Tuesday, 8 November 2011
Smell the WEB
2D? 3D? We're used to seeing and hearing content, now internet comes with the smell. This is a good news, there's a new "WEB CONNETED SMELLY ROBOT" can be hooked up to your computer and it will release scents as alerts for internet alerts.
How it work?
Olly- The web connected smelly robot! It takes services on the internet and delivers their pings as well.
In the meantime, we can all just marvel at an incredibly neat idea brought to life.
Source:
http://thenextweb.com/gadgets/2011/11/07/olly-a-device-that-lets-you-smell-the-internet/
http://www.brandflakesforbreakfast.com/2011/11/i-love-smell-of-twitter-in-morning.html
http://www.engadget.com/2011/10/29/olly-the-web-connected-robot-that-converts-pings-to-odors/
Tuesday, 1 November 2011
Report for contest.
Unfortunately, there is only 1 people participant in the contest. We have no other choice, he is the winner of this contest :Thanaraj

The 16GB Thumb-drive is belong to him.

The 16GB Thumb-drive is belong to him.
Thursday, 20 October 2011
Future Tech: Visible Light Communications
Visible Light Communication using light emitting diodes (LEDs), for the dual role of illumination and data transmission. Using visible light, this is free, and lower than the other frequencies crowded, wireless service pig supports the existing lighting fixtures. With this leading edge technology, including video and audio, Internet traffic and other data, you can use LED lights, high-speed transmission.
Prof Harald Haas leads the EPSRC-funded D-LIGHT project at the School of Electronics and Engineering at the University of Edinburgh.
VLC technology has the potential to provide more than hundreds of megabits per second data transfer rate. Light radiation neither constitutes nor suffers from electromagnetic interference (EMI) making VLC a very attractive technology in places/environments where electromagnetic interference (EMI) is an issue, such as in hospitals and in aircraft.
Two-year D-light project is halfway through its funding. The main commercial goal is to form the University of Edinburgh spinout company hopes in 2012.
VLC Applications:
A wide range of applications would benefit from using novel visible light communications:
- WiFi Spectrum Relief - Providing additional bandwidth in environments where licensed and/or unlicensed communication bands are congested
- Smart Home Network – Enabling smart domestic/industrial lighting; home wireless communication including media streaming and internet access
- Commercial Aviation – Enabling wireless data communications such as in-flight entertainment and personal communications
- Hazardous Environments- Enabling data communications in environments where RF is potentially dangerous, such as oil & gas, petrochemicals and mining
- Hospital and Healthcare – Enabling mobility and data communications in hospitals
- Defence and Military Applications – Enabling high data rate wireless communications within military vehicles and aircraft
- Corporate and Organisational Security – Enabling the use of wireless networks in applications where (WiFi) presents a security risk
- Underwater Communications – Enabling communications between divers and/or remote operated vehicles
- Location-Based Services – Enabling navigation and tracking inside buildings.
The Future Internet
Just as the internet revolutionized how the world accessed information and communicated through the 1990's, the ongoing development in speed, bandwidth, and functionality will continue to cause fundamental changes to how our world operates for decades to come. Some of the major trends shaping the future of the internet are summarized below, along with exrapolated predictions:
Globalism:
The future of the internet global distribution of information and knowledge at lower and lower cost will continue to lift the world community for generations to come. people will have access to any information they wish, get smarter environment. A better informed humanity will make better macro-level decisions, and an increasingly integrated world will drive international relations towards a global focus.
Communities:
The future of the internet communication revolution is ongoing, now uniting communities as it recently united networks. not everything about the internet is global; an interconnected world is also locally interconnected. The Internet will increasingly be used for communications within communities tools such as mailing lists, newsgroups, and websites, and towns and cities will become more organized and empowered at the neighborhood level.
Bandwidth:
The future of the internet growth in bandwidth availability shows little sign of flattening. Large increase of bandwidth in the 10 Mbps range and u will continue to be deployed to home users through cable, phone, and wireless networks. cable modems and telephone-based DSL modems will continue to spread high speed Internet throughout populated areas. High resolution audio, video, and virtual reality will be increasingly available online and on demand, and the cost of all kinds of internet connection will continue to drop.
Wireless:
The future of internet wireless communications is the end-game. Wireless frequencies has two great advantages: (a) There are no infrastructure start-up or maintenance costs other than the base stations, and (b) it frees users to become mobile, talking internet use from one dimension to three. Wireless internet networks will offer increasingly faster services at vastly lower costs over wider distance, eventually pushing out physical transmission systems.
The internet open TCP/IP design was originally inspired by use of radio communications networks in the 1970's, The wireless technologies experimented with in the 1990's were continually improved. By the early 2000's, several technologies provided reliable, secure, high bandwidth networking that worked in crowded city centers and on the move, providing nearly the same mobility for internet communications as for the cellular phone.
Interplanetary Internet
Now-a-days, we can talk to anyone in any corner of this world almost instantly because of Internet. What did you think about we could communicate with someone beyond the Earth?
There're a few reason for low data transfer speed :
Distance -- On Earth, we are only a fraction of a light second apart, making Earth communication nearly instantaneous over the Internet. As you move farther out into space, however, there is a delay of minutes or hours because light has to travel millions of miles, instead of thousands of miles, between transmitter and receiver.
Line of sight obstruction -- Anything that blocks the space between the signal transmitter and receiver can interrupt communication.
Weight -- High-powered antennas that would improve communication with deep space probes are often too heavy to send on a space mission, because the payload must be light and efficiently used.
SCPS is a protocol suite designed allow communication over challenging environments. Originally developed jointly by NASA and DoD’s USSPACECOM to meet their various needs and requirements. These protocols have been found to be applicable in meeting the needs of the satellite and wireless communities.
(Source :www.scpr.org)
With this kind of network in place, the communications problems resulting from having very little communications infrastructure in place at Mars that plagued the 'rescue' efforts after the Mars Polar Lander disappeared would be greatly simplified.
Referencing:
HowStuffWorks "How Interplanetary Internet Will Work". 2011. HowStuffWorks "How Interplanetary Internet Will Work". [ONLINE] Available at:http://computer.howstuffworks.com/interplanetary-internet.htm. [Accessed 19 October 2011].
There're a few reason for low data transfer speed :
Distance -- On Earth, we are only a fraction of a light second apart, making Earth communication nearly instantaneous over the Internet. As you move farther out into space, however, there is a delay of minutes or hours because light has to travel millions of miles, instead of thousands of miles, between transmitter and receiver.
Line of sight obstruction -- Anything that blocks the space between the signal transmitter and receiver can interrupt communication.
Weight -- High-powered antennas that would improve communication with deep space probes are often too heavy to send on a space mission, because the payload must be light and efficiently used.
SCPS is a protocol suite designed allow communication over challenging environments. Originally developed jointly by NASA and DoD’s USSPACECOM to meet their various needs and requirements. These protocols have been found to be applicable in meeting the needs of the satellite and wireless communities.
(Source :www.scpr.org)
With this kind of network in place, the communications problems resulting from having very little communications infrastructure in place at Mars that plagued the 'rescue' efforts after the Mars Polar Lander disappeared would be greatly simplified.
Referencing:
HowStuffWorks "How Interplanetary Internet Will Work". 2011. HowStuffWorks "How Interplanetary Internet Will Work". [ONLINE] Available at:http://computer.howstuffworks.com/interplanetary-internet.htm. [Accessed 19 October 2011].
Thursday, 13 October 2011
Contest Promote Video.
This video is to tell you we are organizing a CONTEST, and we hope to get more and more participants. For the contest. Good Luck Guys. =)
Sunday, 9 October 2011
Web 4.0 Era Is Upon Us.
A future where "technology and human become one"--the Web 4.0 era--is on the way, says TrendOne CEO.
According to Nils Müller, CEO of TrendOne, a German microtrend analysis firm. Web 2.0 is seen in the audience-generated content, such as the rise of blogs and podcasts. The 3.0 period is being represents a deeper level of engagement, where users can jumps into media site such as virtual worlds. But evidence of the '4.0' era -- an "always-on" world where humans can "self-upgrade" through technology extensions -- is already nigh and being driven by the youngest generation. While to adults virtual worlds such as Second Life were novelties, today's children are growing up virtually. As evidence, a virtual world launched last year.
Thursday, 6 October 2011
Rules and Regulation for Logo Design Contest
Rules and Regualation for Logo Design Contest
1.Do not use less than three colour.
2.The logo must be recognizable.
3.Create a unique shape or layout for the logo.
4.Each participant only ONE product.
5.Do not combine elements from popular logos and claim it as original work.
6.Make sure that the logo is recognizable when resized.
7.A photo does not make a logo.
8.The logo should look solid, with no trailing elements.
9.Do not use more than two fonts.
10.Avoid bright, neon colors and dark, dull colors.
11.The logo must be easy to describe.
12.Related to Internet.
Visit our Facebookpage for more information:
https://www.facebook.com/pages/Future-of-Internet/159211297497311
Sent us the Logo before 20/10/2011 to our facebook page.
PRICE : 16GB Kingston Pendrive.
Wednesday, 5 October 2011
Third poll analysis
The tittle of the poll analysis in the previous week is " What Internet Connection Method are you using?" The pie chart created for the vote result.
11 voters involved in the poll. Most of the user use Digital Subscriber Line (DSL). There's 4 user use fixed wireless connection. There's only 2 voters choose Cable.
11 voters involved in the poll. Most of the user use Digital Subscriber Line (DSL). There's 4 user use fixed wireless connection. There's only 2 voters choose Cable.

In conclusion, most of the user use Digital Subscriber Line(DSL)
Tuesday, 27 September 2011
PodCast-Welsh
大家好,我是玟谦。欢迎来到我们的部落格。今天
我们要讨论的话题是“云计算”所有人都在谈论“云”,但它到底是什么意思呢?
(Hello, everyone, I'm MunChean. Welcome to our blog. Today we have to discuss the topic is "cloud computing" all the talk about "cloud," but it in the end what does that mean?)
云计算(cloud computing)是一种基于因特网的超级计算模式,在远程的数据中心里,成千上万台电脑和服务器连接成一片电脑云。用户通过电脑、笔记本、手机等方式接入数据中心,按自己的需求进行运算。
(Cloud computing [cloud computing] is an Internet-based super-computing model, in remote data centers, tens of thousands of computers connected to a computer and the server cloud. User through the computer, laptop, mobile phone access to the data center, etc., according to their computing needs.)
云计算的基本原理就是用户端的简单化,仅负责数据输入和读取,而将庞杂的处理工作交给“云”,也就是联网的计算机群和数据中心来处理。
(The basic principle of cloud computing is the simplicity of the client is only responsible for data input and read, but the vast and complex processing to the "cloud", that is, group of networked computers and data centers to deal with.)
云计算本质上是一种更加灵活、高效、低成本、节能的信息运作的全新方式。借助基于互联网的一系列创新技术,存储、计算、软件、管理、网络、信息等各类资源以服务的形式实现虚拟化、即时定制、面向领域、灵活的相互组合,直接满足用户的各种现实需求,真正实现IT服务的透明化。
(Cloud computing is essentially a more flexible, efficient, low-cost, energy-efficient operation of the new way of information. With a range of innovative Internet-based technology, storage, computing, software, management, network, information and other resources to service in the form of virtualization, real-time custom, domain-oriented, flexible combination with each other directly meet user actual needs, truly transparent IT services.)
Thursday, 22 September 2011
The Next Internet
A leading advocate of radical change in the Internet says research solutions will across the dual concepts of replace and revamp.
Technology Review: The problems with the Internet are fairly well understood. What are the basic views of what needs to be done at a technical level?
- There is universal agreement that creating the "Future Internet," which meets the demands of the 21st century, is both a national priority and ripe with research challenges and opportunities. But there are two general schools of thought as to how to pursue this goal said by Larry Peterson.
One view is that we may be the Internet's social utility of the inflection point erosion trust, reduce innovation, and slowing rate of update. This view focuses on assumptions built into today's 30-year-old architecture that limit its ability to cope with emerging threats and opportunities, and argues that it is time for a "clean slate" re-conceptualization of the Internet architecture.
The other view takes today's Internet as a given, and argues that future innovation will come in the form of new services and applications running on top of the Internet. Over time, these innovations will likely have a transformational effect on the Internet, but [this argument goes] it is simply not practical to think in terms of replacing today’s entire Internet infrastructure.
The Future Network in 5 Step

The Future of Networks in 5 Steps
There will be one network:
Wireless and Wireline networks will have converged to form a single, high performance, cost-optimized aggregation and core IP network, with either wireless or wired edges. In fact, even the distinction between the wireless and wired edge connectivity will be blurred as devices embed Ethernet ports, Wifi and LTE modems. So you will no longer even think about connectivity; the device and network will connect you to whatever network best suits your application and mobility needs at each instant in time. In many ways, lightRadio™ is a prime example of this trend: the ‘wired’ IP, optical and access networks are used to connect small wireless radios. Furthermore, increasingly the network will connect the radios to a central pool of control and processing elements situated back in the operator switching and data centers, allowing optimal sharing and re-use between wireless cells and access points, thereby achieving up to a 50% Total Cost of Ownership (TCO) savings over today’s architectures.
The network will be intelligent:
As Moore’s law continues its seemingly inexorable progression, the cost of processing and the associated memory and storage will have decreased to the point where the economics of embedding application-level functionality in the network makes sense. This will allow much more efficient use of network resources, and a concomitant improvement in the user Quality of Experience (QoE)
The network will be open and sustainable:
The traditional service provider applications (voice, data and TV/video) are opening up to allow third-party and ‘web’ application developers to leverage these capabilities and ‘mash them up’ with other web services to create previously unimaginable new applications.We are already seeing this trend with the emergence of applications such as gaming and on-line video delivery leveraging the quality of service (QoS) parameters in the network to deliver the desired user experience.
The network will be a platform:
Think of a PC today: there is a processor, some memory and storage (a hard drive), and Ethernet ports, all connected by an internal communications network (e.g. the PCI and memory busses). if we consider that with the emergence of Cloud computing, processing and storage are separated into pools of resources connected together by Ethernet ports on local area networks in data centers, which in turn are connected together over the wider telecommunications network, the parallels are clear and we can think of the applications increasingly running in the network
The network will be green:
If we look to the more than 30x growth in capacity that is predicted to occur as smart devices and tablets proliferate over the coming years, and person-to-person communications are usurped (in volume) by Machine-to-Machine communications, we must optimize the energy cost per bit in order that the environmental impact of building these networks is minimized and the operational cost of running them does not become prohibitive. we are seeing a real focus on the energy costs of networks.Importantly, this is a problem that transcends a single vendor or a single operator and is the reason that we founded the GreenTouch™ consortium to tackle this massive problem via an open collaboration across the telecommunications industry.
Second poll result analysis
We did a poll voting with title "What's the biggest threat to the future of the Internet?" . To show the result clearly, we created a Pie chart related to the topic.
There is 24 user take part in this Poll Question.From the Pie Chart, it is clearly showing the view of percentages. According to the chart, most of the user choose Limited access to content and services(16 user). The percentage of Lack privacy and Increase in Internet Security threats are equal(4user for each other).
What did you think about the statistic? Is that "Limited access to content and services" is your answer? No? Comment about this..
Thursday, 15 September 2011
Poll Result Analysis
We had created a poll widget for our 1 week's lab task. Our qustion of this poll is 'What do you expect in the future of the development of the internet?
- Faster surfing speed - 4 vote <66.67%>
- More reliable/Hacker safe - 1 vote <16.67%>
- Storage space - 1 vote <16.67%>
- Mobality - 0 vote <0%>
There are total 6 voters participated for our poll voting.
There are the result of the poll:


Thursday, 8 September 2011
The Future of Security

Information Security & Standards Compliance:
Many organizations face the challenge of information security management. More and more, companies are questioning how to protect their data and the consequences of a security breach is what.Professional consultants in the field of information security team, we have assisted in line with standards such as ISO 27001 standard number of customers.
Such As:
- ISO27001 Lead Auditor
- Certified Ethical Hacker (EC Council)
- Computer Hacking Forensic Investigator (EC Council)
Network layer security
TCP/IP can be made secure with the help of cryptographic methods and protocols that have been developed for securing communications on the Internet. These protocols include SSL and TLS for web traffic, PGP for email, and IPsec for the network layer security.
IPsec Protocol
This protocol is designed to protect communication in a secure manner using TCP/IP. It is a set of security extensions developed by IETF, and it provides security and authentication at the IP layer by using cryptography. To protect the content, the data is transformed using encryption techniques. There are two main types of transformation that form the basis of IPsec: the Authentication Header (AH) and Encapsulating Security Payload (ESP). These two protocols provide data integrity, data origin authentication, and anti-replay service. These protocols can be used alone or in combination to provide the desired set of security services for the Internet Protocol (IP) layer.
The basic components of the IPsec security architecture are described in terms of the following functionalities:
- Security protocols for AH and ESP
- Security association for policy management and traffic processing
- Manual and automatic key management for the internet key exchange (IKE)
- Algorithms for authentication and encryption
The set of security services provided at the IP layer includes access control, data origin integrity, protection against replays, and confidentiality. The algorithm allows these sets to work independently without affecting other parts of the implementation. The IPsec implementation is operated in a host or security gateway environment giving protection to IP traffic.
Electronic mail security (E-mail)
Email messages are composed, delivered, and stored in a multiple step process, which starts with the message's composition. When the user finishes composing the message and sends it, the message is transformed into a standard format: an RFC 2822 formatted message. Afterwards, the message can be transmitted. Using a network connection, the mail client, referred to as a mail user agent (MUA), connects to a mail transfer agent (MTA) operating on the mail server. The mail client then provides the sender’s identity to the server. Next, using the mail server commands, the client sends the recipient list to the mail server. The client then supplies the message. Once the mail server receives and processes the message, several events occur: recipient server identification, connection establishment, and message transmission. Using Domain Name System (DNS) services, the sender’s mail server determines the mail server(s) for the recipient(s). Then, the server opens up a connection(s) to the recipient mail server(s) and sends the message employing a process similar to that used by the originating client, delivering the message to the recipient(s).
Pretty Good Privacy (PGP)
PGP provides confidentiality by encrypting messages to be transmitted or data files to be stored using an encryption algorithm such 3DES or CAST-128. Email messages can be protected by using cryptography in various ways, such as the following:
- Signing an email message to ensure its integrity and confirm the identity of its sender.
- Encrypting the body of an email message to ensure its confidentiality.
- Encrypting the communications between mail servers to protect the confidentiality of both the message body and message header.
The first two methods, message signing and message body encryption, are often used together; however, encrypting the transmissions between mail servers is typically used only when two organizations want to protect emails regularly sent between each other. For example, the organizations could establish a virtual private network (VPN) to encrypt the communications between their mail servers over the Internet.[4] Unlike methods that can only encrypt a message body, a VPN can encrypt entire messages, including email header information such as senders, recipients, and subjects. In some cases, organizations may need to protect header information. However, a VPN solution alone cannot provide a message signing mechanism, nor can it provide protection for email messages along the entire route from sender to recipient.
Multipurpose Internet Mail Extensions (MIME)
MIME transforms non-ASCII data at the sender's site to Network Virtual Terminal (NVT) ASCII data and delivers it to client's Simple Mail Transfer Protocol (SMTP) to be sent through the Internet. The server SMTP at the receiver's side receives the NVT ASCII data and delivers it to MIME to be transformed back to the original non-ASCII data.
- Secure/Multipurpose Internet Mail Extensions (S/MIME)
S/MIME provides a consistent means to securely send and receive MIME data. S/MIME is not only limited to email but can be used with any transport mechanism that carries MIME data, such Hypertext Transfer Protocol (HTTP).
Firewalls
A firewall controls access between networks. It generally consists of gateways and filters which vary from one firewall to another. Firewalls also screen network traffic and are able to block traffic that is dangerous. Firewalls act as the intermediate server between SMTP and HTTP connections.
Role of firewalls in Internet security
Firewalls impose restrictions on incoming and outgoing packets to and from private networks. All the traffic, whether incoming or outgoing, must pass through the firewall; only authorized traffic is allowed to pass through it. Firewalls create checkpoints between an internal private network and the public Internet, also known as choke points. Firewalls can create choke points based on IP source and TCP port number. They can also serve as the platform for IPsec. Using tunnel mode capability, firewall can be used to implement VPNs. Firewalls can also limit network exposure by hiding the internal network system and information from the public Internet.
Types of firewalls
Packet filters
Packet filters are one of several different types of firewalls that process network traffic on a packet-by-packet basis. Their main job is to filter traffic from a remote IP host, so a router is needed to connect the internal network to the Internet. The router is known as a screening router, which screens packets leaving and entering the network.
Circuit-level gateways
The circuit-level gateway is a proxy server that statically defines what traffic will be allowed. Circuit proxies always forward packets containing a given port number, provided the port number is permitted by the rules set. This gateway operates at the network level of an OSI model. The main advantage of a proxy server is its ability to provideNetwork Address Translation (NAT), which can hide the user's IP address from the Internet, effectively protecting all internal information from the Internet.
Application-level gateways
An application-level gateway is a proxy server operating at the TCP/IP application level. A packet is forwarded only if a connection is established using a known protocol. Application-level gateways are notable for analyzing entire messages rather than individual packets of data when the data are being sent or received.
Thesis statement
Information security will be much better than it is now. But then and now, everything will get inconceivably worse in 2010.In other words, today's sloppiness will become tomorrow's chaos.
The good news is that we may not get to this point. Most experts are optimistic about the future of the Internet and software security. They said that from now to 2010, the vulnerability will flatten or decline, and so will security breaches.
The bad news is that this confidence, which the industry smartening up the concept, this is hard to imagine the scope and deeply troubling consequences, there will be security incidents based on assumptions, the so-called digital Pearl business Hong Kong? As usual, will be unthinkable.
Subscribe to:
Posts (Atom)