Monday, June 2, 2008

Week 13: Reflection!

After 13 weeks of taking the course 'New Communication Technology', I am happy that I chose it. As I have worked with computers, the internet and various other communication technologies all my life, I felt right at home undertaking the studies of the course. Though I found the practical side of the course fairly basic, I really enjoyed the theory and found many of the topics covered within the course very interesting. I found it interesting to learn about the history of the computer and the interenet as I use both these things everyday and never truly knew how they came about. I also enjoyed learning the different theories and concepts of how communication technologies have evolved over time. I found the concept behind each of the movies we watched very relevent to the course and enjoyed the different insights into each of these films.

Overall I believe that this course has a very well structured program. Though the practical side could become a bit more complex, I understand that the course is only an introductory course. I would recommend this course to any student moving into an arts education.

Thursday, May 29, 2008

Essay (Final Copy)!

Perhaps the most significant development in computing science since the web, Peer-to-Peer (P2P) networks have generated great interest world wide from general Internet users to networking professionals. P2P systems such as Kazaa and Guntella have ranked amongst the most popular software applications ever. According to several Internet providers, fifty percent of Internet traffic is due to P2P applications (Steinmetz, Wehlre, 2005). Many claim P2P networks to be the networking of the future. However, others argue that the use of these networks lead to illegal actions and they create more problems then they are worth. This essay will outline both the advantages and disadvantages of a P2P network. The essay will then conclude on the note that the advantages and potential P2P networks have out way the problems they create. Though before this essay takes sides, it will give a brief history and description of P2P networks.

A P2P network is a type of network in which each computer connected is equal and has the same capabilities and tasks. The term peer-to-peer refers to the concept of a network of equals and through the use of information and communication systems; two or more computers can pool resources and share with each other without needing any centralized coordination (Schoder, Fischbach, Schmitt, 2005). This contrasts to the server/client architecture as there are no server computers dedicated to serving others. P2P networks can be classified into five areas, which are communication and collaboration, distributed contribution, Internet service support, database systems and content distribution (Theotokis, Spinellis, 2004). The networks can be further classified by the degree of centralization. For example, P2P networks that are classified ‘pure’ have peers acting as equals and no central server managing the network. Many networkers argue that only networks where every peer has equal capabilities is P2P (Oram, 2001).

In the late 1960’s the Internet was originally created as a P2P network. Though the term P2P was not well established before the Internet was made available to the public, there were fixtures created that were based on the P2P concept. An example of this is Usenet. Usenet was created in 1979 and is a worldwide network of discussion groups. In some ways Usenet is considered the Grandfather of the P2P applications and software used today (Oram, 2001). Once the Internet was made available to the public, this allowed P2P networks to evolve. In 1999, Napster was created and so came the phenomenon of P2P file sharing. Napster was created as a hybrid system and though its file sharing was decentralized, the directory of those files was centralized. The network had a central server supplying the search queries and brokering user connections (Oram, 2001). Because of this, Napster was shutdown due to legal controversy. From then on, most P2P file sharing applications were created as ‘pure’ networks. In 2002 Bit Torrent was created and began another generation of P2P networks. It is clear to see from this brief timeline, that P2P networks have evolved over time and continue to become more efficient and effective.

P2P networks have easily emerged as one of the largest innovation rich areas in computer science and networking (Elsevier, 2007). This large amount of interest towards P2P networks is due to the advantages that occur through the use of the networks. The first and foremost advantage of a P2P network is that they are less expensive and easier to set up then client/server networks. The basis of P2P networks is that all clients provide the resources, which include computing power, storage and bandwidth. Therefore, as user numbers and demands on the network grow then so does its resources. The network also remains strong, healthy, flexible and adaptable by replicating data over numerous peers and in pure systems; a peer is allowed to locate data without a centralized server (Rosseholvel, 2008).

Because of these advantages, many areas within our society have begun to explore ways to adapt and use P2P networks. Academics have been creating P2P search engines to provide free and open search to academic knowledge. At the Pennsylvania State University, a P2P application has been developed called LionShare and its purpose is to share academic information between users at various academic establishments (Solyrich, 2006). In 2001, according to the Washington Post (Walker, 2001) the United States military began conducting research on P2P networks and planned to use the networks for a modern network warfare strategy against the war on terrorism. Hundreds of businesses have also invested into P2P networks, mainly in the area of file sharing networks. However, businesses have shown interest in distributing content, e-marketplace and groupware based on P2P networks. Within telecommunications, more and more emphasis is being placed on P2P networks. Many researchers are trying to apply the concept of P2P networks into cellular networks (Raivio, 2005). An example of this is the current ‘BlueTooth’ network.

However, in spite of the above advantages, P2P networks also receive large amounts of criticism and can create a number of problems. The basic problems of P2P networks are to do with the cooperation and contribution of the peers. Many peers damage a network by poisoning and polluting its contents. This occurs by providing files which contents do not fit its description and the insertion of files into the network that do not function properly. Peers known as ‘leechers’ are users that do not allow their own resources available to the network. This reduces the networks efficiency. Another huge problem for P2P networks is that they allow viruses to be spread at a rapid rate. In some countries there have even been cases of identity attacks where a user has been able to track down other users and steel their identity. Due to the rise of the P2P file-sharing phenomenon, there is an ongoing problem with copyright infringement. P2P file sharing applications allow any user to download large amounts of copyrighted video, audio and visuals. In 2002, the Recording Industry Association of America released figures that claimed Internet piracy, lead by P2P file sharing applications, was responsible for a 5% decrease in the dollar value of music worldwide in year 2001 (Ghosemmmajumder, 2002).

Though there are various problems that arise from the use of P2P networks, it is clear to see that in the end, the advantages and potential of P2P networks out-way the disadvantages. With the proper research and development, P2P networks will be able to be filtered and controlled effectively to rid the networks of any basic impurities. Companies concerned with copyright infringement need to adapt to the new age of computer science and begin to implement new ways to distribute their content. When our society begins to adapt we will then be able to see the true potential of P2P networks.

Reference List:

Books:
(1) Oram, Andrew, 2001, Peer-to-Peer: Harnessing the Power of Disruptive Technologies, O’Reilly and Associates, Sebastopol CA.
(2) Steinmetz, Ralf & Wehlre, Klaus, 2005, Peer-to-Peer Systems and Applications, Springer Publishing, Germany.

Jounral Articles:
(1) Schoder, Detlef & Fischbach, Kai & Schmitt, Christian, 2005, ‘Core Concepts in Peer-to-Peer Networking’, Idea Group Inc.
(2) Raivio, Yrjo, 2005, ‘Mobile Peer-to-Peer in Cellular Networks’, Helsinki University of Technology.
(3) Elsevier, 2007, ‘Foundations of Peer-to-Peer Computing’, Computer Communications, Vol. 31, pp. 187-189.
(4) Theotokis, Stephanos Androutsellis & Spinellis, Diomidis, 2004, ‘A Survey of Peer-to-Peer Content Distribution Technologies’, ACM Computer Surveys, Vol. 36, No. 4, pp. 335-371.
(5) Ghosemajumder, Shuman, 2002, ‘Advanaced Peer-Based Technology Business Models‘, MIT Sloan.

Internet Sites:
(1) Solyrich, 2006, Advantages of Peer-to-Peer Networks, P2P World http://www.solyrich.com/p2p-pros-cons.asp
(2) Walker, Leslie, 2001, Uncle Sam Wants Napster!, Washington Post http://www.washingtonpost.com/ac2/wp-dyn?pagename=article&node=washtech/techthursday/columns/dotcom&contentId=A59099-2001Nov7
(3) Rossenhovel, Carsten, 2008, Peer-to-Peer Filters: The Big Report, Internet Evolution http://www.internetevolution.com/document.asp?doc_id=148803&f_src=flfone

Monday, May 12, 2008

Essay Outline!

Topic: Peer-to-Peer networks; Arguments for and against.

Summary:
For my essay I have chosen the topic of Peer-to-Peer networks. I chose this topic because I am familiar with it and there is a lot of controversy on how people look at peer-to-peer networks and whether they are good or bad. Within the essay my argument will be that even though Peer-to-Peer networks create many problems, the advantages out way the disadvantages and the networks have a lot of potential in the future. When researching the topic I used the catalogue databases Griffith has access to and Google Scholar. I found Google Scholar much more effective then going through Griffith databases. Once I had some references I was able to begin to structure my essay.

Introduction-

  • Introduce the topic of Peer-to-Peer networks; give a brief explanation on what they are. Outline the structure of the essay.

Body-

  • History of Peer-to-Peer networks, explain how they work and how they have evolved over time. Give examples of major peer-to-peer networks.
  • Outline the advantages of Peer-to-Peer networks. Describe the different areas in society that use peer-to-peer networks such as Bioinformatics, military, education, business, TV and telecommunications.
  • Describe the problems of peer-to-peer networks; outline the disadvantages. This includes the spread of viruses, leeching, spamming, copyright infringement, illegal downloading and identity attacks. Use Napster as an example to describe the problem of illegal downloading and to outline legal controversy.

Conclusion-

  • Conclude on the note that even though there are many problems with Peer-to-Peer networks, they are very useful and have significant potential.

Resources:

  • Schoder, Detlef & Fischbach, Kai & Schmitt, Christian, 2005, Core Concepts in Peer-to-Peer Networking, Idea Group Inc, Germany.
  • Khan, Javid I & Wierzbicki, Adam, 2007, Foundations of Peer to Peer Computing, Elsevier B.V, pp. 187 – 189.
  • Engle, Marling & Khan, Javid I, 2006, Vulnerabilities of P2P Systems and a Critical Look at their Solutions, Internetworking and Media Communications Research Laboratories, Department of Computer Science, Kent State University.
  • Theotok, S, 2004, A Survey of Peer-to-Peer Content Distribution Technologies, Athens University of Economics and Business, Athens.
  • Rossenhovel, Carsten 2008, Peer to Peer Filters: Ready for the Internet Prime Time? Internet Evolution, http://www.internetevolution.com/document.asp?doc_id=148803&f_src=flfon

Monday, April 28, 2008

Week 8: Part 2!

Being both a 3d Envionment interaction user and a IM user it is clear to see some of the differences between the two. Though when interacting in a 3d environment your character does not look anything like you, I believe it becomes more personal and users get more involved in 3d envionments. It allows people to express themselves more then just having a chat name and picture. By being able to see a 3d character of the person your talking to it gives a more real vibe then IM programs. Social envionments in a 3d world are alot more intense then that of a simple IM program and I believe more emotion becomes involved. Because of this I also believe that in time 3d worlds or interaction will become more and more popular and simple IM programs will fade out.

Week 8: Part 1!

For the first part of the tutorial task this week we were given exercisesthat work with Microsoft Word and Excel.

When using Microsoft word I had no problems at all until the mail merge section of the exercises. After trying to figure it out I ended up using the Word help function which showed me how to set up a mail merge source, giving step by step instructions. However apart from the mail merge feature I found the exercises very simple as I have had plenty of experience with the Word software. I believe the 2003 version of Word is very useful to use and it is why it became so widely used and popular around the world.

When using the Microsoft Excel program I did not struggle with any of the exercises as I have used Excel in those ways before. A fair amount of my previous education such as accounting has delt with the use of excel and provided me with all i needed to complete the graph and formula exercises. Though I was not too familar with creating my own toolbar and applying the macros, I had done this before and picked it up easily enough. Though Excel might seem confusing and off-putting at first, it is very useful to use and again is why it is so widely used around the world.

Monday, April 14, 2008

Week 6!

The two articles on wikipedia that I chose to evaluate are 'Stargate SG1' and 'Lupe Fiasco'.

'Stargate SG1' is a science fiction tv series that has been running for over 10 years and is a lead on from the original motion picture 'Stargate'. The article located on wikipedia is very long and is somewhat more detailed then most wikipedia entires. However this is neccasary as Stargate SG1 has 10 years of history and has a complex plotline. I believe that this article does a very effective job in being accurate and providing the basic facts sorrounding a show. The references that the information was obtained from are reliable sources as they come from the producers and writers themselves and television broadcast sites. The article provides the basic concpet around the stargate, production information, cast members the basic plotline over the 10 season outlining the different arcs that occur and also provides media information and future productions. After reading this article, even if a person had not seen the show before, they would have a pretty good understanding of what the show is about. The article follows the wikipedia guidelines quite well though the only downfall could be the size of the article. However as it was discussed previously, it was neccasary of the article to be this size and the article does do a good job connecting other relevant topics as there is alot more information on the Stargate world. The article also remains unbiased towards the show throughout the article.

'Lupe Fiasco' is a grammy award winning hip hop artist who rose to fame in 2006 following his debut release 'Food and Liquor'. This article is not as detailed as the 'Stargate Sg1' article but does provide the basic background information that is needed to fill anyone who hasn't heard of Lupe up to speed. Though the one downfall of this article could be the accuracy. Lupe Fiasco has always been very underground especially in his earlier career and likes to keep it that way and therefore alot of the information written about him was not from solid sources. This article however does follow the the wikipedia guidelines such as providing an article summary and complying with the article size. It also remains unbiased and just provides the information about the artist with no expression of opinion.

Both the articles I chose were effective and very well written articles. Any one person could read both these articles and be caught up to speed on the subject topics without any difficulty.

Monday, April 7, 2008

Week 5!

Walter Benjamin's article "Art in the Age of Mechanical Reproduction" explores his ideas that the replication of art depreciates the original work and takes away its 'aura'. This article has great relevence today as our society has entered the digital age and the viewing and replication of 'art' is now in most cases a simple process. Anyone can go onto the internet and see replicated images of any famous art piece. With new technology and sofware such as photoshop, Sound Forge and Video Maker, anyone can create thier own 'art' or manipulate another persons previous work.

It could be argued that now anyone can create a piece of art digitally, it is not art. However I believe it still should be classsified as art. Art is a product of human creativity. Therefore if a person has put in time and effort and the piece holds a significance, then it should be considered art whether it was created digitally or not. However, I do believe that by creating art on a digital platform that it does depreciate the authenticity of it. A photoshop image will never be worth that much to anyone or authentic as it can be copied with two clicks of a mouse and spread around the world.

Going back to Benjamin's ideas, it is clear to see that digital art does not have the unqiue 'aura' he outlines. The reason paintings and drawings have this 'aura' is because there is an original authentic copy that can be seen without electricity, it can be touched and it was skillfulness of the artist that created it. Digital art is skillful in its own way but real art requires the skill and cordination of human functions to create. This is why digital art does not have the 'aura' Benjamin outlines in his article.

Monday, March 31, 2008

Week 4: Part 2!

The way search engines rank web pages when they are being searched by user is by following a certain algorithm. The first and foremost rule is searching for pages with the keywords in the HTML title tag. These pages are often assumed to be more relevant to others in the topic. Search engines also search if the keywords appear at the top of the web page such as in the headline or subheadings. Frequency is the next biggest factor for search engines. A search engine will analyze how often keywords on a page appear relevant to the other words. The higher the frequency the more relevant the search engine deems that web page.

Search engines also analyze how pages link together and can determine what pages are about and how important they are deemed to be and whether the page deserves a ranking boost or not. Another factor is clickthrough measurement. The search engine watches users and the results they select from a search and eventually change the ranking and importance of different pages depending on the clickthrough measurement results.

My overall favorite search engine would have to be Google. I choose this search engine because its so simple and user friendly and almost always gives me the best results. It also has a few good features such as the dictionary, calculator, language converter and currency converter. My next favorite search engine would be msn as it again achieves good results and is user friendly.

Week 4: Part 1!

Below is the question and answers for this weeks blogging task. I obtained my information from various sources which I had previously had experience with. I found news sites, scientific sites and answer sites the most useful in finding the answers. I could never be absolutely sure that these answers were 100% accurate but by sticking to highly appraised sites such as answers.com, news sites such as CNN.com and science research sites such as ebola.emedtv.com I am able to be fairly confident that these answers are correct.

1. Who was the creator of the infamous "lovebug" computer virus?
Onel de Guzman -
http://edition.cnn.com/2000/TECH/computing/06/29/philippines.lovebug.02/index.html

2. Who invented the paper clip?
Johan Vaaler -
http://inventors.about.com/library/inventors/blpaperclip.htm

3. How did the Ebola virus get its name?
From the name of a river where the virus was first recognized -
http://ebola.emedtv.com/ebola-virus/from-what-place-did-the-ebola-virus-get-its-name.html

4. What country had the largest recorded earthquake?
Chile on May 22, 1960 -

earthquake
.usgs.gov/learning/kids/facts.php

5. In computer memory/storage terms, how many kilobytes in a terabyte?
1 terabyte = 1 073 741 824 kilobytes -
http://www.t1shopper.com/tools/calculate/

6. Who is the creator of email?
Ray Tomlinson -
http://itmanagement.earthweb.com/entdev/article.php/1408411

7. What is the storm worm, and how many computers are infected by it?
It is a Trojan virus that infects a computer and accesses its email log book and keeps sending spam emails. It is unsure how many computers the virus has infected as it is sent out to millions of users everyday. However some experts have put an estimate of storm worm infected computers at 10 million. -
http://blog.washingtonpost.com/securityfix/2007/10/the_storm_worm_maelstrom_or_te.html

8. If you wanted to contact the prime minister of australia directly,
what is the most efficient way?
On his website -
www.pm.gov.au

9. Which Brisbane-based punk band is Stephen Stockwell (Head of the School
of Arts
) a member of?

Black Assassins - https://secure6.ozhosting.com/brisbanewritersfestival/2005/content/standard.asp?name=StockwellS

10. What does the term "Web 2.0" mean in your own words?
Is a term given to the second generation of of the World Wide Web -
http://www.answers.com/topic/web-2-0?cat=technology

Monday, March 17, 2008

Week 3!

I guess most of my life I have been connected to some form of new communication technologies. As my parents work has always delt with computeres and the internet I have had an email since I was about 6 or 7 and have always been connected to different groups on the internet. These groups include forums, blogs and various online games.

Through playing online games which led me to intereact with the program 'ventrilio' (voice chat rooms using mics on computers) I met many different people and still talk to them to this day. One of the people I met on one of the online games I played i actually became good friends with and when he came up to the Gold Coast for our schoolies as he was the same age as me, we met in person. However these online game days are behind me now.

The main forms of new communication technologies that I interact with today are mobile phones and msn messenger. The use of a mobile phone began when my parents felt it neccesary to give me a mobile phone to keep track of me as I became a roudy teen. The use of msn came into play during highschool as all my fellow class mates had it and it was the cheapest and easiest way to keep connected to my friends after school hours.

I have never had any problems with privacy issues. I have given my number out but only a few times and only to people I had been talking to for a long time. I have also given out my home address but that was to the friend I met at schoolies. We began to send each other music, dvd's, software and games. All which of course were legal copies! *cough*

Monday, March 10, 2008

Welcome!

Welcome to my blog for the class of New Communication Technologies. My name is Matthew Parker and I am currently in my second year of university studying a bachelor of arts and business through Griffith University on the Gold Coast. I have played a musical instrument all my life and currently playing the guitar. I have played soccer for various clubs and teams and love to travel. The purpose of this blog is to show my progress in the class of New Communication Technoligies by posting my thoughts and feelings after each weeks class and uploading my tutorial work and assessment.