Hardware and Networking
Hardware and Networking
B - 49
Hardware
The physical component of a computer is known as hardware.
Screen Speaker
Web cam
Internal hardware devices Mother board Processor RAM & ROM Hard disk 1
Mohamed Simad SMPS (switch mode power supply) CD/DVD drive AGP card NIC card Sound card
B - 49
External hardware devises Key board Mouse Monitor Scanner Printer Webcam Headphone & Microphone Joy stick Speaker
Mohamed Simad
B - 49
Network Topologies 1. What is Topologies? Topology is the shape of the network. 2. What are the types of Topologies? Bus Topology Star Topology Ring Topology Mesh Topology Hybrid Topology 3. What is the first topology? Bus topology 4. What is the most common topology now? Star topology
Bus Topology All the computer (servers, client computers) and other networking devices (Printers) are connected in a linear Backbone Cable. Printer Client 1 Client 3
Client 2 3
Server
Mohamed Simad
B - 49
Both end of the back bone cable is terminated by the terminators. All the computers are connected with a backbone cable by using T connectors. The terminators at the both ends prevent the data from data loss and prevent the data signals to bounce back.
Advantages of Bus topology It is very cost effective (cheap to implement No need of switch and hubs
Disadvantages of Bus topology Scalability is very less If there is any problem in the backbone cable or connectors, the entire network will fail. It is suitable only for small network.
Star Topology
Switch
Database server
Client 3
4 Client 4
Mohamed Simad
B - 49
All the components and other networking devices are connected with the centralized hub or switch. Star topology is one of the most common computer network topology today.
Advantages of star Topology Scalability is very high. Better performance. Isolation of devices. Simplicity
Disadvantages of star Topology The primary disadvantage of star Topology is the high dependence of the centralized hub or switch. If the centralized hub or switch fails due to power failure or hardware failure the entire network will fail.
Ring Topology
Client 1
Client 4
Client 2
Client 3 5
Mohamed Simad
B - 49
Client 1
Ring
Client 4
Client 2
Client 3
Computers are connected in a ring like fashion. Each nod connected to exactly two other nodes forming a single continues pathway for signals to travel through each node. Data travels from node to node. It works based on token Ring standards. Data flow in unidirectional in ring topology. Token contains the data, source MAC address and Destination MAC address.
Advantages No data collision Because data flow is unidirectional Every computer acts as a repeater, it regenerates the signals (tokens) on its own. Does not require network server to manage the connectivity between computers. Performs better than a star topology under heavy network load. 6
Mohamed Simad Every device has access to the token and the opportunity to transmit.
B - 49
Disadvantages If any one of the node fails or any problem in the cable can create problems for the entire network. Slower than an Ethernet network. Network cards are expensive than Ethernet network cards. Moves, adds and charges of devices can affect the entire network.
Mesh Topology: All the computers are interconnected with every other computer in mesh topology. Dedicated connection.
Node 1
Node 2
Node 3
Node 4
Mohamed Simad
B - 49
Advantages: High fault tolerance Mesh network is very reliable. Mesh topology is suitable for wireless networks.
Disadvantages: It requires more cable segments and more network adaptors. It is highly impractical in wired networks.
Hybrid Topology
It is the combination of two network topologies. The resulting network does not exhibit one of the standard topologies (e.g. Star, Ring, etc.) Example: Star + Bus network = Hybrid topology.
Terminator
STAR 1
STAR 2
Mohamed Simad
B - 49
Client 1 Server
Client 2
T connector Terminator
Switch
Client 6 Client 7 9
Mohamed Simad
B - 49
Types of networks:
1. 2. 3. 4. LAN MAN WAN PAN
LAN (Local Area Network): Distance Limit: 0 2kms Interconnection of computers (Server/Clients) and other networking devices (Printer, Fax Machines, IP Telephone, Scanner, Router, etc.,) for the purpose of file sharing and resources sharing with a small geographical area such as Network within an office building Networks between two office building (near <2kms) Networks at schools, colleges, universities Networks at hospitals, shops.
Switch
Client 1
Client 3
Client 2
10
B - 49
Distance Limit: 2 50kms Interconnection of computers (Server/Clients) and other networking devices (Printer, Fax Machines, IP Telephone, Scanner, Router, etc.,) for the purpose of file sharing and resources sharing between two buildings within the same metropolitan city or between two metro cities (not greater than 50kms).
Router Router
SWITCH
Server Printer Server
SWITCH
Printer
Client 1
Client 2
Client 3
Client
Client 1
Client 2
Client 3
Client
LAN 1 at Male
LAN 2 at Villingili
Power
Hub
Client 1
Client 3
Client 2
11
B - 49
Protocol is set of rules that govern the information or data flow between computer within the network and between computer networks. There are number of protocols exist in computer networks.
SL No
1
Protocol
HTTP (Hyper Text Transfer Protocol() HTTPS (Hyper Text Transfer Protocol Secured) FTP (File Transfer Protocol) SMTP (Simple Mail Transfer Protocol) POP3 (Post Office Protocol version 3) DNS (Domain Name System) DHCP (Dynamic Host Configuration Protocol) Telnet(Telephone Network)
Port number
80
Uses
Unsecured web browsing.
443
3 4 5 6 7
To download or upload files to and from the file server. (file transfer) Outgoing mail To send mail from your computer. Incoming mails to receive mails. To convert domain names in to Ip addresses and Ip address into domain name. To assign Ip address dynamically to all client computers in a network Text Based protocol Remote administraton
Hub
A hub is a small electronic devices, that joins multiple computers and other networking devices such as printers, routers, modems, together within a local area networking (LAN). A hub is common connection point for networking devices in a network. Hub receives signals from one device and broadcasts it to all other devices in the network.
12
Mohamed Simad
B - 49
Power
Hub
Client 1
Client 3
Client 2
Types of Hub 1. Active Hub 2. Passive Hub Passive Hub A passive hub passes signals along (or) broadcasts signals but has no addition capability ie, it doesnt contain amplifier to regenerate the signals. It doesnt require external power supply
Active Hub An active hub is a hub that includes a signal amplifier. It regenerate or amplifies signals and passes them along. It requires external power supply. Active hub = Hub + repeater 13
B - 49
Switch is a common connection point in a network to connect multiple computers and other networking devices together. It join multiple connectors and other networking devices within one local area network (LAN)
Switch
Client 1
Client 3
Client 2 Switch works at data link layer (layer 2) of the OSI model Switch are capable of inspecting data packets determining the source and destination devices of the packet and forwarding it appropriately.
Types of switch 1. Unmanaged switch 2. Managed switch Unmanaged switch There is no configuration interface in unmanaged switches We can configure unmanaged switch We cant create VLAN 14
Mohamed Simad Difference between hub and switch Hub Hub works in the physical layer of the OSI model; it is a layer 1 device. Hub always broadcasts data packets Hub shoes the band width Hub doesnt understand the MAC address Hub doesnt maintains the MAC table Network traffic and data collision is high
B - 49
Switch Switch works in the data link layer of the OSI model; It is a layer 2 device. Switch broadcasts data packets for the first time, second time own wards it unicasts data packets. Switch doesnt share the band width Switch can understand the MAC address Switch maintains the MAC table Network traffic and data collision is very less
Differences between switch and router Router Router is used to connect two different networks Router works in the network layer of the OSI model, It is a layer 3 devices. A router works on the principal of IP address Routers have their own in built operating system and they need to be configured before used. Routers are much more sophisticated and intelligent network device as compared to switches. A routers inbuilt hardware and software makes use of routing algorithms to compute the best possible path for routing data packets across different computer networks. Switch Switch connects different computers within one network. Switch works in the data link layer of the OSI model. It is a layer model. A switch work on the principal of MAC address. Most of the switches do not require any prior configuration and are usually ready to use. In comparison with router switches are less sophisticated and less intelligent. A switch does not perform any such activity.
Different between FAT and NTFS FAT File Allocation Table FAT volume can be converted to NTFS volume FAT does not support file compression FAT provides very little security. It support share level security only. It doesnt support file level and folder level security. FAT volume are recognized by all versions of windows O/S starting from win-98 up to win -7 NTFS New Technology File System NTFS cannot be converted to FAT32 volume NTFS support file compression & encryption NTFS provide high level security it supports share level, file level and folder level security. NTFS volume are not recognized by windows 95/98/ME (Lower version of windows)
15
Mohamed Simad Operating System Common diagram for OS Operating system is system software. It acts as an interface between the user and the computer hardware. Operating system provides an environment at which we can install all the applications. Without OS we cant boot the computer, we cant operate the computer. Operating system controls and manages the entire activities and resources of a computer.
B - 49
16
Mohamed Simad
B - 49
Over a certain period of time computer starts functioning slowly Troubleshooting steps Execute disk clean up tools to delete unnecessary files. Execute disk defragment tool to consolidate the fragmented files across the hard disk. Uninstall the unwanted, unnecessary application program from your computer. Managing your program and cleaning your registry can easily boost your computers performance speed up to 30% ( Registry-cleaner software) Increase virtual memory Scan the entire hard disk drive for viruses and other threats. Disable unnecessary startup items and programs in MS config.
Differences between RAM and ROM RAM 1-Random Access memory 2-Read and write operation is possible 3-User can interact with RAM 4-Volatile Memory 5-RAM is temporary memory ROM 1-Read only memory 2-Only read operation is possible / write is not possible 3-User cant interact with ROM 4-Non-volatile 5-ROM is permanent memory
Computer Power Supply The computers components would not be able to operate without power The device in the computer that provides this power is the switch mode power supply (SMPS) SMPS converts 110 volt to 230 volt AC current into the various DC voltages that a computer needs to operate. Various DC voltages we can get from an SMPS o +3.3 Volt DC o +5 Volt DC o -5 Volt DC - ground AT Motherboard ATX Motherboard o +12 Volt DC o -12 Volt DC -ground o +5 Volt DC -standby
17
Mohamed Simad
B - 49
Power supply connectors SMPS use 4 types of power connectors to power the various devices within computer 1- Floppy drive power connector 2- AT(Advanced Technology) system power connector 3- ATX(Advanced Technology Extended) system power connector 4- Standard Peripheral power connectors eripheral Each has a different appearance and way of connecting to the device. Each type is used for a specific purpose.
1. Floppy drive power connector - Floppy drive pc is smaller and flatter These connectors also called as berg connector connectors - There are 4 wires going to the connector. These wires carry the 2 voltages used by the motors and logic circuits. o +5 V DC carried on the red wire o +12 V DC carried on the yellow wire Plus 2 black ground wires - Color Coding
2. Standard Peripheral Power Connector - The standard peripheral power connector is generally used to power different types of internal disk drives Hard disk, CD Drive, DVD DVD-Drive except floppy drive. - This type of connector is called a Molex connector - This power connector, though larger than the floppy drive connector, uses the same wiring color larger code scheme as the floppy drive connector. 3. AT System Power Connectors: Dual Power Connector - There are two 6 wire connectors, labeled p8 and p9.
18
Mohamed Simad
B - 49
4. ATX Power Connector - ATX Power connector provides power supply to ATX motherboard vides - It provides the six voltages required plus it delivers then all through one connector a single 20 pin connector
Network interface card NIC connect a computer and other networking devices with a network Without NIC card a computer cannot participate in a network.
Now a day NIC is in built in the mother board. Interface is the place where data arrives or departs from a computer.
Name of port 45 connect NIC has got 1 RJ-45 port to conne a computer with a network.
ASCII (America Standard Code for In Information Interchange) ASCII is code for representing English character (alphabet) and special symbols as numbers, with each letter assigned number from 0 to 127. Most computer use ASCII codes to represent text, which makes it possible to transfer data from codes one computer to another. ASCII developed from telegraphic codes. ASCII was developed under the auspices of committee of the American Standards Association, called the X3 committee.
Unicode 19
Mohamed Simad
B - 49
Unicode provides a unique number for every chapter, no matter what the O/S, no matter what the program, no matter what the language. The Unicode standard has been adopted by such industry leaders Apple, HP, IBM, Microsoft, Oracle, SAP, Sun, Sybase, Unisys character set. Microsoft software uses Unicode at its core. Major operating system windows, Macintosh, Linux, Unix, support Unicode.
EBCIDIC (Extended Binary Coded Decimal Interchange Code) Extended Binary Coded Decimal interchange Code EBCIDIC is an IBM code for representing character as numbers. Although it is widely used on large IBM computers, most other computers include PCs and Macintosh use ASCII codes.
Difference between FTP and TFTP FTP - File Transfer Protocol TFTP - Trivial File Transfer Protocol We use both FTP and TFTP protocol in a computer network to transfer file in between the computers TFTP TFTP uses UDP protocol TFTP doesnt require secure username and password Unsecured protocol TFTP less commands TFTP unreliable but faster than FTP TFTP uses UDP port 69
FTP FTP uses TCP protocol FTP needs secure user name and password Secured protocol FTP more commands FTP reliable but slower than TFTP FTP uses TCP ports 20 & 21
20
Mohamed Simad
B - 49
Motherboard layout
Processor fan Processor slot connector DIM memory modules Chassis cooling fan connector Key board connector PS2 ports Mouse connector Serial port Parallel port Floppy drive connector USB port BIOS memory chip Mother board power connector
VGA port Network port Game port Line in Line out Microphone PCI ports North Bridge Chipset IDE1 IDE0
IDE ports
Graphics (AGP port) CMOS battery South Bridge Chipset Inbuilt speaker
Ports and Slots on the motherboard 123456789101112Keyboard Connector to connect keyboard Mouse Connector to connect mouse Serial Port to connect serial printer, modem Parallel Port - to connect parallel printer USB Ports to connect USB devices Printer, Webcam, Scanner etc VGA Port to connect monitor , projector Network Port (RJ45) to connect network cable Game Port to connect joystick Audio Ports to connect external speakers, microphone, headphone PCI Slots to connect NIC card, Sound Card, VGA Card, MIDI card etc. Memory Slots to connect DIMM memory modules Power Connector to connect SMPS 20pin power connector 21
Mohamed Simad 13- AGP Port to connect graphics card 14- IDE Ports to connect disk storage devices (Hard disk, CD/DVD drive) sk 3 types of Internet Connection
B - 49
1. Dial-up: The internet connection that is established by using telephones and telephone lines as a medium is known as dialup internet connection. Telephone remains busy while ac accessing the internet A modem is used to connect the computer to the ISP. Once the connection is established an activity called handshaking takes place between the modem and the remote server.
The dialup internet connection is also known as transient connection. This is because the connection can be terminated by either the ISP or the other user Dialup connection supports up to 56kbps bandwidth.
2. Broadband: If any internet connection that support 512kbps or higher bandwidth will be considered as broadband internet connection. Broadband means a wide range of frequencies used to transmit and receive data. In broadband IC, the data transfer rates are very high as compared to the dialup internet connection. internet. We can use telephone while accessing the int
22
Mohamed Simad
B - 49
There are various types of broadband internet connections, depending upon the cost , speed and availability. 1. ADSL 2. SDSL 3. Wireless broadband 4. Cable broadband 5. Satellite broadband 6. Fiber optic broadband
3. Cable Internet Connection: Internet can be accessed via the cable TV connection The cable TV is used by almost everybody and now the internet connection is also made available along with the cable TV channels. Cable broadband Internet connection provides a speed ranging from 2mbps to 10 mbps It is more poplar compared to the ADSL internet connection The downloading and uploading speeds of cable & ADSL are the same
23
Mohamed Simad
B - 49
Sender PC at india
Receiver PC at USA
Application Layer
Application Layer
Presentation Layer
Presentation Layer
Session Layer
Transport Layer
Transport Layer
Network Layer
Network Layer
Network Layer
Network Layer
Physical Layer
Physical Layer
0101010011010110101
0101010011010110101
24
Mohamed Simad
B - 49
1. Application Layer This layer is point of contact between the user and the network therefore; it brings the basic network service to the user, such as file transfer, email, remote login. Protocols: HTTP, HTTPS, FTP, SMTP, Telnet, Pop3 2. Presentation Layer This layer deals with the syntax and semantics of the transmitted data, it processes the data so as to make it compatible between communicating tasks. This layers can covert, format, encrypt and compress the data 3. Session Layer This layer sets up and synchronizes the exchange between distant processes. It binds logical addresses for distributable tasks. 4. Transport Layer The layer is responsible for the good/reliable delivery of messages to the recipient / destination. Its main road is to take the messages of the session layer, split them in to smaller units (segments) and give them to the network layer. This layer can use one network connection to transport several messages at the same time using multiplexing unit. This layer is also responsible for flow control. The information unit for this layer is the message or segment. Protocols in Transport layer(TCP/UDP) 5. Network Layer This layer is in charge of sub network ie. The routing packets over the subnet work and the inter connection on the various sub networks. The information unit for this layer is the ip packets. Protocols of the network layer: IP, IPSEP, ICMP, IGMP, RIP, IGRP, EGRP, OSPF.
Transport Layer
Segment 1
Segment 2
Segment 3
Segment 4
Segment 5
Network Layer
IP
IP
IP
IP
IP Packets
IP
IP
IP
Mac
Mac
Mac
Mac
Mac
Mac
Mac
Mac address
010011010101110011110101010101010110110101011001 25
Mohamed Simad
B - 49
Physical Layer
Binary Bits
6. Data Link Layer It has a role of binder, it splits input data of the sender in to frames since this frames in sequence and manages the acknowledgment frames send back by the receiver. An important role of this layer consists in detecting and correcting errors that occurs in the physical error. This layer integrates also a flow control function to avoid the blocking of the receiver. The information unit of this layer is data frame. Protocol: PPTP, L2TP, MAC, ARP, RARP. 7. Physical Layer This layer is in charge of the transmission of bits over a communication channel. This layer must guarantee perfect transmission of the data. The information of this layer is the binary bits. Devices at physical layer: Physical layer has no additional functionality, but it depend on data link layer for all the function Devices working at physical layer: Hub, repeater, Cable, connector such as RJ11, RJ45, Ethernet, token ring, ATM, Frame riley.
TCP / IP model
Application Layer Transport Layer
4
Internet Layer
1. Application Layer This layer is point of contact between the user and the network therefore; it brings the basic network service to the user, such as file transfer, email, remote login.
26
Mohamed Simad This layer is immediately bound to the transport layer simply because the session and presentation layers in TCP/IP model are useless. Protocols: HTTP, HTTPS, FTP, SMTP, Telnet, Pop3
B - 49
2. Transport Layer The layer is responsible for the good/reliable delivery of messages to the recipient / destination. Its main road is to take the messages of the session layer, split them in to smaller units (segments) and give them to the network layer. This layer can use one network connection to transport several messages at the same time using multiplexing unit. This layer is also responsible for flow control. The information unit for this layer is the message or segment. Protocols in Transport layer(TCP/UDP) It has the same role as the transport layer of the original model. Its role is to split up the message to be transmitted into a form the internet layer can handle. 3. Internet layer This layer is in charge of sub network ie. The routing packets over the subnet work and the inter connection on the various sub networks. The information unit for this layer is the ip packets. Protocols of the network layer: IP, IPSEP, ICMP, IGMP, RIP, IGRP, EGRP, OSPF. This layer is responsible for the inter connection of the remote networks without establishing a physical connection. Its role is to inject packets in to any network and deliver to the destination independently to one another. 4. Host- to network layer This layer seems to cover both physical and data link layer of the OSI model. This layer has not been really specified the only constrain of this layer is to allow a host to send a IP packets of a network. There is no protocols Devices working at physical layer: Hub, repeater, Cable, connector such as RJ11, RJ45, Ethernet, token ring, ATM, Frame riley.
27
Mohamed Simad
B - 49
Presentation Layer
Session Layer
Transport Layer
Network Layer
Packet IP packet
A TCP packets resides within IP packet An IP packet resides within an Ethernet packet A HTTP packets resides within a TCP packet TCP Packet Sender port number Receiver port number Data
TCP packet contains only port numbers not the IP address or MAC address
28
Mohamed Simad
B - 49
Data
Ethernet frames packet contains only MAC address not the IP address.
Differences OSI reference model Defined before advent of internet OSI model came into existence way before TCP/IP model was created ISO created OSI model Service, interface and protocols are clearly distinguished Inter- networking not supported Strict layering Less credible 8 7 layers TCP/IP reference model Defined after advent of internet TCP / IP model came into existence after OSI model DARPA created TCP / IP model Service, interface and protocols are not clearly distinguished TCP / IP support internetworking Loosely layered Less credible 8 4 layers
PC
PC
switch
DCE (data communication equipment): Switch, modem Similar devices Cross over cable Dissimilar devices Straight through cable
29
Mohamed Simad Configuration cable Roll over cable Wireless communication Techniques Wireless communication is the transfer of information over a distance without the use of electrical conductors or wires.
B - 49
The distance involved may be 1. Short distance WC a few meters as in Television remote control. 2. Long distance WC thousands or millions of kilometers for radio communications (Radio, TV, broadcasting )
Wireless NIC
Wireless NIC
Source Pc
Destination PC
Example of Wireless communication devices 1. 2. 3. 4. 5. 6. 7. Mobile phone (or) cellular phones Cordless telephones PDA (Personal Digital Assistant) Wireless computer networking Wireless mouse and keyboard TV remote control Satellite TV & Radio
Advantages of Wireless network Wireless communications permit services such as long distance communications, which are impossible or impractical to implement with the use of wires. It covers greater distance. No need of cables and connectors.
30
Mohamed Simad Energy we use to transfer data wirelessly. Radio frequency (RF) Infra red light or wave Laser light Visible light Sound energy Microwaves (or) electromagnetic wave
B - 49
Bluetooth Bluetooth is an open wireless protocol for exchanging data over short distance (using short length radio waves) from fixed and mobile devices. Bluetooth is a standard and a communication protocol primarily designed for low power consumption, with a short range based on low cost transceiver microchips in each devices. Bluetooth makes it possible for these devices to communicate each other when they are in range, because the devices use radio waves, they do not have to be in line of sight of each other.
Infrared Infrared radiation is electromagnetic radiation with the wave length between 07 and 300 micro meters, which equates to a frequency range between approximately 1 and 400 htz. Its wave length is longer when the frequency is lower Its wave length is Shorter when the frequency is higher Shorter Shorter infrared waves are not hot at all in fact you cannot even feel them. These shorter wave lengths are the ones used by your TVs remote control. Far infrared waves: we experience this type of infrared radiation everyday in the form of heat. The heat that we feel from sunlight, a fire, a radiator is infrared.
Wireless Fidelity (Wi-Fi) Wi-Fi is a wireless LAN technology that enables laptops, PDAs, and other devices to connect easily to the internet. Wi-Fi is sometimes called Wireless Ethernet Wi-Fi is less expensive and nearing he speeds of standard Ethernet and other common wirebased LAN technologies. Wi-Fi uses the same radio frequencies as Bluetooth but with higher power, resulting a stronger connection. Wi-Fi enables a faster connection, better ranges from the base station , and better security than Bluetooth.
31
Mohamed Simad
B - 49
Difference between plug & play and Non plug & Play. Plug and Play 1-No need to install device driver software, it will automatically install device driver and automatically configure the device settings 2-After connecting the device, it is ready to use Non Plug and Play 1-We must install device driver software for all non plug and play devices manually
2-After connecting the device we cant use the device until we install device driver 3-Pendrives, Hard disks(Internal, External) 3-Printers, Scanners, Web Cam, Plotter, NIC Card, CD,DVD Drives, USB Keyboard, Mouse etc Sound Card, AGP Card etc. Hot Swapping The ability to add and remove devices to a computer while the computer is running and have the operating system automatically recognize the change Two external bus standards 1- Universal Serial Bus (USB) 2- IEEE 1394 Support hot plugging
Differences between World Wide Web (WWW) and the Internet 1- The World Wide Web (www) or simply the web is global information medium. Users can read and write via computers connected to the internet. 2- The term is often mistakenly as a synonym for the internet itself, but the web is a service that operates over the internet, as e-mail does -> the World Wide Web is a system of interlinked hyper text documents accessed via the internet. 3- The world wide web was invented in 1989 by the English physicist Tim Berners Lee World Wide Web 1-Global Information medium 2-www is a service that operates over the internet 3-www was invented in 1989 by the English physicist Tim Berners - Lee Internet 1-Global Network 2-Internet is not a service 3-ARPNET was the first internet, invented by ARPA.
How can we protect small office or home office or computer network? 1- Install or implement basic hardware firewall at the gateway 2- Install Antivirus software (AVG, McAfee, E-scan, Symantec etc) 3- Use username & password for all user accounts 4- Assign Static IP Address to all client computers 5- When using a wireless connection, use the strongest security technique such as WPA or WPA2 6- Install a fairly strong hardware firewall 32
Mohamed Simad 7- Install a proxy server to keep unwanted people out. 8- Install antivirus server and update it regularly. 9- For authentication, use strong password and change it on weekly base.
B - 49
Various Memory 1. 2. 3. 4. Main Memory Main memory is also known as internal memory, Primary memory, memory. Internal storage area in the computer, the term memory indentifies data storage that comes in form of chips and the word storage is used for memory that exists on disk or tapes. Main memory has arrays of boxes each of which can hold a single byte of information. ROM ROM PROM EPROM EEPROM SRAM DRAM SDRAM RDRAM DDR I DDR II DDR III RAM Cache memory Virtual memory Secondary memory Main memory
Characteristics of Main Memory Main memory is volatile memory CPU can directly access main memory (RAM) Storage capacity of main memory is very less compared to secondary storage devices.
Secondary memory (or) storage Characteristics of Secondary memory (or) storage Secondary storage devices are non volatile memory Permanent memory CPU access secondary storage devices through input / Output channels. Storage capacity is huge compared to main memory. 33
Mohamed Simad
B - 49
Secondary storage devices are used to store huge amount of data permanently for future use. Data is kept for a longer time on secondary storage devices. Secondary storage does not loss the data when the device is power down. Eg. Internal Hard Disk, External Hard Disk, CD/DVD, Floppy Disk, Magnetic Tape, Pen Drive
Virtual Memory Virtual memory is a computer system technique which use an application program the impression that it has contagious working memory. While in fact it may be physically fragmented and may even over flower on to disk storage.
800 MB
512 MB RAM
800MB
9.7 GB
Hard disk
Cache memory Cache memory is the smallest memory among all. Cache memory is the fastest memory among all. (Speed of cache memory is the equal to the speed of processor.) CPU contains cache memory. A cache memory is used by the processor (CPU) to reduce the average time to access the main memory (RAM)
Processor
Cache memory 34
Main memory
Mohamed Simad
B - 49
SRAM
DRAM
WINS & DNS WINS Windows Internet Name Service DNS Domain Name Service WINS & DNS are both name resolution service for TCP / IP networks. Environments that include some computers that use NetBIOS names (win-98, Win-NT, Win-me) and other computers that use domain names (win-XP, vista, 7, 2000, 2003, 2008) most include both wins and DNS servers. The server which provides wins services to the client computers is called as wins server. The server which provides DNS services to t he client computers is known as DNS servers. If you are using NetBIOS over TCP / IP you will need to have Wins server running so that each computer can find the correct IP address of the other to communicate. If you are using Domain names over TCP / IP you will need to have DNS server running so that each computer can find the correct IP address of the other to communicate.
What is an IP address? An IP address is a unique numeric identifier for a host, printer, router, modem, placed in network. An IP address (internet Protocol address) will allow the host to communicate with other host in a network. Networking devices will be assigned IP addresses in order to identify and communicate with each other in a network utilizing the internet protocol. Any participating network device including routers, switches, client and server computers, network printers, internet fax machines, modems, and some IP telephones can have it own IP address that is unique within the scope of the specific network. IP addresses are created and managed by the Internet Assigned Numbers Authorities (IANA). If IP address is not assigned to a computer that particular device cannot participate in the network. Type of IP address IP V4 32bits IP V6 128bits
35
Mohamed Simad Private IP 1. Non routable IP address 2. Un-Registered IP address 3. No need to pay for private IP address 4. Intranet purposes Public IP 1. Routable IP address 2. Registered IP address in the internet 3. Need to pay for public IP address 4. Internet Purposes
B - 49
Public IP address range Class A: 1-126 8/24 Subnet mask:255.0.0.0 Class B: 128-191 16/16 Subnet mask:255.255.0.0 Class C: 192-223
126.255..255.255
128.0.0.0 to
191.255.255.255
192.0.0.0 to 36
223.255.255.255
Mohamed Simad 24/8 Subnet mask:255.255.255.0 Class D: 224-239 (not defined) Subnet mask: (not defined) Class E: 240-255 (not defined) Subnet mask: (not defined)
B - 49
224.0.0.0 to
239.255.255.255
240.0.0.0 to
255.255.255.255
Special Purposes IP addresses 1. 2. 3. 4. 5. 0.0.0.0 to 0.255.255.255 default network address 127.0.0.0 to 127.255.255.255 Loopback IP address 255.0.0.0 to 255.255.255.255 Limited IP address Class D: Multicast Class E: Reserved for future use (or) research & development
Types of IP addresses IPV4 32 bits 192.168.1.1 We use classes in IPV4 class A,B,C,D,E It supports unicast broadcast and multicast 0.0.0.0 127.0.0.0 255.255.255.255 IPV6 128 bits A6C2:884F:C849:f 864:AC29:C375:Df1E (0-9,A-F) No classes in IPV4 It support unicast, multicast and anycast it doesnt support broadcast. 0:0:0:0:0:0:0:0 - protocol implementation. 0:0:0:0:0:0:0:1 - loop back IP address.
IP address class
27 -2=126
37