Tuesday, 30 April 2013

unit 14 d2


D2 unit 14

My protocol i used was Bluetooth there are many positive and negative points to do with Bluetooth.

  • The positive points are
  •  It quick and easy
  • you can be at other ends of a room and it will still send
  • the picture is normally clear and not fuzzy
  • however the negative points are
  • it can sometimes take ages depending on the memory span on your phone
  • the picture may come through to big or to small and in result on this being fuzzy
  • it wont send if your too far away in distance
  • it can take ages for you to find the pair you want
  • on some phones you need a code to pair with someone else ( which takes time)
  • its free

Other than Bluetooth though you can use picture message which is just sending the message in a text which is not so good though because the picture normally comes out rubbish and it costs which will take credit off you and will go over if your on contract

unit 14- d1


d1 unit 14

How do Protocols and devices save data ? The way to keep your devices safe is very simple you just need to follow very simple steps and be careful what you do, for example you should change your password regularly so if a case that you do get hacked or someone discovers your password, you will still be safe and they can not do as much damage as they would have done if they knew it permanently. Also be wary if you give out your vital information that no one is around that could use against you or you do not trust.(i would recommend not telling anyone at all.) Be careful when you access your email or whatever you need to keep safe make sure you log out because some websites will leave you logged in for the future but someone else could access it. Most Wi-Fi hubs are encrypted so that you will not be hacked and your information will not get stolen or seen.(Encrypting is a way on concealing information to keep you safe. 3G is a collection generation cellular data technologies.In order to be labeled "3G," a cellular data transfer standard must meet a set of specifications defined by the International Telecommunications Union, known as IMT-2000. For example, all 3G standards must provide a peak data transfer rate of at least 2 Mbps. Most 3G standards, however, provide much faster transfer rates of up to 14.4 Mbps. Gprs is General Packet Radio Services (GPRS) is a packet-based wireless communication service that promises data rates from 56 up to 114 Kbps and continuous connection to the Internet for mobile phone and computer users. The higher data rates allow users to take part in video conferences and interact with multimedia Web sites and similar applications using mobile handheld devices as well as notebook computers.

unit 1 m2

The risks and safety issues of being on blogspotter are that key loggers that can steal passwords and also PINs also they can be a load of bulling e.g. Cyber bulling and racist bulling. Also they is a risk of Virus’s and malware this can cause very serious effects to your computer.  Personal details and Pin numbers can be placed on this site and some stranger can add you and you’ll properly end up adding them and then they can check out all your personal information and your pin number this can also cause a lot of harm you can be putting yourself in a great lot of danger this can be very risky so be careful on what you put Blogspotter as it can be dangerous even though it seems very unlikely. Data loss and Data theft can also happen. People find it a lot easier to hack your account or copy information which not only you think it is your work but someone else could take it and claim it is theirs as for Data loss and Data theft this can put you also in a great lots of danger it can  cause to very serious conditions. Also not all the security is a safe as you think it is and company’s information could be on their and it takes seconds for someone to make a little chat to you Secretary or your boss and then it becomes that you will get in a load of trouble and most certain that you would get put into a thing called job loss.

Tuesday, 23 April 2013

unit 14 p7 and d2

When someone askes you for someone elses number her are the easy and simple steps or doing it : 1. you go on to the contact you want eg: adam witkowski the you should see the number below once you have clicked onto the the contact the number should highlight the click it and it should give you options like forward or copy if you click forward it will take you too your contacts then if you click on you contact you want to send it to them. And that is one of the best ways to do this or you could do this : you go on to the contact you want eg: adam witkowski the you should see the number below once you have clicked onto the the contact the number should highlight the click it and it should give you options like forward or copy if you click copy then you go onto the message you would like to send it to and then in the text click paste and send. The way to do it is the way shown above as it should be in your allowance and it is automatically sent by sms or you could possible bluetooth it over but you would of have to been sat next to the person you are going to send it to, also you could of done it by email but it would of made it harder for the person that wants the number and it was also harder for the person who is wanting the number.

unit 14 p6

Health and social problems

The biggest risk at the moment is health and social due to miss using the muscles and we could possible get carpel tunnel syndrome this is where the muscles are prominently hurt another risks that people can bully you online so this can hit you later in life.


Data loss 

We all know that feeling when we delete something by mistake, it is easily done on your mobile devices and you laptops. You can easily have your phone wiped by mistake, Studies have constantly shown hardware failure and human error that is just 2 of the most common causes of data loss. So be careful and check your phone or devices for viruses


The Law and Mobile devices
Theft- is similar to data loss but isn't your fault this is caused by hackers. To prevent this you can download an anti-hacking program from and official website to run scans so that hackers don't hack into your computer ,They is loads of websites Google's anti-hacking software is just one of the links. This is illegal so don't panic and get protected for hackers today!


War driving

This is where people drive around in their cars and look for open networks, so therefore they can do illegal things. The way to prevent this is to ring up your internet provider and and ask them to secure your network by putting up a password, but not an easy password a complicated password


Piggybacking
Piggybacking on Internet access is the practice of establishing a wireless Internet connection by using another subscriber's wireless Internet access service without the subscriber's explicit permission or knowledge.
i.e
They can obtain internet service by reception from someone else's computer. 
Just to clarify, when a person sets up a wireless router, they have the option to leave the signal open or set it up securely and require a password. Evidently some people aren't all that concerned with security or they don't know how to set it up correctly, and leave their connection open where others can then log on and use their signal.

unit 14 p5

With the iphone you have navigation, 3g internet and access to apps and you can track them so you can track your drivers.

You then will need to go to an app developer ask them to develop an app on which you can go on and type your name and your own profile comes up were you can send information to your boss like you have just delivered 8000 phones so then the boss can know how much of what is left, and because its your own profile your boss can send you information like go to Morrison’s, saving time and money

Tuesday, 16 April 2013

unit 14 p3

Bluetooth is used to send files such as songs,pictures etc it is a wireless technology standard for exchanging data over short distances .A master Bluetooth device can communicate with a maximum of seven devices Bluetooth is a standard wire-replacement communications protocol primarily designed for low power consumption, with a short range based on low-cost transceiver microchips in each device. When any other device tries to establish a connection to the user's gadget, the user has to decide to allow it. Service-level security and device-level security work together to protect Bluetooth devices from unauthorized data transmission. Security methods include authorization and identification procedures that limit the use of Bluetooth services to the registered user and require that users make a  conscious decision to open a file or accept a data transfer. As long as these measures are enabled on the user's phone or other device, unauthorized access is unlikely.

 Infrared Data Association ( is an industry driven interest group that was founded in 1993 by around 50 companies point infrared can be used at least a meter apart it has been implemented in portable devices such as mobile phones, laptops, cameras, printers, medical devices and many more. Main characteristics of this kind of optical wireless communication is physically secure data transfer. The frame size depends on the data rate mostly and varies between 64 Byte and 64 k Byte  Additionally bigger blocks of data can be transferred by sending multiple frames consecutively. 

GPRS Tunneling Protocol  is a group of IP-based communications protocols used to carry general packet radio service (GPRS) within networks it can be decomposed into separate protocols.

WI-Fi is a very common wireless technology . It is used to connect machines such as mobiles headsets ipads computers etc.  WI-Fi is like a wireless version of Internet. Wi-Fi is technically referred to as the 802.11 protocol. Over time, Wi-Fi has improved, giving rise to different variations of the protocol:802.11a This version operates at 54 Mbps.. The problem with it is distance; beyond 100 feet, you are out of the network.802.11b This version operates at 11 Mbps, but the distance of transmission is 300 feet, which is a considerable improvement over its predecessor. This version is used for public hotspots and small campus environments.802. 11g This version is relatively new and is considered as a high-speed replacement for 802.11b. It works at 54 Mbps, most wifi spots have passwords so people cant just connect to it


Microsoft Media Server (MMS), sends pictures to other devices a Microsoft proprietary network-streaming protocol, serves to transfer unicast data in Windows Media Services  If using Windows Media Player 11 and an RTSP attempt fails, or if using a previous version of Windows Media Player and MMS fails, a modified version of a HTTP over TCP connection will be attempted. This modified version is referred to by some third parties as MMSH, and by Microsoft as MS-WMSP The URI scheme "mms://" has also been proposed to be used for the unrelated Multimedia Messaging Service (MMS) protocol.For several years developers of the SDP Multimedia download-tool reverse-engineered the MMS protocol and published unofficial documentation for it. However, Microsoft finally released the protocol specification in February 2008 mms send straight to the person so nobody else will see it unless they show them .


 Short Message Service (SMS),is a delivery of text and numeric information for paging, messaging, and voice mails.  This standard includes Service Option 6 and Service Option 14 which support delivery of short messages  Mobile Station-Base Station Compatibility Standard for Dual- Mode Spread Spectrum Systems,  Support for 14.4 kbps Data Rate and PCS Interaction for Spread Spectrum Cellular Systems Personal Station- Base Station Compatibility Requirements for 1.8 to 2.0 GHz Code Division Multiple Access  Personal Communications Systems. A mobile station can obtain Short Message Service operating in either the analog or the spread spectrum mode when it conforms to this standard and any of the following standards: This standard does not address the quality or reliability of Short . all WiFi's  have incripted codes so it is impossible to hack into.