Você está na página 1de 23

Mohamed Simad B - 49

1
Hardware and Networking
Hardware
The physical component of a computer is known as hardware.
Internal hardware devices
• Mother board
• Processor
• RAM & ROM
• Hard disk
Scanner
Speaker
Key board
Screen
Headphone / Microphone
Joy stick
Mouse
Printer
Web cam
System Unit / Cabinet
Mohamed Simad B - 49
2
• SMPS (switch mode power supply)
• CD/DVD drive
• AGP card
• NIC card
• Sound card
External hardware devises
• Key board
• Mouse
• Monitor
• Scanner
• Printer
• Webcam
• Headphone & Microphone
• Joy stick
• Speaker
Q. List out any 10 input devises and 5 output devises.
Input devises
1. Key board
2. Mouse
3. Scanner
4. Microphone
5. Joy stick
6. Track ball
7. Light pen
8. Touch screen
9. Web came
10. Bar code reader
Output devises
1. Printer
2. Monitor
3. Speaker
4. Projector
5. Head phone
6. Plotter
Mohamed Simad B - 49
3
Network Topologies
1. What is Topologies?
Topology is the shape of the network.
2. What are the types of Topologies?
• Bus Topology
• Star Topology
• Ring Topology
• Mesh Topology
• Hybrid Topology
3. What is the first topology?
Bus topology
4. What is the most common topology now?
Star topology
Bus Topology
• All the computer (servers, client computers) and other networking devices (Printers) are
connected in a linear Backbone Cable.
Client 1 Client 3
Client 2 Server
Printer
Terminator Terminator
‘T’ connector
Backbone cable (Coaxial
cable)
Mohamed Simad B - 49
4
• Both end of the back bone cable is terminated by the terminators.
• All the computers are connected with a backbone cable by using ‘T’ connectors.
• The terminators at the both ends prevent the data from data loss and prevent the data signals
to bounce back.
Advantages of Bus topology
• It is very cost effective (cheap to implement
• No need of switch and hubs
Disadvantages of Bus topology
• Scalability is very less
• If there is any problem in the backbone cable or connectors, the entire network will fail.
• It is suitable only for small network.
Star Topology
Client 5
Client 1 Client 2
File server
Client 3
Client 4
Database server
Printer
Switch
Mohamed Simad B - 49
5
• All the components and other networking devices are connected with the centralized hub or
switch.
• Star topology is one of the most common computer network topology today.
Advantages of star Topology
• Scalability is very high.
• Better performance.
• Isolation of devices.
• Simplicity
Disadvantages of star Topology
• The primary disadvantage of star Topology is the high dependence of the centralized hub or
switch.
• If the centralized hub or switch fails due to power failure or hardware failure the entire network
will fail.
Ring Topology
Client 3
Client 4 Client 2
Client 1
Mohamed Simad B - 49
6
• Computers are connected in a ring like fashion.
• Each nod connected to exactly two other nodes forming a single continues pathway for signals
to travel through each node.
• Data travels from node to node.
• It works based on token – Ring standards.
• Data flow in unidirectional in ring topology.
• Token contains the data, source MAC address and Destination MAC address.
Advantages
• No data collision – Because data flow is unidirectional
• Every computer acts as a repeater, it regenerates the signals (tokens) on its own.
• Does not require network server to manage the connectivity between computers.
• Performs better than a star topology under heavy network load.
Ring
Client 3
Client 1
Client 2
Client 4
Mohamed Simad B - 49
7
• Every device has access to the token and the opportunity to transmit.
Disadvantages
• If any one of the node fails or any problem in the cable can create problems for the entire
network.
• Slower than an Ethernet network.
• Network cards are expensive than Ethernet network cards.
• Moves, adds and charges of devices can affect the entire network.
Mesh Topology:
• All the computers are interconnected with every other computer in mesh topology.
• Dedicated connection.
Node 1 Node 2
Node 3 Node 4
Mohamed Simad B - 49
8
Advantages:
• High fault tolerance
• Mesh network is very reliable.
• Mesh topology is suitable for wireless networks.
Disadvantages:
• It requires more cable segments and more network adaptors.
• It is highly impractical in wired networks.
Hybrid Topology
• It is the combination of two network topologies.
• The resulting network does not exhibit one of the standard topologies (e.g. Star, Ring, etc.)
Example: Star + Bus network = Hybrid topology.
SWITCH
STAR 1
Terminator Terminator
SWITCH
STAR 2
BUS
Server
T-Connector
Mohamed Simad B - 49
9
Client 1 Client 2
Server
Terminator
‘T’ connector
Backbone cable (Coaxial
cable)
Client 3
File server
Client 5
Client 4
Database server
Switch
Client 6
Client 7
Switch
Mohamed Simad B - 49
10
Types of networks:
1. LAN
2. MAN
3. WAN
4. PAN
LAN (Local Area Network):
Distance Limit: 0 – 2kms
• Interconnection of computers (Server/Clients) and other networking devices (Printer, Fax
Machines, IP Telephone, Scanner, Router, etc.,) for the purpose of file sharing and resources
sharing with a small geographical area such as
w Network within an office building
w Networks between two office building (near <2kms)
w Networks at schools, colleges, universities
w Networks at hospitals, shops.
Printer
File server
Client 3
Client 2
Switch
Client 1
Mohamed Simad B - 49
11
MAN (Metropolitan Area Network):
• Distance Limit: 2 – 50kms
• Interconnection of computers (Server/Clients) and other networking devices (Printer, Fax
Machines, IP Telephone, Scanner, Router, etc.,) for the purpose of file sharing and resources
sharing between two buildings within the same metropolitan city or between two metro cities
(not greater than 50kms).
Server
SWITCH
Client 1 Client 2 Client 3 Client
Printer Server
SWITCH
Client 1 Client 2 Client 3 Client
Printer
LAN 1 at Male’ LAN 2 at Villingili
Router Router
Printer
File server
Client 3
Client 2
Hub
Client 1
Power
Mohamed Simad B - 49
12
Protocol
• Protocol is set of rules that govern the information or data flow between computer within the
network and between computer networks.
• There are number of protocols exist in computer networks.
SL – No Protocol Port number Uses
1 HTTP
(Hyper Text Transfer Protocol()
80 Unsecured web browsing.
2 HTTPS
(Hyper Text Transfer Protocol
Secured)
443 Secured web browsing.
3 FTP
(File Transfer Protocol)
20 – Data
21 – Control
To download or upload files to and from the
file server. (file transfer)
4 SMTP
(Simple Mail Transfer Protocol)
25 Outgoing mail – To send mail from your
computer.
5 POP3
(Post Office Protocol version 3)
110 Incoming mails – to receive mails.
6 DNS
(Domain Name System)
53 To convert domain names in to Ip addresses
and Ip address into domain name.
7 DHCP
(Dynamic Host Configuration
Protocol)
67 – Server
68 - Clients
To assign Ip address dynamically to all client
computers in a network
8 Telnet(Telephone Network) 23 Text Based protocol
Remote administraton
Hub
• A hub is a small electronic devices, that joins multiple computers and other networking devices
such as printers, routers, modems, together within a local area networking (LAN).
• A hub is common connection point for networking devices in a network.
• Hub receives signals from one device and broadcasts it to all other devices in the network.
Mohamed Simad B - 49
13
Types of Hub
1. Active Hub
2. Passive Hub
Passive Hub
• A passive hub passes signals along (or) broadcasts signals but has no addition capability ie, it
doesn’t contain amplifier to regenerate the signals.
• It doesn’t require external power supply
Active Hub
• An active hub is a hub that includes a signal amplifier. It regenerate or amplifies signals and
passes them along.
• It requires external power supply.
Active hub = Hub + repeater
Printer
File server
Client 3
Client 2
Hub
Client 1
Power
Mohamed Simad B - 49
14
Switch
• Switch is a common connection point in a network to connect multiple computers and other
networking devices together.
• It join multiple connectors and other networking devices within one local area network (LAN)
• Switch works at data link layer (layer 2) of the OSI model
• Switch are capable of inspecting data packets determining the source and destination devices of
the packet and forwarding it appropriately.
Types of switch
1. Unmanaged switch
2. Managed switch
Unmanaged switch
• There is no configuration interface in unmanaged switches
• We can configure unmanaged switch
• We can’t create VLAN
Printer
File server
Client 3
Client 2
Switch
Client 1
Mohamed Simad B - 49
15
Difference between hub and switch
Hub Switch
Hub works in the physical layer of the OSI model; it
is a layer 1 device.
Switch works in the data link layer of the OSI
model; It is a layer 2 device.
Hub always broadcasts data packets Switch broadcasts data packets for the first time,
second time own wards it unicasts data packets.
Hub shoes the band width Switch doesn’t share the band width
Hub doesn’t understand the MAC address Switch can understand the MAC address
Hub doesn’t maintains the MAC table Switch maintains the MAC table
Network traffic and data collision is high Network traffic and data collision is very less
Differences between switch and router
Router Switch
Router is used to connect two different networks Switch connects different computers within one
network.
Router works in the network layer of the OSI
model, It is a layer 3 devices.
Switch works in the data link layer of the OSI
model. It is a layer model.
A router works on the principal of IP address A switch work on the principal of MAC address.
Routers have their own in built operating system
and they need to be configured before used.
Most of the switches do not require any prior
configuration and are usually ready to use.
Routers are much more sophisticated and
intelligent network device as compared to
switches.
In comparison with router switches are less
sophisticated and less intelligent.
A routers inbuilt hardware and software makes
use of routing algorithms to compute the best
possible path for routing data packets across
different computer networks.
A switch does not perform any such activity.
Different between FAT and NTFS
FAT NTFS
File Allocation Table New Technology File System
FAT volume can be converted to NTFS volume NTFS cannot be converted to FAT32 volume
FAT does not support file compression NTFS support file compression & encryption
FAT provides very little security. It support share
level security only. It doesn’t support file level and
folder level security.
NTFS provide high level security it supports share
level, file level and folder level security.
FAT volume are recognized by all versions of
windows O/S starting from win-98 up to win -7
NTFS volume are not recognized by windows
95/98/ME (Lower version of windows)
Mohamed Simad B - 49
16
Operating System
Common diagram for OS
• Operating system is system software.
• It acts as an interface between the user and the computer hardware.
• Operating system provides an environment at which we can install all the applications.
• Without OS we can’t boot the computer, we can’t operate the computer.
• Operating system controls and manages the entire activities and resources of a computer.
4 users
3 Application software (CorelDraw,
Photoshop)
2 Operating system (XP,
win95
1 Computer
hardware
Mohamed Simad B - 49
17
Over a certain period of time computer starts functioning slowly
Troubleshooting steps
• Execute disk clean up tools to delete unnecessary files.
• Execute disk defragment tool to consolidate the fragmented files across the hard disk.
• Uninstall the unwanted, unnecessary application program from your computer.
• Managing your program and cleaning your registry can easily boost your computers
performance speed up to 30% ( Registry-cleaner software)
• Increase virtual memory
• Scan the entire hard disk drive for viruses and other threats.
• Disable unnecessary startup items and programs in MS config.
Differences between RAM and ROM
RAM ROM
1-Random Access memory 1-Read only memory
2-Read and write operation is possible 2-Only read operation is possible / write is not
possible
3-User can interact with RAM 3-User can’t interact with ROM
4-Volatile Memory 4-Non-volatile
5-RAM is temporary memory 5-ROM is permanent memory
Computer Power Supply
è The computer’s components would not be able to operate without power
è The device in the computer that provides this power is the switch mode power supply (SMPS)
è SMPS converts 110 volt to 230 volt AC current into the various DC voltages that a computer needs to
operate.
è Various DC voltages we can get from an SMPS
o +3.3 Volt DC
o +5 Volt DC
o -5 Volt DC - ground
o +12 Volt DC
o -12 Volt DC -ground
o +5 Volt DC -standby
ATX AT Motherboard Motherboard
Mohamed Simad
Power supply connectors
è SMPS use 4 types of power connectors to power the various devices within computer
1- Floppy drive power connector
2- AT(Advanced Technology) system power connector
3- ATX(Advanced Technology Extended) system power connector
4- Standard Peripheral power connectors
è Each has a different appearance and way of connecting to the device. Each type is used for a specific
purpose.
1. Floppy drive power connector
- Floppy drive pc is smaller and flatter These connectors also called as “berg connector
- There are 4 wires going to the connector. These wires carry the 2 voltages used by the motors
and logic circuits.
o +5 V DC – carried on the red wire
o +12 V DC – carried on the yellow wire
Plus 2 black ground wires
- Color Coding
2. Standard Peripheral Power Connector
- The standard peripheral power connector is generally used to power different types of internal
disk drives – Hard disk, CD Drive, DVD
- This type of connector is called a “Molex connector”
- This power connector, though la
code scheme as the floppy drive connector.
-
3. AT System Power Connectors: Dual Power Connector
- There are two 6 wire connectors, labeled p8 and p9.
18
eripheral DVD-Drive except floppy drive.
larger than the floppy drive connector, uses the same wiring color
B - 49
connectors”
rger
Mohamed Simad
4. ATX Power Connector
- ATX Power connector provides power supply to ATX motherboard
- It provides the six voltages required plus it delivers then all through one connector a single 20
pin connector
Network interface card
• NIC connect a computer and other networking devices with a network
• Without NIC card a computer cannot participate in a network.
Two types of NICs:
• Wireless NIC
• Wired NIC
• Now a day NIC is in built in the mother board.
• Interface is the place where data arrives or departs from a computer.
Name of port
• NIC has got 1 RJ-45 port to conne
ASCII (America Standard Code for In
• ASCII is code for representing English character (alphabet) and special symbols as numbers,
with each letter assigned number from 0 to 127.
• Most computer use ASCII cod
one computer to another.
• ASCII developed from telegraphic codes.
• ASCII was developed under the auspices of committee of the American Standards Association,
called the X3 committee.
Unicode
19
vides connect a computer with a network.
Information Interchange)
codes to represent text, which makes it possible to transfer data from
B - 49
es
Mohamed Simad B - 49
20
• Unicode provides a unique number for every chapter, no matter what the O/S, no matter what
the program, no matter what the language.
• The Unicode standard has been adopted by such industry leaders Apple, HP, IBM, Microsoft,
Oracle, SAP, Sun, Sybase, Unisys character set.
• Microsoft software uses Unicode at its core.
• Major operating system windows, Macintosh, Linux, Unix, support Unicode.
EBCIDIC (Extended Binary Coded Decimal Interchange Code)
• Extended Binary Coded Decimal interchange Code
• EBCIDIC is an IBM code for representing character as numbers. Although it is widely used on
large IBM computers, most other computers include PCs and Macintosh use ASCII codes.
Difference between FTP and TFTP
FTP - File Transfer Protocol
TFTP - Trivial File Transfer Protocol
• We use both FTP and TFTP protocol in a computer network to transfer file in between the
computers
FTP TFTP
FTP uses TCP protocol TFTP uses UDP protocol
FTP needs secure user name and password TFTP doesn’t require secure username and
password
Secured protocol Unsecured protocol
FTP more commands TFTP less commands
FTP reliable but slower than TFTP TFTP unreliable but faster than FTP
FTP uses TCP ports 20 & 21 TFTP uses UDP port 69
Mohamed Simad B - 49
21
Motherboard layout
Ports and Slots on the motherboard
1- Keyboard Connector – to connect keyboard
2- Mouse Connector – to connect mouse
3- Serial Port – to connect serial printer, modem
4- Parallel Port - to connect parallel printer
5- USB Ports – to connect USB devices – Printer, Webcam, Scanner etc
6- VGA Port – to connect monitor , projector
7- Network Port (RJ45) – to connect network cable
8- Game Port – to connect joystick
9- Audio Ports – to connect external speakers, microphone, headphone
10- PCI Slots – to connect NIC card, Sound Card, VGA Card, MIDI card etc.
11- Memory Slots – to connect DIMM memory modules
12- Power Connector – to connect SMPS 20pin power connector
Key board connector
Mouse connector
Serial port
Parallel port
USB port
VGA port
Network port
Game port
Line in
Line out
Microphone
PCI ports
PS2 ports
North Bridge
Chipset
Chassis cooling fan connector
BIOS memory chip
Mother board power connector
Floppy drive connector
IDE ports
IDE1 IDE0
Graphics (AGP port)
CMOS battery
Inbuilt speaker
Processor slot
Processor fan
connector
DIM memory
modules
South Bridge Chipset
Mohamed Simad
13- AGP Port – to connect graphics card
14- IDE Ports – to connect disk storage devices (Hard disk, CD/DVD drive)
3 types of Internet Connection
1. Dial-up:
• The internet connection that is established by using telephones and telephone lines as a
medium is known as dialup internet connection.
• Telephone remains busy while ac
• A modem is used to connect the computer to the ISP. Once the connection is established an
activity called “handshaking” takes place between the modem and the remote server.
• The dialup internet connection is also known as ‘transient
connection can be terminated by either the ISP or the other user
• Dialup connection supports up to 56kbps bandwidth.
2. Broadband:
• If any internet connection that support 512kbps or higher bandwidth will be considered as
broadband internet connection.
• Broadband means a wide range of frequencies used to transmit and receive data.
• In broadband IC, the data transfer rates are very high as compared to the dialup internet
connection.
• We can use telephone while accessing the int
22
sk accessing the internet
connection’. This is because the
internet.
B - 49
Mohamed Simad B - 49
23
• There are various types of broadband internet connections, depending upon the cost , speed
and availability.
1. ADSL
2. SDSL
3. Wireless broadband
4. Cable broadband
5. Satellite broadband
6. Fiber optic broadband
3. Cable Internet Connection:
• Internet can be accessed via the cable TV connection
• The cable TV is used by almost everybody and now the internet connection is also made
available along with the cable TV channels.
• Cable broadband Internet connection provides a speed ranging from 2mbps to 10 mbps
• It is more poplar compared to the ADSL internet connection
• The downloading and uploading speeds of cable & ADSL are the same
Mohamed Simad B - 49
24
OSI – Reference model
OSI – Open System Inter Connection
• OSI model was designed by ISO – International Standard Organization.
• OSI model is logical model; it is not a physical model.
• There are seven virtual layers in OSI model each layer performs a well defined function.
• Without OSI (or) TCP/IP model data communication is not possible between computer in a local
area network as well as in the internet.
Router at
source
Sender PC
at india
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
Receiver PC
at USA
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer Physical Layer
Data Link Layer
Network Layer
ISP ISP
Router at
Destination
0101010011010110101
Physical Layer
Data Link Layer
Network Layer
0101010011010110101
Mohamed Simad B - 49
25
1. Application Layer
This layer is point of contact between the user and the network therefore; it brings the basic
network service to the user, such as file transfer, email, remote login.
• Protocols: HTTP, HTTPS, FTP, SMTP, Telnet, Pop3
2. Presentation Layer
This layer deals with the syntax and semantics of the transmitted data, it processes the data so
as to make it compatible between communicating tasks. This layers can covert, format, encrypt
and compress the data
3. Session Layer
This layer sets up and synchronizes the exchange between distant processes. It binds logical
addresses for distributable tasks.
4. Transport Layer
• The layer is responsible for the good/reliable delivery of messages to the recipient /
destination. Its main road is to take the messages of the session layer, split them in to
smaller units (segments) and give them to the network layer.
• This layer can use one network connection to transport several messages at the same time
using multiplexing unit.
• This layer is also responsible for flow control. The information unit for this layer is the
message or segment.
• Protocols in Transport layer(TCP/UDP)
5. Network Layer
• This layer is in charge of sub network ie. The routing packets over the subnet work and the
inter connection on the various sub networks.
• The information unit for this layer is the ip packets.
• Protocols of the network layer: IP, IPSEP, ICMP, IGMP, RIP, IGRP, EGRP, OSPF.
Transport Layer
Network Layer
Data Link Layer
Segment 1 Segment 2 Segment 3 Segment 4 Segment 5

IP IP IP IP IP IP IP
Mac Mac Mac Mac Mac Mac Mac
IP Packets
Mac address
010011010101110011110101010101010110110101011001
Mohamed Simad B - 49
26
6. Data Link Layer
• It has a role of binder, it splits input data of the sender in to frames since this frames in
sequence and manages the acknowledgment frames send back by the receiver.
• An important role of this layer consists in detecting and correcting errors that occurs in the
physical error.
• This layer integrates also a flow control function to avoid the blocking of the receiver.
• The information unit of this layer is data frame.
• Protocol: PPTP, L2TP, MAC, ARP, RARP.
7. Physical Layer
• This layer is in charge of the transmission of bits over a communication channel.
• This layer must guarantee perfect transmission of the data.
• The information of this layer is the binary bits.
• Devices at physical layer: Physical layer has no additional functionality, but it depend on
data link layer for all the function
• Devices working at physical layer: Hub, repeater, Cable, connector such as RJ11, RJ45,
Ethernet, token ring, ATM, Frame riley.
TCP / IP model
1. Application Layer
• This layer is point of contact between the user and the network therefore; it brings the basic
network service to the user, such as file transfer, email, remote login.
Physical Layer
Binary Bits
Application Layer
Transport Layer
Internet Layer
Host - to – Network
layer (or) link layer 1
2
3
4
Mohamed Simad B - 49
27
• This layer is immediately bound to the transport layer simply because the session and
presentation layers in TCP/IP model are useless.
• Protocols: HTTP, HTTPS, FTP, SMTP, Telnet, Pop3
2. Transport Layer
• The layer is responsible for the good/reliable delivery of messages to the recipient /
destination. Its main road is to take the messages of the session layer, split them in to
smaller units (segments) and give them to the network layer.
• This layer can use one network connection to transport several messages at the same time
using multiplexing unit.
• This layer is also responsible for flow control. The information unit for this layer is the
message or segment.
• Protocols in Transport layer(TCP/UDP)
• It has the same role as the transport layer of the original model.
• Its role is to split up the message to be transmitted into a form the internet layer can
handle.
3. Internet layer
• This layer is in charge of sub network ie. The routing packets over the subnet work and the
inter connection on the various sub networks.
• The information unit for this layer is the ip packets.
• Protocols of the network layer: IP, IPSEP, ICMP, IGMP, RIP, IGRP, EGRP, OSPF.
• This layer is responsible for the inter connection of the remote networks without
establishing a physical connection. Its role is to inject packets in to any network and
deliver to the destination independently to one another.
4. Host- to – network layer
• This layer seems to cover both physical and data link layer of the OSI model.
• This layer has not been really specified the only constrain of this layer is to allow a host to
send a IP packets of a network.
• There is no protocols
• Devices working at physical layer: Hub, repeater, Cable, connector such as RJ11, RJ45,
Ethernet, token ring, ATM, Frame riley.
Mohamed Simad B - 49
28
Packet format
• A TCP packets resides within IP packet
• An IP packet resides within an Ethernet packet
• A HTTP packets resides within a TCP – packet
TCP Packet
• TCP packet contains only port numbers not the IP address or MAC address
IP Packet
• IP packet contain only IP addresses not the MAC address
Ethernet frame packet
Sender port number Receiver port number Data
Sender IP address Receiver IP address Data
Transport Layer
Network Layer
Data Link Layer
Segment – TCP packet
Packet – IP packet
Frames – Ethernet frames
Application Layer
Presentation Layer
Session Layer
Raw data – HTTP packet
Mohamed Simad B - 49
29
• Ethernet frames packet contains only MAC address not the IP address.
Compare and contrast OSI model with TCP/IP model
Similarities:
• They share similar architecture both of them are constructed with layers
• They share a common application layer
• Both models have comparable transport and network layers
• Both models assume that packets are switched; basically this means that individual packets may
take different path in order to reach the same destination.
Differences
OSI reference model TCP/IP reference model
Defined before advent of internet Defined after advent of internet
OSI model came into existence way before TCP/IP
model was created
TCP / IP model came into existence after OSI
model
ISO created OSI model DARPA created TCP / IP model
Service, interface and protocols are clearly
distinguished
Service, interface and protocols are not clearly
distinguished
Inter- networking not supported TCP / IP support internetworking
Strict layering Loosely layered
Less credible 8 7 layers Less credible 8 4 layers
Cross over cable
DTE (data terminal equipment): PC, Router
DCE (data communication equipment): Switch, modem
Similar devices
Cross over cable
Dissimilar devices
Straight through cable
Sender MAC address Receiver MAC address Data
PC PC
PC switch
Mohamed Simad B - 49
30
Configuration cable
Roll over cable
Wireless communication Techniques
• Wireless communication is the transfer of information over a distance without the use of
electrical conductors or wires.
The distance involved may be
1. Short distance WC – a few meters as in Television remote control.
2. Long distance WC – thousands or millions of kilometers for radio communications (Radio, TV,
broadcasting )
Example of Wireless communication devices
1. Mobile phone (or) cellular phones
2. Cordless telephones
3. PDA (Personal Digital Assistant)
4. Wireless computer networking
5. Wireless mouse and keyboard
6. TV remote control
7. Satellite TV & Radio
Advantages of Wireless network
• Wireless communications permit services such as long distance communications, which are
impossible or impractical to implement with the use of wires.
• It covers greater distance.
• No need of cables and connectors.
Source Pc Destination PC
Wireless NIC Wireless NIC
Wireless
Router or
WAP
Mohamed Simad B - 49
31
Energy we use to transfer data wirelessly.
• Radio frequency (RF)
• Infra red light or wave
• Laser light
• Visible light
• Sound energy
• Microwaves (or) electromagnetic wave
Bluetooth
• Bluetooth is an open wireless protocol for exchanging data over short distance (using short
length radio waves) from fixed and mobile devices.
• Bluetooth is a standard and a communication protocol primarily designed for low power
consumption, with a short range based on low – cost transceiver microchips in each devices.
• Bluetooth makes it possible for these devices to communicate each other when they are in
range, because the devices use radio waves, they do not have to be in line of sight of each other.
Infrared
• Infrared radiation is electromagnetic radiation with the wave length between 07 and 300 micro
meters, which equates to a frequency range between approximately 1 and 400 htz.
• Its wave length is longer when the frequency is lower
• Its wave length is Shorter when the frequency is higher
• Shorter
§ Shorter infrared waves are not hot at all in fact you cannot even feel them. These
shorter wave lengths are the ones used by your TV’s remote control.
§ Far infrared waves: we experience this type of infrared radiation everyday in the form of
heat.
§ The heat that we feel from sunlight, a fire, a radiator is infrared.
Wireless Fidelity (Wi-Fi)
§ Wi-Fi is a wireless LAN technology that enables laptops, PDAs, and other devices to connect
easily to the internet.
§ Wi-Fi is sometimes called “Wireless Ethernet”
§ Wi-Fi is less expensive and nearing he speeds of standard Ethernet and other common wirebased
LAN technologies.
§ Wi-Fi uses the same radio frequencies as Bluetooth but with higher power, resulting a stronger
connection.
§ Wi-Fi enables a faster connection, better ranges from the base station , and better security than
Bluetooth.
Mohamed Simad B - 49
32
Difference between plug & play and Non plug & Play.
Plug and Play Non Plug and Play
1-No need to install device driver software, it will
automatically install device driver and
automatically configure the device settings
1-We must install device driver software for all
non plug and play devices manually
2-After connecting the device, it is ready to use 2-After connecting the device we can’t use the
device until we install device driver
3-Pendrives, Hard disks(Internal, External)
CD,DVD Drives, USB Keyboard, Mouse etc
3-Printers, Scanners, Web Cam, Plotter, NIC Card,
Sound Card, AGP Card etc.
Hot Swapping
• The ability to add and remove devices to a computer while the computer is running and have the
operating system automatically recognize the change
• Two external bus standards
1- Universal Serial Bus (USB)
2- IEEE 1394 – Support hot plugging
Differences between World Wide Web (WWW) and the Internet
1- The World Wide Web (www) or simply the web is global information medium. Users can read and
write via computers connected to the internet.
2- The term is often mistakenly as a synonym for the internet itself, but the web is a service that
operates over the internet, as e-mail does -> the World Wide Web is a system of interlinked hyper
text documents accessed via the internet.
3- The world wide web was invented in 1989 by the English physicist Tim Berners – Lee
World Wide Web Internet
1-Global Information medium 1-Global Network
2-www is a service that operates over the
internet
2-Internet is not a service
3-www was invented in 1989 by the English
physicist Tim Berners - Lee
3-ARPNET was the first internet, invented by
ARPA.
How can we protect small office or home office or computer network?
1- Install or implement basic hardware firewall at the gateway
2- Install Antivirus software (AVG, McAfee, E-scan, Symantec etc)
3- Use username & password for all user accounts
4- Assign Static IP Address to all client computers
5- When using a wireless connection, use the strongest security technique such as WPA or WPA2
6- Install a fairly strong hardware firewall
Mohamed Simad B - 49
33
7- Install a proxy server to keep unwanted people out.
8- Install antivirus server and update it regularly.
9- For authentication, use strong password and change it on weekly base.
Various Memory
1. Cache memory
2. Virtual memory
3. Secondary memory
4. Main memory
Main Memory
• Main memory is also known as internal memory, Primary memory, memory.
• Internal storage area in the computer, the term memory indentifies data storage that comes in
form of chips and the word storage is used for memory that exists on disk or tapes.
• Main memory has arrays of boxes each of which can hold a single byte of information.
ROM RAM
ROM SRAM
PROM DRAM
EPROM SDRAM
EEPROM RDRAM
DDR I
DDR II
DDR III
Characteristics of Main Memory
• Main memory is volatile memory
• CPU can directly access main memory (RAM)
• Storage capacity of main memory is very less compared to secondary storage devices.
Secondary memory (or) storage
Characteristics of Secondary memory (or) storage
• Secondary storage devices are non volatile memory
• Permanent memory
• CPU access secondary storage devices through input / Output channels.
• Storage capacity is huge compared to main memory.
Mohamed Simad B - 49
34
• Secondary storage devices are used to store huge amount of data permanently for future use.
• Data is kept for a longer time on secondary storage devices.
• Secondary storage does not loss the data when the device is power down.
• Eg. Internal Hard Disk, External Hard Disk, CD/DVD, Floppy Disk, Magnetic Tape, Pen Drive
Virtual Memory
Virtual memory is a computer system technique which use an application program the impression that it
has contagious working memory. While in fact it may be physically fragmented and may even over
flower on to disk storage.
Cache memory
• Cache memory is the smallest memory among all.
• Cache memory is the fastest memory among all. (Speed of cache memory is the equal to the
speed of processor.)
• CPU contains cache memory.
• A cache memory is used by the processor (CPU) to reduce the average time to access the main
memory (RAM)
800 MB 512 MB
RAM
800MB 9.7 GB
Program Size
Main memory
300MB
Hard disk
512 + 300 = 812 MB
Processor Cache
memory
Main
memory
Mohamed Simad B - 49
35
1000 times faster than Main memory SRAM DRAM
WINS & DNS
WINS –Windows Internet Name Service
DNS –Domain Name Service
• WINS & DNS are both name resolution service for TCP / IP networks.
• Environments that include some computers that use NetBIOS names (win-98, Win-NT, Win-me)
and other computers that use domain names (win-XP, vista, 7, 2000, 2003, 2008) most include
both wins and DNS servers.
• The server which provides wins services to the client computers is called as wins server.
• The server which provides DNS services to t he client computers is known as DNS servers.
• If you are using NetBIOS over TCP / IP you will need to have Wins server running so that each
computer can find the correct IP address of the other to communicate.
• If you are using Domain names over TCP / IP you will need to have DNS server running so that
each computer can find the correct IP address of the other to communicate.
What is an IP address?
• An IP address is a unique numeric identifier for a host, printer, router, modem, placed in
network.
• An IP address (internet Protocol address) will allow the host to communicate with other host in
a network.
• Networking devices will be assigned IP addresses in order to identify and communicate with
each other in a network utilizing the internet protocol.
• Any participating network device including routers, switches, client and server computers,
network printers, internet fax machines, modems, and some IP telephones can have it own IP
address that is unique within the scope of the specific network.
• IP addresses are created and managed by the Internet Assigned Numbers Authorities (IANA).
• If IP address is not assigned to a computer that particular device cannot participate in the
network.
Classification of IP addresses Type of IP address
Private IP address IP V4 32bits
Public IP address IP V6 128bits
Mohamed Simad B - 49
36
Private IP Public IP
1. Non routable IP address 1. Routable IP address
2. Un-Registered IP address 2. Registered IP address in the internet
3. No need to pay for private IP address 3. Need to pay for public IP address
4. Intranet purposes 4. Internet Purposes
Private IP address ranges
Class A:
10.0.0.0 to 10.255.255.255
Network part 8 |Host part 24
Subnet mask: 255.0.0.0
Class B:
172.16.0.0 to 172.31.255.255
Network part 16|Host part 16
Subnet mask: 255.255.0.0
Class C:
192.168.0.0 to 192.168.255.255
Network part 24|Host part 8
Subnet mask: 255.255.255.0
Public IP address range Full Form
Class A: 1-126
8/24
Subnet mask:255.0.0.0
1.0.0.0 to 126.255..255.255
Class B: 128-191
16/16
Subnet mask:255.255.0.0
128.0.0.0 to 191.255.255.255
Class C: 192-223 192.0.0.0 to 223.255.255.255
Mohamed Simad B - 49
37
24/8
Subnet mask:255.255.255.0
Class D: 224-239
(not defined)
Subnet mask: (not defined)
224.0.0.0 to 239.255.255.255
Class E: 240-255
(not defined)
Subnet mask: (not defined)
240.0.0.0 to 255.255.255.255
Special Purposes IP addresses
1. 0.0.0.0 to 0.255.255.255 default network address
2. 127.0.0.0 to 127.255.255.255 Loopback IP address
3. 255.0.0.0 to 255.255.255.255 Limited IP address
4. Class D: Multicast
5. Class E: Reserved for future use (or) research & development
Types of IP addresses
IPV4 IPV6
32 bits 128 bits
192.168.1.1 A6C2:884F:C849:f 864:AC29:C375:Df1E (0-9,A-F)
We use classes in IPV4 class A,B,C,D,E No classes in IPV4
It supports unicast broadcast and multicast It support unicast, multicast and anycast it doesn’t
support broadcast.
0.0.0.0
127.0.0.0 Special purpose IP address
255.255.255.255
0:0:0:0:0:0:0:0 - protocol implementation.
0:0:0:0:0:0:0:1 - loop back IP address.
IP
address
class
Total # of bits
for networking
id / Host id
First octect
of IP address
# Of
network
ID bits
used to
identify
class
Usable # of
networking
ID bits
Number of
possible
network
# Of host ID
per Network
ID
Class A 8/24 0XXX XXXX 1 8-1=7 27 -2=126 224-
2=16,777,24
Class B 16/16 10XX XXXX 2 16-2=14 214=16384 216-2=65,534
Class C 24/8 110X XXXX 3 24-3=3 221=2,097,152 28-2=254

Você também pode gostar