In this section, we provide background information about the mobile social networking.
2.1 Mobile Social Network
Nowadays, you can see the mobile device with everyone. This large rise of mobile device usage, give it high priority in development. Mobile device now became more advanced, with allowing internet access and open source for the application development. It gives the user with a lot of ways for communication, entertainment, and information. Also, it has bought for mobile user’s unlimited access for online social network information, and provides location based service (LBS). LBS open new direction to mobile application developer that was not exit before, by using the location feature such as finding the nearest restaurant, locating
…show more content…
The architecture categorized based on the communication pattern to client – server architecture, peer-to-peer architecture and hybrid architecture.
a. Client – Server Architecture
Client–server architecture is the most common architecture represents the MSNs, as it shows in Figure 1. It consists of service provider that stores all the information about the users of MSN in remote server, which may include an enhanced third party application servers e.g. SMTP Mail server, Voip Servers. Also, network infrastructure includes a cellular network and Wi-Fi that is used to connect client device to the service provider. This architecture called centralized because all the communication has to get through the service provide. One of it is advantage is that he is clear and can offer good quality of services (QoS). On the other hand, his disadvantage is that all the communication has to get through one source, which loads to a lot of head in the server. Also, with only one storage location that have to deals with all the information
…show more content…
family, or friends. The relationship represented in the graph as edges between the nodes and the strength of the relationship by weight value. The strength defined by many indicators such as frequency, which means the more the two users contact each other the stronger their relationship strength well be. Intimacy is represents the long in time of the relationships. Also the Recency, that means the last contact happen between two nodes. And last, The Homogeneity refers to the degree of having the same interest between the
1.3 How do local area networks (LANs) differ from wide area networks (WANs) and backbone networks (BNs) Local area networks are limited within an organization Wide area networks extend over a large geographical distance and may be privately owned or rented Backbone network are the part of network infrastructure that feeds the connected networks 1.8 Describe the seven layers in the OSI network model and what they do. Application – this layer is specific to applications and provides services such as email, network software services and file transfers Presentation - In this layer, the data is formatted in a schema that network understands, and also manages data encryption and decryption Session – this layer establishes and controls the data communication between
In the architecture, there are different modules like- Prime number generation and test by Rabin-Miller module, initial key-exchange and authentication, secure communication initiation, peer to peer authentication, hybrid encryption and hybrid decryption module and third party module. Another new aspect is challenger module will only allow one client to securely communicate with the server so communication architecture is peer to peer only but multiple clients can try to connect, so they will be connected to server but will not be authenticated to start messaging they have to wait for authenticated communication clearance one by one. Here the flow diagrams are described in two parts –First in Fig. 1 the generic communication model and in Fig.
Social media has created the popularity of many meaningless relationships diminishing the number of true connections among people. The author used the point-by-point organizational style for her essay. This can be seen the clearest in paragraphs
A person's life and values are changed and affected by the relationships they have with others. Once a person is born, their entire life is changed by others. From small decisions to big decisions, relationships with friends, family, and significant others change the way a person chooses. Relationships with others influence a person’s life by changing their mood, stress level, and goals. How you relate to people can directly change your mood.
People connect through many different types of social media. With social media, you may be friends with or follow people that you don’t know personally. Someone that you don’t know personally is called a “weak tie”. In the short story, “I’m So Totally, Digitally, Close to You” written by Clive Thompson describes what weak ties are and how we use them in our everyday lives. Weak ties are an important part of today’s society because it helps connect people, it gives them a bigger social circle, and it expands their ability to solve problems.
In today’s society there are many ways to bring change. In “Hashtag Activism, and Its Limits” by David Carr, we can see the different ways that change may or may not be accomplished. Social Media is a modern day technology used not only as form of expression for many, but also as an outlet for cries of injustice. The word activism is defined as “the policy or action of using bigger is campaigning to bring about political or social change.” However, activism is not only about what a person says but also about what a person does.
Adaptive Location Data Buffering provides two different methods to occasionally confirm an open end-to-end connection with the server. If the IP address of the device is publically addressable, the server can occasionally send “alive” messages via single UDP packets to the phone. If, for security or capacity reasons, the cellular provider does not allow publically addressable IPs, the Adaptive Location Data Buffering module occasionally opens a TCP connection from the phone to the server to determine if there is a successful “alive” response from the server.
Although researchers have tried to defined friendship simply focused on the differences between friends and non-friends, Willard Hartup (1996) cited in Brownlow (2012, p. 239) argues that a whole range of relationship is possible from best friend to good friend to occasional friend to non-friend. Therefore, it is far more complex than just a definition between friends and non-friends. Now that friendship is defined it is essential to define and understand qualitative approach. Unlike a quantitative data, qualitative method or approach involves the analysis of talk, interview material and written text such as transcripts, newspaper diaries or articles and it does not use any measurements nor is in numerical form.
TELE 5330 – DATA NETWORKING ASSIGNMENT #2 Name: Prashanth Reddy Edunuri Grade (1) Most applications that use peer-to-peer communication also employs client server communication for some portion of functionality as decentralized peer-to-peer networks have numerous compensations over old-fashioned client-server networks. This system endorsed files to be questioned and shared between users, devoid of a central directory, and as a result shielded the network from lawful issues of individual users. By decentralizing resources, P2P networks have been able to virtually exclude expenses allied with a centralized infrastructure.
Patetic says, “Ours is an open, fast moving society… makes it easy for us to move away from the people and places of our past.” It may be easy to move away once but trying to visit the people and places of our past frequently can be very expensive and cost a fortune just to see our family. In order for people to keep close relationships, they don't necessarily need to visit. People can keep close relationships through technology. A good example of this is right in my family.
Social media was created two decades ago and has developed a lot since 1997 when it had first made an appearance in the world. Before social media many people did not have a way to communicate or interact with others using electronics, everything was verbal or written. When social media first made a blogging page it became a hit as told by Small Business Trends, “In 1999, the first blogging sites became popular, creating a social media sensation that is still popular today.” Social media has made an impact in many people’s lives throughout the years. After blogging was invented, social media exploded with popularity.
I. INTRODUCTION Social Networking Sites (SNSs) are online platforms that users use to create Personal profiles, associates with companion and fuss in different parts. Social networking sites exhibits individual profile and facilitates with various other activities such as sharing information with each other. Social networking sites grab million of people in the globe who are united these websites into their daily life style. Social networking sites will become famous all over the world.
What is Media Ecology? According to Neil Postman, 1970, said that Media ecology looks into the matter of how media of communication affect human perception, understanding, feeling, and value; and how our interaction with media facilitates or impedes our chances of survival. Media ecology is the study of media as environments. How we are media controlled by media and that the actions we made is affected by how the media is towards us. It speaks of how media shapes and alters our society and how it alters our social structures.
High degree of responsiveness of between various functional head and CEO. 2. Inter department decision making is smooth i.e. the functional heads can make decision based on other functions smoothly. 3. Centralized controlling system.
Name : (Quintus) Gan QI Xiang Student’s iD : 0322280 Question: What are the advantages and disadvantages of Social Media? Justify your answer with relevant evidences. The definition of social media is a group of internet-based applications that allows the creation and exchange of user-generated contents such as tweet, post, picture, audio files, video and others more which is created by users of an online system and service.