0% found this document useful (0 votes)
90 views

Hardware and Networking

Uploaded by

Harsha Shetty
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
90 views

Hardware and Networking

Uploaded by

Harsha Shetty
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

Mohamed Simad

B - 49

Hardware and Networking

Hardware
The physical component of a computer is known as hardware.

Screen Speaker

System Unit / Cabinet

Web cam

Printer Mouse Scanner Key board Joy stick Headphone / Microphone

Internal hardware devices Mother board Processor RAM & ROM Hard disk 1

Mohamed Simad SMPS (switch mode power supply) CD/DVD drive AGP card NIC card Sound card

B - 49

External hardware devises Key board Mouse Monitor Scanner Printer Webcam Headphone & Microphone Joy stick Speaker

Q. List out any 10 input devises and 5 output devises.


1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Input devises Key board Mouse Scanner Microphone Joy stick Track ball Light pen Touch screen Web came Bar code reader 1. 2. 3. 4. 5. 6. Output devises Printer Monitor Speaker Projector Head phone Plotter

Mohamed Simad

B - 49

Network Topologies 1. What is Topologies? Topology is the shape of the network. 2. What are the types of Topologies? Bus Topology Star Topology Ring Topology Mesh Topology Hybrid Topology 3. What is the first topology? Bus topology 4. What is the most common topology now? Star topology

Bus Topology All the computer (servers, client computers) and other networking devices (Printers) are connected in a linear Backbone Cable. Printer Client 1 Client 3

Backbone cable (Coaxial cable)

T connector Terminator Terminator

Client 2 3

Server

Mohamed Simad

B - 49

Both end of the back bone cable is terminated by the terminators. All the computers are connected with a backbone cable by using T connectors. The terminators at the both ends prevent the data from data loss and prevent the data signals to bounce back.

Advantages of Bus topology It is very cost effective (cheap to implement No need of switch and hubs

Disadvantages of Bus topology Scalability is very less If there is any problem in the backbone cable or connectors, the entire network will fail. It is suitable only for small network.

Star Topology

Printer Client 1 Client 2

Switch

Client 5 File server

Database server

Client 3

4 Client 4

Mohamed Simad

B - 49

All the components and other networking devices are connected with the centralized hub or switch. Star topology is one of the most common computer network topology today.

Advantages of star Topology Scalability is very high. Better performance. Isolation of devices. Simplicity

Disadvantages of star Topology The primary disadvantage of star Topology is the high dependence of the centralized hub or switch. If the centralized hub or switch fails due to power failure or hardware failure the entire network will fail.

Ring Topology

Client 1

Client 4

Client 2

Client 3 5

Mohamed Simad

B - 49

Client 1

Ring

Client 4

Client 2

Client 3

Computers are connected in a ring like fashion. Each nod connected to exactly two other nodes forming a single continues pathway for signals to travel through each node. Data travels from node to node. It works based on token Ring standards. Data flow in unidirectional in ring topology. Token contains the data, source MAC address and Destination MAC address.

Advantages No data collision Because data flow is unidirectional Every computer acts as a repeater, it regenerates the signals (tokens) on its own. Does not require network server to manage the connectivity between computers. Performs better than a star topology under heavy network load. 6

Mohamed Simad Every device has access to the token and the opportunity to transmit.

B - 49

Disadvantages If any one of the node fails or any problem in the cable can create problems for the entire network. Slower than an Ethernet network. Network cards are expensive than Ethernet network cards. Moves, adds and charges of devices can affect the entire network.

Mesh Topology: All the computers are interconnected with every other computer in mesh topology. Dedicated connection.

Node 1

Node 2

Node 3

Node 4

Mohamed Simad

B - 49

Advantages: High fault tolerance Mesh network is very reliable. Mesh topology is suitable for wireless networks.

Disadvantages: It requires more cable segments and more network adaptors. It is highly impractical in wired networks.

Hybrid Topology
It is the combination of two network topologies. The resulting network does not exhibit one of the standard topologies (e.g. Star, Ring, etc.) Example: Star + Bus network = Hybrid topology.

BUS Terminator T-Connector Server


SWITCH SWITCH

Terminator

STAR 1

STAR 2

Mohamed Simad

B - 49

Client 1 Server

Client 2

Backbone cable (Coaxial cable)

T connector Terminator

Switch

Client 3 File server

Database server Client 5 Client 4


Switch

Client 6 Client 7 9

Mohamed Simad

B - 49

Types of networks:
1. 2. 3. 4. LAN MAN WAN PAN

LAN (Local Area Network): Distance Limit: 0 2kms Interconnection of computers (Server/Clients) and other networking devices (Printer, Fax Machines, IP Telephone, Scanner, Router, etc.,) for the purpose of file sharing and resources sharing with a small geographical area such as Network within an office building Networks between two office building (near <2kms) Networks at schools, colleges, universities Networks at hospitals, shops.

Switch

Printer File server

Client 1

Client 3

Client 2

10

Mohamed Simad MAN (Metropolitan Area Network):

B - 49

Distance Limit: 2 50kms Interconnection of computers (Server/Clients) and other networking devices (Printer, Fax Machines, IP Telephone, Scanner, Router, etc.,) for the purpose of file sharing and resources sharing between two buildings within the same metropolitan city or between two metro cities (not greater than 50kms).
Router Router

SWITCH
Server Printer Server

SWITCH
Printer

Client 1

Client 2

Client 3

Client

Client 1

Client 2

Client 3

Client

LAN 1 at Male

LAN 2 at Villingili

Power

Hub

Printer File server

Client 1

Client 3

Client 2

11

Mohamed Simad Protocol

B - 49

Protocol is set of rules that govern the information or data flow between computer within the network and between computer networks. There are number of protocols exist in computer networks.

SL No
1

Protocol
HTTP (Hyper Text Transfer Protocol() HTTPS (Hyper Text Transfer Protocol Secured) FTP (File Transfer Protocol) SMTP (Simple Mail Transfer Protocol) POP3 (Post Office Protocol version 3) DNS (Domain Name System) DHCP (Dynamic Host Configuration Protocol) Telnet(Telephone Network)

Port number
80

Uses
Unsecured web browsing.

443

Secured web browsing.

3 4 5 6 7

20 Data 21 Control 25 110 53 67 Server 68 - Clients 23

To download or upload files to and from the file server. (file transfer) Outgoing mail To send mail from your computer. Incoming mails to receive mails. To convert domain names in to Ip addresses and Ip address into domain name. To assign Ip address dynamically to all client computers in a network Text Based protocol Remote administraton

Hub
A hub is a small electronic devices, that joins multiple computers and other networking devices such as printers, routers, modems, together within a local area networking (LAN). A hub is common connection point for networking devices in a network. Hub receives signals from one device and broadcasts it to all other devices in the network.

12

Mohamed Simad

B - 49

Power

Hub

Printer File server

Client 1

Client 3

Client 2

Types of Hub 1. Active Hub 2. Passive Hub Passive Hub A passive hub passes signals along (or) broadcasts signals but has no addition capability ie, it doesnt contain amplifier to regenerate the signals. It doesnt require external power supply

Active Hub An active hub is a hub that includes a signal amplifier. It regenerate or amplifies signals and passes them along. It requires external power supply. Active hub = Hub + repeater 13

Mohamed Simad Switch

B - 49

Switch is a common connection point in a network to connect multiple computers and other networking devices together. It join multiple connectors and other networking devices within one local area network (LAN)

Switch

Printer File server

Client 1

Client 3

Client 2 Switch works at data link layer (layer 2) of the OSI model Switch are capable of inspecting data packets determining the source and destination devices of the packet and forwarding it appropriately.

Types of switch 1. Unmanaged switch 2. Managed switch Unmanaged switch There is no configuration interface in unmanaged switches We can configure unmanaged switch We cant create VLAN 14

Mohamed Simad Difference between hub and switch Hub Hub works in the physical layer of the OSI model; it is a layer 1 device. Hub always broadcasts data packets Hub shoes the band width Hub doesnt understand the MAC address Hub doesnt maintains the MAC table Network traffic and data collision is high

B - 49

Switch Switch works in the data link layer of the OSI model; It is a layer 2 device. Switch broadcasts data packets for the first time, second time own wards it unicasts data packets. Switch doesnt share the band width Switch can understand the MAC address Switch maintains the MAC table Network traffic and data collision is very less

Differences between switch and router Router Router is used to connect two different networks Router works in the network layer of the OSI model, It is a layer 3 devices. A router works on the principal of IP address Routers have their own in built operating system and they need to be configured before used. Routers are much more sophisticated and intelligent network device as compared to switches. A routers inbuilt hardware and software makes use of routing algorithms to compute the best possible path for routing data packets across different computer networks. Switch Switch connects different computers within one network. Switch works in the data link layer of the OSI model. It is a layer model. A switch work on the principal of MAC address. Most of the switches do not require any prior configuration and are usually ready to use. In comparison with router switches are less sophisticated and less intelligent. A switch does not perform any such activity.

Different between FAT and NTFS FAT File Allocation Table FAT volume can be converted to NTFS volume FAT does not support file compression FAT provides very little security. It support share level security only. It doesnt support file level and folder level security. FAT volume are recognized by all versions of windows O/S starting from win-98 up to win -7 NTFS New Technology File System NTFS cannot be converted to FAT32 volume NTFS support file compression & encryption NTFS provide high level security it supports share level, file level and folder level security. NTFS volume are not recognized by windows 95/98/ME (Lower version of windows)

15

Mohamed Simad Operating System Common diagram for OS Operating system is system software. It acts as an interface between the user and the computer hardware. Operating system provides an environment at which we can install all the applications. Without OS we cant boot the computer, we cant operate the computer. Operating system controls and manages the entire activities and resources of a computer.

B - 49

4 users 3 Application software (CorelDraw, Photoshop)

2 Operating system (XP, win95 1 Computer hardware

16

Mohamed Simad

B - 49

Over a certain period of time computer starts functioning slowly Troubleshooting steps Execute disk clean up tools to delete unnecessary files. Execute disk defragment tool to consolidate the fragmented files across the hard disk. Uninstall the unwanted, unnecessary application program from your computer. Managing your program and cleaning your registry can easily boost your computers performance speed up to 30% ( Registry-cleaner software) Increase virtual memory Scan the entire hard disk drive for viruses and other threats. Disable unnecessary startup items and programs in MS config.

Differences between RAM and ROM RAM 1-Random Access memory 2-Read and write operation is possible 3-User can interact with RAM 4-Volatile Memory 5-RAM is temporary memory ROM 1-Read only memory 2-Only read operation is possible / write is not possible 3-User cant interact with ROM 4-Non-volatile 5-ROM is permanent memory

Computer Power Supply The computers components would not be able to operate without power The device in the computer that provides this power is the switch mode power supply (SMPS) SMPS converts 110 volt to 230 volt AC current into the various DC voltages that a computer needs to operate. Various DC voltages we can get from an SMPS o +3.3 Volt DC o +5 Volt DC o -5 Volt DC - ground AT Motherboard ATX Motherboard o +12 Volt DC o -12 Volt DC -ground o +5 Volt DC -standby

17

Mohamed Simad

B - 49

Power supply connectors SMPS use 4 types of power connectors to power the various devices within computer 1- Floppy drive power connector 2- AT(Advanced Technology) system power connector 3- ATX(Advanced Technology Extended) system power connector 4- Standard Peripheral power connectors eripheral Each has a different appearance and way of connecting to the device. Each type is used for a specific purpose.

1. Floppy drive power connector - Floppy drive pc is smaller and flatter These connectors also called as berg connector connectors - There are 4 wires going to the connector. These wires carry the 2 voltages used by the motors and logic circuits. o +5 V DC carried on the red wire o +12 V DC carried on the yellow wire Plus 2 black ground wires - Color Coding

2. Standard Peripheral Power Connector - The standard peripheral power connector is generally used to power different types of internal disk drives Hard disk, CD Drive, DVD DVD-Drive except floppy drive. - This type of connector is called a Molex connector - This power connector, though larger than the floppy drive connector, uses the same wiring color larger code scheme as the floppy drive connector. 3. AT System Power Connectors: Dual Power Connector - There are two 6 wire connectors, labeled p8 and p9.

18

Mohamed Simad

B - 49

4. ATX Power Connector - ATX Power connector provides power supply to ATX motherboard vides - It provides the six voltages required plus it delivers then all through one connector a single 20 pin connector

Network interface card NIC connect a computer and other networking devices with a network Without NIC card a computer cannot participate in a network.

Two types of NICs: Wireless NIC Wired NIC

Now a day NIC is in built in the mother board. Interface is the place where data arrives or departs from a computer.

Name of port 45 connect NIC has got 1 RJ-45 port to conne a computer with a network.

ASCII (America Standard Code for In Information Interchange) ASCII is code for representing English character (alphabet) and special symbols as numbers, with each letter assigned number from 0 to 127. Most computer use ASCII codes to represent text, which makes it possible to transfer data from codes one computer to another. ASCII developed from telegraphic codes. ASCII was developed under the auspices of committee of the American Standards Association, called the X3 committee.

Unicode 19

Mohamed Simad

B - 49

Unicode provides a unique number for every chapter, no matter what the O/S, no matter what the program, no matter what the language. The Unicode standard has been adopted by such industry leaders Apple, HP, IBM, Microsoft, Oracle, SAP, Sun, Sybase, Unisys character set. Microsoft software uses Unicode at its core. Major operating system windows, Macintosh, Linux, Unix, support Unicode.

EBCIDIC (Extended Binary Coded Decimal Interchange Code) Extended Binary Coded Decimal interchange Code EBCIDIC is an IBM code for representing character as numbers. Although it is widely used on large IBM computers, most other computers include PCs and Macintosh use ASCII codes.

Difference between FTP and TFTP FTP - File Transfer Protocol TFTP - Trivial File Transfer Protocol We use both FTP and TFTP protocol in a computer network to transfer file in between the computers TFTP TFTP uses UDP protocol TFTP doesnt require secure username and password Unsecured protocol TFTP less commands TFTP unreliable but faster than FTP TFTP uses UDP port 69

FTP FTP uses TCP protocol FTP needs secure user name and password Secured protocol FTP more commands FTP reliable but slower than TFTP FTP uses TCP ports 20 & 21

20

Mohamed Simad

B - 49

Motherboard layout
Processor fan Processor slot connector DIM memory modules Chassis cooling fan connector Key board connector PS2 ports Mouse connector Serial port Parallel port Floppy drive connector USB port BIOS memory chip Mother board power connector

VGA port Network port Game port Line in Line out Microphone PCI ports North Bridge Chipset IDE1 IDE0

IDE ports

Graphics (AGP port) CMOS battery South Bridge Chipset Inbuilt speaker

Ports and Slots on the motherboard 123456789101112Keyboard Connector to connect keyboard Mouse Connector to connect mouse Serial Port to connect serial printer, modem Parallel Port - to connect parallel printer USB Ports to connect USB devices Printer, Webcam, Scanner etc VGA Port to connect monitor , projector Network Port (RJ45) to connect network cable Game Port to connect joystick Audio Ports to connect external speakers, microphone, headphone PCI Slots to connect NIC card, Sound Card, VGA Card, MIDI card etc. Memory Slots to connect DIMM memory modules Power Connector to connect SMPS 20pin power connector 21

Mohamed Simad 13- AGP Port to connect graphics card 14- IDE Ports to connect disk storage devices (Hard disk, CD/DVD drive) sk 3 types of Internet Connection

B - 49

1. Dial-up: The internet connection that is established by using telephones and telephone lines as a medium is known as dialup internet connection. Telephone remains busy while ac accessing the internet A modem is used to connect the computer to the ISP. Once the connection is established an activity called handshaking takes place between the modem and the remote server.

The dialup internet connection is also known as transient connection. This is because the connection can be terminated by either the ISP or the other user Dialup connection supports up to 56kbps bandwidth.

2. Broadband: If any internet connection that support 512kbps or higher bandwidth will be considered as broadband internet connection. Broadband means a wide range of frequencies used to transmit and receive data. In broadband IC, the data transfer rates are very high as compared to the dialup internet connection. internet. We can use telephone while accessing the int

22

Mohamed Simad

B - 49

There are various types of broadband internet connections, depending upon the cost , speed and availability. 1. ADSL 2. SDSL 3. Wireless broadband 4. Cable broadband 5. Satellite broadband 6. Fiber optic broadband

3. Cable Internet Connection: Internet can be accessed via the cable TV connection The cable TV is used by almost everybody and now the internet connection is also made available along with the cable TV channels. Cable broadband Internet connection provides a speed ranging from 2mbps to 10 mbps It is more poplar compared to the ADSL internet connection The downloading and uploading speeds of cable & ADSL are the same

23

Mohamed Simad

B - 49

OSI Reference model


OSI Open System Inter Connection OSI model was designed by ISO International Standard Organization. OSI model is logical model; it is not a physical model. There are seven virtual layers in OSI model each layer performs a well defined function. Without OSI (or) TCP/IP model data communication is not possible between computer in a local area network as well as in the internet.

Sender PC at india

Receiver PC at USA

Application Layer

Application Layer

Presentation Layer

Presentation Layer

Session Layer Router at source ISP ISP Router at Destination

Session Layer

Transport Layer

Transport Layer

Network Layer

Network Layer

Network Layer

Network Layer

Data Link Layer

Data Link Layer Physical Layer

Data Link Layer Physical Layer

Data Link Layer

Physical Layer

Physical Layer

0101010011010110101

0101010011010110101

24

Mohamed Simad

B - 49

1. Application Layer This layer is point of contact between the user and the network therefore; it brings the basic network service to the user, such as file transfer, email, remote login. Protocols: HTTP, HTTPS, FTP, SMTP, Telnet, Pop3 2. Presentation Layer This layer deals with the syntax and semantics of the transmitted data, it processes the data so as to make it compatible between communicating tasks. This layers can covert, format, encrypt and compress the data 3. Session Layer This layer sets up and synchronizes the exchange between distant processes. It binds logical addresses for distributable tasks. 4. Transport Layer The layer is responsible for the good/reliable delivery of messages to the recipient / destination. Its main road is to take the messages of the session layer, split them in to smaller units (segments) and give them to the network layer. This layer can use one network connection to transport several messages at the same time using multiplexing unit. This layer is also responsible for flow control. The information unit for this layer is the message or segment. Protocols in Transport layer(TCP/UDP) 5. Network Layer This layer is in charge of sub network ie. The routing packets over the subnet work and the inter connection on the various sub networks. The information unit for this layer is the ip packets. Protocols of the network layer: IP, IPSEP, ICMP, IGMP, RIP, IGRP, EGRP, OSPF.

Transport Layer

Segment 1

Segment 2

Segment 3

Segment 4

Segment 5

Network Layer

IP

IP

IP

IP
IP Packets

IP

IP

IP

Data Link Layer

Mac

Mac

Mac

Mac

Mac

Mac

Mac

Mac address

010011010101110011110101010101010110110101011001 25

Mohamed Simad

B - 49

Physical Layer
Binary Bits

6. Data Link Layer It has a role of binder, it splits input data of the sender in to frames since this frames in sequence and manages the acknowledgment frames send back by the receiver. An important role of this layer consists in detecting and correcting errors that occurs in the physical error. This layer integrates also a flow control function to avoid the blocking of the receiver. The information unit of this layer is data frame. Protocol: PPTP, L2TP, MAC, ARP, RARP. 7. Physical Layer This layer is in charge of the transmission of bits over a communication channel. This layer must guarantee perfect transmission of the data. The information of this layer is the binary bits. Devices at physical layer: Physical layer has no additional functionality, but it depend on data link layer for all the function Devices working at physical layer: Hub, repeater, Cable, connector such as RJ11, RJ45, Ethernet, token ring, ATM, Frame riley.

TCP / IP model
Application Layer Transport Layer
4

Internet Layer

Host - to Network layer (or) link layer

1. Application Layer This layer is point of contact between the user and the network therefore; it brings the basic network service to the user, such as file transfer, email, remote login.

26

Mohamed Simad This layer is immediately bound to the transport layer simply because the session and presentation layers in TCP/IP model are useless. Protocols: HTTP, HTTPS, FTP, SMTP, Telnet, Pop3

B - 49

2. Transport Layer The layer is responsible for the good/reliable delivery of messages to the recipient / destination. Its main road is to take the messages of the session layer, split them in to smaller units (segments) and give them to the network layer. This layer can use one network connection to transport several messages at the same time using multiplexing unit. This layer is also responsible for flow control. The information unit for this layer is the message or segment. Protocols in Transport layer(TCP/UDP) It has the same role as the transport layer of the original model. Its role is to split up the message to be transmitted into a form the internet layer can handle. 3. Internet layer This layer is in charge of sub network ie. The routing packets over the subnet work and the inter connection on the various sub networks. The information unit for this layer is the ip packets. Protocols of the network layer: IP, IPSEP, ICMP, IGMP, RIP, IGRP, EGRP, OSPF. This layer is responsible for the inter connection of the remote networks without establishing a physical connection. Its role is to inject packets in to any network and deliver to the destination independently to one another. 4. Host- to network layer This layer seems to cover both physical and data link layer of the OSI model. This layer has not been really specified the only constrain of this layer is to allow a host to send a IP packets of a network. There is no protocols Devices working at physical layer: Hub, repeater, Cable, connector such as RJ11, RJ45, Ethernet, token ring, ATM, Frame riley.

27

Mohamed Simad

B - 49

Packet format Application Layer Raw data HTTP packet

Presentation Layer

Session Layer

Transport Layer

Segment TCP packet

Network Layer

Packet IP packet

Data Link Layer

Frames Ethernet frames

A TCP packets resides within IP packet An IP packet resides within an Ethernet packet A HTTP packets resides within a TCP packet TCP Packet Sender port number Receiver port number Data

TCP packet contains only port numbers not the IP address or MAC address

IP Packet Sender IP address Receiver IP address Data

IP packet contain only IP addresses not the MAC address

Ethernet frame packet

28

Mohamed Simad

B - 49

Sender MAC address

Receiver MAC address

Data

Ethernet frames packet contains only MAC address not the IP address.

Compare and contrast OSI model with TCP/IP model


Similarities: They share similar architecture both of them are constructed with layers They share a common application layer Both models have comparable transport and network layers Both models assume that packets are switched; basically this means that individual packets may take different path in order to reach the same destination.

Differences OSI reference model Defined before advent of internet OSI model came into existence way before TCP/IP model was created ISO created OSI model Service, interface and protocols are clearly distinguished Inter- networking not supported Strict layering Less credible 8 7 layers TCP/IP reference model Defined after advent of internet TCP / IP model came into existence after OSI model DARPA created TCP / IP model Service, interface and protocols are not clearly distinguished TCP / IP support internetworking Loosely layered Less credible 8 4 layers

PC

Cross over cable

PC

PC DTE (data terminal equipment): PC, Router

switch

DCE (data communication equipment): Switch, modem Similar devices Cross over cable Dissimilar devices Straight through cable

29

Mohamed Simad Configuration cable Roll over cable Wireless communication Techniques Wireless communication is the transfer of information over a distance without the use of electrical conductors or wires.

B - 49

The distance involved may be 1. Short distance WC a few meters as in Television remote control. 2. Long distance WC thousands or millions of kilometers for radio communications (Radio, TV, broadcasting )

Wireless NIC

Wireless NIC

Source Pc

Wireless Router or WAP

Destination PC

Example of Wireless communication devices 1. 2. 3. 4. 5. 6. 7. Mobile phone (or) cellular phones Cordless telephones PDA (Personal Digital Assistant) Wireless computer networking Wireless mouse and keyboard TV remote control Satellite TV & Radio

Advantages of Wireless network Wireless communications permit services such as long distance communications, which are impossible or impractical to implement with the use of wires. It covers greater distance. No need of cables and connectors.

30

Mohamed Simad Energy we use to transfer data wirelessly. Radio frequency (RF) Infra red light or wave Laser light Visible light Sound energy Microwaves (or) electromagnetic wave

B - 49

Bluetooth Bluetooth is an open wireless protocol for exchanging data over short distance (using short length radio waves) from fixed and mobile devices. Bluetooth is a standard and a communication protocol primarily designed for low power consumption, with a short range based on low cost transceiver microchips in each devices. Bluetooth makes it possible for these devices to communicate each other when they are in range, because the devices use radio waves, they do not have to be in line of sight of each other.

Infrared Infrared radiation is electromagnetic radiation with the wave length between 07 and 300 micro meters, which equates to a frequency range between approximately 1 and 400 htz. Its wave length is longer when the frequency is lower Its wave length is Shorter when the frequency is higher Shorter Shorter infrared waves are not hot at all in fact you cannot even feel them. These shorter wave lengths are the ones used by your TVs remote control. Far infrared waves: we experience this type of infrared radiation everyday in the form of heat. The heat that we feel from sunlight, a fire, a radiator is infrared.

Wireless Fidelity (Wi-Fi) Wi-Fi is a wireless LAN technology that enables laptops, PDAs, and other devices to connect easily to the internet. Wi-Fi is sometimes called Wireless Ethernet Wi-Fi is less expensive and nearing he speeds of standard Ethernet and other common wirebased LAN technologies. Wi-Fi uses the same radio frequencies as Bluetooth but with higher power, resulting a stronger connection. Wi-Fi enables a faster connection, better ranges from the base station , and better security than Bluetooth.

31

Mohamed Simad

B - 49

Difference between plug & play and Non plug & Play. Plug and Play 1-No need to install device driver software, it will automatically install device driver and automatically configure the device settings 2-After connecting the device, it is ready to use Non Plug and Play 1-We must install device driver software for all non plug and play devices manually

2-After connecting the device we cant use the device until we install device driver 3-Pendrives, Hard disks(Internal, External) 3-Printers, Scanners, Web Cam, Plotter, NIC Card, CD,DVD Drives, USB Keyboard, Mouse etc Sound Card, AGP Card etc. Hot Swapping The ability to add and remove devices to a computer while the computer is running and have the operating system automatically recognize the change Two external bus standards 1- Universal Serial Bus (USB) 2- IEEE 1394 Support hot plugging

Differences between World Wide Web (WWW) and the Internet 1- The World Wide Web (www) or simply the web is global information medium. Users can read and write via computers connected to the internet. 2- The term is often mistakenly as a synonym for the internet itself, but the web is a service that operates over the internet, as e-mail does -> the World Wide Web is a system of interlinked hyper text documents accessed via the internet. 3- The world wide web was invented in 1989 by the English physicist Tim Berners Lee World Wide Web 1-Global Information medium 2-www is a service that operates over the internet 3-www was invented in 1989 by the English physicist Tim Berners - Lee Internet 1-Global Network 2-Internet is not a service 3-ARPNET was the first internet, invented by ARPA.

How can we protect small office or home office or computer network? 1- Install or implement basic hardware firewall at the gateway 2- Install Antivirus software (AVG, McAfee, E-scan, Symantec etc) 3- Use username & password for all user accounts 4- Assign Static IP Address to all client computers 5- When using a wireless connection, use the strongest security technique such as WPA or WPA2 6- Install a fairly strong hardware firewall 32

Mohamed Simad 7- Install a proxy server to keep unwanted people out. 8- Install antivirus server and update it regularly. 9- For authentication, use strong password and change it on weekly base.

B - 49

Various Memory 1. 2. 3. 4. Main Memory Main memory is also known as internal memory, Primary memory, memory. Internal storage area in the computer, the term memory indentifies data storage that comes in form of chips and the word storage is used for memory that exists on disk or tapes. Main memory has arrays of boxes each of which can hold a single byte of information. ROM ROM PROM EPROM EEPROM SRAM DRAM SDRAM RDRAM DDR I DDR II DDR III RAM Cache memory Virtual memory Secondary memory Main memory

Characteristics of Main Memory Main memory is volatile memory CPU can directly access main memory (RAM) Storage capacity of main memory is very less compared to secondary storage devices.

Secondary memory (or) storage Characteristics of Secondary memory (or) storage Secondary storage devices are non volatile memory Permanent memory CPU access secondary storage devices through input / Output channels. Storage capacity is huge compared to main memory. 33

Mohamed Simad

B - 49

Secondary storage devices are used to store huge amount of data permanently for future use. Data is kept for a longer time on secondary storage devices. Secondary storage does not loss the data when the device is power down. Eg. Internal Hard Disk, External Hard Disk, CD/DVD, Floppy Disk, Magnetic Tape, Pen Drive

Virtual Memory Virtual memory is a computer system technique which use an application program the impression that it has contagious working memory. While in fact it may be physically fragmented and may even over flower on to disk storage.

800 MB

512 MB RAM

Program Size Main memory 300MB 512 + 300 = 812 MB

800MB

9.7 GB

Hard disk

Cache memory Cache memory is the smallest memory among all. Cache memory is the fastest memory among all. (Speed of cache memory is the equal to the speed of processor.) CPU contains cache memory. A cache memory is used by the processor (CPU) to reduce the average time to access the main memory (RAM)

Processor

Cache memory 34

Main memory

Mohamed Simad

B - 49

1000 times faster than Main memory

SRAM

DRAM

WINS & DNS WINS Windows Internet Name Service DNS Domain Name Service WINS & DNS are both name resolution service for TCP / IP networks. Environments that include some computers that use NetBIOS names (win-98, Win-NT, Win-me) and other computers that use domain names (win-XP, vista, 7, 2000, 2003, 2008) most include both wins and DNS servers. The server which provides wins services to the client computers is called as wins server. The server which provides DNS services to t he client computers is known as DNS servers. If you are using NetBIOS over TCP / IP you will need to have Wins server running so that each computer can find the correct IP address of the other to communicate. If you are using Domain names over TCP / IP you will need to have DNS server running so that each computer can find the correct IP address of the other to communicate.

What is an IP address? An IP address is a unique numeric identifier for a host, printer, router, modem, placed in network. An IP address (internet Protocol address) will allow the host to communicate with other host in a network. Networking devices will be assigned IP addresses in order to identify and communicate with each other in a network utilizing the internet protocol. Any participating network device including routers, switches, client and server computers, network printers, internet fax machines, modems, and some IP telephones can have it own IP address that is unique within the scope of the specific network. IP addresses are created and managed by the Internet Assigned Numbers Authorities (IANA). If IP address is not assigned to a computer that particular device cannot participate in the network. Type of IP address IP V4 32bits IP V6 128bits

Classification of IP addresses Private IP address Public IP address

35

Mohamed Simad Private IP 1. Non routable IP address 2. Un-Registered IP address 3. No need to pay for private IP address 4. Intranet purposes Public IP 1. Routable IP address 2. Registered IP address in the internet 3. Need to pay for public IP address 4. Internet Purposes

B - 49

Private IP address ranges Class A: 10.0.0.0 to 10.255.255.255

Network part 8 |Host part 24 Subnet mask: 255.0.0.0

Class B: 172.16.0.0 to 172.31.255.255

Network part 16|Host part 16 Subnet mask: 255.255.0.0

Class C: 192.168.0.0 to 192.168.255.255

Network part 24|Host part 8 Subnet mask: 255.255.255.0

Public IP address range Class A: 1-126 8/24 Subnet mask:255.0.0.0 Class B: 128-191 16/16 Subnet mask:255.255.0.0 Class C: 192-223

Full Form 1.0.0.0 to

126.255..255.255

128.0.0.0 to

191.255.255.255

192.0.0.0 to 36

223.255.255.255

Mohamed Simad 24/8 Subnet mask:255.255.255.0 Class D: 224-239 (not defined) Subnet mask: (not defined) Class E: 240-255 (not defined) Subnet mask: (not defined)

B - 49

224.0.0.0 to

239.255.255.255

240.0.0.0 to

255.255.255.255

Special Purposes IP addresses 1. 2. 3. 4. 5. 0.0.0.0 to 0.255.255.255 default network address 127.0.0.0 to 127.255.255.255 Loopback IP address 255.0.0.0 to 255.255.255.255 Limited IP address Class D: Multicast Class E: Reserved for future use (or) research & development

Types of IP addresses IPV4 32 bits 192.168.1.1 We use classes in IPV4 class A,B,C,D,E It supports unicast broadcast and multicast 0.0.0.0 127.0.0.0 255.255.255.255 IPV6 128 bits A6C2:884F:C849:f 864:AC29:C375:Df1E (0-9,A-F) No classes in IPV4 It support unicast, multicast and anycast it doesnt support broadcast. 0:0:0:0:0:0:0:0 - protocol implementation. 0:0:0:0:0:0:0:1 - loop back IP address.

Special purpose IP address

IP address class

Total # of bits for networking id / Host id

First octect of IP address

Class A Class B Class C

8/24 16/16 24/8

0XXX XXXX 10XX XXXX 110X XXXX

# Of network ID bits used to identify class 1 2 3

Usable # of networking ID bits

Number of possible network

# Of host ID per Network ID

8-1=7 16-2=14 24-3=3

27 -2=126

2242=16,777,24 214=16384 216-2=65,534 21 2 =2,097,152 28-2=254

37

You might also like