You are on page 1of 37

Mohamed Simad B - 49

Hardware and Networking

Hardware
The physical component of a computer is known as hardware.

Screen System Unit / Cabinet

Speaker
Web cam

Printer

Mouse
Scanner
Key board Joy stick

Headphone / Microphone

Internal hardware devices

• Mother board
• Processor
• RAM & ROM
• Hard disk

1
Mohamed Simad B - 49

• SMPS (switch mode power supply)


• CD/DVD drive
• AGP card
• NIC card
• Sound card

External hardware devises

• Key board
• Mouse
• Monitor
• Scanner
• Printer
• Webcam
• Headphone & Microphone
• Joy stick
• Speaker

Q. List out any 10 input devises and 5 output devises.


Input devises Output devises
1. Key board 1. Printer
2. Mouse 2. Monitor
3. Scanner 3. Speaker
4. Microphone 4. Projector
5. Joy stick 5. Head phone
6. Track ball 6. Plotter
7. Light pen
8. Touch screen
9. Web came
10. Bar code reader

2
Mohamed Simad B - 49

Network Topologies
1. What is Topologies?
Topology is the shape of the network.
2. What are the types of Topologies?
• Bus Topology
• Star Topology
• Ring Topology
• Mesh Topology
• Hybrid Topology
3. What is the first topology?
Bus topology
4. What is the most common topology now?
Star topology

Bus Topology

• All the computer (servers, client computers) and other networking devices (Printers) are
connected in a linear Backbone Cable.

Printer
Client 1 Client 3

Backbone cable (Coaxial


cable)

‘T’ connector
Terminator Terminator

Client 2 Server
3
Mohamed Simad B - 49

• Both end of the back bone cable is terminated by the terminators.


• All the computers are connected with a backbone cable by using ‘T’ connectors.
• The terminators at the both ends prevent the data from data loss and prevent the data signals
to bounce back.

Advantages of Bus topology

• It is very cost effective (cheap to implement


• No need of switch and hubs

Disadvantages of Bus topology

• Scalability is very less


• If there is any problem in the backbone cable or connectors, the entire network will fail.
• It is suitable only for small network.

Star Topology

Printer

Client 1 Client 2

Switch

Client 5
File server

Database server
Client 3

4
Client 4
Mohamed Simad B - 49

• All the components and other networking devices are connected with the centralized hub or
switch.
• Star topology is one of the most common computer network topology today.

Advantages of star Topology

• Scalability is very high.


• Better performance.
• Isolation of devices.
• Simplicity

Disadvantages of star Topology

• The primary disadvantage of star Topology is the high dependence of the centralized hub or
switch.
• If the centralized hub or switch fails due to power failure or hardware failure the entire network
will fail.

Ring Topology

Client 1

Client 4 Client 2

Client
5 3
Mohamed Simad B - 49

Client 1

Ring

Client 4
Client 2

Client 3

• Computers are connected in a ring like fashion.


• Each nod connected to exactly two other nodes forming a single continues pathway for signals
to travel through each node.
• Data travels from node to node.
• It works based on token – Ring standards.
• Data flow in unidirectional in ring topology.
• Token contains the data, source MAC address and Destination MAC address.

Advantages

• No data collision – Because data flow is unidirectional


• Every computer acts as a repeater, it regenerates the signals (tokens) on its own.
• Does not require network server to manage the connectivity between computers.
• Performs better than a star topology under heavy network load.

6
Mohamed Simad B - 49

• Every device has access to the token and the opportunity to transmit.

Disadvantages

• If any one of the node fails or any problem in the cable can create problems for the entire
network.
• Slower than an Ethernet network.
• Network cards are expensive than Ethernet network cards.
• Moves, adds and charges of devices can affect the entire network.

Mesh Topology:

• All the computers are interconnected with every other computer in mesh topology.
• Dedicated connection.

Node 1 Node 2

Node 3 Node 4

7
Mohamed Simad B - 49

Advantages:

• High fault tolerance


• Mesh network is very reliable.
• Mesh topology is suitable for wireless networks.

Disadvantages:

• It requires more cable segments and more network adaptors.


• It is highly impractical in wired networks.

Hybrid Topology

• It is the combination of two network topologies.


• The resulting network does not exhibit one of the standard topologies (e.g. Star, Ring, etc.)
Example: Star + Bus network = Hybrid topology.

BUS
Terminator Terminator

T-Connector
Server

SWITCH
SWITCH

STAR 1 STAR 2

8
Mohamed Simad B - 49

Client 1 Client 2
Server

Backbone cable (Coaxial


cable)

‘T’ connector
Terminator

Switch

Client 3
File server

Database server
Client 5
Client 4

Switch

Client 6
Client 7
9
Mohamed Simad B - 49

Types of networks:

1. LAN
2. MAN
3. WAN
4. PAN

LAN (Local Area Network):

Distance Limit: 0 – 2kms


• Interconnection of computers (Server/Clients) and other networking devices (Printer, Fax
Machines, IP Telephone, Scanner, Router, etc.,) for the purpose of file sharing and resources
sharing with a small geographical area such as
w Network within an office building
w Networks between two office building (near <2kms)
w Networks at schools, colleges, universities
w Networks at hospitals, shops.

Switch

Printer
File server

Client 1 Client 3

Client 2

10
Mohamed Simad B - 49

MAN (Metropolitan Area Network):

• Distance Limit: 2 – 50kms


• Interconnection of computers (Server/Clients) and other networking devices (Printer, Fax
Machines, IP Telephone, Scanner, Router, etc.,) for the purpose of file sharing and resources
sharing between two buildings within the same metropolitan city or between two metro cities
(not greater than 50kms).
Router Router

SWITCH SWITCH
Server Printer Server Printer

Client 1 Client 2 Client 3 Client Client 1 Client 2 Client 3 Client

LAN 1 at Male’ LAN 2 at Villingili

Power

Hub

Printer
File server

Client 1 Client 3

Client 2

11
Mohamed Simad B - 49

Protocol

• Protocol is set of rules that govern the information or data flow between computer within the
network and between computer networks.
• There are number of protocols exist in computer networks.

SL – No Protocol Port number Uses


1 HTTP 80 Unsecured web browsing.
(Hyper Text Transfer Protocol()

2 HTTPS 443 Secured web browsing.


(Hyper Text Transfer Protocol
Secured)
3 FTP 20 – Data To download or upload files to and from the
(File Transfer Protocol) 21 – Control file server. (file transfer)
4 SMTP 25 Outgoing mail – To send mail from your
(Simple Mail Transfer Protocol) computer.
5 POP3 110 Incoming mails – to receive mails.
(Post Office Protocol version 3)
6 DNS 53 To convert domain names in to Ip addresses
(Domain Name System) and Ip address into domain name.
7 DHCP 67 – Server To assign Ip address dynamically to all client
(Dynamic Host Configuration 68 - Clients computers in a network
Protocol)
8 Telnet(Telephone Network) 23 Text Based protocol
Remote administraton

Hub

• A hub is a small electronic devices, that joins multiple computers and other networking devices
such as printers, routers, modems, together within a local area networking (LAN).
• A hub is common connection point for networking devices in a network.
• Hub receives signals from one device and broadcasts it to all other devices in the network.

12
Mohamed Simad B - 49

Power

Hub

Printer
File server

Client 1 Client 3

Client 2

Types of Hub

1. Active Hub
2. Passive Hub

Passive Hub

• A passive hub passes signals along (or) broadcasts signals but has no addition capability ie, it
doesn’t contain amplifier to regenerate the signals.
• It doesn’t require external power supply

Active Hub

• An active hub is a hub that includes a signal amplifier. It regenerate or amplifies signals and
passes them along.
• It requires external power supply.
Active hub = Hub + repeater

13
Mohamed Simad B - 49

Switch

• Switch is a common connection point in a network to connect multiple computers and other
networking devices together.
• It join multiple connectors and other networking devices within one local area network (LAN)

Switch

Printer
File server

Client 1 Client 3

Client 2

• Switch works at data link layer (layer 2) of the OSI model


• Switch are capable of inspecting data packets determining the source and destination devices of
the packet and forwarding it appropriately.

Types of switch

1. Unmanaged switch
2. Managed switch

Unmanaged switch

• There is no configuration interface in unmanaged switches


• We can configure unmanaged switch
• We can’t create VLAN

14
Mohamed Simad B - 49

Difference between hub and switch

Hub Switch
Hub works in the physical layer of the OSI model; it Switch works in the data link layer of the OSI
is a layer 1 device. model; It is a layer 2 device.
Hub always broadcasts data packets Switch broadcasts data packets for the first time,
second time own wards it unicasts data packets.
Hub shoes the band width Switch doesn’t share the band width
Hub doesn’t understand the MAC address Switch can understand the MAC address
Hub doesn’t maintains the MAC table Switch maintains the MAC table
Network traffic and data collision is high Network traffic and data collision is very less

Differences between switch and router

Router Switch
Router is used to connect two different networks Switch connects different computers within one
network.
Router works in the network layer of the OSI Switch works in the data link layer of the OSI
model, It is a layer 3 devices. model. It is a layer model.
A router works on the principal of IP address A switch work on the principal of MAC address.
Routers have their own in built operating system Most of the switches do not require any prior
and they need to be configured before used. configuration and are usually ready to use.
Routers are much more sophisticated and In comparison with router switches are less
intelligent network device as compared to sophisticated and less intelligent.
switches.
A routers inbuilt hardware and software makes A switch does not perform any such activity.
use of routing algorithms to compute the best
possible path for routing data packets across
different computer networks.

Different between FAT and NTFS

FAT NTFS
File Allocation Table New Technology File System
FAT volume can be converted to NTFS volume NTFS cannot be converted to FAT32 volume
FAT does not support file compression NTFS support file compression & encryption
FAT provides very little security. It support share NTFS provide high level security it supports share
level security only. It doesn’t support file level and level, file level and folder level security.
folder level security.
FAT volume are recognized by all versions of NTFS volume are not recognized by windows
windows O/S starting from win-98 up to win -7 95/98/ME (Lower version of windows)

15
Mohamed Simad B - 49

Operating System

Common diagram for OS

• Operating system is system software.


• It acts as an interface between the user and the computer hardware.
• Operating system provides an environment at which we can install all the applications.
• Without OS we can’t boot the computer, we can’t operate the computer.
• Operating system controls and manages the entire activities and resources of a computer.

4 users

3 Application software (CorelDraw,


Photoshop)

2 Operating system (XP,


win95

1 Computer
hardware

16
Mohamed Simad B - 49

Over a certain period of time computer starts functioning slowly

Troubleshooting steps

• Execute disk clean up tools to delete unnecessary files.


• Execute disk defragment tool to consolidate the fragmented files across the hard disk.
• Uninstall the unwanted, unnecessary application program from your computer.
• Managing your program and cleaning your registry can easily boost your computers
performance speed up to 30% ( Registry-cleaner software)
• Increase virtual memory
• Scan the entire hard disk drive for viruses and other threats.
• Disable unnecessary startup items and programs in MS config.

Differences between RAM and ROM

RAM ROM
1-Random Access memory 1-Read only memory
2-Read and write operation is possible 2-Only read operation is possible / write is not
possible
3-User can interact with RAM 3-User can’t interact with ROM
4-Volatile Memory 4-Non-volatile
5-RAM is temporary memory 5-ROM is permanent memory

Computer Power Supply


è The computer’s components would not be able to operate without power
è The device in the computer that provides this power is the switch mode power supply (SMPS)
è SMPS converts 110 volt to 230 volt AC current into the various DC voltages that a computer needs to
operate.
è Various DC voltages we can get from an SMPS
o +3.3 Volt DC
o +5 Volt DC
o -5 Volt DC - ground
AT Motherboard ATX Motherboard
o +12 Volt DC
o -12 Volt DC -ground
o +5 Volt DC -standby

17
Mohamed Simad B - 49

Power supply connectors


è SMPS use 4 types of power connectors to power the various devices within computer
1- Floppy drive power connector
2- AT(Advanced Technology) system power connector
3- ATX(Advanced Technology Extended) system power connector
4- Standard Peripheral
eripheral power connectors
è Each has a different appearance and way of connecting to the device. Each type is used for a specific
purpose.

1. Floppy drive power connector


- Floppy drive pc is smaller and flatter These connectors also called as “berg connector
connectors”
- There are 4 wires going to the connector. These wires carry the 2 voltages used by the motors
and logic circuits.
o +5 V DC – carried on the red wire
o +12 V DC – carried on the yellow wire
Plus 2 black ground wires
- Color Coding

2. Standard Peripheral Power Connector


- The standard peripheral power connector is generally used to power different types of internal
disk drives – Hard disk, CD Drive, DVD
DVD-Drive except floppy drive.
- This type of connector is called a “Molex connector”
- This power connector, though la larger
rger than the floppy drive connector, uses the same wiring color
code scheme as the floppy drive connector.
-
3. AT System Power Connectors: Dual Power Connector
- There are two 6 wire connectors, labeled p8 and p9.

18
Mohamed Simad B - 49

4. ATX Power Connector


- ATX Power connector provides
vides power supply to ATX motherboard
- It provides the six voltages required plus it delivers then all through one connector a single 20
pin connector

Network interface card

• NIC connect a computer and other networking devices with a network


• Without NIC card a computer cannot participate in a network.

Two types of NICs:

• Wireless NIC
• Wired NIC

• Now a day NIC is in built in the mother board.


• Interface is the place where data arrives or departs from a computer.

Name of port

• 45 port to conne
NIC has got 1 RJ-45 connect a computer with a network.

ASCII (America Standard Code for In


Information Interchange)

• ASCII is code for representing English character (alphabet) and special symbols as numbers,
with each letter assigned number from 0 to 127.
• Most computer use ASCII cod
codes
es to represent text, which makes it possible to transfer data from
one computer to another.
• ASCII developed from telegraphic codes.
• ASCII was developed under the auspices of committee of the American Standards Association,
called the X3 committee.

Unicode

19
Mohamed Simad B - 49

• Unicode provides a unique number for every chapter, no matter what the O/S, no matter what
the program, no matter what the language.
• The Unicode standard has been adopted by such industry leaders Apple, HP, IBM, Microsoft,
Oracle, SAP, Sun, Sybase, Unisys character set.
• Microsoft software uses Unicode at its core.
• Major operating system windows, Macintosh, Linux, Unix, support Unicode.

EBCIDIC (Extended Binary Coded Decimal Interchange Code)

• Extended Binary Coded Decimal interchange Code


• EBCIDIC is an IBM code for representing character as numbers. Although it is widely used on
large IBM computers, most other computers include PCs and Macintosh use ASCII codes.

Difference between FTP and TFTP

FTP - File Transfer Protocol

TFTP - Trivial File Transfer Protocol

• We use both FTP and TFTP protocol in a computer network to transfer file in between the
computers

FTP TFTP
FTP uses TCP protocol TFTP uses UDP protocol
FTP needs secure user name and password TFTP doesn’t require secure username and
password
Secured protocol Unsecured protocol
FTP more commands TFTP less commands
FTP reliable but slower than TFTP TFTP unreliable but faster than FTP
FTP uses TCP ports 20 & 21 TFTP uses UDP port 69

20
Mohamed Simad B - 49

Motherboard layout
Processor fan
Processor slot connector
DIM memory
modules
Chassis cooling fan connector
Key board connector
PS2 ports
Mouse connector BIOS memory chip

Serial port Mother board power connector

Parallel port
Floppy drive connector

USB port

VGA port IDE ports


North Bridge
Network port Chipset
IDE1 IDE0
Game port

Line in Graphics (AGP port)


Line out
Microphone CMOS battery

PCI ports South Bridge Chipset

Inbuilt speaker

Ports and Slots on the motherboard

1- Keyboard Connector – to connect keyboard


2- Mouse Connector – to connect mouse
3- Serial Port – to connect serial printer, modem
4- Parallel Port - to connect parallel printer
5- USB Ports – to connect USB devices – Printer, Webcam, Scanner etc
6- VGA Port – to connect monitor , projector
7- Network Port (RJ45) – to connect network cable
8- Game Port – to connect joystick
9- Audio Ports – to connect external speakers, microphone, headphone
10- PCI Slots – to connect NIC card, Sound Card, VGA Card, MIDI card etc.
11- Memory Slots – to connect DIMM memory modules
12- Power Connector – to connect SMPS 20pin power connector

21
Mohamed Simad B - 49

13- AGP Port – to connect graphics card


14- IDE Ports – to connect disk
sk storage devices (Hard disk, CD/DVD drive)

3 types of Internet Connection

1. Dial-up:
• The internet connection that is established by using telephones and telephone lines as a
medium is known as dialup internet connection.
• Telephone remains busy while ac accessing the internet
• A modem is used to connect the computer to the ISP. Once the connection is established an
activity called “handshaking” takes place between the modem and the remote server.

• The dialup internet connection is also known as ‘transient connection’. This is because the
connection can be terminated by either the ISP or the other user
• Dialup connection supports up to 56kbps bandwidth.

2. Broadband:
• If any internet connection that support 512kbps or higher bandwidth will be considered as
broadband internet connection.
• Broadband means a wide range of frequencies used to transmit and receive data.
• In broadband IC, the data transfer rates are very high as compared to the dialup internet
connection.
• We can use telephone while accessing the int
internet.

22
Mohamed Simad B - 49

• There are various types of broadband internet connections, depending upon the cost , speed
and availability.
1. ADSL
2. SDSL
3. Wireless broadband
4. Cable broadband
5. Satellite broadband
6. Fiber optic broadband

3. Cable Internet Connection:


• Internet can be accessed via the cable TV connection
• The cable TV is used by almost everybody and now the internet connection is also made
available along with the cable TV channels.
• Cable broadband Internet connection provides a speed ranging from 2mbps to 10 mbps
• It is more poplar compared to the ADSL internet connection
• The downloading and uploading speeds of cable & ADSL are the same

23
Mohamed Simad B - 49

OSI – Reference model


OSI – Open System Inter Connection

• OSI model was designed by ISO – International Standard Organization.


• OSI model is logical model; it is not a physical model.
• There are seven virtual layers in OSI model each layer performs a well defined function.
• Without OSI (or) TCP/IP model data communication is not possible between computer in a local
area network as well as in the internet.

Sender PC Receiver PC
at india at USA

Application Layer Application Layer

Presentation Layer Presentation Layer

Session Layer Session Layer


Router at Router at
ISP ISP
Transport Layer source Destination
Transport Layer

Network Layer Network Layer


Network Layer Network Layer

Data Link Layer Data Link Layer Data Link Layer Data Link Layer

Physical Layer Physical Layer Physical Layer Physical Layer

0101010011010110101 0101010011010110101

24
Mohamed Simad B - 49

1. Application Layer
This layer is point of contact between the user and the network therefore; it brings the basic
network service to the user, such as file transfer, email, remote login.
• Protocols: HTTP, HTTPS, FTP, SMTP, Telnet, Pop3

2. Presentation Layer
This layer deals with the syntax and semantics of the transmitted data, it processes the data so
as to make it compatible between communicating tasks. This layers can covert, format, encrypt
and compress the data

3. Session Layer
This layer sets up and synchronizes the exchange between distant processes. It binds logical
addresses for distributable tasks.

4. Transport Layer
• The layer is responsible for the good/reliable delivery of messages to the recipient /
destination. Its main road is to take the messages of the session layer, split them in to
smaller units (segments) and give them to the network layer.
• This layer can use one network connection to transport several messages at the same time
using multiplexing unit.
• This layer is also responsible for flow control. The information unit for this layer is the
message or segment.
• Protocols in Transport layer(TCP/UDP)

5. Network Layer
• This layer is in charge of sub network ie. The routing packets over the subnet work and the
inter connection on the various sub networks.
• The information unit for this layer is the ip packets.
• Protocols of the network layer: IP, IPSEP, ICMP, IGMP, RIP, IGRP, EGRP, OSPF.

Transport Layer Segment 1 Segment 2 Segment 3 Segment 4 Segment 5

Network Layer IP IP IP IP IP IP IP
IP Packets

Data Link Layer Mac Mac Mac Mac Mac Mac Mac

Mac address

010011010101110011110101010101010110110101011001
25
Mohamed Simad B - 49

Physical Layer

Binary Bits

6. Data Link Layer


• It has a role of binder, it splits input data of the sender in to frames since this frames in
sequence and manages the acknowledgment frames send back by the receiver.
• An important role of this layer consists in detecting and correcting errors that occurs in the
physical error.
• This layer integrates also a flow control function to avoid the blocking of the receiver.
• The information unit of this layer is data frame.
• Protocol: PPTP, L2TP, MAC, ARP, RARP.

7. Physical Layer

• This layer is in charge of the transmission of bits over a communication channel.


• This layer must guarantee perfect transmission of the data.
• The information of this layer is the binary bits.
• Devices at physical layer: Physical layer has no additional functionality, but it depend on
data link layer for all the function
• Devices working at physical layer: Hub, repeater, Cable, connector such as RJ11, RJ45,
Ethernet, token ring, ATM, Frame riley.

TCP / IP model

Application Layer 4

Transport Layer 3

Internet Layer 2

Host - to – Network
1
layer (or) link layer

1. Application Layer
• This layer is point of contact between the user and the network therefore; it brings the basic
network service to the user, such as file transfer, email, remote login.

26
Mohamed Simad B - 49

• This layer is immediately bound to the transport layer simply because the session and
presentation layers in TCP/IP model are useless.
• Protocols: HTTP, HTTPS, FTP, SMTP, Telnet, Pop3

2. Transport Layer
• The layer is responsible for the good/reliable delivery of messages to the recipient /
destination. Its main road is to take the messages of the session layer, split them in to
smaller units (segments) and give them to the network layer.
• This layer can use one network connection to transport several messages at the same time
using multiplexing unit.
• This layer is also responsible for flow control. The information unit for this layer is the
message or segment.
• Protocols in Transport layer(TCP/UDP)
• It has the same role as the transport layer of the original model.
• Its role is to split up the message to be transmitted into a form the internet layer can
handle.

3. Internet layer
• This layer is in charge of sub network ie. The routing packets over the subnet work and the
inter connection on the various sub networks.
• The information unit for this layer is the ip packets.
• Protocols of the network layer: IP, IPSEP, ICMP, IGMP, RIP, IGRP, EGRP, OSPF.
• This layer is responsible for the inter connection of the remote networks without
establishing a physical connection. Its role is to inject packets in to any network and
deliver to the destination independently to one another.

4. Host- to – network layer


• This layer seems to cover both physical and data link layer of the OSI model.
• This layer has not been really specified the only constrain of this layer is to allow a host to
send a IP packets of a network.
• There is no protocols
• Devices working at physical layer: Hub, repeater, Cable, connector such as RJ11, RJ45,
Ethernet, token ring, ATM, Frame riley.

27
Mohamed Simad B - 49

Packet format

Application Layer

Raw data – HTTP packet


Presentation Layer

Session Layer

Transport Layer Segment – TCP packet

Network Layer Packet – IP packet

Data Link Layer Frames – Ethernet frames

• A TCP packets resides within IP packet


• An IP packet resides within an Ethernet packet
• A HTTP packets resides within a TCP – packet
TCP Packet

Sender port number Receiver port number Data

• TCP packet contains only port numbers not the IP address or MAC address

IP Packet

Sender IP address Receiver IP address Data

• IP packet contain only IP addresses not the MAC address

Ethernet frame packet

28
Mohamed Simad B - 49

Sender MAC address Receiver MAC address Data

• Ethernet frames packet contains only MAC address not the IP address.

Compare and contrast OSI model with TCP/IP model

Similarities:

• They share similar architecture both of them are constructed with layers
• They share a common application layer
• Both models have comparable transport and network layers
• Both models assume that packets are switched; basically this means that individual packets may
take different path in order to reach the same destination.

Differences

OSI reference model TCP/IP reference model


Defined before advent of internet Defined after advent of internet
OSI model came into existence way before TCP/IP TCP / IP model came into existence after OSI
model was created model
ISO created OSI model DARPA created TCP / IP model
Service, interface and protocols are clearly Service, interface and protocols are not clearly
distinguished distinguished
Inter- networking not supported TCP / IP support internetworking
Strict layering Loosely layered
Less credible 8 7 layers Less credible 8 4 layers

PC Cross over cable PC

PC switch

DTE (data terminal equipment): PC, Router

DCE (data communication equipment): Switch, modem

Similar devices

Cross over cable

Dissimilar devices

Straight through cable

29
Mohamed Simad B - 49

Configuration cable

Roll over cable

Wireless communication Techniques

• Wireless communication is the transfer of information over a distance without the use of
electrical conductors or wires.

The distance involved may be

1. Short distance WC – a few meters as in Television remote control.


2. Long distance WC – thousands or millions of kilometers for radio communications (Radio, TV,
broadcasting )

Wireless NIC Wireless NIC

Wireless
Source Pc Router or Destination PC
WAP

Example of Wireless communication devices

1. Mobile phone (or) cellular phones


2. Cordless telephones
3. PDA (Personal Digital Assistant)
4. Wireless computer networking
5. Wireless mouse and keyboard
6. TV remote control
7. Satellite TV & Radio

Advantages of Wireless network

• Wireless communications permit services such as long distance communications, which are
impossible or impractical to implement with the use of wires.
• It covers greater distance.
• No need of cables and connectors.

30
Mohamed Simad B - 49

Energy we use to transfer data wirelessly.

• Radio frequency (RF)


• Infra red light or wave
• Laser light
• Visible light
• Sound energy
• Microwaves (or) electromagnetic wave

Bluetooth

• Bluetooth is an open wireless protocol for exchanging data over short distance (using short
length radio waves) from fixed and mobile devices.
• Bluetooth is a standard and a communication protocol primarily designed for low power
consumption, with a short range based on low – cost transceiver microchips in each devices.
• Bluetooth makes it possible for these devices to communicate each other when they are in
range, because the devices use radio waves, they do not have to be in line of sight of each other.

Infrared

• Infrared radiation is electromagnetic radiation with the wave length between 07 and 300 micro
meters, which equates to a frequency range between approximately 1 and 400 htz.
• Its wave length is longer when the frequency is lower
• Its wave length is Shorter when the frequency is higher
• Shorter
§ Shorter infrared waves are not hot at all in fact you cannot even feel them. These
shorter wave lengths are the ones used by your TV’s remote control.
§ Far infrared waves: we experience this type of infrared radiation everyday in the form of
heat.
§ The heat that we feel from sunlight, a fire, a radiator is infrared.

Wireless Fidelity (Wi-Fi)

§ Wi-Fi is a wireless LAN technology that enables laptops, PDAs, and other devices to connect
easily to the internet.
§ Wi-Fi is sometimes called “Wireless Ethernet”
§ Wi-Fi is less expensive and nearing he speeds of standard Ethernet and other common wire-
based LAN technologies.
§ Wi-Fi uses the same radio frequencies as Bluetooth but with higher power, resulting a stronger
connection.
§ Wi-Fi enables a faster connection, better ranges from the base station , and better security than
Bluetooth.

31
Mohamed Simad B - 49

Difference between plug & play and Non plug & Play.

Plug and Play Non Plug and Play


1-No need to install device driver software, it will 1-We must install device driver software for all
automatically install device driver and non plug and play devices manually
automatically configure the device settings
2-After connecting the device, it is ready to use
2-After connecting the device we can’t use the
device until we install device driver
3-Pendrives, Hard disks(Internal, External) 3-Printers, Scanners, Web Cam, Plotter, NIC Card,
CD,DVD Drives, USB Keyboard, Mouse etc Sound Card, AGP Card etc.

Hot Swapping

• The ability to add and remove devices to a computer while the computer is running and have the
operating system automatically recognize the change
• Two external bus standards
1- Universal Serial Bus (USB)
2- IEEE 1394 – Support hot plugging

Differences between World Wide Web (WWW) and the Internet

1- The World Wide Web (www) or simply the web is global information medium. Users can read and
write via computers connected to the internet.
2- The term is often mistakenly as a synonym for the internet itself, but the web is a service that
operates over the internet, as e-mail does -> the World Wide Web is a system of interlinked hyper
text documents accessed via the internet.
3- The world wide web was invented in 1989 by the English physicist Tim Berners – Lee

World Wide Web Internet


1-Global Information medium 1-Global Network
2-www is a service that operates over the 2-Internet is not a service
internet
3-www was invented in 1989 by the English 3-ARPNET was the first internet, invented by
physicist Tim Berners - Lee ARPA.

How can we protect small office or home office or computer network?


1- Install or implement basic hardware firewall at the gateway
2- Install Antivirus software (AVG, McAfee, E-scan, Symantec etc)
3- Use username & password for all user accounts
4- Assign Static IP Address to all client computers
5- When using a wireless connection, use the strongest security technique such as WPA or WPA2
6- Install a fairly strong hardware firewall

32
Mohamed Simad B - 49

7- Install a proxy server to keep unwanted people out.


8- Install antivirus server and update it regularly.
9- For authentication, use strong password and change it on weekly base.

Various Memory

1. Cache memory
2. Virtual memory
3. Secondary memory
4. Main memory

Main Memory

• Main memory is also known as internal memory, Primary memory, memory.


• Internal storage area in the computer, the term memory indentifies data storage that comes in
form of chips and the word storage is used for memory that exists on disk or tapes.
• Main memory has arrays of boxes each of which can hold a single byte of information.

ROM RAM
ROM SRAM
PROM DRAM
EPROM SDRAM
EEPROM RDRAM
DDR I
DDR II
DDR III

Characteristics of Main Memory

• Main memory is volatile memory


• CPU can directly access main memory (RAM)
• Storage capacity of main memory is very less compared to secondary storage devices.

Secondary memory (or) storage

Characteristics of Secondary memory (or) storage

• Secondary storage devices are non volatile memory


• Permanent memory
• CPU access secondary storage devices through input / Output channels.
• Storage capacity is huge compared to main memory.

33
Mohamed Simad B - 49

• Secondary storage devices are used to store huge amount of data permanently for future use.
• Data is kept for a longer time on secondary storage devices.
• Secondary storage does not loss the data when the device is power down.
• Eg. Internal Hard Disk, External Hard Disk, CD/DVD, Floppy Disk, Magnetic Tape, Pen Drive

Virtual Memory

Virtual memory is a computer system technique which use an application program the impression that it
has contagious working memory. While in fact it may be physically fragmented and may even over
flower on to disk storage.

800 MB 512 MB
RAM

Program Size
Main memory

300MB
512 + 300 = 812 MB

800MB
9.7 GB

Hard disk

Cache memory

• Cache memory is the smallest memory among all.


• Cache memory is the fastest memory among all. (Speed of cache memory is the equal to the
speed of processor.)
• CPU contains cache memory.
• A cache memory is used by the processor (CPU) to reduce the average time to access the main
memory (RAM)

Processor Cache Main


memory memory

34
Mohamed Simad B - 49

1000 times faster than Main memory SRAM DRAM

WINS & DNS

WINS –Windows Internet Name Service

DNS –Domain Name Service

• WINS & DNS are both name resolution service for TCP / IP networks.
• Environments that include some computers that use NetBIOS names (win-98, Win-NT, Win-me)
and other computers that use domain names (win-XP, vista, 7, 2000, 2003, 2008) most include
both wins and DNS servers.
• The server which provides wins services to the client computers is called as wins server.
• The server which provides DNS services to t he client computers is known as DNS servers.
• If you are using NetBIOS over TCP / IP you will need to have Wins server running so that each
computer can find the correct IP address of the other to communicate.
• If you are using Domain names over TCP / IP you will need to have DNS server running so that
each computer can find the correct IP address of the other to communicate.

What is an IP address?

• An IP address is a unique numeric identifier for a host, printer, router, modem, placed in
network.
• An IP address (internet Protocol address) will allow the host to communicate with other host in
a network.
• Networking devices will be assigned IP addresses in order to identify and communicate with
each other in a network utilizing the internet protocol.
• Any participating network device including routers, switches, client and server computers,
network printers, internet fax machines, modems, and some IP telephones can have it own IP
address that is unique within the scope of the specific network.
• IP addresses are created and managed by the Internet Assigned Numbers Authorities (IANA).
• If IP address is not assigned to a computer that particular device cannot participate in the
network.

Classification of IP addresses Type of IP address


Private IP address IP V4 32bits
Public IP address IP V6 128bits

35
Mohamed Simad B - 49

Private IP Public IP
1. Non routable IP address 1. Routable IP address
2. Un-Registered IP address 2. Registered IP address in the internet
3. No need to pay for private IP address 3. Need to pay for public IP address
4. Intranet purposes 4. Internet Purposes

Private IP address ranges

Class A:

10.0.0.0 to 10.255.255.255

Network part 8 |Host part 24

Subnet mask: 255.0.0.0

Class B:

172.16.0.0 to 172.31.255.255

Network part 16|Host part 16

Subnet mask: 255.255.0.0

Class C:

192.168.0.0 to 192.168.255.255

Network part 24|Host part 8

Subnet mask: 255.255.255.0

Public IP address range Full Form


Class A: 1-126 1.0.0.0 to 126.255..255.255
8/24
Subnet mask:255.0.0.0
Class B: 128-191 128.0.0.0 to 191.255.255.255
16/16
Subnet mask:255.255.0.0
Class C: 192-223 192.0.0.0 to 223.255.255.255

36
Mohamed Simad B - 49

24/8
Subnet mask:255.255.255.0
Class D: 224-239 224.0.0.0 to 239.255.255.255
(not defined)
Subnet mask: (not defined)
Class E: 240-255 240.0.0.0 to 255.255.255.255
(not defined)
Subnet mask: (not defined)

Special Purposes IP addresses

1. 0.0.0.0 to 0.255.255.255 default network address


2. 127.0.0.0 to 127.255.255.255 Loopback IP address
3. 255.0.0.0 to 255.255.255.255 Limited IP address
4. Class D: Multicast
5. Class E: Reserved for future use (or) research & development

Types of IP addresses

IPV4 IPV6
32 bits 128 bits
192.168.1.1 A6C2:884F:C849:f 864:AC29:C375:Df1E (0-9,A-F)
We use classes in IPV4 class A,B,C,D,E No classes in IPV4
It supports unicast broadcast and multicast It support unicast, multicast and anycast it doesn’t
support broadcast.
0.0.0.0 0:0:0:0:0:0:0:0 - protocol implementation.
127.0.0.0 Special purpose IP address 0:0:0:0:0:0:0:1 - loop back IP address.
255.255.255.255

IP Total # of bits First octect # Of Usable # of Number of # Of host ID


address for networking of IP address network networking possible per Network
class id / Host id ID bits ID bits network ID
used to
identify
class
Class A 8/24 0XXX XXXX 1 8-1=7 27 -2=126 224-
2=16,777,24
Class B 16/16 10XX XXXX 2 16-2=14 214=16384 216-2=65,534
Class C 24/8 110X XXXX 3 24-3=3 2 =2,097,152 28-2=254
21

37

You might also like