance of a security breach rises as the number
CA
three devices and two channels.
of devices and channels increases.
Data that travels on a star
pathway makes only one stop
U
es a
ts
•XStar topologies are limited by
Mesh topologies offer higher capaci
the amount of data that can be
ties because data can be transmitted
handled by the central device.
from different devices simultane
ously.
(S ■o s
ce a
•X-
vs\
•X-
VS\
The network can be expanded infi number of devices that can be nitely. As new devices are added, attached to the central device the network continues to repeat within its immediate area of the signal as necessary until it wireless coverage or maximum reaches the farthest devices. cable length. Expandability is limited by the
Setup and updates are primar ily done on the central device, o
u
which also can be used to shut down the entire network.
Setup Is more complex, as each device must be configured to send, receive, and forward network data. There is no central point at which the network can be shut down.
•«J3
O
•XAll data passes through a central point, which is easy to monitor for legitimate or illicit purposes.
Data does not pass through a central point, making data more challenging to monitor.
i
168
SECTION A, MODULE 3
NETWORK NODES Communication networks connect all kinds of devices: from smartphones to satellite dishes, from computers to cell towers, and even between tiny sensors and RFID tags. Any device in a network is called a node. You are familiar with network nodes such as laptops, smartphones, tablets, desk tops, and peripheral devices. There are many other nodes that you don't interact with directly, yet they ultimately control how smoothly your Netflix movie streams and whether your email arrives at its destination. t What should I know about network nodes? Devices on a network are classified as DTEs or DCEs. DTE stands for data terminal equipment. A DTE can be any device that stores or generates data. When connected to a network, your laptop is a DTE, as are your smartphone, tablet, and fitness tracker. The servers that house Web sites, handle email, offer cloud storage, and stream videos are also DTEs. Your own DTEs are under your control, and many servers are open to public access. DCE stands for data communication equipment. These devices control the speed of data over networks, convert signals as they jump from cables to wireless, check for corrupted data, and route data from its origin to its desti nation. The most well-known DCEs are routers and modems.
QUICKCHECK When you connect a cell phone to a network, it is considered a(n)______ a. DTE b. DCE c. SPT d. TCP
t How does a router work? You probably have a DCE in your home network. A router is a device that controls the flow of data within a net work and also acts as a gateway to pass data from one network to another. Routers are used to direct traffic over major Internet trunk lines. And they are commonly used to route data from home networks to the Internet (Figure 3-11 ). FIGURE 3-11: ROUTERS
To other networks
t How does a modem work? A modem contains circuitry that con verts the data-carrying signals from a digital device to signals that can travel over various communication channels. The kind of modem you use depends on whether you are connecting to a dial-up, wireless, cable, satel lite, or DSL Internet service. A modem is usually supplied by your Internet service provider (Figure 3-12).
QUICKCHECK A typical home network with Internet access would have a. a single DTE b. multiple DCEs, but no DTEs
FIGURE 3-12: MODEMS
c. a modem and a router Modem
d. multiple routers
169
NETWORKS
i What about other DCEs? DCEs perform all sorts of tasks. Suppose you want to extend the range of your home network out onto your bal cony. What if your Internet provider wants to streamline network traffic in a neighborhood where lots of subscribers stream HD movies? DCEs such as repeaters, switches, and hubs can get the job done (Figure 3-13). FICURE 3-13; NETWORK DEVICES
More
Hub
Router
Computers
computers
Hub
'
Extends a wired network by adding more ports
Switch
Computers
Switch
Sends signals to individual nodes rather than broadcasting to all of them
Bridge
Computers ^^Router
Bridge
Router
Connects two similar networks
*>■ '
Repeater
Computers W
Repeater
Extends the range of a network by restoring signals to maximum strength and retransmitting them
Wireless access
point (WAP)
Router Router
More
Computers
computers Allows wireless devices to connect to a wired network
QUiCKCHECK To extend the read) or your wireless network out onio your balcony, which of the following devices would be best? a. A hub
b. A router
c. A repeater d. A gateway
170
SECTION A, MODUtE 3
COMMUNfCATION PROTOCOLS A protocol is a set of rules for interacting and negotiating. In some respects, it is like the hand signals used by pitchers and catchers during base
ball games. Before the ball Is thrown, the pitcher and catcher use hand signals to negotiate the speed and style of the pitch. Similar to the way pitchers and catchers use signals, networks use communication proto cols to coordinate data transfer.
TRY IT! People use many verbal and
► What is a communication protocol? In the context of networks, a
nonverbal communication
communication protocol refers to a set of rules for efficiently transmit ting data from one network node to another. Two devices on a network negotiate their communication protocols through a process called hand shaking. The transmitting device sends a signal that means "I want to communicate." It then waits for an acknowledgment signal from the receiving device. The whooshing sounds you hear as two fax machines connect are examples of handshaking.
protocols. Think of a nonverbal signal that you might use in a restaurant to indicate that
you'd like the bill. How does
the server acknowledge your request?
> What can communication protocols do? Protocols set standards for encoding and decoding data, guiding data to its destination, and reduc ing the effects of interference. Networks use more than one protocol, and the collection of protocols for a network Is referred to as a protocol stack. Some protocols set standards for the physical cables and signals used to connect network nodes. Other protocols deal with the way data flows over network channels. And even more protocols specify standard formats for data so that it can be accessed by communication software. Figure 3-14 explains. FIGURE 3-14: COMMUNICATION PROTOCOLS
¥
PHYSICAL PROTOCOLS
specify cable and signal standards for the channels that carry data
TRANSPORT PROTOCOLS
Make sure data gets to its destination by establishing stan dards for dividing data into chunks, assigning addresses, and correcting errors
QUICKCHECK Which protocol category Is responsible for the standards that attempt to block junk mail?
ARRIVAL PROTOCOLS
[jl]
Convert data into standard formats that can be used by
applications, such as email. Web browsers, and Skype
a. Physical b. Transport c. Arrival
171
NETWORKS
► How can a network detect if a signal has been corrupted? Error correction is one of the responsibilities of communication protocols.
Remember from Module 1 that text, numbers, sound, images, and video all are represented by bits. Suppose that some of those bits are garbled in transmission. Did that email say to meet at 29:00? Did your music track stop halfway through? Without error checking, the data you receive may not be reliable or complete.
Digital networks—those that transmit digital signals—can be easily mon itored to determine if interference has corrupted any signals. At its most
primitive level, digital equipment is sensitive to only two frequencies—one that represents 1s and one that represents Os. Suppose that a 0 is sent as -5 volts and a 1 is sent as +5 volts. What if. dur ing transmission, some interference changes the voltage of a 1 bit from +5 volts to +3 volts?
To correct the corrupted bit, the receiving device realizes that +3 volts is not one of the two valid voltages. It guesses that a 1 bit {- Who siipervises Internet standards? Although each country can develop laws, policies, and regulations for the networks within their jurisdic tion, there is one crucial administrative task necessary to keep the internet
from sinking into chaos. Every Internet node—each server, each computer, and each piece of data communication equipment—must have a unique address in order to send and receive data.
The organization that supervises Internet addressing is ICANN, the Internet
Corporation for Assigned Names and Numbers. iCANN is a not-for-profit private sector organization operated by an international board of directors. Its advisory committee has representatives from more than 100 nations, and public comments pertaining to ICANN policies are accepted at its Web site.
QUICKCHECK
The primary role of ICANN is to • a. run the Internet
b. provide funding for the Internet
Control of Internet address assignments is a powerful tool. It provides the means to block users from accessing specific network nodes. Local govern ments exercise this power within their jurisdictions to shut down servers that violate copyright and distribute inappropriate content. The power to globally shut down access to a server, however, only rests with ICANN. You will discover more about the key role of internet addresses later in this section.
c. supervise Internet address assignments d. make sure that every country in the world gets equal access to the Internet
NETWORKS
175
INTERNET INFRASTRUCTURE The Internet Is not one huge communication network, but rather a net
work of networks. The way these networks fit together is referred to as the Internet infrastructure, internet networks are organized into tiers. As a consumer, you are subject to the fees, policies, and technologies of the tiers that provide your Internet service.
• What are the components of the Internet? The Internet is structured as a hierarchy of networks. Tier 1 networks are at the top of the hierarchy, followed by Tier 2 and Tier 3 networks. Tier 1 networks, such as AT&T, CenturyLink, Verizon, and NTT Communications, form the Internet backbone, a system of high-capacity routers and fiber-optic communica
tion links providing the main routes for data speeding across the Internet. Routers on the Internet backbone store routing tables that calculate and track the most efficient routes for data to travel from point A to point B. The Internet backbone is configured as a mesh network that offers redun dant routes for data transport. The backbone's mesh infrastructure is
probably the basis for the myth that the internet originated as a Department of Defense project to create a network that could survive nuclear attacks. Networks that form the Internet are maintained by Internet service provid ers (ISPs)that supply routers and other data communication equipment, as well as physical and wireless channels to carry data. ISPs exchange data at Internet exchange points (IXPs). Consumers generally connect to Tier 2 or Tier 3 networks. Use the infographic in Figure 3-18 to become familiar with the Internet infrastructure and its terminology: pay attention to the arrangement of network tiers and
QUiCKCHECK The Internet backbone
a. became the ARPANET In 1985
b. is maintained by ISPs
c. has IXPs where data can get sidetracked
d. is operated by the NSA
points where data moves between them. FIGURE 3-18; INTERNET INFRASTRUCTURE
■ Routers •IXPs
TIER 1
Jffjj ir^il iqor
. fSi.i
TIER 2
TIER 3
School network
Homo network
Business network
SECTION B, MODULE 3
176
> Who pays for the Internet? The Internet is not free. ISPs make a substantial investment in equipment and the cable or wireless infrastruc tures to connect consumers. The largest providers each have close to 200,000 miles of cables Installed across continents and laid over the ocean floor.
Tier 1 ISPs also own and maintain millions of dollars of data communication
equipment. In addition to Infrastructure expenses, ISPs are subject to data transport fees, especially when shipping data up through higher tiers. To offset expenses, ISPs charge consumers for access. Figure 3-19 explains how it works.
FIGURE 3-19: HOW ISPs CHARGE FOR ACCESS
FREE
Tier 1 service providers exchange data with other Tier 1 providers on a
FREE
no-cost basis.
S
$
s
_
$
free
I
QUICKCHECK Which ISP tier is not subject to transport fees from other tiers?
Tier 2 service providers exchange data on a no-cost basis with other
a. Tier 1
Tier 2 providers, but they pay fees to connect to the backbone through
b. Tier 2
Tier 1 providers.
c. Tiers
Tier 3 service providers connect to
Tier 2 or Tier 1 providers and pay transit fees for the data exchanged.
Consumers either pay fees directly
A
U
or their access is subsidized by an organization or government.
PACKETS
(Viost people envision their files, email, and other data flying through the Internet as a continuous stream of bits. This is not the case. Files are
QUICKCHECK Files are divided into before being shipped over the
chopped up into small pieces called packets. The technology that breaks a file into packets and routes them to any location on Earth in the blink of an
Internet.
eye Is absolutely amazing.
a. packets
t What's a packet? A packet is a parcel of data that is sent across a computer network. Each packet contains the address of its sender, the des
b. email messages
tination address, a sequence number, and some data. When packets reach
c. bits
their destination, they are reassembled into the original message according
d. tiers
to the sequence numbers (Figure 3-20). FIGURE 3-20: DATA PACKETS
li Messages divided into equal-size packets are easier to handle than an assort ment of small, medium, large, and extra large files.
177
NETWORKS
► Why not just send an entire message? Some communication networks, such as telephone systems, use a technology called circuit switching, which essentially establishes a dedicated, private link between one telephone and another for the duration of a call. Unfortunately, circuit switching is rather inefficient. For example, when someone is on hold, no communication is taking place—yet the circuit is reserved and cannot be used for other communications.
A more efficient alternative to circuit switching is packet switching tech nology, which divides a message into several packets that can be routed independently to their destination. Packets from many different messages can share a single communication channel, or circuit. Packets are shipped over the circuit on a first-come, first-served basis. If some packets from a message are not available, the system does not need to wait for them, instead, the system moves on to send packets from other messages. The end result is a steady stream of data (Figure 3-21).
Terminology The telephone network is sometimes referred to as the
public switched telephone network (PSTN).
FIGURE 3-21: SHIPPING PACKETS
Each circuit dedicates
CIRCUIT-SWITCHING NETWORK
A single channel can carry packets from many devices.
QUICKCHECK Which of the following dedicates a communication channel to each data transmission? a. The Internet b. Packet-switched network PACKET-SWITCHING NETWORK
Packet-switching networks (bottom) provide a more efficient communication system than circuit-switching networks (top).
c. Circuit-switched network
d. FedEx
SECTION B, MODULE 3
178
► How are packets created? One of the core Internet protocols, TCP (Transmission Control Protocol) is responsible for dividing files into chunks, adding headers containing information for reassembling packets in their original order, and verifying that the data was not corrupted while in transit (a process called error checking). When data is sent over the Internet using TCP, it will reliably reach its destination. TCP is built into applications that transmit data from one digital device to another.
► How are packets transported? TCP is also responsible for estab lishing a connection, transferring packets, and dosing the connection when the transmission is complete. Most of the data that fiows over the Internet is
QUICKCHECK Which data transport protocol includes robust error-checking? a. TCP b. UDP c. ARPANET
d. Circuit switching
under the control of TCP.
An alternative transport protocol, UDP (User Datagram Protocol) is faster than TCP but does not perform error checking and cannot reorder packets
if they are received out of order. UDP, therefore, is suitable for applications in which a bit of lost data is not critical, such as streaming video and music,
and Internet-based multiplayer games and voice calls. UDP and TCP both use communications ports to shuttle data into and out of a network device.
► What is a communications port? Here's the problem: On a packetswitching network, packets for Web pages, email, streaming videos, and other downloads may arrive at your digital device in the same stream and over the same channel. The packets may not arrive in neat little bundles; some video packets could arrive interspersed with Web page packets. Which packets should go to the browser and which to the Netflix player? Acommunication poit (usually referred to simply as a port) is a virtual end point for data entering and leaving a digital device. These ports are virtual in the sense that they are not physical ports, as are USB ports, for example. A communication port is not a physical circuit, but rather an abstract concept of a doorway, an opening, or a portal through which data flows.
QUICKCHECK Communication ports. a. include USB and audio ports b. simulate the dedicated circuits that exist on circuit-
Ports work in conjunction with Internet addresses, as you'll learn in later modules. Computers can have up to 65,535 ports. Typically about 10-20 ports are in use and open for various types of data. Data originating from the Web, for instance, uses port 80, whereas streaming video uses port 554. When ports are open, data is allowed to flow freely. Closing ports can block data, and that strategy is used by firewalls to prevent unauthorized
switching networks c. are designed to increase the download speed of video data
d. do not recognize packets
intrusions.
Ports create simulated end-lo-end connections on packet-switching net
works. So although the devices on two ends of a communication channel are not connected by a single dedicated circuit, ports create a conceptual circuit for each type of data, as shown in Figure 3-22. FIGURE 3-22: COMMUNICATION PORTS WORK WITH DATA FOR SPECIFIC APPLICATIONS
Port 80
a
■aaaa-
0,(S)fl
Port 554
Port 554
\j Data pours into a digital device from multiple sources.
Port 80
Data with simliar port numbers is channeled to associated apps.
browser Netflix
179
NETWORKS
INTERNET ADDRESSES
You might have heard that Internet addresses are running out. Does that mean some people will be unable to get online? Will people have to share addresses? Networks use several kinds ot addresses to determine where
packets originate and where they are headed. To find out how internet addresses might affect your online access, read on.
Terminology Internet Protocol is often
referred to as TCP/IP (pronounced "T-C-P-l-P").
i Exactly what is an Internet address? Although most people are accustomed to entering something such as www.wikipedia.org to access Internet locations, those "www" addresses are not the underlying address used to transport data to its destination. Internet addresses are controlled by IP (Internet Protocol), which—along with TCP—is part of the Internet protocol suite. IP defines two sets of addresses: IPv4 and IPv6.
► What is the difference between IPv4 and IPv6? IPv4, which stands for Internet Protocol version 4, is the Internet address standard
that has been used since the early 1980s. IPv4 uses 32-bit addresses to uniquely identify devices connected to the Internet. In binary, IPv4 addresses are written as:
11001111 01001011 01110101 00011010
For convenience, 32-bit binary addresses are usually written in decimal as four sets of three digits separated by periods: 207.75.117.26
Using 32 bits. IPv4 offers about 4 billion unique addresses. In 2011, that supply of addresses was completely allocated. Yes. IP addresses can be recycled when the original assignees no longer want them, but the demand far outstrips the number of addresses coming up for recycling. Another set of addresses was needed.
IPv6 (Internet Protocol version 6) uses 128 bits for each address, producing billions and billions of unique Internet addresses. An IPv6 address is usually written as eight groups of four hexadecimal digits, like this: 2001:48a8:800:1192:198:110:192:54
Don't worry, there are enough IPv6 addresses for the foreseeable future,
even with the anticipated influx of 2 billion new Internet users and the Internet of Things poised to add an estimated 50-100 billion devices to the Internet by 2020.
► Does every Internet user need an IP address? It is more accurate to say that every device on the Internet needs an IP address. Many, but not all, devices on the Internet have permanently assigned IP addresses, called static IP addresses. As a general rule, routers and computers on
QUICKCHECK An IP address that contains
84a3 would be a(n)
the Internet that act as servers use static IP addresses.
ISPs. Web sites. Web hosting services, and email servers that always need to be found at the same address also require static IP addresses. There is an emerging trend for individuals to request static IP addresses for their home networks, and a static address might be useful for remotely commu nicating with sensors and other devices in the Internet of Things.
a. IPv4 address
b. IPv6 address
c. corrupted address d. static address
SECTION B, MODULE 3
180
I What happens when a device doesn't have a static IP address? IP addresses can be temporarily allocated so that a device uses an address only while it is actively online. When the device is turned off or its Internet connection is disabled, the address can be recycled to another device. The next time the device is tumed on, it will be assigned a different IP address. Internet addresses that are temporarily assigned are called dynamic IP addresses.
QUICKCHECK When connected to a network, your computer can receive an address from
In practice, dynamic IP addresses do not change very often. Today, most consumers have always-on Internet connections that remain active as long as the router that connects to the Internet remains powered on. Turning a computer off or on does not affect the IP address stored in the router. Customers who access the Internet using Comcast XFINITY and AT&T U-verse, for example, could have the same IP address for weeks or
a.
DHCP
b.
packets
c.
IPv4
d. the CPU
months.
I How do devices get IP addresses? IP addresses can be assigned by a network administrator, but more commonly they are automatically assigned by DHCP (Dynamic Host Configuration Protocol). Most devices are preconfigured to receive an IP address by sending a query to the net work device acting as the DHCP server. That device could be a router for a local area network or a DHCP server from your ISP. IP addresses get a bit tricky because a device can have a public IP address and a private IP address.
TRY IT!
I What is a private IP address? Let's suppose that your laptop is con nected to your school network. The DHCP server for the school assigns a dynamic IP address to your laptop when you log in. That address, which probably begins with 10, 172, 192, FD. or FcOO, is classified as a private IP address because it works only within the school network.
Find your IP uddress. Is it m the
range of private addresses listed in Figure 3-23?
A private IP address can be allocated by any network without supen/ision from ICANN. However, the address cannot be used to send data over the
Internet; it is not routable. Figure 3-23 demonstrates how to find your pri vate IP address. FIGURE 3-23: FIND YOUR PRIVATE IP ADDRESS IN WINDOWS 9 •r 5- - N«yr_
Networt; Connection Details
filkietooth NCMOrk Co Not connected
1. Access Network
X
V Giu«lcoih OeY'ice (Peti
Connections, then
C«mectMtyt
UdAsSatt;
select your LAN or
L.tl l'.V.Fc Wi'crWi'«lr>1>S
DHCf>ETt«Md
Ym
15KWMlluMHiBll|
Si^uiQgiirr; UkMOOttrted
2. Select Details.
litoMay liecetTtberS
Lene
Qstrivay Server DtvS Semper
3. Your computer's
private IP address
^WNS S««v«
Ne£lOS ovei Tcpap E Unk-lecel
AAdrtse
PvCMuKGewwey
Private IPv4 addresses are within
these ranges: 10.0-0.0-10,255.255.255
172.16.0.0-172.31.255.255 192.168.0.0-192.168.255.255
is shown here. —offTOBffTBaser
181
NETWORKS
i If my private IP address can't be routed over the Internet, how does my data get anywhere? Here is where your local router plays a crucial role. Any network you use to access the Internet—a campus network, your home network, or a Wi-Fi hotspot—has a router that con nects to the Internet. The router has a public IP address that is routable over the Internet. Figure 3-24 explains how public and private IP addresses
TRY IT!
What is your public IP address?
You can find it by googiing What's my IP. Compare your public IP address to your private address.
work. FIGURE 3-24; ROUTING DATA USING PRIVATE AND PUBLIC IP ADDRESSES
Your request is forwarded to the music store using the
router's public IP address.
0The router records
192.168.1.J
for 35.24.35.7,
your IP address as the
0The request,
with your private IP address, goes to your local router,
Thriller for 192.168.1.1
music store
^ You request a stream ing music track from an online music store.
'"'"•'l/er to 35.24.35'
^ The music store
J-Thrittet to
sends the stream to
© The router looks in its records and
your router.
finds that your private IP address sent the request to the music store, so the music stream Is forwarded to your computer.
I Does using a private IP address make me anonymous? No. the router's network address translation table keeps track of your activities,
QUICKCHECK
so your footprint across the Internet can be traced back to you. However,
A local network's router uses
a private IP address can protect you from some threats. For example, a
an address table to keep track of private IP
hacker who randomly enters IP addresses looking for unauthorized access
will never find your private IP address because the only address that is vis ible to the public is the address of your local router. This security technique is usually referred to as NAT (network address translation).
That being said, private IP addresses cannot protect your devices from many other attacks. Clicking corrupted links or downloading infected files sends packets and also makes a path in the network address translation table that can allow malware into your device.
addresses. a.
IP
b. routing c.
translation
d. dynamics
182
SECTION 8, MODULE 3
DOMAIN NAMES
If the Internet has an Achilles' heel, it is the domain name system. When a wide swath of the Internet goes dark, when you hear about massive outages, or when you struggle to get to a Web site that seems to have
disappeared, the domain name system is probably at fault. The ability of governments to censor information by blocking sites is also made possible by the domain name system. And if there is an Internet kill switch, you can bet that the domain name system will be involved.
► What is the domain name system? People find it difficult to remember the string of numbers in an IP address. Therefore, most internet destinations also have an easy-to-remember domain name, such as nike.com. A domain name is a key component of Web page addresses and email addresses. You can easily recognize the domain name in a Web site address such as www.nike.com or an email address such as
[email protected]. The mechanism for tracking domain names and their cor responding IP addresses is called the domain name system (DNS).
QUICKCHECK What's the purpose of the
domain name system? a. Hand out IP private addresses. b. Translate domain names Into IP addresses.
c. Route packets to their destinations.
d. Encrypt data that is sent over the Internet.
► Do I need a domain name? For client-style Internet activities, such as Web browsing, email, and downloading, you do not need your own
domain name. Today, social networking sites give ample opportunity for making your presence known on the Internet. However, domain names are quite useful for businesses and individual art ists, musicians, or crafters who want to engage in online commerce. The
fees associated with obtaining a domain name might initially seem small. The first year may cost only S1, but prices for subsequent years are typi cally around S15. Then there is the question of how many domain names you need: one might not be enough. You might need domain names with more than one extension, such as .com or .club.
server space for Web sites (Figure 3-25). FIGURE 3-25: CHOOSE YOUR OWN DOMAIN NAME
^
4*
^
^ fl*5Btfnoi>, ifK juij re^nif«((yn
reglster.com
IM
domom noM you oKvoyt wonted
Enter the name you'd like to use for your domain.
FOA^Ut BAND DCLtVCRY
if you want to know who owns a domain name or an IP address,
google WHOIS and then a
iCANN is the top-level authority for supervising domain name requests. Rather than going directly to ICANN, domain names can be obtained from several domain registrars and hosting services that provide internet-based
O WA Ocxuin
TRY IT
space followed by the name or
address. Give it a try. Who owns 199.181.132.250?
183
NETWORKS
> What is a top-level domain? A domain name ends with an exten sion that indicates its top-level domain. For example. In the domain name msu.edu, .edu indicates that the computer is maintained by an educa tional institution. Country codes also serve as top-level domains. Canada's top-level domain is .ca, the United Kingdom's is .uk, Australia's is .au, and the European Union uses .eu as a top-level domain. Historically, businesses used the .com domain, while nonprofit organiza tions used .org. Educational institutions used .edu. The .net domain was usually used by communication companies. Businesses generally obtained domain names with all applicable top-level domains (e.g.. nike.com, nike.org, and nike.net) to prevent their use by competitors or fake businesses. Businesses also tried to acquire domain names with similar sounding names or those that are common misspellings
QUICKCHECK What Is the top-level domain m www.nike.com7 a. www
b. nike c..com
d. "dot"
of their corporate names.
Today, there are hundreds of additional top-level domains, such as .biz, .CO, and .fit. Obtaining all the TLDs for a business name is not practical.
Even within a sector such as education,.edu has been joined by .academy, .education, .guru, .institute, .training, and .university.
> How does the domain name system work? Scattered around the world are several domain name servers that maintain lists of all domain
names and their corresponding IP addresses. In addition, frequently used domain names are stored by ISPs, educational institutions, organizations, and Internet companies such as Google. When new domain names are added, these lists are updated. New domain
names may take several days to propagate to all of the lists, which is why new Web sites can be accessed only by their IP addresses for the first few days they are in operation. A Web site can be accessed by its domain name once the name is added to the domain name server lists.
Suppose you want to look at the newest selection of Nike athletic shoes. You enter nike.com in your browser's address bar. Your browser must find the IP address that corresponds to nike.com before it can connect you to the site. Your browser queries a domain name server to get the IP address,
a process that generally happens without noticeable delay (Figure 3-26). FIGURE 3-26: HOW DOES THE DOMAIN NAME SYSTEM WORK?
NIKE 66.54.56.30 Show us the Nike
home page at Hmmm. I need to
66.54.56.30.
Nike's IP address
check the DNS for Nike's IP address.
I want some Info from
Is 66.54.56.30. 66.54.56.30
What is Nike's IP address?
www.nlke.com. DNS server
1 84
SECTION B, MODULE 3
I So what makes the DNS one of the Internet's weaknesses?
Altering the DNS records can change the destination of email, browser con nections, and download requests. Unauthorized changes to the DNS are called DNS spoofing.
Hackers use DNS spoofing so that queries for legitimate sites are directed to fake sites. Some governments use DNS spoofing to redirect searches from culturally or politically Inappropriate sites to government-approved sites. Figure 3-27 illustrates what happens when unauthorized changes are
QUICKCHECK Each record in the domain name
system
.
a. represents a correspondence between a domain name and an IP address
b. protects domain names from
DNS spoofing
made in the DNS.
c. routes packets over the FIGURE 3-27; ONS SPOOFING
Internet
d. has a spoofed IP address that Is easy for hackers and governments to change
lo^eadofgoingtp
'^www^iivelocity.com, yoti^ll end up at the
o A hacker changes the DNS records.
Domain
Q You enter the address
name server
www.travelocity.com.
_
_
www.travelocitv.coti^^Bs®^*di38 www.travelocity.com = 181.177.105.123
> Can domain name servers be turned off? Yes, though more com monly a DNS server operated by your ISP will go offline as a result of an equipment failure. When the DNS you're using goes down, the process of accessing the Internet can get very slow while DNS requests are routed
TRY IT
For security, you should periodically check your DNS to make sure it hasn't been
through alternate servers. It is even possible that a DNS outage can leave you without Internet access unless you enter raw IP addresses.
changed by a hacker. What is
It Is a good idea to know how to find your DNS server and how to change it in case of an outage. Figure 3-28 demonstrates how to find your DNS
it a private address residing on your router or a public address?
the IP address of your DNS? Is
settings. FIGURE 3-28: FIND YOUR DNS SETTINGS WINDOWS
1. Use the Control Panel to access the Network and
Sharing Center,
2. Right-click your network, then select Properties. 3. Select Internet Protocol Version 4 (TCP/IPv4),
O Obtain DNS serve add*ess automatialy ($)Use the fotowing DNS server addresses: Referred DNS server:
a . S . B . 8|
AltEmate DNS server:
4. Select Properties. If the DNS server address Is
obtained automatically, your device is likely using your ISP's DNS. You can override the automatic settings as shown at right. macOS
1. Click the Apple menu and select System
joir
Preferences. 2. Select Network. The DNS server is listed in the Network window.
3. To add an alternative DNS server, select the Advanced button and the DNS tab before entering the iP address for the DNS server.
I Ciaai I [
OS
I
185
NETWORKS
I What can I use as an alternative DNS server? Surprisingly, you
might be able to bypass DNS outages, blocks, and hacks by changing your DNS server. Errors in the domain name tables may be limited to the domain name server that you are using. Connecting to a different domain name server might restore full access. In addition, when you are traveling—espe cially overseas—a local DNS server might be closer and quicker. Keep the numbers in Figure 3-29 handy In case you need to change your domain name server. Write them down,or store them locally on your device.
Remember, if your domain name server has an outage, you won't be able to use domain names to search the Internet for a solution.
QUICKCHECK When might you want to change your DNS server? a. When the DNS server that I'm
using goes down b. When I'm traveling and other DNS servers are closer
c. If I suspect that my DNS server has been hacked d. All of the above
FIGURE 3-29; PUBLIC DOMAIN NAME SERVERS
Google's public DNS 8.8.8.8 2001:4860:4860::8888 8.8.4.4 2001:4860:4860:;8844
OpenDNS 208.67.222.222
208.67.220.220
r SECTION B
QUICKQUIZ 1.
2.
The Internet
is a system of
3.
and UDP are two of the
high-capacity routers and fiber-optic communica
main protocols used to transport data over the
tion links.
Intemet.
The Internet uses
switch-
4.
ing technology to route data from many different messages over a single communication channel.
The Internet's supply of addresses ran out in 2011.
5.
IP addresses are not
routable over the Internet.
186
SECTION C, MODULE 3
Quality
Internet Access
Portab e
SECTION C
Mobile
INTERNET ACCESS
A HUMAN RIGHTS VIOLATION.
Terminology
That's what the United Nations had to say about
laws in France and England that penalize copy right violators by banning them from the internet.
connection speed bandwidth cap
Whether or not you agree that Intemet access is a human right, there is little doubt that global net work access is increasingly required to participate in activities ranging from politics to education to
symmetric connection Ping latency jitter
dating. As you read Section C, consider which of
mobile Internet access cable Internet
the access technologies are likely to be available in
service dial-up voiceband modem ISDN
various regions of the globe.
DSL FTTH satellite Internet service
bandwidth throttling asymmetric connection
packet loss Traceroute fixed Internet access portable Internet access
mobile broadband service tethering
mobile hotspot Wi-Fi hotspot
Objectives List three acceptable speeds for the following: basic Skype video calls, streaming standarddefinition movies,and viewingVouTube videos. Explain the significance of asymmetric Intemet connections.
Define latency and state the type of Internet
service that it affects most negatively. List online activities that are most affected by
jitter and packet loss. Name three tools that you can use to troubleshoot an Internet connection.
> Explain the pros and cons of fixed, portable, and mobile Intemet access.
I Rank each type of Intemet service according to speed,then rank them according to dependability. I Draw diagrams of the infrastructures for cable, dial-up, DSL, mobile broadband,and Wi-Fi hotspot Intemet services.
I Discuss why mobile Intemet access is globally the most popular way to connect to the Intemet.
187
NETWORKS
CONNECTION BASICS With online access becoming an essential component in our daily
lives, sociologists have been tracking Internet "haves" and "have-nots." According to the Pew Research Center, an estimated 80% of American adults have Internet access. Worldwide, about 40% of the population has
Internet access. Not all of these connections are fast and dependable. Let's take a look at what makes a good Internet connection. I How fast is the Internet? Data travels over the Internet at an incred
ible speed, but that speed varies. Some Internet services are faster than others. Speed is affected by the amount of traffic flowing over the connec tion. It slows down when usage is heavy. Slowdowns also occur as a result
of faulty routers and when hackers launch denlal-of-service attacks that overwhelm sen/er capacity.
It is easy to check the speed of your Internet connection by running a few online tests. Figure 3-30 shows results from testing speed in a rural area. Is this connection suitable for streaming movies, playing online games, and conducting video chats? FIGURE 3-30:15 YOUR CONNECTION FAST ENOUGH? "cr
TRY IT! 6 O
What is the speed of your Internet connection right now? Connect to www.ooklo.net or
www.bandwidthplace.com and run a speed test to find out. Download
User's ISP
Destination ISP
Corne Hem Telacoifi
This speed test measured the rate of data flowing between the user's ISP In Macon, GA, and a Comcast server in Moncks Corner, SC.
QUICKCHECK
I What does connection speed measure? Speed is the distance something (ravels in a specified amount of time. The speed of a car, for
Would the connection used for
example, is measured in miles(distance)per hour(time). What we casually
the speed test in Figure 3-30 be
refer to as "connection speed" has little to do with distance. The most com
classified as broadband?
mon measurement of connection speed is the amount of data that can be
3. Yes, it is synchronous,
transmitted in a specified time. Technically, it is a measure of capacity. But let's use nontechnical terms and call it speed.
b. Yes, the download speed Qualifies as broadband.
The speed test in Figure 3-30 produced a download speed of 46.42 Mbps because it was able to move 46 megabits of data down from a server to the user's computer in one second. The upload speed at which data is transferred from the computer to a server was only 24.27 Ivlbps. With this connection, downloading a two-hour movie from ITunes would take about 4 minutes. Uploading a 4 MB photo would take less than a second.
c. No, Its minimum speed of 17.22 Mbps Is not fast
enough.
d. No, its average speed is only 24.27 Mbps.
188
SECTION C, MODULE 3
► How much speed do I need? For email, browsing the Web, and streaming videos. 0.5 Mbps (500 Kbps) speeds are adequate. However, other activities require higher speeds, as shown in Figure 3-31. FIGURE 3-31;CONNEaiON SPEEDS FOR POPULAR INTERNET-BASED SERVICES SERVICE
RECOMMENDED
RECOMMENDED ■
UPLOAD
DOWNLOAD
Skype video calling and screen sharing
300 Kbps
300Kbps
Skype video calls (HD)
1.5 Mbps
1.5 Mbps
Skype three-person group calling
2 Mbps
512 Kbps
Netfllx movie on a laptop computer
1 Mbps
Netfllx SD movie on a TV
2 Mbps
1
In the table at left, why are there recommended upload speeds only for Skype? a, Skype doesn't use uploads.
b. Skype requires two-way communication, whereas
Netfllx 72Qp HD movie
4 Mbps
Netfllx "best video and audio experience"
5 Mbps
the other services use most
—
of the bandwidth only for —
downloads.
c. Skype is the slowest service
—
of those listed, —
d. Amazon. YouTube, and Netfllx YouTube basic videos
YouTube movies, TV shows, and live events
offer different levels of
500 Kbps
service, so the upload speed 1 Mbps
Amazon Prime Instant Video (SO)
900 Kbps
Amazon Prime Instant Video (HD)
3.5 Mbps
Netfllx and Amazon 4K Streaming Video
15-25 Mbps
» L
•
•
m
cannot be specified.
—
—
► Why are upload and download speeds different? ISPs control connection speeds based on the service plan you've selected. Your band width cap is the top speed aiiowed by your plan. During peak times. ISPs
can place further limits on speed, a process called bandwidth throttling. When Internet upload speed differs from download speed, you have an asymmetric connection. When upload and download speeds are the same, you have a symmetric connection.
Most Internet connections are asymmetricai, with upload speeds considerabiy iess than download speeds. Asymmetric connections discourage subscribers from setting up Web and emaii servers that wouid transmit
lots of outgoing data. For most users, however, an asymmetric connection is sufficient, but downioad speeds of less than 1.5 Mbps may not provide the full internet experience.
► What Is Ping? Ping is utiiity software designed to measure respon siveness. Ping rate indicates how quickly data can reach a server and bounce back to you. Ping was named after the sound that a submarine's sonar makes when it bounces off an undersea object. Technicaliy. Ping measures iatency. Latency is the elapsed time for data
to make a round trip from point A to point B and back to point A. Latency is measured in milliseconds (ms). A millisecond is a thousandth of a second, so data transmitted on an internet connection with 100 ms iatency makes a round trip in one-tenth of a second.
Terminology Download and upload speeds are sometimes referred to
as downstream speeds and
upstream speeds, respectively.
189
NETWORKS
¥ What is an acceptable ping rate? Latency generally averages less than 40 ms (milliseconds) within North America, but increases to about 75 ms for transatlantic transmissions. If you want to play online multiplayer
games, it is best to have less than 100 ms latency. Good-quality video streaming and videoconferencing require latency rates of 200 ms or less. Speed and latency are not the only factors that affect your Internet experi ence. Even if your connection gets good marks on speed tests, jitter and packet loss can degrade the quality of online services.
I What are jitter and packet loss? Jitter measures the variability of packet latency. Network traffic and interference can delay some packets and create erratic data fiow. If the variation between packets exceeds 5 ms, Internet voice and video call quality is likely to be poor. Packet loss refers to data that never reaches its destination or gets dis carded because it arrives too late to be of any use. Packet loss of less than 2% is required for acceptable streaming, gaming, Skype, and voice calls. Too many lost packets during an online gaming session can cause the
game to stutter or stall. And if packets don't arrive in the correct order, your game character might seem to act randomly for a few seconds. You can test the jitter and packet loss on your Internet connection by using a ping test similar to the one in Figure 3-32. FIGURE 3-32; CHECK THE JITTER AND PACKET LOSS ON YOUR CONNECTION
QUICKCHECK The connection in Figure 3-32 gets a grade of D For bad performance. What are the
©Pir«.
problems?
17
a. The speed is too low and
JiHtr
packet loss is too high. b. The ping rate is too low and
YQURGRAOE D Ccnc«m>r^ Mo»1onUn« •ppUution* wili not perform wvll bu1 thould
packet loss is too high.
funolion in some
capKity TMlloolher
^ 4'2WA
PINGTESTiET
c. The ping rate and the jitter rate are too high.
errwrm to confirm LLUN MWtEABOt/I CfUDCS
d. The ping rate is too high, but
W 178,. O PKOCIUSS.0% SEKiTS
ISP
Stanlsn. Ml nSIANCC -
Merit Netwcrk mi
FORUM LINK
*•*1
34/5
DIRECT UNK
This test was performed using the PINGTEST tab at www.speedtest.nef, powered by Ookla.
the jitter rate is too low.
190
SECTION C, MODULE 3
I Can I troubleshoot an Internet connection? Suppose your Internet connection seems unusually slow one day. Or, perhaps you cannot access a favorite Web site. You wonder, Is the problem on my computer, my ISP, or somewhere else on the Internet?" To find out, you can use Traceroute, a network diagnostic tool that lists each router and server that your data encounters as it travels over the Internet.
Traceroute sends three packets of data to a specified destination. It records the address of each router along the way and the elapsed time for each "hop." When a connection is inoperable, the packets will not reach their destination and they will become lost. Figure 3-33 illustrates how to use Traceroute and how to interpret its results. FIGURE 3-33: WHERE DOES YOUR DATA TRAVEL?
On a Mac,open the Utilities folder, then select Terminal. Enter the
A
TRY IT!
command traceroute followed by any domain name, like this:
Find out how many hops your «
•walismlth — i>ath — 65x24
If
Last login: Sun See !4 lB:47:ee on console
sarohlHac:- sarahsmthS traceroute msu.edu |
data makes before it arrives at www.hotwiredcom. What was
the slowest leg of the trip? / rui'
I'll-
On a PC, from the Home screen, type com and choose the option for Command Prompt. Enter the command tracert followed by any
U
domain name, like this: m Command Promnl
□
X
licrusuiL Uiiidows [Versiuii iU.U.143'J3j (tracert msu.edUa
Traceroute results appear as a list, showing each router, the router's IP ndhrnci: .nnrl tlip ol.nrc'r) timn for nach Hot). X, Comnund Prempl
QUiCKCHECK
C:\Wirc>Ows>tracert mww.hotwired.cdn
How many AT&T routers did
Tracing route to wviw.hotwired.com [216.32.2; over a maaiaun of 30 hops: 1 2 3 4 5 6 7 8 9 10 11 12 13 14
1479 928 640 78S 761 1S93 757 763 3378 903 2261 1614 1S97 946
»» ns ms ms ms ms ms ms ms ms ms ms ms ms
1526 1203 1559 830 1552 1300
ms ms ms ms ms ms
774 782 813 1512
ms ms ms ms
each packet pass through when this Traceroute report was
8SS 1576 818 764
ms ms as ms
172.9.1.253 148.74.246.254
835 2258 621 1557 1519
ms ms ms ms ms
9br6-p53.wswdc.ip.att.net [12.123.8.190
I
generated?
148.74.3.2 12.125.10.37
gbr4-p90.wswdc.ip.att.net [12.122.5.2C6, ggrl-p370.wswdc.ip.att.net [12.123.9.53] ibr01-p5-0.stng01.e«odus.net
216.32.173.1:
822 ms 647 ms 2325 ms
bbr02-p4-0.$tn902.e>odos.net bbr02-p5-0.sntc04.e>odus.nec
209.185.9.2] 2u9.185.9.11
973 ms
1074 ms
1027 ms
2414 ms
dcr03-g4-0.sntc03.e>odus.n' r$ml4-v] an921.sntc03.e«odu,
865 ms 1340 ms
bbr02-g3-0.stng01.e'Odos.net bbr01-pl-l.sncc03.eiodus.n^ Heouest timed out.
Request timed out. . Request timed out.
Request timed out.
a.
1
b. 3
216.33.96.14: I'l ■>
trace timed out before the
, packets arrived at their destination,
in all. this is a I connection.
rx « Ml
do)
c.
14
d. 18
191
NETWORKS
I What else affects the speed of my connection? Your Internet connection can be affected by outages and traffic. In Section B, you found out what can happen wtien a DNS server goes down. Service disrup tions can also occur at ISPs, cloud storage sites, email servers, and other Internet-based services. You can use online tools such as Akamai's Real
time Web Monitor and downrightnow.com to check the status of various
TRY ITI Are any service disruptions
occurring right now? Connect to downrightnow.com to find out.
Internet services.
I What are my Internet connection options? Although public Internet access is available in many locations, such as coffee shops and libraries, most consumers like the convenience of having their own Internet
connection. Depending on your geographical location, you may have several options for connecting to the Internet. Before we look at the most
popular internet access options such as cable Internet service and cellu lar broadband, consider the pros and cons of the three classifications of Internet connections in Figure 3-34. FIGURE 3-34: INTERNET CONNECTION OPTIONS
Fixed Internet Access Fixed Internet access links your computer to an ISP from
a stationary point,such as a wall socket or roof-mounted antenna. This service Is dependable and relatively cost effective. You can't take It with you, so when you're away from home, you must depend on public access points.
|^0®(«H|.))X ^^
Cable, DSL, ISDN, Fixed WiMAX,Satellite, Fiber-to-the-home
Portable internet Access
III
Portable Internet access allows you to easily move your access device, as In the case of vehicle-mounted satellite dishes that can be deployed when the vehicle Is parked. This
service is primarily used in situations where mobile and fixed access are not available.
Mobile satellite
QUICKCHECK A local ISP advertises a modem
Mobile internet Access Mobile Internet access allows you to use the Internet while you are on the go, such as using a cell phone to col lect your email while you are traveling by train or querying SIrl while riding In a car. These services usually require a data plan.
that you can carry to any location and plug In to access the Internet. This device would
be used for access.
a. fixed
(((«')){«mo)
(((m»)((cm ((dHOXdmo)
kui
ini
Mobile broadband
Mobile WIMAX
b. portable c. mobile
d. none of the above
Internet
192
SECTION C, MODULE 3
CABLE INTERNET SERVICE
The gold standard of fixed Internet access is cable internet service, which is offered by the same companies that supply cable television.
Cable service is a luxury enjoyed by developed countries; emerging nations cannot afford its expensive infrastructure, nor can device owners
afford the high cost of monthly subscriptions.
I How does cable Internet service work? The cable television sys tem was originally designed for remote areas where TV broadcast signals could not be received with a roof-mounted antenna. These systems were called community antenna television, or CATV. The CATV concept was to install one or more large, expensive satellite dishes in a community, catch TV signals with these dishes, and then send the signals over a system of cables to individual homes.
With cables branching out from a central location, the topology of a CATV system happened to also work as the infrastructure for a digital data net work. Now, in addition to carrying signals for cable television, the CATV
infrastructure also carries Internet data. When your cable TV company becomes your Internet provider, your computer becomes part of a neighbor
hood network linked together by the cable company's wiring (Figure 3-35). FIGURE 3-3S: CABLE TELEVISION INFRASTRUCTURE
{ t How does the system transport data? The cable modem supplied with your subscription converts signals from your computer to signals that can travel over the cable infrastructure. CATV coaxial and fiber-optic cables have plenty of bandwidth to carry television signals for hundreds of chan nels in addition to digital data. CATV cables provide bandwidth for television signals. Incoming data signals, and outgoing data signals (Figure 3-36). FIGURE 3-36;TV AND DATA STREAMS ON ONE CABLE
V CHANNELS Downstream Data
QUICKCHECK Which one of the following is most likely to affect the actual
> How fast is cable Internet service? Most cable Internet service
is asymmetric, with upload speeds considerably slower than download speeds to discourage subscribers from setting up public Web servers. Service plans range from economy packages offering speeds of 3 Mbps to an expensive 150 Mbps package. Your actual speed may be less than the advertised speed due to traffic from other subscribers in your neighborhood.
speed of your cable Internet connection from day to day? a. Your ISP service plan b. Weather
c. High traffic from other users d. Watching TV shows
193
NETWORKS
TELEPHONE NETWORK INTERNET SERVICE Some people limp along with narrowband access to the Internet, which is frustratingly slow. Telephone companies offer four types of service: dialup, ISDN, DSL, and FTTH. Only one of these technologies is considered broadband. Are the other three of any use at all?
k What is a dial-up connection? A dial-up connection is a fixed Intemet connection that uses a voiceband modem and the telephone com
pany's circuit-switched network to transport data between your computer and your ISP. A voiceband modem converts digital signals from a com puter into audible analog signals that can travel over telephone lines. A modem transmits a 1070 Hz tone for a 0 data bit and a 1270 Hz tone for a
1 data bit (Figure 3-37). FIGURE 3-37: A VOICEBAND MODEM CHANGES VOLTAGES TO AUDIO TONES
+5 volts
1270 Hz tone
A voiceband modem mnHom changes rhanop< A
A computer
generates digital signals.
outgoing digital signals into analog audio tones. Incoming signals are converted from tones to voltages.
Signals are sent over the same channel used for voice calls.
I How does a dial-up connection work? When you use a dial-up connection, a voiceband modem places a regular telephone call to your ISP. When the ISP's computer answers your call, a dedicated circuit is established between you and your ISP—just as though you had made a voice call and someone at the ISP had picked up the phone.
QUICKCHECK Dial-up connections use a voiceband modem to convert
signals from
The circuit remains connected for the duration of the call to carry data
a. analog to digital
between your computer and the ISP. As your data arrives at the ISP, a
b. tones to pulses for outgoing signals, and voltages to binary digits for incoming signals
router sends it out over the Intemet (Figure 3-38). FIGURE 3-38: DIAL-UP INFRASTRUCTURE
c. digital to analog
d. digital to analog for outgoing ISP s modem
Your computer and modem
Telephone jack
ISP's router
• How fast is dial-up service? ISPs, such as NetZero, AOL, and EarthLInk, still offer dial-up Internet access. The service ordinarily costs
less than $10 per month, but the access speed is slow. The maximum speed of a dial-up connection is 56 Kbps, so it is not classi
fied as broadband. Actual data transfer speeds are affected by factors such as the quality of your phone line and connection. In practice, the top speed for downloads is about 44 Kbps. For uploads, the data rate drops to 33 Kbps or less. Dial-up service is the Internet connection of last resort for people who live in remote areas where land lines are the only communication services.
signals, and analog to digital for incoming signals
194
SECTION C, MODULE 3
• How about ISDN? ISDN stands for Integrated Services Digital Network. It essentially divides a telephone line into two channels: one for data and one for voice. The data channel uses packet switching and sends data in digital format, unlike dial-up. which uses analog tones to carry data. With data rales of 128 Kbps, ISDN was only briefly popular in the United States, though in Europe it still has an active base of users.
I What is DSL? DSL (digital subscriber line) is a high-speed, digital, aiways-on, internet access technology that runs over standard phone lines. It is best known as the technology offered by AT&T's U-verse ser vice.
Several variations of DSL technology exist. ADSL(asymmetric DSL)offers faster speeds for downloads than for uploads, and it is the most common. SDSL (symmetric DSL) offers the same speed for uploads as for down loads. Other flavors of DSL include HDSL (high bit rate DSL) and VDSL (very high bit rale DSL).
QUICKCHECK When using a DSL connection, can you expect similar upload and download speeds?
a. Yes, if it is an asymmetrical connection
b. Yes, if it Is a broadband
I How does DSL work? A DSL modem converts computer signals into high-frequency data signals. Voice and data signals travel over tele phone lines to your telephone company's local switching station. There, voice signals are routed to the regular telephone system and data signals
connection
c. Yes, if it is ADSL
d. Only If It is SDSL
are routed to the internet (Figure 3-39). FIGURE 3-39; DSL DATA PATH
Phone Company Modem
Switch Voice and Data
Voice
Voice
I How fast is DSL? The speed of a DSL connection varies according to the characteristics of your telephone line and your distance from the tele phone company's switching station. The least expensive plans offer speeds of 768 Kbps. Premium plans offer 6 Mbps sen/ice. DSL installations require filters on every phone to screen out frequencies that interfere with data sig nals (Figure 3-40). FIGURE 3-40: DSL MODEM AND FILTERS
QUICKCHECK What is the fastest type of ► What is FTTH? FTTH stands for fiber-lo-the-home. It is the use of
Internet access plan available from telephone networks?
high-capacity fiber-optic cables, rather than coaxial cables or twisted pair
a. Dial-up
wires, to connect homes to broader municipal networks. As telephone com
b. FTTH
panies upgrade their infrastructure with fiber-optic cables, they are able to offer faster access speeds. AT&T, for example, offers an Internet access plan with 1,000 Mbps speeds. That plan is available only in areas where fiber runs to homes.
c.
DSL
d.
ISDN
195
NETWORKS
SATELLITE INTERNET SERVICE Communications satellites seem so retro. They settled into orbit during an
era when your grandparents watched The Jetsons and the United States rushed to catch up to the Soviet Union's manned spaceflight program. And yet at one point in time, satellites used for continent-to-continent telephone communications appeared to be a natural fit with the emerging Internet. Unfortunately, satellites have a fatal flaw that reduces their suit ability for today's Internet. What's the problem? Read on to find out. > What is satellite Internet service? Most people are familiar with services that provide access to television programming over a personal satellite dish. Many companies that provide satellite TV also offer Internet access. Satellite Internet service is a means of distributing broadband asymmetric Internet access by broadcasting signals to a satellite. In many rural areas, satellite Internet service Is the only alternative to a slow dial-up connection.
t How does satellite Internet service work? Figure 3-41 illustrates how data from a customer's computer (1) is converted into signals by the customer's modem (2) that are carried by cable to a personal satellite dish (3) and broadcast to a communication satellite (4). Signals are rebroadcast from the satellite to a ground-based ISP (5) that forwards them to the Intemet (6). FIGURE 3-41: YOUR DATA TRAVELS INTO SPACE AND BACK
% 22,000 miles % o above Earth
250 ms up
250 ms down
> How fast is satellite Internet service? Satellite service averages 1.0-1.5 Mbps for downloads but only 100-256 Kbps for uploads. Satellite
QUICKCHECK
signals can be slowed or blocked by adverse weather conditions, such as
What is the main problem with
rain and snow, which makes this type of data transport less reliable than
satellite Internet service?
wired Internet access services, such as cable and DSL.
a. Speed
Satellite data transport is subject to latency delays of one second or more,
b. Latency
which occur as your data is routed between your computer and a satel
lite. Medium Earth Orbit satellites positioned about 5,000 miles (8,000 km)
c. Traceroute
above Earth have a latency of 132 ms. The latency for geosynchronous satellites 22,000 miles (35,786 km)above Earth is about 500 ms.
d. Cost
Geosynchronous latency might not pose much of a problem for general Web surfing and downloading files, but it can become a showstopper for
interactive gaming that requires a quick response, and for video calling with Skype, FaceTime, and similar services.
196
SECTION C, MODULE 3
MOBILE BROADBAND SERVICE
Worldwide, more people access the Internet using cellular data plans than with fixed connections. Many of these subscribers can afford only one device. They make do with the nuisance of a small screen in exchange
for the convenience offered by a pocket-sized device with voice and data capability. Mobile broadband service has become so compelling that In 2015 most of the Web underwent a visual makeover to fit the require
ments of smartphone-sized screens. • How does mobile broadband work? Cell networks transmit voice
and data using radio signals. The signals flow between a device, such as a mobile phone, and a cellular radio tower (1), as shown in Figure 3-42. The transmitters and receivers on each tower cover a specific area and use a
unique frequency. Data signals are passed to ground stations (2). where they are forwarded over a packet-switched network to the Internet (3); voice signals may be routed to a circuit-switched network (4). FIGURE 3-42; FROM A CELL PHONE TO THE INTERNET
(('Ifi'))
n I («J0)
(CHtD)
(('Hi'))
Q.6
o Voice and Text
Messages
I What happens when I move between towers? When you are accessing the Internet and move out of range of one tower, the cellular net work automatically searches for a new channel so that it can hand off your call to the next tower. To coordinate the handoff, the cellular network tells the handset to switch to the new channel. At the same time, the Internet data link is also switched to the new channel and tower.
QUICKCHECK On the cellular network, how are
text messages handled? a. They are combined with
> Why do I need a data plan? Mobile broadband providers typically
Internet data, but extra
offer two plans: voice and data. They can be separated because voice and data travel over essentially two different networks.
charges apply.
Voice calls travel from a tower to a circuit-switched network and then to
public switched telephone network land lines. Data travels from a tower to a packet-switched network and then to the Internet. Text messages travel over the circuit-switched network along with voice
calls, but they are handled by SMS service centers for yet another billing charge. Text messages can be sent successfully even when signal strength Is tow because they are a store-and-forward technology that does not require a round-trip circuit to be established between sender and receiver.
b. They use the same channels as voice data but are routed
by SMS service centers. c. They are sent from lower to tower rather than being transmitted by land lines. d. They take priority over voice and Internet data in order to
arrive faster.
197
NETWORKS
• How fast is mobile broadband service? Mobile broadband has
evolved through several generations. The most recent of these generations are 3G and 4G.
3G {third generation) service was available In the United States beginning
QUICKCHECK
in 2001. Common protocols included CDMA, which reached maximum download speeds of 4.9 Mbps, and GSM EDGE, with 1.6 Mbps speeds.
Which of the following is true
4G (fourth generation) technologies, such as WiMAX and LTE, rolled out in 2011. Of the two, LTE is most widespread. LTE has maximum down load rates of 300 Mbps and upload rates of 75 Mbps. The actual speeds enjoyed by consumers are significantly slower. In the United States, down load speeds of 5-12 Mbps are common, and upload speeds of 2-5 Mbps
a. It is 3G technology.
are typical.
c. Users can expect faster
Mobile broadband speed decreases at the edges of coverage. It can be reduced by obstacles, such as trees, hills, walls, and even metal roofs. Electromagnetic interference from speakers, microwave ovens, and other electrical devices can reduce speeds, too. Rain, snow, and high humidity
about LTE?
b. It is not affected by weather like earlier mobile
technologies were.
speeds than with basic cable Internet plans. d. It uses circuit-switched networks for data.
can also reduce speeds.
i Can I get mobile broadband for my laptop? Mobile broadband isn't just for your smartphone. You can also use it to access the Internet from a laptop or desktop computer. Most of today's smartphones include a tethering feature that connects wirelessly with other digital devices. Figure 3-43 demonstrates how to set up tethering to create a mobile hotspot. Just remember that data sent over the tethered connection accumulates toward
your monthly data usage total.
r
CREATE A NETWORK WITH YOUR CELL PHONE E
(CIH'))
I
□
1. Activate tethering by turn ing on your phone's mobile
hotspot.
a
2. On your computer, connect
to the network created by your mobile phone.
Mobile hotspot on/off switch
.
I
List of devices connected
to the mobile hotspot
UoMe HoisoM eoflSum«a mote banevy. Connect the device to an oultel to ejitend
baUcry hie
■iT"
Bnnr'i
Allowed dovKi'v
,
...
Ccnrt.^utv
Cell phone
Computer
HOI1KAIV 2.4
198
SECTION C, MODULE 3
WI-FI HOTSPOTS
Wi-Fi hotspols are everywhere. Pull out your smartphone in any coffee shop, airport, hotel lobby, or university building and you'll likely find more than one network that serves as an Internet on-ramp. But public Wi-Fi hotspots are fraught with security risks, so it pays to know how they work.
I How do Wi-Fi hotspots work? A Wi-Fi hotspot is a wireless local area network, usually operated by a business, that offers Intemet access to the public. The network has an Internet connection and a device called an
access point that broadcasts Wi-Fi signals within a range of about 150 feet. Any and all devices with Wi-Fi capability can detect the signal (Figure 3-44). FIGURE 3-44: BEHIND THE SCENES OF A COFFEE SHOP Wl-Ff HOTSPOT
•
Coffee shop
Coffee shop
Internet connection
wireless router
Wi-Fi signals *
Coffee shop customers
I How fast is hotspot access? The speed of a hotspot is related to the speed of the Wi-Fi network and the service that connects it to the Internet. A hotspot that goes through a 1 Mbps DSL line will be slower than a hotspot that goes through a 50 Mbps cable Internet connection. You can expect speeds of 2-8 Mbps, but the speed can vary depending on your distance from the access point, the number of people logged in, and interference from other networks.
QUICKCNECK Which of the following is most
likely to affect the maximum speed of a WI-FI hotspot? a. The hotspot's Internet service
provider b. Your Internet service provider
► Is hotspot access secure? The data that travels over unsecured hotspots is not encrypted, so eavesdroppers can easily tap into data that flows over the network. Figure 3-45 summarizes hotspot risk levels.
c. The number of people who are using the hotspot
FIGURE 3-4S: GAUGE YOUR RISK AT WI-FI HOTSPOTS
d. Whether the hotspot is
Browsing. When using a WI-FI hotspot for simple browsing activities such as checking sports scores, reading Google news, and looking for direc tions, your security risk Is fairly low if your computer's antivirus software is up to date. Using secure sites. Your security risk Is low when you are accessing secured Web sites that have addresses beginning with HTTPS. These secured sites, which are used for activities such as online banking, access
ing medical records, and making credit card purchases, encrypt the data that you enter to keep it safe from eavesdroppers. ; ill. Eavesdroppers might be able to access the flies on your com puter If you have file sharing turned on. When using public networks, you should turn file sharing off. You can do so manually if your operating sys tem does not offer that option when you connect. Using unsecured sites. When you log in to unsecured sites while using public Wi-Fi hotspots, a wireless eavesdropper could potentially snag
your user ID and password information, then use It later to access your accounts. Logging in to your Webmall account, for example, could be risky If your user ID and password are transmitted over an unsecured connection.
secured or not
199
NETWORKS
► How do I access a Wi-Fi hotspot? Your computer's networking utili
QUICKCHECK
ties automatically sense a Wi-Fi network and add it to the list of available connections. You can then connect using your network utilities. Some Wi-Fi
In Figure 3-46, what tells you
hotspots can be accessed simply by starting your browser and accepting
that the Hclidaylnn-FREE!
the license. Other networks require you to enter a password, which you can
network is not secured?
obtain from the hotspot manager.
a. The misspelled SStD
Select public networks with care. Hackers create networks that have names similar to those of legitimate hotspots. Those networks are not usually
b. The word FRff?
secured. Network utilities indicate unsecured hotspots in various ways.
Microsoft Windows displays a shield icon for hotspots that are not secured.
c. The shield icon d. The number of bars
If you mistakenly connect to a non-secured network, any passwords you enter or data you transmit could fall into the hands of a hacker. You can view a list of available networks and connect to one as shown in Figure 3-46.
FIGUItE 3-46: ACCESS WI-FI HOTSPOTS SECURELY
10.59.2.1
HoliOey Im Mvquem
Unsecured Wi-Fi hotspot Log In
^ Holidaylnn-FREE!
Cancel
to h::l.c!jy Ion' I li;i'i
access
Open 11
.
'.man
iM-« nnfin*. ►w.
re,6
e iwr*.
«ui*. Swe ■>
Tm*. Owe Mm*
i,^.rii«
II
SMa«*, c».nin,n Vicabii« Veee*, ••••• •
"MAOrMXIVMr -wu
h
Diagram the components and connection In a typical home LAN, k Explain the roles of MAC addresses and IP addresses in local area networks.
k List five advantages of Ethernet wired network standards.
k Explain the pros and cons of wireless mesh networks as compared to centralized wireless
I List five steps for securely configuring a wireless router.
k State the purpose of an SSID.
k List four types of wireless encryption. k Provide two example scenarios for using RFID tags and NFC tags. k List three low-power wireless standards used for loT networks.
networks.
k Compare the speeds and ranges of Ethernet and Wi-Fi.
k Evaluate potential security exposure for data that is collected by loT networks.
201
NETWORKS
LAN BASICS In the early years of personal computers, networks were scarce. Most personal computers functioned as standalone units, and computing was essentially a solitary activity in which one person interacted with one com puter. Some computer engineers, however, had the foresight to anticipate that personal computers could be networked to provide advantages not available with standalone computers. ► What are the characteristics of LANs? Local area networks are
often referred to as LANs. They are designed to provide connectivity for devices within a limited area, typically within the premises of a home, office building, business, or school.
LANs use many of the same network technologies as the Internet, just on a smaller scale. They have a topology. They use communication protocols to ship packets. They require communication channels such as cables or wireless signals. They also include data communication equipment such
as routers and modems. Figure 3-47 illustrates a LAN that you can easily build. FIGURE 3-47: BUILD THIS LAN
To an ISP
Wireless connections
and Internet I Wired connections
Cable, DSL. or satellite modem Router
File server
Printer
for Internet access
A a bo Computer
Computer
Smartphone
The plan for your network hinges on a centralized router that supports wired and wireless connections.
.Connect a computer to a wired connection for maximum speed. Use it for online games or as a file server where you store and back up your data.
Connect your smartphone and
o you'll be able to use the LAN's Internet connection instead of
your expensive data plan.
Connect a printer to a wired
The router is the centerpiece of your network. Most wire
all devices on the network can
less routers support five wired devices and a maximum of 255
access it.
wireless devices.
o or wifeless connection so that
.Connect computers wirelessly so you can use them in various rooms.
.All the devices in your LAN can access the Internet If you con nect the router to a modem
supplied by an ISP.
QUICKCHECK
In the LAN depicted in Figure 3-47, all the network data goes
through the a. modem
b. printer c.
router
d. Internet
.
202
SECTION D, MODULE 3
I Are there different kinds of LANs? LANs can be classified by their protocols; Ethernet and Wi-Fi are the two most popular. The Windows oper ating system includes a tool for setting up a LAN called a homegroup that makes it easy to share files among local computers, but does not provide Internet access. MacOS also provides a tool called AirDrop for making a
QUICKCHECK
point-to-point connection between two computers. Most LANs, however, are set up using a router so that they have proper security and Internet
Whlcli frequencies does tlie TCC not regulate?
access.
a. Wireless frequencies
> Are LANs regulated by the government? Most wireless LANs use the 2.4 GHz and 5.0 GHz unlicensed frequencies so that they can be
set up without applying to the FCC for permission. The few unlicensed fre quencies are crowded, however, and neighboring networks that are forced to use the same frequencies pose security risks.
b. Radio frequencies c. Internet frequencies d. 2.4 GHz and S GHz
► Are my devices equipped to access LANs? The circuitry that enables a device to access a LAN is called a network interface controller
(NIC). NICs are built into the circuit boards of most digital devices. NICs are also available as add-on circuit boards and USB devices.
NICs contain a MAC address (media access control address) used to
uniquely identify devices on LANs. MAC addresses are usually assigned by
Terminology The term MAC address has
the manufacturer of digital devices and embedded in the hardware.
nothing to do with Apple's Mac computers. Both PCs and
A MAC address functions in conjunction with an IP address on a LAN. Each device on a LAN has a MAC address (sometimes listed as the Wi-Fi
do smartphones, routers, and
address or physical address). DHCP assigns an IP address to a device and
other data communication
links it to the device's MAC address. Figure 3-48 illustrates how to Hnd the
equipment.
Macs have MAC addresses, as
MAC address on various devices.
FIGURE 3-48: FIND THE MAC ADDRESS
iPhone or iPad: Tap 5 ettlngslGeneral
TRY IT! Find the MAC address for the
□ Android Phone: Tap the 1=1 button, then tap
device you're currently using. Does it look similar to an IP address?
U a
IMac macOS computer: Select
ystem Preference
NetworklAflvancedlHardwar
Windows 10 computer: Select the 8' button, type CMD, select
, then type IPconfIg /all
Chromebook: Select IWatWiffPIBtHniiliB from the tray, select
the
section, then dick the © button
203
NETWORKS
ETHERNET
The first computer networks were configured with wired connections. These networks used a variety of topologies and protocols, but a technology called Ethernet emerged as the dominant standard and became a key element in
large and small computer networks.
> What is Ethernet? Ethernet is a wired network technology that is defined by IEEE 802.3 standards. It was first deployed in 1976 and is now used for wired connections in just about every local area network.
• Why is Ethernet so popular? Ethernet's success is attributable to several factors:
Terminology IEEE is the Institute of Electrical
Secure. The wired connections in an Ethernet LAN are more secure than
and Electronics Engineers, a professional organization that develops technical standards In
wireless LAN technologies.
areas such as electronics and
Inexpensive. As a nonproprietary technology, Ethernet equipment is avail able from a variety of vendors, and market competition keeps prices low.
are grouped and numbered.
Easy. Ethernet is easy to understand, implement, manage, and maintain.
Flexible. Current Ethernet standards allow extensive flexibility In network configurations to meet the needs of small and large installations. Compatible. Ethernet is compatible with popular Wi-Fi wireless technol ogy,so it is easy to mix wired and wireless devices on a single network.
> How does Ethernet work? Ethernet was originally a bus topol ogy in which computers were all strung along a cable like birds on a power line. Today's Ethernet LANs are usually arranged in a star topology with computers wired to central switching circuitry that is incorporated in modern routers. Data sent from a computer on the network is transmitted to the router, which then sends the data to the network nodes (Figure 3-49). FIGURE 3-49: ETHERNETTOPOLOGY
The central router handles all the traffic within the Ethernet. The router receives data and then broadcasts it to all of the nodes. The data
is accepted only by the device to which it was addressed.
networking. These standards Many IEEE LAN standards begin with the number 802.
QUICKCHECK Ethernet and Wi-Fi are
compatible network standards. a. True
b. False
204
SECTION D, MOOUEE 3
I How fast is Ethernet? The original Ethernet standard carried data over a coaxial cable at 10 Mbps. Ethernet encompasses a family of LAN technologies that offer various data transmission rates as shown in Figure 3-50. Today, most personal computers and LAN equipment work with Gigabit Ethernet. FIGURE 3-50 ETHERNET STANDARDS
ETHERNET STANDARD
IEEE DESIGNATION
SPEED
lOBaseT Ethernet
IEEE 802.3i
10 Mbps
Pest Ethernet
IEEE8D2.3U
100 Mbps
Gigabit Ethernet
IEEE802.3Z
1,000 Mbps
10 Gigabit Ethernet
IEEE802.3ae
10 Cbps
40/100 Gigabit Ethernet
IEEE 802.3ba
40 or lOOGbps
> How can I tell if a device is Ethernet ready? Many computers have a built-in Ethernet port located on the system case. The port looks
very similar to an oversized telephone jack (Figure 3-51). FIGURE 3-51; DOES YOUR COMPUTER HAVE AN ETHERNET PORT? TRY III
Check your computer. Does it
have an Ethernet port for wired network connections?
An Ethernet port is slightly larger than a telephone jack.
• What if a computer doesn't have an Ethernet port? If you want a wired network connection but your computer has no Ethernet
port, you can purchase and install an Ethernet adapter (also called an Ethernet card). A USB Ethernet adapter plugs Into a USB port and can
QUICKCHECK Suppose you have a Fast Ethernet connection to your
be used with laptop and desktop computers. You also have the option of
LAN. Will it keep up with the data you exchange with the
installing an Ethernet card In an expansion slot inside the system unit of
Internet?
a desktop computer. Figure 3-52 Illustrates two types of adapters for add a. Yes, Fast Ethernet is faster than my Internet connection speed.
ing Ethernet ports. FIGURE 3-52; ETHERNET ADAPTERS
b. Yes, my iSP uses Fast Ethernet for my modem.
c. No, my Internet connection is faster than my Ethernet connection.
d. No, Fast Ethernet makes Ethernet adapter for USB port
Ethernet adapter for expansion slot
streaming video pause occasionally.
205
NETWORKS
Wi-Fi
Wi-Fi refers to a set of wireless networking technologies defined by IEEE 802.11 standards. A Wi-Fi device transmits data as radio waves and is
compatible with Ethernet, so you can use the two technologies in a single network.
• How does Wi-Fi work? You can set up Wi-Fi in two ways. One option is to use wireless mesh topology in which devices broadcast directly to each other (Figure 3-53).
Terminology
FIGURE 3-53: WIRELESS MESH CONFIGURATION
Wireless mesh networks
©
are sometimes called peer networks or ad-hoc networks.
Wireless networks that depend on a router are sometimes
called wireless infrostructure
--1^
networks or managed networks.
Wireless ad-hoc networks are conceptually simple but provide few security safeguards. This type of connection is best limited to occasional use when you want to temporarily connect two computers to share a few files.
A second option for Wi-Fi networks is a star topology in which a centralized broadcasting device—a wireless access point—coordinates communication among network devices. Technically, the centralized device is a wireless
access point, but that function is built into most routers (Figure 3-54). FIGURE 3-54: WIRELESS STAR CONFIGURATION
a
e 0 0 0 0 a
The most common wireless network technology uses a centralized device to handle data that travels from one device to another.
QUiCKCHECK Which Wi-Fi infrdStructure is most similar to Ethernet?
a. Wireless ad-hoc
b. Wireless infrastructure
206
SECTION D. MODULE 3
> How can I tell if a device Is Wi-Fi ready? Today, Wi-Fi capabiiity is Inciuded wilh just about every desktop, iaptop, tabiet, and smartphone. Don't worry if your device has no visibie antenna for transmitting and receiv ing data; the antenna is likeiy integrated into the case. Older equipment without Wi-Fi can be outfitted with a Wi-Fi adapter that plugs into a USB port or an internai expansion siot.
> How fast is Wi-Fi? Wi-Fi is availabie in severai versions that operate
QUiCKCHECK Are Wi-Fi actuai speeds faster than Ethernet actual speeds? a. Yes. b. No.
c. Some Wi-Fi speeds are faster
at different speeds and have different ranges. Current standards inciude
than IGBasel Ethernet.
802.11n, 802.11ac, and 802.11ad. d- Only 802.llac Wi-Fi Is slower
With wired connections, such as Ethernet, the rated speed and range are usuaily very ciose to actuai performance. Wireless connection speed and range, however, are often theoreticai maximums because signais can easiiy deteriorate. Although Wi-Fi 802.11 n is capabie of 600 Mbps speeds, its actuai performance is normaliy 50-100 Mbps. 802.11ac has a theoreticai speed of 7 Gbps, but actual speeds are 400-800 Mbps.
than Ethernet.
> What is the range of a Wi-Fi network? Wi-Fi signais may reach up to 300 feet(90 meters)from the router. Thick cement waiis, steei beams, and other environmental obstacles can drastically reduce this range.
QUICKCHECK In Figure 3-55, how many of the routers are dual-band?
The standard that is used to transmit data—whether it is 802.iln or the
faster 802.11 ad—depends on the router and your network device. A smartphone with 802.11 n Wi-Fi cannot send data at 802.11 ad speeds even if the network has an 802.11ad router. When setting up a Wi-Fi network, check
your devices. The router you select should support the fastest device you'll want to use on the network. Routers have severai ways to boost speed (Figure 3-55).
a.
0
b. 1 c.
2
d. 3
FIGURE 3-55; WIRELESS ROUTER OPTIONS MAX SPEED
Basic Router
300 Mbps
BANDS
2.4 GHz
RANGE
ANTENNAS
.a
Browsing, email, voice chat
Basic Dual-
450 Mbps
band Router
Full-featured Router
eoo Mbps
2 MIMO
ISO Mbps at 2.4 GHz 300 Mbps at 5 GHz
300 Mbps at 2.4 GHz 300 Mbps at 5 GHz
Online gaming, simultane ous music downloads
.mi
4 MIMO
Video streaming, multiplestory buildings
Speed: Router speed can be designated by a single
Bands: Wi-FI can be transmitted over 2.4 GHz or 5
number or a combination of numbers. A single
GHz frequencies. When a router uses both frequen
number, such as 300 Mbps, means that the router transmits one set of sigr^als at a given bit rate. A
cies, it Is referred to as dual-band. Dual-band offers flexibility to support various network devices and
combination of numbers, such as 300+300, means that the router can transmit more than one set of
also can overcome interference on either of the
signals. Such a router might be sold as a 600N router, but savvy consumers understand that no single device connected to such a modem can use all 600
Mbps; each connection is limited to 300 Mbps.
bands. Antennas: Devices with one or more antennas use
MIMO (multiple-input multiple-output) technol
ogy to boost signals and spread them more evenly over the signal range. Routers usually have one to four antennas; more antennas generally mean more
coverage area and good speed even as devices get farther from the router.
207
NETWORKS
SET UP YOUR OWN NETWORK Having your own network is great. You can access the Internet from muitiple devices, share files, and download apps to your smartphone without maxing out your data plan. But LANs can be a security risk. Here's how to set up your own safe and secure LAN.
t What's the general procedure for setting up a network? The basic steps for setting up a LAN are:
Q Plug in the router and connect it to your Internet modem. Configure the router. Connect wired and wireless devices.
• How do I connect the router to my Internet modem? Use a cable to connect the router's WAN port to the Internet modem's Ethernet port {Figure 3-56). FIGURE 3-56: CONNECT THE ROUTER TO THE INTERNET MODEM
Connect the router's WAN Of Internet
port to the modem
provided by your ISP.
I How do I set up a router? A router has no screen or keyboard of its own; so to access the router's configuration software, you'll use a computer and connect to the router using a browser. Instructions are included with the router.
Change the password. The first step is to change the router password. All routers are shipped with a standard password. Your router can be
accessed and controlled by anyone who enters that password until you've created a secure password as shown in Figure 3-57. FIGURE 3-57: CHANGE TOUR ROUTER'S PASSWORD D KfTCtiR RsvIK MJOCO * s«curity
Security Options 'J None
Select an encryption
■r WPA2-PSK[AES1 ^ protocol. O WPA-PSK[T)aP)-WPA2-PSK(AES O WPAWPAZ Enterprise Security Options (WPA2-PSK)
> Administration
Password iNetwork Key) I pwsa/ah222
Enter a key
or password. *■ Advanctd Setup
b. WEP c. WPA
209
NETWORKS
Configure the Guest network. A Guest network is essentially a sec ond network that you can configure on your LAN's router. Guest networks allow visitors to access the Internet through your LAN, but don't allow them to access other resources on your network, such as your data files. Some routers come preconflgured with a Guest network. You should be sure to check your router's settings to verify that they meet your security requirements.
TRY IT
Does the network you usually use have a Guest network?
How can you tell?
You can view Guest network settings using your router's configuration soft ware. Your Guest network will have Its own SSID and security settings. You may be allowed to change these settings, or the router manufacturer may have designated permanent settings. If the Guest network Is secured, It should have its own unique encryption key or password, which you'll have to supply to your visitors. Leaving the Guest network unsecured makes access open to anyone—not a good idea. Even when secured, a Guest network offers a potential security risk, so It should be disabled when you are not expecting visitors. Activate DHCP. Each workstation requires a unique address for send ing and receiving data. When you configure your router to act as a DHCP server, It will automatically assign an address to each device that joins your network. Figure 3-60 Illustrates how to set up DHCP. FIGURE 3-60; ACTIVATE OHCP Q WTSEAII e
tr
PiUCCO *
O
X
QUiCKCHECK
C ■© t«.168.i68.VJt. i
If you have four wireless devices
NETGEAR genie ~
connected to your network and
you do not want any interlopers
ADVANCED UIWNCEDHm
to join, you can configure
Ml Snup
to assign only four IP
StttvWtaHd
addresses.
WPSViaitf IAN TCPTP
• Sttup
CW ].US .lit
Enable DHCP. 1
|2S) ■•'in !.ij» .\o
1 T
Wutkii
VUnwi
'DhMM • '
a. SSID b. WEP
ymmac ¥ um AmIm m DHCP
c.
StArhng tP
JM )•; ; JM '-3«n.'u8 '.JSJ '
CMPf tP
» USB Stoiege » Seeutlly » AdrmniaUation
can adjust the
» Advancetl S«fiip
j2l22E«!!3 Htfp ft Suppert »
iQ)
tEAACHNEl
range of addresses assigned for addi tional security. V
O'i
e
I How do I connect devices to a LAN? Simply connect wired devices to the router using a Category 5 network cable. Routers automatically sense wired devices and allow them to Initiate a connection. A password is not needed for wired devices because the signals do not travel through the air where they are easy to Intercept.
A wireless router Is constantly broadcasting its SSID. Wireless devices,
such as smarlphones. laptops, and tablets, sense the router's signal and add the SSID to a list of nearby networks. The first time you connect to a secured network, you must enter the encryption key. Your device remem bers the key for future logins.
DHCP
d. the Guest network
210
SECTION D, MODUIE 3
Laptops and tablets running Windows display a list of nearby networks and their security status. Figure 3-61 illustrates the process of connecting to a secured network from a device using Windows 10. FIGURE 3-61: CONNECTING TO A LAN WITH WINDOWS 10
/S UtUtWII bi-ajtcit
0
/
Enter the encryption key you created when you
U ConrwclaJtomMcily
^ irOKU
nfigurod the router.
0 LollcWih :.l I Micsl tntet (l>cn«tw
^ NEtGEM.Ut Hi....
Clicking the Connect
^ ifmitywin
VcNj can Also connect OypuilwiQ Itw buRon 0*1
button initiates a
irp f^^tcr
connection to the selected network.
»u
How many devices are set to .
> Mum
»
*
T it.
PgbftC
c. 3 d. 5
> Muac
K-OilCO
On a PC, File Explorer lists network devices under
the Network heading. ^ tptMvrvK
TRY IT!
Check your computer. Are any network devices visible?
Window'. I'll-' l" N«f>K!rtM]SF«nngCMfr > AmkM AanAQsranQt
v O
9
X P
CKange Ehsrifig options lor dlllererM network profiles 'iV'(iG0wi(r«4t«sai«p4ritenm*crtfi'eUeterMOiA«biv«i«utM '■Dbc«nOKo»«BwetK.«
I (Ml
•B
^ I Oe'e» VdM ••waaa CMJ
K-j*? * sy * o c gi'» macOS Finder
ichMlMli
Cwunwts
1. Choose the remote
computer from the list
(hctrnma
V ^
Stfvhiw- fi
of devices connected to the network.
"tosTT
HifA B.
HNC
^ AcccH PDF1.bn« ^ Access POFLbmp
BUll
LJ AddtMAdHMfcfPmeMecieA
PfaC
«; vwfo ^
Hm'i Pu^ F Can I control how files are modified? You can control who modi
fies a file, but not what they do to it. Once a shared file is bestowed with read and write permission, it can be modified to the extent that it is unrecogniz able. If you are not checking shared files frequently, you may be surprised by what some of those files contain. You can see the potential problem. Read and write permission is not to be given without considerable thought.
QUICKCHECK Suppose you would like to allow friends to access some
photos, but you don't want
One Important consideration about file sharing is whether to provide access to the original file or to a copy of It. Your decision depends on the reason for
them to make changes. What permissions would you assign?
sharing the file.
a. Read
As a general guideline, do not offer read and write access to the original version of a file. Instead, make a copy of the file and designate the copy as shared with write permissions. If the file gets modified in some bizarre way. you will have a version of the original file that was not shared or modified.
b. Read and write c. Write
d. Drop box
220
SECTION E, MOOUIE 3
I How do I share files from a Mac? The first step is to turn on file sharing, then select the folders you'd like to share. The macOS operating system allows folder sharing but does not give you the option of marking an individual file for sharing. The recommended procedure is to place all the files you want to share in a Public folder as shown in Figure 3-72. FIGURE 3-72: SHARING FILES FROM A MAC
^ Access System Preferences from the Apple menu.There, you can select Sharing to turn on file sharing.
Coo^utef
Dan's Mac CoopgtM OA yov Iocs! nsNfVk e«i•CUM your coApiftv St
BAH..
• Ri* Sharine: On
On
OVD or CO Shanna
Oin#r uMTt c*n acoow
folOcrt on iruf oemputtr. tnd ■dmMMntaii
igvalumai.aI-atpy/10J11.6S.I9-or*unk«10J1t.SS.ig'.
OpScna...
0 Add folders to the Shared Folders list, then specify who can have access and the permissions they are allowed.
QUiCKCHECK
0.
What kind of llles should Dan Computer Kamo:
OsnS Mm
store In his Public folder?
Compuaar* on your locir nntwnrti un MMM yov oanomv M
Edct...
a. files for a drop box
Oira.UKJDca
S«rvc*
DVD or CO SnsrlftQ
ScMA snarirtQ
b. Files he would prefer not to
• flWSMngtOn
share
Omer umts cm sccms stared Wdsn en tMe contpiAti. and sAhMeireiere m vetanes. al -«fp/r 10.211.55.15* or *vnby/tO.21145.10*.
msrmiriQ
c. Copies of files that he doesn't mind being altered
Opbota...
Printer &nar«>g Remote Logm
Remote MansQement
Shared Potdere:
Remote ApoJe Events
Imrnei Sharing
'
Uoan:
RoodiWrilo ;|
fe Dw'iPiieiicFoMar
i This Public folder Is shared.
ASIaO 1 E-.cr,ai-e
Readonly ;| 1 ^ HudAWrite
1
L.
d. Files that he doesn't want
deleted
RaadOnlyA
Write Onl^Prop Cox] No Aooeeol
Everyone can Add more folders to share.
access the folder and all the files it contains.
Cfck Vw loek 10 prmn lUnMr cnangM.
TRY IT! If you're using a Mac, check to see If file sharing is turned on. Which folders are shared?
22
NETWORKS
I How do I share files from a PC? On a PC using Windows, the first step is to use the Control Panel's Network and Sharing utility to make sure that network discovery is on and then tum on file sharing. Windows File Explorer includes a Share tab that's used to select folders or files you want to share. The Share tab also lets you specify permissions
QUICKCHECK Which operating sysiein olfers a way to designate individual files as shared? a. macOS
(Figure 3-73).
b. IDS FIGURE 3-73: SHARING FILES FROM WINDOWS
c. Android
Q Use the Control Ponel to access the Network and Sharing settings. Turn
d. Windows
on network discovery and then turn on file and printer sharing.
File And printer sh4nr>9
.
.
.
When file end printer shering Is orv files end prmtert thatyou hasre(hered from thts computer cert be Accessed by people on the network. File and printer sharing options
')9' Tum on file and printer sharing > Tum off file and printer sharing
In File Explorer, you can select a folder or file that you want to share. Use the Share tab to access settings where you can specify users and permissions. TRY IT!
Share tab
If you're using a PC, check to see
O a Ll VZ" Shirt
^ Soft'KatvMc-
St'S*n$
^
'1^
*4 Mflaryoup h»fw> indidrfj
CmA
if file sharing is turned on. Does
Access to permissions
SMtt nrth
« •r 1 » TNtPC
Deewmcfib > CwibnAfcAoets *
Q'
A DmaIm*
Se*r(hCa— fi
your computer allow shared access to any of your files?
Ki^r
~ Amher Ph«(e.prt^
S OnHnp
V ^
and SeuffrLdecx
PNcn* MKr««cn Wwd Oocumcrt
Q' Aaek: CKtb PreMMKrdA ppti
PewvtPeutt Presifiuo
B Decumoes
File selected for sharing 9iiriiig
i CirBftrtAytog*l •iccdb
0
Musk
s SmI Fil«uip T XC«VsSo
oose
to shaie svith
Select who can share the
file and specific permissions. d W OTd Mn
orIMS
QimnPh«]
222
SECTION E, MODULE 3
INTERNET-BASED SHARING
As more and more activity moves to the cloud, companies that provide cloud services have increased their interest in encouraging consumers to use those services. Cloud storage and sharing services are commonly hyped as being more convenient and more secure than local options, but many consumers are wary of cloud security, not to mention the rampant advertising that accompanies many of the free cloud storage services. The concept of pulling files from remote servers traces back to a protocol called FTP. Newer technologies now power Dropbox and similar services. So what are they all about? > What Is FTP? FTP (File Transfer Protocol) provides a way to transfer flies from one computer to another over any TCP/IP network, such as a LAN or the Internet. The purpose of FTP is to make it easy to upload and QUICKCHECK
download computer files without having to deal directly with the operating system or file management system of a remote computer, FTP also allows
FTP is
authorized remote users to change file names and delete files.
a. a cloud hosting service
i How can i access FTP servers? You can access FTP servers with
b. a file sharing protocol
FTP client software, such as FlleZllla, or with a browser. Addresses of FTP
servers usually begin with ftp, rather than www. To use a Web browser to download a file, simply enter the address of the FTP server as shown In Figure 3-74.
c. LAN-based secure file sharing d. a permission-free file sharing service
FIGURE 3-74: FTP FROM YOUR BROWSER 1. Enter the address of the FTP server in the browser's address bar. At an
anonymous FTP server, a user lb and password would not be necessary. Q FfPdMvctary/p4jWiA0i(^
^
-
-
. ✩
O
- 25
o
x
A -
FTP (Jirecloiy /pub/intlices/ at np.sec.nonii.gov
TRY IT!
Use your browser and try to
connect to ftp://ftp.epa.gov. What happens?
L'fito hiibgt
defection'
:;/ca?*ci£ :2/0?/2C16 IS/Of/ZOlfl OFtlSFM l2/2''/2C12 litC-JAM
Z.K9 :r«,4:c
r; I li/C;/201f
rt cry be
2. Select the file you want to download. Di:«ct=cy ©l Is BitTorrent safe? Because BitTorrent files are assembled from little
segments that come from a jumble of computers, they would seem to be bad candidates for distributing malware. Intelligent hackers would realize that their malicious code could easily be chopped up, too, and that pieces of it might not be delivered. And yet BitTorrent files have become a source of adware and spyware. If you use BitTorrent, make sure your computer is protected with a security software suite that offers good spyware protection.
QUICKCHECK BitTorrent can be called a(n)
a. distributed network
b. peer-to-peer network c. file sharing network d. all of the above
SECTION E
QUICKQUIZ 1.
2.
When network
is on, your 4. |
|client software, such as
computer can see other devices that are con
FileZilia, provides a way to upload and download
nected to a LAN.
files from an Internet-based server to a computer
Read and
permission
allows a shared file to be opened, viewed, modi
5. Torrents exchange segments of flies over a distributed network using a logical
fied, and deleted.
3. File I
on a LAN.
I has to be turned
on before any flies on your computer can be accessed by other devices on a network.
topology.
IT ALL STARTED in October 2007, when the "preserve the Internet as an open platform enabling FCC accused Comcast of slowing and in some cases blocking internet traffic from BitTorrent. Comcast claimed that it was attempting to even the playing field for the average internet user whose online speeds were languishing due to file sharing traffic from a
minority of its customers.
consumer choice, freedom of expression, end-user control, competition, and the freedom to innovate
without permission." Shortly after the Open Internet Order, Comcast was
back In court again to contest the FCC's right to regu late the Intemet. The court ruled in favor of Comcast,
Comcast's ability to adjust some users' bandwidth for the benefit of other users might seem beneficial
based on the fact that the FCC's jurisdiction did not extend to the Internet.
until you consider that ISPs could manipulate Internet speeds to give preferential
Yet the FCC persisted. In 2014, FCC
chairman Tom Wheeler proposed a compromise form of net neutrality that
access to certain sites and
services while slowing access
to others. That practice could essentially give ISPs the power to deny access to sites based
on business, political, or other values.
What if your ISP institutes a
Today's actio n at the FCC could begin the dismantling ofthe open Internet as we know it,..
Senator Edward J. Markey
system whereby you have to pay extra for high-bandwidth services, such as movie downloads? You might be
thinking, "There ought to be a law against that!" That is exactly the opinion of net neutrality supporters. The term net neutrality was created by Columbia
would allow ISPs to offer "faster lane"
options at a premium rate to content providers such as Netflix, Facebook, and Amazon. That proposal absolutely confused the issue; the FCC's pro
posed version of net neutrality was not neutral at all.
Opponents to this new non-neutral neu trality pointed out that considering the finite amount of bandwidth available on the internet,
users outside the proposed "faster lanes" would have their bandwidth squeezed while the added cost of fast lane services would be passed directly on to the con
media law professor Tim Wu in a 2003 paper Network Neutrality. Broadband Discrimination. Although the term net neutrality is relatively new, its roots can be traced to pre-1860 telegram technology. Back then,
sumers of such services.
standard telegrams were routed equally, without
that operate on small budgets—thus, stifling innova
discrimination, and without regard to their contents, source, or recipient. Telegraphs were end-to-end neutral networks. Because telegraph and—later— telephone networks were considered to be public utilities, or common carriers, they were not allowed
Additionally, opponents of this idea feared that the operational costs for fast-lane services would sky rocket and those costs would pose barriers to startups tion and competition. The FCC's "faster lanes" brand
of net neutrality satisfied no one. The net neutrality controversy boils down to simple
ideology; Should the government regulate the Internet
to give preferential treatment to one customer over
or not? On the one hand, regulation could prevent
another. The Federal Communications Commission
abusive business practices on the part of ISPs. On
(FCC) was formed to regulate common carriers and
the other hand, if the Internet were to fall under the
ensure equal access and fair prices.
regulatory control of the FCC, where would the regu lation end? The FCC currently regulates telephone and cellular service. It imposes a variety of taxes and fees that add to your monthly bill. Would similar taxes
As the Internet evolved into a massive communication
network, the FCC began to regard it as a common carrier that should fall under the FCC's umbrella of
influence. The first step would be to ban ISPs from stowing or blocking traffic indiscriminately. In 2010, under the banner of net neutrality, the FCC issued the
Open Internet Order, a set of regulations designed to
and fees be added to your monthly Internet service? And would FCC Internet monitoring add yet more
points where the government can collect data on the activities of its citizens?
227
NETWORKS
TRY IT! Net neutrality has become a political Issue, and organizations with vested interests add to the confusion with misleading ads. Here's a chance for you to explore the current status of net neutrality and to read arguments both for and against regulating ISPs.
o
What Is the current status of net neutrality regulation? Connect to the InfoWorld Net Neutrality page www.infowoi1d.eom/t/net-neutraHtylo find recent articles on this topic.
&
Take a look at your monthly cell phone or land line bill. Locate the amount you pay for taxes and fees. How much do you pay in taxes and fees annually?
e
Go to the FCC Web site and read the Communications Act oi'iQZA transition.fcc.gov/Reports/1934new.pdf. Does the wording in this act appear to apply to the Internet? Why or why not?
o
Many ISPs and media companies have published written statements about their stance on net neutrality. What do you guess are the positions of Amazon, Mozilla, Netflix, Comcast, and the Electronic Frontier
Foundation? Find the net neutrality statements of these companies online. Do they take the positions you expected? Why or why not?
0 In 2016, a U.S. federal court of appeals handed down a controversial net neutrality decision. The case involved a dispute between the United States Telecom Association and the FCC's Open Internet Order. What three practices does the Open Internet Order prohibit? Did the court rule in favor of this order or against it?
©
Search online for the article Open vs. Closed: What kind of internet do we want? What Is the difference between an open Internet and a closed Internet? How does that difference relate to net neutrality?
UerizbriaridATaTwbii:
NelNeutralityisdeaii:; ) ]i ^
1 t,• ■
'i
I' ■
I'Ti
■' I 1
Now they can block or slow down
any site or application tfiey clioose. ■
;
r.J
I
r\,
■
I
. . ■
I
. •• •'
ti"..' ..T'T-;
I
;
ij ihlj, iM,
S'BniliepelltionlolheFCCati,, . . . j blbi//acLcndoactioD.cor!l/siga/iiorl20ii'_flenietitrain ioUOMOUIMi
ISSUE
What Do You Think? 1. Do you support the Idea that internet traffic should flow freely? 2. Do you believe that the U.S. government should regulate the Internet as a common carrier?
3. Were you aware of the net neutrality controversy?
r
These days, you have to be a skeptic. Bioggers have opinions that are not always based on facts. Scam artists
say anything to get your money. Fake news sites are proliferating. Just because an article shows up in Google results, doesn't mean its contents are factual. Even reputable journalists sometimes make mistakes.
Before you form an opinion, make a decision, or take action based on what you read, see, or hear, you can easily use your computer or smartphone to verify facts and look up background information. Search Google. You can use Google or a similar search engine to find information from ail corners of the Web. You can search for information in specific formats, such as videos, images, and news reports. Check out Google Scholar for links to authoritative information in peer-reviewed journals, theses, and other professional publications. Remember that you can formulate searches such as Define DNS spoofing \o learn the meaning of technical terms and find the meaning of acronyms. Search within sites. Rather than conducting a wide-ranging Google search, you can go to a specific Web site and search within it. Search Wikipedia for definitions and topic overviews. Search news sites for articles and video footage about current events. Start at www.snopes.com or www.facfcheck.org to identify email scams. When you check facts or use them in your own research papers, primary sources tend to be more reliable than secondary or tertiary sources. How can you tell the difference?
PRIMARY SOURCES
SECONDARY SOURCES
TERTIARY SOURCES
Original material such as speeches, interviews, letters, photos, email messages, tweets,
Reviews, critiques, panel discus sions, biographies, and other
A list or compilation of material that
sources that analyze, summarize, or otherwise repackage informa tion from primary sources
that include bibliographies, dic
artwork, diaries, laws, database reports, and accounting records
pertains to a topic; from sources tionaries, almanacs, indexes,
timelines, and inventory lists
Example: A video of Apple's CEO announcing a new music product
Example: An article on Google
Example: Apple's ecommerce site
News that describes Apple's new
that lists and sells all versions of
for the iPhone and iPad
music product
its new music product
FACT-CHECKING TIPS I Two sources are better than one. Cross-check facts between two or more sites. I Use common sense. Claims that seem outlandish
require extra verification.
> Understand your priorities. For example, you can go to YouTube and view the trailer for Live Free or Die Hard. That might be fun. but it might not be relevant for a term paper on cyberterrorism. I Use primary sources when possible. Go to the original text of a speech, check the product manufacturer's Web site, or watch the video clip. I Use reputable sources. The Web contains billions of documents; few of them follow strict journalistic standards for accuracy. Check the author's credentials, look at the general quality of the Web site, and make sure the Information Is up to dale.
t Maintain a list of the sites you frequently use for fact checking. You can create a Fact Check folder In your browser's Bookmarks or Favorites list.
I Nail down your search terms. When using voice search on your mobile phone, think about an exact set of keywords before you launch Speak Now.
Speak now
i.'iooglr »4icM
229
NETWORKS
TRY IT! Fact checking can be fun and it can lead you to all sorts of intriguing factoids as well as to sub stantive information. Practice your fact-checking skills by completing the following activities;
o The truth is not always clear cut. Sometimes it is nuanced. Statements can sometimes be literally true, but still manage to misrepresent reality. After the 2016 presidential election, the Russian government was
implicated in obtaining and releasing kompromat[compromising information] gathered from illegal hacking and intended to influence American voters. A statement fay the Russian government said, "The Kremlin does not collect kompromat." Is that statement true? Explore online to discover why this statement may be true, but is misleading. What kind of research would be required to prove this statement true or false? Fact checking Web sites, such as snopes.com, polidfact.com, and factcheck.org, have been accused of being biased in the stories they choose to fact check and in the way they present conclusions about the veracity of information. In July of 2015 presidential candidate Bernie Sanders stated that the unemploy ment rate for African Americans between the ages of 17 and 25 was 51%. A year later, Donald Trump stated that the unemployment rate for young African Americans was 59%. Which statement was true?
Connect to www.politifact.com. a reputable fact-checking Web site. Use the search box to find out how Politifact evaluated the truthfulness of these two statements. Be sure to read the fact checks on both
statements, then answer the following questions: a. According to Politifact, which statement was closer to the truth?
b. According to the Bureau of Labor and Statistics, the actual unemployment rate for African Americans is about 27%, but a different figure can be obtained from the employment-population ratio. How
does that relate to the 51% and 59% unemployment rates that were quoted by Sanders and Trump, respectively?
c. Do you think that Politfacfs conclusions about the statements made by Sanders and Trump were accurate and unbiased?
d. What is the potential danger of simply accepting the bottom-line, true-or-false conclusion presented by fact checking Web sites?
Suppose you're gathering information for a term paper about the emergence of the Internet, and you come across the following short article posted on Facebook. Internaut Day could be an interesting addition to your report; but before you include material from this article, you should do a fact check. Go online and find answers to the questions in the diagram below.
Happy Internaut Day! Few people would disagree, especially those who call themselves internauis.
.^n "internaut" is a person who pos--
c. Is there such
sesses a thorough knowledge of how
a thing as an
10 use the Inierncl and its history.
Internaut?
T he word, a combination of Internet
a. Was tKe
This year's calendar will feature a new
and astronaut first appeared in a 1990 article about response rates to inforinalion posted ott the Web. A group
Internet
U.S. national holiday recognizing the
of hardy iniemauts has been petition
with including
ing presidems, from Nixon to Obama.-.
Nixon here?
Invented on
August 23rd?
b. Is this an accurate quote from a U.S.
president?
"tlay the Internet was invented. Circle
August 23rd. That is the date when
for naiittnai recognition of this special
then Vice President Al Core, threw the
day.
switch that opened the Internet to pub
The hashlag #internautday has-"
lic use.
become a rallying point for Internet
The liilemet has become an indispens able part of everyday life. In declaring
enthusiasts and was instrumental
this new national holiday, the President
-stated,"The Internet is not a Itixtiry, it is a necessity."
in garnering more than five million
digital signatures on the petition to itistiiuic a national Internaut Day.
d. What's wrong
c, Is Internaut
Day a U.S.
national holiday?
t
ECHNOLOGY IN ClfRllxTrtDUCATION
m
THE FIRST EDUCATIONAL applica
simulations, whereas Battlefield 1942 is a first-person
tion of computers emerged in the 1960s, when huge
shooter game based on historic World War II battles.
mainframes with clunky interfaces introduced stu dents to computer-aided instruction (CAI). Based on
The line between the two types of simulations is blurred. Is Guts and Bolts an anatomy simulation or a game for designing bizarre organisms?
operant conditioning research by B. F, Skinner and Ivan Pavlov—remember dogs salivating when a bell
rings?—CAI uses basic drill and practice; The com puter presents a problem, the student responds, and
Most educators believe that computers can help
monochrome display and found the regimented drill
create an Individualized and interactive learning envi ronment, which can make learning more effective and efficient. According to the National Center for Education Statistics, 99% of American public schools have computers and 93% of students use them in some way. However, these statistics can be deceiving. The reality falls far short of the ideal situation in which every student has access to a computer throughout
format boring-
the school day.
the computer evaluates the response.
Studies in the 1970s indicated that programmed instruction systems, such as Programmed Logic for Automated Teaching Operations (PLATO), Improved test scores, but students soon became bored with the
The challenge for K-12 schools is to figure out how to achieve the computers' potential In an educational setting when supplying computers for every student is often cost prohibitive. Compromise solutions have been tried with varying degrees of success. Some schools have installed learning labs where students go for scheduled lab time. In elementary schools, often a few computers are placed in special work areas of classrooms and used for small group projects or indi vidual drill and practice. Some schools have relegated most computers to the media center, where they are connected to the Internet and used for research. In
some classrooms, a single computer can be used as an effective presentation device. Educators know that students have diverse learn
ing styles and are equipped with varying degrees of background knowledge about a topic. Computers, with all their processing power, should be able to provide individualized instruction. With prom ising breakthroughs In artificial intelligence during the 1980s, deploying computers for indi vidualized instruction seemed within easy grasp.
The problem, however, was more complex than first expected. Thirty-some years later, individualized instruction in the form of adaptive learning is just beginning to mature.
Simulations have become a popular educational tool. There are educational simulations that mimic
An emerging bring your own technology(BYOT)trend in elementary schools encourages students to bring their own devices to class. Laptops, smartphones.
and even videogame consoles—any device that can access the Web—might be used to access a wide variety of online educational content. The challenge for teachers is to find appropriate content and inte grate it into the curriculum and lesson plans. Some schools—primarily colleges—have tackled the problem of computer access by requiring all incom ing first-year students to purchase laptop computers. Most colleges offer campus-wide Wi-Fi service with Internet access so that laptop-toting students can
real-world situations through narrative descriptions,
easily take notes in class, contact instructors via
2D graphics, or virtual reality. There are also game
email, use the Internet as a research resource, and
simulations that educate within an entertaining envi
run educational software.
ronment. Flight simulators are an example of real-word
231
NETWORKS
The proliferation of tablet computers has led to a bevy of experiments under the umbrella of mLearning, a buzzword for mobile learning and defined as learning that happens across locations, or that takes advantage of learning opportunities offered by por table technologies. Another educational use of computers can be seen in distance education (DE)courses (also called dis tance learning). -
Select the Start button. FiW
SSit
View Co
j m A®
- sg •
tccis
5 ^^
Momma
PPBB
192.168.168.4
TCP
He
8.253.169.14
192.168.168.4
TCP
1S14 |7C^ of « 1&14 {TCP t«e*«nt of o
8.253.169.14
192.168.168.4
tCP
1514 (T(P »«eaont of » redssMblod POU)
192.166.166.4
8.253.169.14
TCP
192.168.168.4
6.253.169.14
TCP
192.1S8.164.4
6.253.169.14
TCP
1.253.189.14
192.166.166.4
TCP
6.253.189.U
192.168.168.4
TCP
8.253.169.14
Packet List
Suliks Tfioecny Wje'eu
t
POU) ^Xl)
$4 4M&4«M ^ACK] Sec,*99i Acks29eS479 Uin«2UrS84 Ua«0
lACK]
S4 4M64-40
Hin«n44$U L«n«e
S«o>993 Acks291U19 Vln«M4]m L4(M« ^
1SI4 [TCP eegwut of j r««$saibled POU) 2SUJKP °f ' r^4$settle€ POU)
froae 152922: ISU byUt «a mirt (IJIU bits), 1514 byt Are links URLs? No, but a link contains the URL that points to another Web page. Before linking to a page, for security reasons, you might want to preview the URL for the page. Figure 4-10 shows how.
TRY III Can you connect to the CNN
Web site without using http:// in the address? Can you connect without using www?
FIGURE 4-10: LOOK BEFORE YOU CLICK O ShonSMrtw(wOdfa X
^
O
db
✩I
I edisoiiionetcomfh:n-vrT—.-rui btK-ed,i^n-,niw
s- E5 O
STORIES
enMBenwi■De< cue
You wnl DeBffvs tnis!
TlM
•••
nRpMn«M>Joekalmy*tf.coin/sp«aaiarii>t'vouciK Why are URLs so long? When visiting Web sites, glance at the address bar from time to time. Many of the URLs are long and complex.
Here's a long URL that's the Web page for a short story: http:/Avww.edisonjones.com/short-stories-for-kids-edison-jones/stories-forkids-samuel-and-the-pirates.html
t Is there any way to shorten URLs? Long URLs can be a prob lem. The longer they are. the easier it is to make a typing error. Aiso. long URLs consume too many characters in short messaging applications such as Twitter.
Several services, such as Bitly and Goo.gl, create short URLs. Anyone can request a short URL by entering the normal URL at one of these services. The service wili generate a short URL. The originai URL and the short URL are stored in a translation tabie on the service's server. Figure 4-12 iliustrates how short URLs work.
FIGURE 4-12; SHORTEN THAT URL
I Copy and paste the fuli URL into the box pro vided by a short URL service such as Goo.gl.
^The service produces a short URL.
Pwt« jwlenQ WL har*:
I httpy^WlVr.^diion|one«cclm/anof1•u^nes-for•k]0••6tfaon-^ I
http://goo.gl/EefliwZ2
©The short URL is stored on the server along
rii forward you to the full URL.
with the fuil URL. Short URL
©Links to the short URL are directed to the server, which forwards the iink to the full URL. Short URL service server
I Why use a short URL? Suppose you want to share an article or video with your friends on Twitter. Easy. Just find the Twitter icon and click It, right? Twitter automatically shortens the URL to 22 characters. Sure that works on Twitter and a few other social media sites, but what if
you want to share something from a site without Share links to social media sites? You can copy the iink and obtain a short URL before pasting it into an email message or social media post. Posting a short URL takes up less space in a Tweet or post. Aiso, if you expect recipients might manually type the URL, they will make fewer mislakes when typing a short one.
TRY IT! Use Goo.gl or Buiy to create a short URL for an article or video
Some URL shortening services, such as Goo.gl, provide tracking data.
you've found on the Web. Mai!
You can create a short URL and then track how many clicks it receives. To collect click statistics, it is necessary to have an account with the service,
the link to yourself. Test the link. Does it produce the article or
but accounts are free. Goo.gl is operated by Google and it will use your
video you specified?
Googie+ orGmaii login.
253
THE WEB
I Do short URLs expire? Short URL services may lead consumers to believe that all short URLs will last forever, but they last only as long as the service maintains its servers. If a service ceases operations, the short URLs maintained on its servers will no longer work. Short URLs are sometimes used to disguise the real address of a Web site
that is illegitimate. This practice has resulted in short URL services being blocked by Web hosts and ISPs. When URL services are blocked, the short URLs on their servers will not work.
Web surfers should be aware that short URLs may lead to questionable Web sites and scams. Never click a short URL link in an email message
if you are not certain it leads to a legitimate site. As shown in Figure 4-13, several sites, such as checkshorturl.com and getlinkinfo.com, provide ways to check the actual destination of a shortened URL before you click it. FIGURE 4-13: EXPAND THAT URL
B sn" ^
MiiuHK I B o»9Vf I a Cnneti □ OcO x -T-
I D n-cxvi I —
O
(S!)
tlnOufiMturtcom
ir
^
—
9
X
6
YOurmmaufltfpar^ '
r•' r,:. i-j?*
i7r>t
OiecXil
CheckShortURL sjcoorts sirrcs; all ico.gco.gi. c
the site?
•
sncteririg se-.' ces:
ExpsnO
mp___
at "1 cfc*' 1 o [t:
Gft dr., -.;i c."
■
What is it made for? CheekSrwUxl j
'it
cot. o.v.ry.>5j;!j.cear:d n-s-iyctriefs;
hccp://bic. ly/lhjvj»j| Wit h mob
tit,
Can you discover where the
short URL http://bit.ly/lhJ\/jma goes without actually visiting
CheckShortURL ottOM ItiCtmftfteg
TRY III
Google
Be safer online C"«3>Sf*onURl I. M**'* " •
:
5'-' » • f t w *:;
1 i't".*'*! I -• ce's'*
V •«
CO)
Online services such as checkshorturl expand short URLs and display the original, full URL.
SECTION A
QUICKQUIZ 1.
2.
The World Wide Web is one of the many tech
In the URL http://www.mus/cw/re.com/6/f.Wrn,
nologies that uses the
the
infrastructure to distribute data.
com.
The basis for Ted Nelson's original idea for was to use bidirectional
links to navigate between digital documents. 3.
4.
A(n) cates a query.
symbol In a URL i ndl-
5.
name is
musicwire.
Http;//bit.ly/MY67dd93B is an example of a(n) URL.
254
SECTION B, MODULE 4
Browsers
Popular
Cache/Historv
Microsoft Internet
Explorer
SECTION
B BROWSERS T!
GO INCOGNITO.After you read Section B,
Terminology
you might want to put dark glasses on your browser so you can surf the Web in private without accumulating a trail of Web sites, images, and ads
default browser browser home page
that trace your Web activity.
browser tabs browser extension
predictive services bookmarks plugin browser cache History list private browsing
Objectives I identify the following elements of a browser window: address box, refresh and home buttons, back and forward buttons, tabs, and
settings menu.
I Describe the difference between a browser
extension and a plugin. ^ Describe what is in a browser cache and explain how it can affect your privacy.
t List four popular browsers.
I Describe what is in a browser's history list.
I State the difference between the default browser and the browser home page.
I Explain how private browsing works.
» Summarize the potential problem with allowing I Explain the purpose of predictive services.
your browser to store passwords.
255
THE WEB
BROWSER BASICS
Web browsers are the all-purpose tool for accessing the Web and every thing it has to offer. They are used on all personal computer platforms. What's surprising is that the essential elements of browsers for small screen
devices, such as smartphones, are so similar to those for large screen Terminology devices, such as desktops and laptops. I What's in the standard browser window? The essential ele
ments of a browser include an entry area for URLs and searches, navigation controls to move from one page to another, a refresh button, a home but ton, a settings menu, and a display area for Web page content. Additional elements, such as tabs, facilitate the browsing experience. Figure 4-14 illustrates essential browser elements and several additional features com mon to browsers on full-screen and mobile devices.
The address box originally was used only for entering URLs. Today, the trend Is to also use it for entering search terms. The address box is sometimes called an Omnibox to reflect its dual use.
FIGURE 4-14; ESSENTIAL BROWSER ELEMENTS & IMMA'OMMtMiCt Artf 2
• h-'a*
TF-anetSttMn
tedlien
Refresh and Home buttons
Settings menu J. R. R. Toltaer -Wilitpe a A-RJMUm
IstaM CSC fSL troM br w*e*«.#aee»sL re ThesrArevi CxwowTi
Mh
»*«eD4r r«9iTokw>
Biognphy - Th« ToikJer SocMy s^^^iifci'ne».e
te ffta-ltTV Ml•Aiiar «0Wl(M
r qb r>
Tn m PiJmv
R.Tolkle
The Totklen Socisty WsMNew letoeeoeeifefg
jen«felM ta)Bttwa
weeE.
itsetrerrj.! t
««• n f>0wn «HtK90A tn
The Officfa] J. R. R Totkfcn Book Shop
mem
Address box for
««rckeKN(^
Web page display area
entering URLs or search queries
Refresh Button
Navigation but tons for moving
Tabs for multiple open Web pages
back and forth
between pages
Google
lolklen AU.
XI fCWS
OOOK£
TRY III
Compare the browsers thai
you use on mobile devices to those you use on your laptop.
John RonaiO Rouel Ttjikien CBO FRSL
known by N9 oeit name J. R. R. Tolioen,
How many of the user interface
CD
O
elements are similar?
255
SECTION B, MODULE 4
► What are the most popular browsers? Today's popular browsers are Apple Safari, Google Chrome, Microsoft Internet Explorer, Microsoft Edge, and Mozilla FIrefox. In Figure 4-15, compare the placement and design of the address bars and navigation controls of these popular browsers. FIGURE 4-1S: POPULAR BROWSERS
Edit
Vint
rnontn
Taoii
MicrosoU ln!t;rnet
Explorer (IE) Is included with the Windows operat ing system. According to the W3 Counter, IE and Its successor, Microsoft
Edge, account for about 10% of the browsing
Apple Safari is shipped with lOS
activity that takes place
devices. About 15% of desktop
on the Web.
and mobile traffic on the Web is
generated by Individuals using Safari.
#
fvdoa Start
Mozilla Firefox is a descendant ' o.-cQ HOOAafi'itfe
of the first graphical browser, Netscape Navigator. As open source software, Firefox is avail
able for free and is easy to download and install. Firefox
'rr^—a
X
4«| i
a o
accounts for about 11 % of Web Iraffic-
4-
*
C iiWiM
twWTi,
Q
A-
O
»
V(
Google Chrome Is one of the most recently developed browsers, but it accounts for about 60% of desktop and mobile Web traffic. Known for
its streamlined design and billed for its speed and security. Chrome Is free and available from Google's
Sobtcc Mviils
Web site.
G Ooofi*
^
O
n fTMram-] V
I fi 6
Source Goo9'4
Microsoft Edge is the successor
browser to Internet Explorer. It offers built-in support for PDF and Flash, and eliminates the use of
several legacy technologies that are security risks.
257
THE WEB
• When should I upgrade my browser? It is a good idea to upgrade when a new version of your browser becomes available. Because most
browser updates are free, you can get up-to-date functionality simply by spending a few minutes downloading and installing an update. The most important reason to upgrade is for increased security. As hack ers discover and take advantage of security holes, browser publishers try to patch the holes. Upgrades normally contain patches for known security exploits, although new features might sometimes open new holes. New versions of browsers also reflect changes in operating systems and specifications for the HTML used to create Web pages. To take advantage of the latest innovations and to experience Web pages with all the bells and whistles intended by their designers, an updated browser is recommended.
QUICKCHECK Which of the following is not a reason to upgrade your browser?
a. To improve security
b. To keep up with new Web technologies c. To get a free one
I Is it possible to use multiple browsers? It is allowable to have more than one browser installed on a device, and you can open any installed browser and use it to surf the Web. Only one browser can be des ignated as the default browser, which is automatically used, for example, when you click a link in an email message or PDF file. You can add browsers and change which browser is used as the default.
Suppose that your device is equipped with Microsoft Edge, but you'd pre fer to use Chrome or Firefox. There is no need to delete Microsoft Edge. Simply download and install Google Chrome or Firefox, then set it as your default browser using one of the methods shown in Figure 4-16.
TRY IT!
How many browsers are installed on the device you use most frequently? What is the default browser?
FIGURE 4-16: WHAT'S YOUR DEFAULT BROWSER? o Settings «•
O
-
c Q ir-prre
Chrome
Settings Method 1: In Chrome, select
the Customization menu, S«i ««fs py« DT Cerrttt e$ pc
Play [Q NYT Uec. Editor On The Nev
look Co bring
51^1 fFl "r?vn''»'fvOrFoTNrnn
Using a service such as Protopage, you can create a customized home page that helps you easily access the sites you use most frequently and the Informa tion you want at your fingertips.
TRY IT!
You can adjust the behavior of predictive services from
I What about predictive services? Predictive services look ahead and anticipate what you might do when searching or filling out forms while using a browser. These services can automatically fiji in form data based on entries you've made to earlier forms. They can also complete search requests based on previous searches. In addition, they can display search and site predictions as you type queries. Predictive services may track your actions and store data about you online. If you are nervous about privacy intrusions, then you might want to disable these services.
Chrome's Settings menu. Safari's Preferences menu,
Internet Explorer's Internet Options menu, Microsoft Edge's Advanced Settings menu, and Firefox's search box. Are
predictive services turned on in your browser?
259
THE WEB
> How do I customize bookmarks and favorites? Bookmarks (or Favorites, as they are called in Microsoft browsers) link to pages that you use frequently. When the browser is configured to show bookmarks, they appear on the browser toolbar and are easy to access.
Consider creating bookmarks to your favorite social networking and infor mational sites. Set a bookmark to your favorite music service, or create a bookmark to quickly check the caloric content of the food you eat. Perhaps a bookmark to an online thesaurus can help improve your writing (Figure 4-18). One caution; Create bookmarks for sites that help, not hinder. That addictive cat video site? Don't bookmark it if the site becomes a distraction. FIGURE 4-18; CUSTOMIZE YOUR FAVORITES TOOLBAR O
n rhK»«i&csm I MNni y +
^
O
fSl
I ■'•uu'wajm
TRY IT!
Take a look ai your browser's Web sites added to the Favorites toolbar
can be accessed with one click or tap.
Favorites or Bookmarks toolbar.
Does it cor^tain sites you access
n
often?
QUICKCHECK
I Can I control tabs? Browser tabs allow your browser to queue up
Which one of the following
multiple Web pages so that you can easily switch between them. Your browser's Settings menu allows you to specify whether to use tabs or a new browser window. Each tab holds a page, and simply clicking the tab displays the corresponding page.
cannot be customized?
An alternative to tabs is opening new pages in separate browser windows—
c. The home page
a process that allows you to see multiple pages at the same time, rather
d. The Close button
a. Tabs b. Predictive services
than switching among them (Figure 4-19). FIGURE 4-19: DISPLAY MULTIPLE SITES AS TABS OR SEPARATE WINDOWS
' SITE1 ISIT^^Sr^^^
SITE 3 SITE 2 SITE 1
260
SECTION 8, MODULE 4
• What is an extension? A browser extension adds features to a
browser. For example, one very popular extension called AdBlock removes advertisements from Web pages. Other extensions add various toolbars to the browser window: the Google Toolbar, the Merrlam-Webster Online Toolbar, and the StumbleUpon toolbar are popular.
TRY ITl
Even more extensions include a grammar checker to proofread your social media posts, a URL shortener for adding links to Twitter, and encryption that
Search online for a list of extensions that are available for
protects the data passing between your device and Web servers. There
your browser. If you don't have AdBlock, you might consider
are even extensions that detect and display cookies and other devices that
track your activity on the Web.
downloading it from a reputable
I How do I manage extensions? Browsers provide a list of Installed
source, such as the Chrome Web
extensions and provide tools for disabling, enabling, or deleting them, as shown in Figure 4-20.
Store.
FIGURE 4-20: FIND YOUR BROWSER'S EXTENSIONS a
How do I manage plugins? Plugins have been exploited by hackers to access computers without authorization and plant malware.Technologies companies are attempting to phase out the use of plugins. Microsoft Edge does not use pluglns, but for other browsers the phase-out period Is ongoing.
If you are using a browser that requires a plugin or a plugin update, it can be easily downloaded. Plugins come in different versions for different brows ers. When looking for plugins, let your browser do the searching and it will find ffre correct version.
You can view, disable, and delete plugins. In Chrome, Safari, and Firefox, plugins are managed from the browser. In Internet Explorer, plugins are managed along with other installed software through the Control Panel. Figure 4-21 provides a guide so that you can find them in the browser that you use. FIGURE 4-21: FIND YOUR BROWSER'S PLUGINS
Google Chrome: Enter Chrome://plugins/ In the address bar.
TRY IT!
If your browser uses plugins, Apple Safari: Select
Safari Preferences , then
select the BUI icon.
Microsoft Internet Explorer: Open the Control Panel and select the icon for
Programs and Features .
Mozllla Firefox: Enter www.mozllla.crg/en-US/pluglncheck/ In the Firefox address bar.
look at its list of Installed
pluglns. Are there plugins for a Flash player and PDF viewer?
262
SECTION B, MODULE 4
BROWSER CACHE
Browsers pull HTML documents, images, and other Web page elements to your local device—and not just the main elements of a page. All those funky ads are pulled down, too. It is somewhat troubling that these ele ments may remain In a Web cache on your device, leaving a trail of digital bread crumbs to the Web sites you've visited.
Which of the following would
I What is a browser cache? When your browser fetches pages and
you not expect to find In a
graphics to form a Web page, it stores that material on your device in temporary files referred to as a browser cache, Web cache, or browser
browser cache?
QUiCKCHECK
a. Passwords
history. b. Image files from Web pages
A browser cache comes in handy if you switch back and forth between pages or sites. Rather than fetch the entire page and all Its graphics again, your browser can simply load them from the local cache (Figure 4-22). FIGURE 4-22; YOUR BROWSER CACHE IN ACTION
Browser cache
When a Web page Is first accessed, all the ele
If you return to the Web site in a later session, your
ments are downloaded
browser first checks the
and stored locally In the
cache. Any elements that
browser cache before
are stored locally do not
they are displayed on the
have to be downloaded
screen.
again.
I How does a browser cache affect my privacy and security? Files can remain in the Web cache for days or weeks, depending on your
browser's settings. Because a browser cache stores Web page elements from all the sites you've visited, anyone with access to your device can view this trail of Web sites. In addition, when you use a public or lab computer, the next person who uses the computer may be able to see the cache of your Web activity.
c. Images from ads d. HTML documents
263
THE WEB
• Can I see what's in a browser cache? Yes. With some browsers, such as Google Chrome, it is easy to see a listing of files in the browser cache and even retrieve them. So, if you want to access a photo that you saw during a previous browsing session but can't get back to the site,
you may be able to access the photo from the browser cache. The steps for viewing files in the browser cache depend on the browser you're using. It is also worth mentioning that if you use more than one browser, each one has a separate cache. Figure 4-23 illustrates how to access files stored in Chrome's cache. FIGURE 4-23: WHAT'S IN YOUR BROWSER CACHE? £>
"O—T"
>v>Tk C
®
a
til O
C.
-UULiaULiJi
TRY IT!
Take a look at your browser's cache. Do you recognize images
l'i'opI- .-otn Mi
ik
and other content from sites
1,'tns ,
Enter this in the
Cached files include the URL of the
ijif
r,im,
address bar.
originating site and a file name.
itilioiUELdElnE
.1
you've visited recently?
Uma_i)I!S!5!S3?T5!^3SIE55ij! File extensions, such as .png, pro pixrlf coi,i.^llc
vide clues to the file contents. „u-,\
C[,,n
lirT^s
,T,n r-,i .'')J'r,l%T -
ti[iiL,i,'.t-r.irf^ A'srr 1.'-I? I
"I ri-II 1
0 I fc fli ,n 0 I t
tir.ttro&eiBaiEiiui ioiui'lrlc
^i-.-hipnii-
i.o.C-Titi=t.C-rt=fhipfr,'X'fnTs1Arf>
Lllei_iUi2H£2£k.s.cm.ccLiriclcj,:MdCdiniydurai:5fliiujU5-U=£hcsic:ah2mE^amzl&a=ikiflsu&fiU^lAs85 hltiH
»nivco,i«l. f,.m
lv>?S u «l»l
R,.7;i Qgrtum ferfr«« Hts»t M> IZscdoc Aftmn
TRY IT!
Do you go incognito? Malx sure you know how to activate
the private browsing mode for
traces of the sites you
the browser that you use most
visited will be deleted.
frequently.
255
THEWEB
► Is it safe to allow my browser to store passwords? Browsers ask to save passwords when you log in to sites. If you agree, your pass word is stored in an encrypted file on your local device. The next time you log in to a site, your browser will use the corresponding stored password. Storing passwords is a useful feature. You can create unique and hard-toguess passwords without fear that you might forget them and without the hassle of looking them up each time you log in. The potential risk of stored passwords Is that anyone who gains access to your device can easily log in to your password-protected sites because the passwords are supplied by your browser. If you allow your browser to store
QUICKCHECK How would you bummoriZL"
the security risk involved in allowing your browser to store passwords? a. It is not a risk.
b. It is a security risk and should be avoided.
passwords, be sure to use a password to protect access to your device.
You can discover which passwords are saved by the browsers you use. To view passwords stored by Microsoft Edge, use the Start menu to open
c.
It is more secure to store
passwords online.
the Credential Manager. For Safari, select the Preferences menu, then
d. The convenience of stored
select the Passwords tab. In Firefox, open the Security panel and select Saved Passwords. Figure 4-26 illustrates how to find passwords stored by
passwords might be worth the small risk.
Chrome. FIGURE 4-26: FIND YOUR CHROME PASSWORDS
'cr C ' 0
i
Passwords
1. Select this menu, then choose
Settings. Scroll down and select the sign -n lowvbsitcs using vtoteiS avbenridU
loi tonfirmiStic'n rvi'iy time before su)iiuh] in to a wcbuti'
link to show advanced settings. Select the option to manage passwords.
Saved passwords Q KCttmc^ooglexsni I ur So HTML documents look a lot different from Web pages, right? Exactly. An HTML document is tike a screenplay, and your browser is like a director who makes a screenplay come to life by assembling cast
qUICKCHECK
members and making sure they deliver their lines correctly.
The text for a Web page and the HTML togs is stored in
As the HTML "screenplay" unfolds, your browser follows the instructions in an HTML document to display lines of text on the screen in the right color,
a. a source document
size, and position. b. a file with a .web extension
If the screenplay calls for a graphic, your browser collects It from the Web server and displays it. Although the HTML screenplay exists as a perma nent file, the Web page you see on the screen exists only for the duration of the "performance."
c. a browser d. all of the above
An HTML document is sometimes referred to as a source document
because it Is the source of the HTML tags used to construct a Web page.
Figure 4-28 illustrates the difference between an HTML source document (bottom)and the Web page it produces (top).
Open your browser and connect to any Web page. Can you
FIGURE 4-28; HTML SOURCE DOCUMENT
FiF* wit
^tory Bookmarlo Wif^ow
TRY 111
M»lp
SvihSfflilh 0. ^ sS 6
d'
THE GLOBAL CHEF Trivd flffiund the viwld. A de^ecUbte fuftt fo
AOLSTALKER.COM
Enter a (iiieiy
- —
—
batman }usk tnta' a wors
User 6497 spent several minutes
uwttatsia D.
o qs Cq a sp«ctA
What should i keep in mind about geolocation? Location-aware apps may use more than one type of location service. The location services settings for a digital device can be used to enable or disable location track
ing for each individual app. Geosocial networking depends on geolocation, so your participation requires an accurate assessment of your location. If you want to be found, activate all available location services by making sure GPS, cellular, and Wi-Fi are turned on. It you don't want to be found, make sure that all of those iocation services are turned off.
I What is geotagging? Presenting information about what's nearby requires places and landmarks to be tagged with their location. Restaurants featured on Yelp, for example, must have a street address or longitude and latitude available in a machine-readable format that can be interpreted by the geosocial networking service's search engines. Geotagging and geocoding provide the necessary geographical information.
QUiCKCHECK A service that displays the
location of a post office on a map is using
Geocoding is the process of determining the coordinates of a specific place, such as the street address or the longitude and latitude of Cathy's
a. geotagged
Cafe. Geotagging is the process of adding location data to photos. Web
b. geocoded
sites, HTML documents, audio files, blog posts, and text messages. Standard formats for geotagging and geocoding ensure that location data
c. social media
can be read by the computer programs operated by geosocial networking
d. cfowdsourced
services.
data.
321
SOCIAL MEDIA
SOCIAL NETWORK ANALYTICS The now infamous game Six Degrees of Kevin Bacon is based on a notion that any Hollywood actor can be linked to Kevin Bacon in six steps through the actors' roles in various films. The Six Degrees of Separation concept originated in a 1929 short story by author Frigyes Karinthy, whose charac ters devised a game of figuring how to most quickly relay a letter between any two people on Earth based on links between their personal acquain tances. Today, tools let us map and analyze social networks. What do they tell us?
► How are social networks mapped? Social networks are not exclu sively online. Everyone has faoe-to-face networks of family, friends, and acquaintances, who in turn have their own networks of social connections. You may envision these networks as points connected by lines. Sociologists use social network diagrams called sociograms to depict connections between people.
The circles in these diagrams are referred to as sociogram nodes. The lines connecting nodes are referred to as sociogram edges. Two-way edges exist when two people consider each other to be friends. One-way edges exist when a relationship is not reciprocal, such as a Twitter follower who does not follow back. What do the connections in Figure 5-9 tell you about the relationships between characters in The Lord of the Rings? FIGURE 5-9: ANATOMY OF SOCIAL NETWORKING
QUiCKCHECK In a sociogram, edges indicate
Ell^an j* Saruman
Berait
.A
Qoidberry
a. connections b. the boundaries of
Geebom
(rand
relationships c. Individuals with few friends
Boromir
Si\bo
Qtomnddl
d. 3D connections
Qaladnol
Araao Qollum Gandalf
Cardan
Baregond
\
Elrohir yi
Arwe Sam
Faramif
Imrahit
TRY HI Oenethor
Lego las
The thickness of connecting lines (edges) indicates connection strength. Node colors indicate which characters are most important.
Do the most important characters in Figure 5-9 appear to have the most "friends"?
322
SECTION A, MODULE 5
► Is it possible to sort through the complexity? Sodograms can get extremely complex, which makes connections difficult to trace and analyze. An aitemative method for depicting social connections is with an adjacency matrix.
A binary adjacency matrix is simply a set of cells containing a 0 if there is no connection between two people and a 1 if there is a connection. The adjacency matrix in Figure 5-10 depicts the relationships between some of the elves and hobbits of Middle Earth as a sociogram and as an adjacency matrix.
FIGURE 5-10: HOBBITS AND ELVES
BILBO
ELROND
FRODO
LEGOLAS
BILBO
\1
ELROND
LEGOLAS
In this sociogram, Bilbo
The intersection of dark blue cells in the adjacency matrix contains a
considers EIrond his friend,
1 to show that Bilbo considers EIrond his friend. Can you find the cell
but EIrond does not con
that indicates EIrond does not consider Bilbo to be his friend?
sider Bilbo to be his friend.
I What else does the matrix reveal? Matrices can be manipulated visually and mathematically to reveal more information about social connec tions. These manipulations can reveal pathways, connections, and groupings that lead to all sorts of revelations. Law enforcement agencies hope to use
such techniques to uncover criminal organizations, and national security agencies hope to follow links to identify members of terrorist groups. Suppose we rearrange the matrix so the two hobbits and the two elves are adjacent. The results are interesting. The rearranged matrix in Figure 5-11 seems to indicate that the hobbits chose each other as friends, but the elves
were not friends with other elves. Therefore, the elves would not be likely to conspire with each other to overthrow Middle Earth or to save it.
QUICKCHECK Hov; does the adjacency matrix indicate that the elves are not
friends?
a. It has a zero (0) where the elf rows intersect with elf columns.
b. It has a dash (-) where the elf rows intersect with elf columns.
c. It has a one (1) where the FIGURE 5-11: INFERRED CONNECTIONS
BILBO
FRODO
elf rows Intersect with elf ELROND
columns.
LEGOLAS
B LBO
FRODO ELROND
HOBBITS
ELVES
HOBBITS
100%
75'^
ELVES
50%
0%
In the rearranged matrix, the two hobbits are adjacertt, as
This matrix shows the percentage of connections
are the two elves. Color blacks illustrate the general rela
within each block, with hobbits well connected,
tionships between hobbits (red) and between elves (green).
but elves not connected to each other.
323
SOCIAL MEDIA
I How do analytic tools apply to online social networks? Sociograms and other analytic tools help us understand the quality and quantity of our personal social networks. The concept of one-way edges Is important, for example, In understanding that although you may receive status updates directly from the President of the United States and the First Lady, you are not likely to enjoy a similar link In the other direction. Social network analytic tools also uncovered a very odd phenomenon. Does it seem like most of your friends have more friends than you have? It turns out that is the case with more than 80% of Facebook users. This phenomenon Is referred to as the class size paradox because It Is related to the reason
students feel that they are always in larger than average classes. The expla nation is that people tend to choose popular classes and friends, and such popularity does indeed mean that the classes are larger and your friends will have more friends than you have. Figure 5-12 offers a few additional interest ing friend facts. FIGURE 5-12: FRIEND FACTS
\ / 1 1 1
'
' ' ' ■ ' • M I j I ff 1\ 1 If '1 «i »1
lii'ililtli lOO+frienciy miM M .'
#
' '
t
Can 1 assign a CC license to my own work? When you create a work, it is automatically protected by copyright and you have exclusive rights to its distribution, modification, and sale. If you would like to release some
of those rights to make the work easier for othere to use and share, you can assign a Creative Commons license. Figure 5-20 explains how to assign CC licenses to various types of media. FIGURE 5-20: HOW TO ASSIGN CC RIGHTS
^ Connect to the Creative Commons license chooser at creativecommons.org/choose.
Choose the rights you want to grant to others.
License Features YourchoicKonihis panel will updM
other pinels on this p^e.
Allow adaptation* of your work to b*(harodt u Yes
i< No
[T1 Yei, at lone as olhors share jilkt
Allow cemmtrclaltua* of your work? • Yes
. No
© ®@ 6Place the license where it can be easily accessed. TYPE OF WORK Web page. Web site, orblog
Image
WHERE TO PLACE LICENSE At the Creative Commons site creativecommons.org/ choose/, select a license, copy ttie HTML code provided,
then paste it onto a Web page or blog. Reference the CC license you've selected In the image caption or in the image tag.
Reference the CC license you've selected on the title Presentation
slide or the last slide. Adda link, if possible, to the license.
c.
BY
d. BY NC
333
SOCIAL MEDIA
► What about fair use? Earlier modules touched on the concept of fair use, which allows for the limited use of copyrighted material without obtain ing permission from the copyright holder. United States copyright regulations include four factors that characterize fair use:
Qjhe purpose and character of the use. The use of copyrighted mate rials without permission is more likely to be "fair" when the materials are
transformed and used for a purpose different from that of the original work.
^The nature of the copyrighted work. Guidelines for fair use of photos may differ from guidelines for music, videos, or written works.
@The amount of the copyrighted work that is used. Quoting a para graph from a book is more likely to be fair use than reproducing an entire chapter.
O^he effect on the value of the copyrighted work. Uses that deprive the copyright holder of income are not generally considered fair use.
> Is a transformative work different from a derivative work?
Yes. A derivative work modifies a copyrighted work but does not substan tially change its content or purpose. Translations, adaptations, musical arrangements, dramatizations, reproductions, condensations, and similar modifications would all be considered derivative.
Mashups that combine two or more music tracks into a single recording are usually regarded as derivative works because they are intended for the same uses as the original recordings. Derivative works are not fair use. and they require permission directly from the copyright holder or from an appli
QUICKCHECK Suppose thai you creulc a YouTube video and add a music track from a recent hit film.
Would your work be considered
cable license, such as CC BY.
transformative?
A transformative work repackages a copyrighted work to add new mean ing or produce a work that is used for a purpose different from the original work. Parodies, for example, are considered transformative. Cutting up magazine covers to create a collage to hang on a wall would also be con sidered a transformative use.
Transformative works are considered fair use; they can be produced and distributed without the copyright holder's permission. Although the differences between derivative and transformative works may seem clear, in practice copyright holders are free to sue anyone who pro duces a work that is based on their copyrighted works. The courts are the
a. Yes, I've created a new, original work.
b. Yes, the copyrighted sound track is just part of the new work.
c. No, I'm not going to make any money from It. d. No, the sound track is used
in my work for the same
ultimate decision makers in copyright infringement cases. If you want to
purpose as in the original
safely incorporate the works of others into your own work, use only works
work.
that have a 00 BY or 000 license.
SECTION B
QUICKQUIZ 1.
A media element goes
pany I
is accessed by millions of people around the
from misuse by law. 5.
Content communities form around usercontent.
3.
The Twitter bird logo is an example of a com
when it quickly infiltrates popular culture and globe. 2.
4.
Dublin Core is an example of a formal standard.
j that is protected
A Creative Commons license designated as CC BY derivative works.
does not allow
334
SECTION C, MODUIE 5
Twitter
Text-based Content Communities
Wikipedia
SECTION
BLOGS AND MORE
BLOGS, TWEETS. AND WIKIS.ihe
Terminoiogy
major text-based content communities offer up a mountain of content. Some of it is accurate and
blog RSS reader blog aggregator
dependable: some of it is downright false.Yet more
blogosphere tweetS microblogging service
of it is misleading in subtle ways. In this section,
@username retweet promoted tweet
you'll explore the origins of this text-based content and how to cull the good from the bad.
Twitter stream/timeline follow follower
follow back ri'mention#hashtag DM trending wlkl NPOV NOR V
Objectives > Identify the six major eiements of a blog page.
t identify the major elements of alwitter page.
I Describe the purpose of RSS readers and blog
I Describe the characteristics of a wiki.
aggregators.
I Discuss why blogs are considered a disruptive technology.
I Explain how Wikipedia articles are written and edited.
I Explain the meaning of NPOV, NOR,andV in the context ofWikipedla.
I List five questions that help to evaluate the quality of information presented in a blog.
> Identify the eiements of a Wikipedia article.
i Give examples of six ways in whichTwitter
I Identify the purpose of each Wikipedia tab.
has expanded its focus to go beyond personal status updates.
335
SOCIAL MEDIA
BLOGS The democratization of culture is not limited to art: it spills over into the mainstream news media. Today, blogs provide alternative news sources
that offer a greater diversity of topics and opinions than pre-lnternet gatekeepers such as Reuters, Associated Press, and CNN. The ease of broadcasting information has become a major disruptive force with no clear
i
outcome in sight.
► What is a blog? A blog (short for Web log) is a sequence of infor mational articles posted in reverse chronological order and displayed on a scrollable Web page. Blogs are generally maintained by a person, a com pany, or an organization. Blog entries are text based, but can also include graphics and video.
i What are the basic elements of a blog? Whether you are creating your own blog or browsing blogs created by others, you should be aware
that blogs are based on a standard set of elements illustrated in Figure 5-21.
FIGURE S-21:ANAT0MY OF A BLOG Main content area with
posts listed in reverse chronological order
r W
n;^4'dsAFLL'-\
- i-
'o -
r/i,
SKATEBOARD MARQUETTE Vi1»kAetir?M«rQtjeu«.Ukch^4n hav i rocking »k2t*bfl^ fadliry complete
vmh helf pipe. So ukt a brcek Irpm thoic ncfcecy nfings and parting M cvrtn. H«ul LiPnerth to Michigen't (J.P. (thet't Upper PeniniuU) for a Quick
ikate Ctefore nHnter sets fn. Check in with (he locel commurtitv kt TMrd Street Bagel end connect with the bike erewe who meet ecroes the street.
RECENT POSTS Sketeboerd livQueae Bllie Jckyll IsUnd
More on thet In e later post. Foitecl in Uncaiegorizeij 01 Octot>f-r 1
Comments from readers
RECENT COMMENTS frrti Mrehmeeernlth on Skjceboerd
Mvqweoe
BIKEJEKYLL ISLAND Street bikee et tne Jekyti t$Und Club hevt ihet histork vibe. Perfect for loohng Mst eMndoned ninstont liuih tri the
Kortof. Hou«. once occopiri b, Mejol Archive of older articles operated Georgia's firti brewery. On the eastern side of the island, you can park your bike, peel down to your swimsuit. and scoot over pristine sand to
ARCHIVES SaMOMpw n
QUICKCHECK
lake a swim. As the sun sets, settle into a rocker on the club house veranda
and sfp a cool drink, Southern style. '
I . • 7 7 , ■ Links to related sites
Posted in UnciTegorired 00 07ti)tKir
. iJit
BLOGROLL Discuss
Cat Inspired
a. By making a comment
A way to set up a feed
to automatically send new posts to readers
If you subscribe to WordPress, how would you add the Boards & Bikes blog to your list?
. QitSS- Pesu
b. By subscribing to the archive c. By joining the blogroll
A way to add the blog to the reader's list of
favorite blogs
d. By selecting the Following button
SECTION C, MODUIE 5
336
I Is it easy to become a blogger? Popular blogging platforms Include Blogger, WordPress, and Medium. A blogging platform provides tools for creating blogs. It may also provide a Web site where blogs can be posted for access by the public. Bloggers may post to a subdomain, such as htips://medium.com/@sarah, offered by the blogging platform. Bloggers who want a dedicated domain name, such as www.edisonJones.com, can use a Web hosting service, such as HostGator or GoDaddy. These hosting services offer blogging plugIns for authoring and managing blog posts.
TRY IT!
How would you discover n" liiere are any skateboarding blogs on WordPress?
> How can I find and access blogs? You can find blogs by going to Blogger, WordPress, and Medium or by simply launching a Google search such as Skateboard Blogs. You can use an RSS reader or blog aggrega tor to set up a "feed" that monitors your favorite blogs, collects the latest
posts, and displays them. Another option is to use a blog catalog, such as Alltop (Figure 5-22), to view a list of current blogs arranged by topic. FIGURE S-22; BLOG CATALOGS
Terminology «e • «
HecefHTrViftiv*
Wruw#
r
• ■eMUMiM
. y wemWew. Toch«•■•*? !•■*)■
•«*«* (I
hMMu (M am kav • »i#
M *■*•« TMMNr UtT WW
tanrtiartrM'ri'ill IUHl Tim '
SkmnaUcAM H«M tonCKM««FVCCT*M»i.^ Classify communications technologies as
synchronous,asynchronous, public, or private. > List the pros and cons of Webmail and local mail.
t Explain how the term store-and-forward relates to email.
> Differentiate between IMAP and PGR
ft List four steps that help to reduce the security risk of accessing email on a public computer.
ft Explain the circumstances under which a
person might want to forward email between a Webmail account and a local account.
ft Describe the evolution of online chat.
ft List four services that use VoIP technologies. ft Explain the controversy pertaining to Snapchat and its significance for using social media services.
345
SOCIAl. MEDIA
COMMUNICATION MATRIX The Internet offers many tools for communicating and collaborating; more are appearing every day. These tools can be classifled into a four-cell matrix as shown in Figure 5-29. FIGURE 5-29: COMrdlUNtCATION MATRIX
PUBLIC ASYNCHRONOUS
PUBLIC SYNCHRONOUS
Blogs
Chat rooms
Microfalogs(Twitter)
live streaming video
Forums and discussion groups Public social media posts
PRIVATE ASYNCHRONOUS
PRIVATE SYNCHRONOUS
Email
Voice over tP(Skype)
Text messaging service(SMS)
Videoconferencing(WebEx)
Multimedia messaging service(MMS)
Instant messaging(ICQ, AIM)
Private social media posts Snapchat
I How are synchronous and asynchronous communications different? Think about email and Skype. You use them differently because one is synchronous and the other is asynchronous. Synchronous. When communication is synchronous, interchanges hap pen in real time while all parties are online. Synchronous communications have the advantage of immediacy. They can convey your thoughts as you speak and events as they happen. Telephone calls are synchronous, as are video conferences and live streaming video. Asynchronous. When communication is asynchronous, messages are held until the recipient is ready to view them. Asynchronous communication offers convenience because information can be gathered whenever you want it. That information can, however, be out of date by the time you obtain it. Email is an example of asynchronous communication.
I What is significant about public or private communications? There are times when you want to communicate with certain people, and there are times when you want to reach a wider audience. Networks offer opportunities for both public and private communications. Public. Public communications can be accessed by individuals unknown to the person who created a message. The word posting is associated with this type of communication because it is similar to posting a billboard, sign, or poster. Public communication platforms, such as Twitter and blogs, are useful for disseminating information to a wide audience. Private. Communications for which you specify one or more recipients would be classified as private. Text messaging is a popular type of private communication. A limited audience can be an advantage or a disadvantage, depending on what you hope to accomplish with your message. Be aware, however, that private messages can be forwarded by recipients, so they do not necessarily remain private.
QUICKCHECK Email is an example of communication. a. synchronous
b. asynchronous c. mediated
d. public
345
SECTION D, MODULE 5
EMAIL
An estimated 225 billion email messages speed over the Internet each day. You can access email using Webmall or local mail, or both. Which system you use has implications for your security and prlvacy.
QUICKCHECK The message header In Figure
► Exactly what is email? The term email can refer to a single message or to the entire system of computers and software that transmits, receives, and stores email messages. An email message Is an electronic document transmitted over a computer network.
5-30 indicates that the message originated . a. from a Yahoo! account b. from a Facebook user
The computers and software that provide email services form an email sys
c. from a Gmail account
tem. At the heart of a typical email system Is an email server—a computer
d. from a POP mail server
that essentially acts as a central post office for a group of people. Email serv ers run special email server software, which provides an electronic mailbox for each person, sorts Incoming messages Into these mailboxes, and routes outgoing mail over the Internet to other email servers. Email messages have a standard format that consists of a message header and the message body. The message header contains the sender and recipient addresses, date, and subject line. When you view an email mes sage. this information is a simplified version of a more complex header that contains a huge amount of routing information, which traces the path of the message and reveals how It was treated by various servers. If you want to know exactly where a message originated or why a message was retumed
TRY IT!
Open one of your own email messages and take a look at
the header. Can you locate any Information indicating security checks on the sender?
to sender, check the header (Figure 5-30). FIGURE 5-30; EMAIL MESSAGE HEADERS
When using Gmail. click the More button and
then select Show original.
M Original Messaga
^
O
(nt
I
X
mailgeeglixoavmsyuAi/ruisZauksabafMari; ilj' ^
^ ThesaunjMeml W WildpcA & Google
m
a
Header data shows the
DeLivered-To: sarahinaesmich0gtBail.com Received: by 10.70.103.234 with SMTP id f2lOCSp3 Mon,
^
23 OCC 2017 07:47:57 -0700
{PDT)
origin of the message and its route.
am^r
Return-Path: Olexdelamaraggmail.com> caggraail.con Received-SPF: pass (google.com: doinain of alexdel designates 10.140.92.146 as permitted sender) cliencip=10.140.92.146 Authentication-Results: mr.google.com;
3p£=pass (google.com: domain of alexdelaniara0gmail.com designates 10.140.92.146 as permitted sender)
smtp.mail=alexdelamara6gmail.coim
d):im=pass header.i=0gmaiiycom X-Received: from mr.google by 10.140.92.146 w The email server checked to bl8nirl2430378qge .25.141442 Mon, 23 Oct 2017 0
make sure this sender's domain was not on a blocked list.
DKIM-Signature: v=l; a=rsaTsnajbb,' d=gmail.com; 3=20120113; h=mime-version: date: message-id: subject: from: to: con tersetype;
bh=uyOUOA3NoaR3qirnKIfiG+Hjg36inLoJcrarx2qQZP)tXQ=;
I
347
SOCIAL MEDIA
I How does Webmail work? Webmail is typically a free service
TRY III
accessed using a browser. In a classic Webmail configuration, incoming messages are stored in an Inbox on the Web. When you want to read or
send mail, use a browser to go to your email provider's Web site and log in. The controls for reading, composing, and managing messages are all
presented in the browser window. While reading and composing mail, you
An email address is frequently
used to verify your identity when subscribing to social media services. But that email
address may easily fall into
generally must remain online (Figure 5-31).
the hands of marketers. You
can use a "junk" email address FIGURE 5-31:WEBIVIAIL
or work with a service such A Web-based server han
Messages held in your Inbox on the
a temporary email address
the tools you need to
that lasts only long enough to
compose and read maii.
subscribe to a service, receive the confirmation email, and
Webmail server
click the verification link. Check it out!
Webmail server
can be displayed in
the Internet
your browser. Your computer runs a browser
while connected to the Internet.
> What are the pros and cons of Webmail? Webmail accounts are handy. They offer several advantages, but they also have a few disadvan tages that require consumer awareness. Affordable. Most Webmail is free. In addition to your primary account, you can establish additional accounts to use as throwaways for online activities that require registration, but that you don't intend to continue using. Access from any device. Webmail can be accessed from any device that has a browser. With smartphones and tablets, as well as laptops and desktops, simply open a browser and log in to your Webmail account. Access anywhere. Webmail is ideal for people who travel, because mes sages can be accessed from any computer connected to the Internet. Security risks. Your email messages are stored on Web servers that can be targets for hackers and are monitored by government agencies. Accessing email from a public computer is handy when traveling, but it can be a security risk. To reduce the risk, you should: • Reboot the computer before logging in to your email account. • Avoid entering sensitive information, such as your credit card number, in case your keystrokes are being monitored by malicious software lurking on the public computer. • Be sure to log off when your session is finished. • Log out and shut down the computer.
Advertising. Free Webmail is supported by advertising, so expect to see advertisements. Today's sophisticated ad servers can search the contents
of an incoming message looking for keywords and then use them to display targeted ads in your browser window.
as 10 Minute Mail to obtain
dles mail and provides
348
SECTION D, MODULE 5
I How does local email work? When you use local email, an Internet-based email server stores your incoming messages until you launch your email client and get your mail. Messages are then down loaded to a folder on a local storage device that serves as your email Inbox. This telecommunications technique is sometimes referred to as
TRY IT! Do you customarily use
Webmall or do you use a local email client?
store-and-forward.
Using your email client, you can read your mall at your leisure. You can also compose new mail and reply to messages. This outgoing mail can be tem porarily stored In an Outbox or it can be sent immediately. The protocols POPS (Post Office Protocol version 3)and 1IVIAP (Internet Message Access Protocol) can be used to manage your incoming mail. P0P3 deletes messages from the server after they are downloaded, whereas IMAP leaves messages on the server until you specifically delete them. SMTP (Simple Mall Transfer Protocol) handles outgoing mail. Keep these protocols In mind when setting up local email, because the server you specify for outgoing mall might be different from the server for Incoming mail (Figure 5-32). FIGURE 5-32; LOCAL EMAIL
From the To the Internet
P0P3 server
Internet
SMTP server
Incoming mail
Outeoing mail
Outbox
Inbox
Your computer
I What are the advantages of local email? Local email has the fol lowing advantages: Offline access. Because local email stores your Inbox and Outbox on your computer, you can compose and read mail offline. You are required to go online only to transfer outgoing mail from your Outbox to the email server, and to receive incoming messages. This feature is useful if you have
QUICKCHECK Which server handles outgoing mail? a. POP
a dial-up connection or sporadic Internet access. b, IMAP
Control. When you use P0P3 to collect your mail, your messages are transferred to your computer's hard disk, where you can control who has access to them. With this control, however, comes the responsibility for maintaining backups of your important email messages.
c. SMTP
d, LOCAL
349
SOCIAL MEDIA
► How do I set up local email? To set up local email, the first step is selecting a local email client. Macs include an email client called Mail. Microsoft Outlook is one of the most popular email clients for Windows. After installing an email client, you can configure it for the email service you're using. Your email provider can supply the information needed for this task. That information can include the following:
QUICKCHECK
• Your email user ID, which is the first part of your email address (e.g., in AlexHamilton@gsu-edu, the user ID Is AlexHamilton)
What happens on the server
• Your email password, if required to access the email server
when mail is downloaded for the
• An address for the outgoing (SMTP) server, such as mail.viserver.net or smtp.charter.com
account in Figure 5-33? a. The messages In Sarah's
• An address for the incoming (POPS or IMAP) server, such as mail.gsu.edu or pop.media.net
Inbox are deleted.
b. Sarah's outgoing mail is
• Port numbers for incoming and outgoing servers, which are usually Port 110 (incoming) and Port 25 or 587 (outgoing)
blocked.
c. The messages are forwarded
• Whether the connection uses SSL security
to an online account.
Figure 5-33 displays basic information needed to set up a local email
d. The messages remain on the
account.
server.
FIGURE 5-33: HOW TO SET UP LOCAL MAIL
Email Address:, sarahmae®medla.net User Name; SarahMae Password;
Account Type; . Incoming Mail Server mail.media.net
Outgoing Mall Server, smtp.media.net
The incoming server might have pop or mail as part of its name.
The outgoing server might have smtp as part of its name.
Cancel
I What about email apps for mobile devices? Webmail and local email services, such as Gmail, Apple Mail, Windows Mall, and Microsoft Outlook, are available as mobile apps. Downloading an email app to a mobile device places the necessary client software on your smartphone or Cablet.
When an email app opens, it collects the most recent messages from your Inbox on the email server. These messages are temporarily copied to your
device so that you can read them. The original copy of the message is retained on the email server.
When you delete messages and mark them as read while using a mobile app, IMAP protocols generally perform the same actions on the email server. Deleting a message using a mobile app deletes the message from the server. Some email apps provide menu options for customizing this syn chronization. Be sure to understand the synchronization settings for your mobile app, so you don't mistakenly delete messages you might later want to access.
350
SECTION D, MODULE 5
I Can I use both local email and Webmail? Yes. You can mix and
match Webmail and local mail in various ways. Use local email software to access messages sent to your Webmail
account. This approach is useful If you want to compose mail offline or if you prefer the Interface of a local email client such as Outlook compared to the Interface offered by Webmail services, such as Gmall. Using Gmall as an example, once you've created a Gmall account, you can access Settings to enable POP mall and then forward your mail to your local client (Figure 5-34). FIGURE 5-34: HOW TO FORWARD MAIL FROM GMAIL TO A LOCAL CLIENT
Settings
I Ctnaral Labab InboR Accdvnta and Import Filtaro Fomrtflngand POP/IHAP Chat WebCllpa Liba Forwvdlnfl;
I
t loiwvoing tMftti I
LMmtnort
Tip: You can atao lofward onty seme of your man by VBSttnp s Enable POP and then POPOewnlMtf: Uarnngrv
1.8(ia«a: POP la anablad (oral mad thai haa arrked aferca 1
^ I EnaUt POP br all mall{avon ma3 ihafa already been do«
0£ruM POP tor mal that arrtvaa ftom new on •«
configure your local email client to get mail from Gmall.
1 iDlaabloPOP
2* Whan maasagaa am aceaasad with POP | dewa Omaif» 2.CenflQiaa your email ebant(e o- OuUook, EuOora. Natacaoe Ma
if«wn
ihe>ev. Oi«a eit onrtdeA e WTp fi'ti* Iri mm'
H
SyMm
Tm «ra Mw
li
Syitw
vtduwm $are»
4
to ah
>1^.
a
TIP.SUP_>a«tl R
a
S««h
Iw tfeenx Ch« te we >ew»
yw
Print
an Oeiteei. A PeMaa Cfc* bwt w# be lOOi i«
cwmcM I* m apaaC T1i*e you te oMi Odi 041
V)(9:ne l» fk^rom irti« Qwf^ Z hope yewwi tonged wdlhiefc>wfaniWe^ Ny wwB)»ird lee an
QUICKCHECK
kAvrttfr I Ndp
WM rra«id teu irxmnetd fee •
«Me< on • buPpeL*
e# yn aw w Uei (■ i** wl giB lha ay** to
Chat participants enter messages here.
ibou* IMP *