1st Year Computer Notes
1st Year Computer Notes
Computer:
Computer is an electronic device which takes input (data) processes it and then produces an
output (data). The output can be stored in memory.
Computing devices:
Abacus:
It was the first device used in Asia for computing 5000 years ago. Computation was done by
sliding beads arranged on a rack.
Leibniz
It was a digital mechanical calculator invented by the German mathematician Gottfried
Wilhelm Von Leibniz around 1672 and completed in 1694. Leibniz‘s mechanical multiplier
worked by a system of dials and gears.
Difference Engine:
In 1822 an English Professor of Mathematics, Charles Babbage proposed a machine to
perform differential equations called Difference Engine.
Analytical Engine:
10 years after making Difference Engine, Babbage begins to work on first general purpose
computer called Analytical Engine.
Tabulating Machine:
The tabulating machine was an electromechanical machine designed to easily compute
information stored on punched cards. Invented by Herman Hollerith, the machine was
developed to help process data for the 1890 U.S. Census.
Calculator:
Vannevar Bush developed a Calculator for solving differential equations in 1931. The
machine could solve complex differentials.
All-Electronic Computer:
In 1940, John V. Atanasoff, a professor at Lowa State College and his graduate student,
Clifford Berry, invented All All-Electronic Computer that applied Boolean algebra to
computer circuitry.
Z3:
In 1941 German Engineer Kennard Zuse had developed a computer called Z3 to design
airplanes and missiles.
UNIVAC-I:
In 1951, Remington Rand, built the Universal Automatic Computer (UNIVAC), which
became the first commercial computer.
Modern Computing Devices:
The invention of transistor in 1948 is considered as a revolution because in digital computer
like ENIAC it quickly replaced the vacuum tubes.
The invention of IC (Integrated Circuit) started in the year 1958. In an IC millions of
transistors can be created and interconnected. The development of IC speeds up the process
of manufacturing the computer and also reducing the size and its cost. The early super
computers were based on transistors.
In 1971, Intel introduced Intel 4004, the first commercially available single chip
microprocessor. This was considered as the first single chip microprocessor in computer
history. This CPU was designed for calculators.
In 1981. IBM and Apple introduced computers for the home users, as a result desktop
computers were introduced and computers became more powerful and could be linked
together to form networks which ultimately led to the development of internet.
In 1981, the first IBM PCs were introduced into homes, schools and offices. These computers
looked much like the ones we are using. They had a Monitor, a mouse and a keyboard. The
World Wide Web, which was started in 1989, links up computers worldwide to provide
communication via e-mail. In 1993, the Intel had launched a very fast processor namely
Pentium chip that contained 3100000 transistors.
With the continued advancements in portable battery life, portable computers grew in
popularity in the 2000s. The same development encouraged the growth of laptop computers
and other portable computers allowed manufacturers to integrate computing resources into
cellular phones.
CLASSIFICATION OF COMPUTERS:
Based on size, performance and application areas, the computers are generally classified into
Microcomputers, Mainframe, Super and Mobile computers.
MICROCOMPUTERS:
A microcomputer is a small, relatively inexpensive computer with a microprocessor as
its central processing unit (CPU). It includes a microprocessor, memory, and minimal
input/output (I/O) circuitry mounted on a single printed circuit board.
A microcomputer is a computer with a central processing unit (CPU) as a microprocessor.
Designed for individual use, a microcomputer is smaller than a mainframe or a
minicomputer.
The term microcomputer is not as commonly used as it was during the 1970s-1980s. We now
refer to microcomputers as, simply, computers, or personal computers (PC).
Types of Microcomputers:
A desktop computer: is a personal computer designed for regular use at a single location on
or near a desk or table due to its size and power requirements. The most common
configuration has a case that houses the power supply, motherboard (a printed circuit
board with a microprocessor as the central processing unit (CPU), memory, bus, and other
electronic components), disk storage (usually one or more hard disk drives, optical disc
drives, and in early models a floppy disk drive); a keyboard and mouse for input; and
a computer monitor, speakers, and, often, a printer for output. The case may be
oriented horizontally or vertically and placed either underneath, beside, or on top of a desk.
A notebook computer: is a battery- or AC-powered personal computer generally smaller
than a briefcase that can easily be transported and conveniently used in temporary spaces
such as on airplanes, in libraries, temporary offices, and at meetings.
A laptop computer: is a battery- or AC-powered personal computer generally smaller than a
briefcase that can easily be transported and conveniently used in temporary spaces such as on
airplanes, in libraries, temporary offices, and at meetings. A laptop typically weighs less than
5 pounds and is 3 inches or less in thickness. Among the best-known makers of laptop
computers are IBM, Apple, Compaq, Dell, and Toshiba.
A handheld computer: is a computer that can conveniently be stored in a pocket (of
sufficient size) and used while you're holding it. Today's handheld computers, which are also
called personal digital assistants (PDAs), can be divided into those that accept handwriting as
input and those with small keyboards.
MAINFRAME COMPUTERS:
Mainframe computers are computers used primarily by large organizations for critical applications;
bulk data processing, such as census, industry and consumer statistics, enterprise resource planning;
and
Transaction processing. They are larger and have more processing power than some other classes of
computers: minicomputers, servers, workstations, and personal computers. Mainframe computers are
reliable often used as servers. Several manufacturers produced mainframe computers from the late
1950s through the 1970s.
SUPERCOMPUTER:
A supercomputer is a computer with a high level of performance compared to a general-
purpose computer. Performance of a supercomputer is measured in floating-point operations
per second (FLOPS) instead of Billion instructions per second (BIPS). As of 2017, there are
supercomputers which can perform up to nearly a hundred quadrillion FLOPS. As of
November 2017, all of the world's fastest 500 supercomputers run Linux-based operating
systems.
Supercomputers play an important role in the fields including quantum mechanics, weather
forecasting, climate research, oil and gas exploration, airplane and spacecraft aerodynamics,
and
Nuclear fusion.
The fastest supercomputer is TOP500 in the United States, with a score of 122.3 PFLOPS.
Super computer used in:
1970s Weather forecasting, aerodynamic research (Cray-1)
2010s Molecular Dynamics Simulation (Tianhe-1A)
MOBILE COMPUTERS:
Mobile computers allow processing and transaction of data via a computer or wireless
enabled device without having to be connected to wires. Mobile computers are devices which
are used for mobile computing. These devices include Laptops, smart phones, Tablets and
Personal Digital Assistants.
These are capable of sending and receiving signals. They operate in full-duplex mode i.e.
they can send and receive signals at the same time. They are wireless devices.
Hardware:
They physical parts of computer that can be touched and replaced. They can damage physical
means they can break and burn. E.g. Keyboard, mouse and hard disk etc.
Hardware Software
Physical parts of the computer are A set of instructions given to the computer
called hardware. is called software.
You can touch, see and feel hardware. You cannot touch and feel software.
Software:
Software is defined as ―a collection of instructions that enable the user to interact with a
computer, its hardware, or perform tasks. Without software, most computers would be
useless. It is nonphysical component of computer system. For example, without your
Internet browser software, you could not surf the Internet or read this page and without an
operating system, the browser could not run on your computer.‖
Types of Software:
There are two types of software:
System software and applications software.
System software:
Is the software used to manage and control the hardware components and which allow
interaction between the hardware and the other types of software?
Types of System Software:
Operating system: an essential collection of computer programs that manages resources and
provides common services for other software. Supervisory programs, boot
loaders, shells and window systems are core parts of operating systems. In practice, an
operating system comes bundled with additional software (including application software) so
that a user can potentially do some work with a computer that only has an operating system.
Device driver: a computer program that operates or controls a particular type of device that
is attached to a computer. Each device needs at least one corresponding device driver; thus a
computer needs more than one device driver.
Utility software: is software such as anti-virus software, firewalls, disk defragmenters and so
on which helps to maintain and protect the computer. Much utility software is provided
within the operating system and can be directly used from the user interface. Windows
Defender is the malware and infected files detecting and repairing tool. System tools include
system restore to recover from stored restore point.
Language Translators: Software used to translate the source code (program written in
computer language like C++) into machine code.
There are three types of language processors:
Compilers:
These are translator programs used to translate code written in high level language into
machine code. It reads the whole code finds the errors and indicates them and suggests the
remedy. One all the errors are removed it translates the code into machine code and creates
file of it and then executes it. Compilers are complex soft wares than the interpreters.
Interpreters:
These are the translation software‘s used to find errors in line by line fashion, if there is no
error in the line translates it and executes it, then it reads the second line finds errors if correct
translates it and then executes it. If there is an error in the line, it suggests the remedy and
after the correction it starts from the start. So it is slow because it wastes a lot of time. It is
simple to create than compilers. It does not create any file like compilers.
Assemblers:
Assembler is the translation software of Assembly language. It converts the assembly
language statements into machine language.
Application Software:
(Also known as 'apps') are designed to allow the user of the system complete a specific task
or set of tasks. They include programs such as web browsers, office software, games and so
on. They aren't concerned with the management or maintenance of the system itself.
Productivity software:
a. Word Processing software:
Like MS-Word, Word perfect, Word Star and in page etc. These software packages
are used for producing and saving well laid out documents such as letters, books,
memos and reports.
b. Desktop publishing software:
Such as PageMaker, Ventura, Frame maker and page plus etc. Among other things
these are used to produce Magazines, newsletters and advertisements.
c. Spread Sheet Packages:
Like MS-Excel, Lotus-123, Super Calc and so on. These packages are mostly used for
working with numbers, producing accounts and tabulated numerical information of all
types.
d. Database Packages:
Like MS-Access, Paradox, Dbase III Plus and FoxPro etc. These are used for the
storage and retrieval of information. Databases are used in thousands of different
applications from Airline Booking System to Mail Order and Invoicing system.
e. Multimedia Packages:
They allow you to play audio, video and open graphics. Like Paint, Paint Brush and
Corel Draw are used to produce artwork, 3-Dimentional images and special textual
effects.
Business Software:
Any software that helps you to increase or measure productivity is called business software.
Business software includes Marketing software, payroll system, communication software and
accounting software etc.
Entertainment Software:
Entertainment software allows a computer system to be used as an entertainment tool. Some
examples of entertainment software are Media Player, video games etc.
Educational Software:
Educational software allows a computer system to be used as a teaching and learning tool.
Some examples of educational software are:
Computer Based Training (CBT): This application software is used for the purpose of
training.
Example: A training software for pilots how to fly an airplane and also for doctors to train
them.
COMPUTER:
Computer is an electronic device that takes data as an input, processes it and then produces
data as an output. Computer output is fast and accurate than humans.
Computer has four main components:
Input unit.
Processing unit.
Memory unit.
Output unit.
Input:
The signal or data (pictures, video, text and sound) given to the computer for processing is
called input.
Input Devices / Input unit:
It consists of those devices which helps users to input the data or signals into the computer in
digital form (digitization).
Keyboard, mouse, joy stick, scanner, camera and microphone etc. are input devices.
Written By Mehran Ali Master Of Computer Science Page 7
Unit-1 Introduction To Computer
KEYBOARD: This is most commonly used device which acts as input device. Its structure
is like typewriter. It contains number of buttons called keys.
Function keys: F1, F2, F12. Every key is used to perform specific function, often used in
combination of other keys.
Numeric keys: 0, 1, 2, 3, 9. used to write numbers.
Alphabetic keys: a, b, c, z used to write letters.
Special keys:!,@,#,$ and so on.
Arrow keys: used to move cursor up, down, left and right.
Control, shift, alt are used to control different operations, often used in combination with
other keys.
Pointing device: is an input interface that allows a user to input data to
a computer. CAD systems and graphical user interfaces (GUI) allow the user to control and
input data to the computer using mouse or similar device. Movements of the pointing device
are echoed on the screen by movements of the pointer (or cursor) and other visual changes.
Common uses are point and click and drop. Commonly used pointing device is the mouse.
MOUSE
This is a pointing and drawing device. Which contains a ball in its base and is connected to
the system unit through serial port? When the mouse is moved on any surface, the pointer on
the screen is also moved. It contains a potentiometer coupled with the roller. This
potentiometer senses the motion of mouse & converts it into digital value. A mouse may
contain two or three buttons. Now a day's optical mouse is very popular.
TRACKBALL:
A trackball is a pointing device consisting of a ball housed in a socket containing sensors to
detect rotation of the ball about two axes, similar to an upside-down mouse: as the user rolls
the ball with a thumb, fingers, or palm the pointer on the screen will also move. Tracker balls
are commonly used on CAD workstations for ease of use, where there may be no desk space
on which to use a mouse. Some are able to clip onto the side of the keyboard and have
buttons with the same functionality as mouse buttons. There are also wireless trackballs
which offer a wider range of ergonomic positions to the user.
JOYSTICK:
It is an input device, having a handily that rotates over its axis in 3600 to control the object. It
has few buttons to give input. It may be used to control the camera or used in gaming.
TOUCH SCREEN:
A touch screen is a monitor screen that allows users to interact with a computer system by
touching an area of the display screen. The screen is covered with a clear plastic layer that
has a matrix of cells. A user touches a graphic button that displays option on the screen.
Touch screens are easy to use.
TOUCHPAD:
A touchpad or track pad is a flat surface that can detect finger contact. It is a stationary
pointing device, commonly used on laptop computers. At least one physical button normally
comes with the touchpad, but the user can also generate a mouse click by tapping on the pad.
Advanced features include pressure sensitivity and special gestures such as scrolling by
moving one's finger along an edge.
DIGITAL CAMERA:
As the name specifies, these camera stores the data digitally, which then can be stored in the
computer & can be stored for a long time. These are very popular because of less expensive
photographs & Speed.
LIGHT PEN:
It is a pointing device which contains a photocell mounted at its tip. It senses the light from
the screen when it becomes closer to the screen, & generates a pulse. So for identifying a
particular location on the screen these light pens are very useful. But this is not in very much
use these days.
MIC's or MICROPHONES:
A microphone also called a mic is a voice input device. It uses special sensor that converts
sound into an electrical signal. Microphones are used in many applications such as
telephones, tape recorders and hearing aids.
SCANNER:
The scanner is an input device like the photocopier machine which makes the electronic copy
of the picture or document which can be further edited.
Hand 3D scanner:
Handheld 3D scanners are used in industrial design, reverse engineering, inspection and
analysis, digital manufacturing and medical applications. "To compensate for the uneven
motion of the human hand, most 3D scanning systems rely on the placement of reference
markers, typically adhesive reflective tabs that the scanner uses to align elements and mark
positions in space.
Flatbed:
This type of scanner is sometimes called a reflective scanner because it works by shining
white light onto the object to be scanned and reading the intensity and color of light that is
reflected from it, usually a line at a time. They are designed for scanning prints or other flat,
opaque materials but some have available transparency adapters, which for a number of
reasons, in most cases, are not very well suited to scanning film.
Optical scanner:
Computer input device that uses a light beam to scan codes, text, or graphic images directly
into a computer or computer system. Bar-code scanners are used widely at point-of-sale
terminals in retail stores. A handheld scanner or bar-code pen is moved across the code,
which immediately processes the data in the bar code.
MAGNETIC CARDS/DEVICES BASED SYSTEMS:
Magnetic Ink Character Reader (MICR):
This device is used to recognize the characters encoded using special magnetized ink that
contains Ferric Oxide. Such characters are mostly written along the bottom of bank's cheques
and are used to identify the bank number and the customer account number. Similarly the
amount of money is also encoded on the cheque by the bank operator for processing. These
devices can process 1000 cheques per minute. Certain utility companies like gas, electricity
and credit card companies may also use this method of data capture to input and process large
volumes of data.
Bit-Mapped Printers: Images are formed from groups of dots and can be placed anywhere
on the page. They have many printing options and good printing quality. They use PostScript
as a standard language for instructing a microcomputer.
Character-based Printers: Printer print characters into the lines and columns of a page.
These printers use predefined set of characters and are restricted in position of characters.
Microcomputers use four kinds of printers. They are chain printers, dot-matrix printers, ink-
jet printers, and laser printers.
Dot-Matrix Printer:
Dot-matrix printers are printers that write characters and form graphic images using one or
two columns of tiny dots on a print head. The dot hammer moving serially across the paper
strikes an inked-ribbon and creates images on paper.
Dot matrix printers are popular printers used with microcomputers, because the printers are
highly reliable and inexpensive. They are used for tasks where a high-quality image is not
essential. Many users, however, move from dot printers to laser printers, because the price of
laser printers is falling down. Several kinds of dot matrix printers are available with print
heads that have 7, 9, 18, or 24 pins.
Drum printer:
In a typical drum printer design, a fixed font character set is engraved onto the periphery of a
number of print wheels, the number matching the number of columns (letters in a line) the
printer could print. The wheels, joined to form a large drum (cylinder), spin at high speed and
paper and an inked ribbon is stepped (moved) past the print position.
As the desired character for each column passes the print position, a hammer strikes the paper
from the rear and presses the paper against the ribbon and the drum, causing the desired
character to be recorded on the continuous paper.
Full set of hammers (and delivering, for example 600 lines-per-minute of output) and a half
set of hammers (delivering 300 LPM).
Chain Printer:
A chain printer uses a printing mechanism that uses character typefaces linked together in a
chain. The chain spins horizontally around a set of hammers aligned with each position.
When the required character is in front of the selected print position, hammer in that position
hits the paper into the ribbon against the character in the chain.
This printer is not commonly found around microcomputers, because it is a very expensive,
high-speed machine designed originally for mainframes and minicomputers. Chain printers
are very reliable and can speed up to 3000 lines per minute.
Ink-Jet Printer:
Ink-jet is a printer mechanism that sprays one or more color of ink at high speed onto the
paper and produces high-quality printing. This printer also produces color printing as well as
high-quality image. That is, ink-jet printers can be used for variety of color printing at a
relatively low cost. Ink-jet printing has two methods: Continuous stream method and drop-
on- demand method.
LASER Printer:
The laser printer produces high-resolution letters and graphics quality images.Coloured
LASER printer is also available in the market; a less expensive, desktop gray scale laser
printer is widely used. Then the images on the drum are treated with a magnetically charged
toner and then are transferred onto a paper. A heat source is usually applied to make the
images adhere. In 1984, Hewlett-Packard introduced the first desktop laser printer, called the
LaserJet.
3. Plotters:
Plotters are large printer type devices. Instead of using ink cartridges, plotters use pens to
draw the output on to paper. With different coloured pens, plotters can produce colour output.
Plotters are capable of producing very accurate drawings and plans. They are most often used
in computer aided design (CAD).
Drum plotter:
A type of pen plotter that wraps the paper around a drum with a pin feed attachment. The
drum turns to produce one direction of the plot, and the pens move to provide the other. The
plotter was the first output device to print graphics and large engineering drawings. Using
different colored pens, it could draw in color long before color inkjet printers became
available. Contrast with flatbed plotter.
Flatbed plotter:
a graphics plotter that contains a flat surface that the paper is placed on. The size of this
surface (bed) determines the maximum size of the drawing. Contrast with drum plotter.
Speakers:
Speakers receive the sound in the form of electric current from the sound card & convert it to
sound format. These are used for listening music, chatting, seminars for presentations etc.
Soft copy output:
A soft copy (sometimes spelled "softcopy") is an electronic copy of some type of data, such
as a file viewed on a computer's display or transmitted as an e-mail attachment. Such
material, when printed, is referred to as a hard copy .
Hard copy output:
A hard copy (or "hardcopy") is a printed copy of information from a computer. Sometimes
referred to as a printout, a hard copy is so-called because it exists as a physical object. The
same information, viewed on a computer display or sent as an e-mail attachment, is
sometimes referred to as a soft copy
Bit:
Bit is the smallest unit of memory. It can store only 1 or 0. ‗1‘ means ‗On‘ and ‗0‘ means
‗Off‘.
Byte:
Eight bits combines to form Byte of memory. To save single character we need 1 Byte. E.g.
to save the word ALI, 3 Bytes are used.
Memory Word:
A fixed group of bits that are handled together by the system are called memory word. The
number of bits in a word may be 16, 32 or 64 bits. A computer with bigger word size can
process more bits at a time hence improves speed of the system.
Memory:
It is used to store data and instructions temporarily (Primary Memory e.g. RAM, Registers
etc.) or permanently (Secondary Memory e.g. Hard Disk, USB Flash Drive etc.).
COMPUTER ARCHITECTURE:
Computer architecture means the combination of different hardware parts within the
computer system. In other words, we can say that computer architecture is the way to
organize the four main components and connect them to obtain a complete computer system
in working condition. Four main components are given below:
1. input/output peripherals
2. processing unit
3. primary memory
4. secondary memory
SYSTEM UNIT:
It is one of the major parts of computer system. It consists of Mother Board, CPU,
Memory, Disk Drives, Power supply units, Cards etc.
PROCESSING UNIT:
This is also called the central processing unit (CPU) or simply processor. This is the
administrative section of the computer which supervises the operation of other computer
units. The CPU is connected with all I/O devices, storage units and to all other ports of
computer system. CPU is also called the heart and brain of computer system.
It is the fact that without brain human body is useless. Similarly computer machine is
nothing without CPU.
The CPU supports the actual processing of the data i.e. it captures the data from the
input unit, processes it internally and finally prepares the output (information) for output
devices.
CPU performs all processing and controls the I/O activities. The CPU is further
collection of three main subunits. I.e. Arithmetic Logic Unit (ALU), Control Unit (CU) and
the Memory unit.
a. ARITHMETIC LOGIC UNIT:
It is the manipulating part of the CPU. As the name indicates, it is also called the
calculation box. It is capable to perform Arithmetic operations such as addition, subtraction,
multiplication, division, square root and exponentials as well as logical operations including
less than (<), greater than (>) and equal to (=). A special type of processor called Coprocessor
performs the different scientific computations and complex mathematical functions. Speed of
the processor is measured in Mega Hertz (Mz) or Giga Hertz (GH).
Few registers are associated with this unit which holds the data temporarily and
passes it on for processing whenever required.
The two registers feed the two binary numbers on which ALU will operate. These
numbers are referred to as operands and the ALU operates on them in accordance with the
control inputs coming from the control unit.
For Example
If two numbers are to be added say 5 and 9. So one operand (i.e. 5) is stored in the data buffer
register (B) and the other operand (i.e. 9) is stored in the Accumulator Register (A). The
control inputs determine what the ALU will do with these operands. The result of the
operation (which is 14) is transferred to the Accumulator.
The logical operations make it possible for the computer to make decisions on the result of
comparing one item with another one.
ALU performs these operations at a very high speed i.e. even in milliseconds.
Control UNIT:
It is functional component of the computer. It is nerve Centre of entire computing system. It
coordinates and controls the entire computer system just as the brain directs the human body.
It supervises all the activities of various components of the computer system.
Besides it schedules the I/O operations. It itself does nothing but however, directs other parts
to do so.
Control unit is just like the traffic policeman in computer system, who signals the vehicles for
maintaining the entire traffic system or in simple words; it controls the flow of data inside the
computer.
PRIMARY MEMORY OR MAIN MEMORY:
It is also called simple memory. It is faster than secondary memory. Its cost per storage is
higher than secondary memory as it is a circuit. It retains the information so that the
information is available for processing, when it is needed. It also serves as storage for the
results of operation performed by the ALU. The main memory operation is controlled by the
control unit, which signals either a READ or WRITE operation and provides the appropriate
memory address. Data that is to be written into Main memory can come from ALU or the
input unit, again under the control of control unit. Data that is read from memory can be sent
to ALU or the output unit.
The path through which data is send to Memory or data is received from memory is called a
Bus.
There are two types of Main memory.
1. RAM:
RAM stands for Random Access Memory. A better name for it might be READ/WRITE
memory because information can either be read from or written to the RAM.
This is the memory whose information can be erased or changed. RAM is temporary
memory, so the major disadvantage of RAM is that anything stored inside it are washed out
when the computer is switched off, so it is also called volatile memory (means that
information is lost on shutting down the computer system)
B.DYNAMIC RAM:
Dynamic RAM is the most common type of memory in use today. Inside a dynamic RAM
chip, each memory cell holds one bit of information and is made up of two parts:
a transistor and a capacitor. DRAM is made of cells that stores data as charge on capacitors.
The absence of charge is 0 and presence is represented as 1. It requires charging periodically.
Types of DRAM are SDRAM and DDR SDRAM.
SDRAM (synchronous DRAM):
SDRAM (synchronous DRAM) is a generic name for various kinds of dynamic random
access memory (DRAM) that are synchronized with the clock speed that the microprocessor
is optimized for. This tends to increase the number of instructions that the processor can
perform in a given time.
DDR SDRAM (double data rate SDRAM):
DR SDRAM (double data rate SDRAM) is synchronous dynamic RAM (SDRAM) that can
theoretically improve memory clock speed to double. It reads or writes two consecutive
words per clock cycle.
Types of DDR SDRAM:
DDR1 RAM (Double Data Rate),DDR1 RAM and DDR3 RAM ranging in speed from 100
MHz to 2000 MHz SDRAM comes in sizes of 512 MB to 4 GB.
DDR2 RAM reads or writes 4 words of data per clock cycle whereas, DDR3 RAM reads or
writes 8 words of data per clock cycle.
ROM:
ROM stands for Read Only Memory. As the name depicts information can only be read from
ROM and not written to it. It is permanent memory which stores the built-in information from
the computer manufacturers used to load the operating system files from hard disk into RAM
called booting of computer and these instructions are non-volatile.
Types of ROM:
PROM, EPROM and EEPROM.
PROM:
Programmable read-only memory (PROM) is read-only memory (ROM ) that can be
modified once by a user. PROM is a way of allowing a user to modify a microcode program
using a special machine called a PROM programmer. This machine supplies an electrical
current to specific cells in the ROM that successfully blows a fuse in them. The process is
known as burning the PROM.
EPROM:
EPROM (erasable programmable read-only memory) is programmable read-only memory
(programmable ROM) that can be erased and re-used. Erasure is caused by shining an intense
ultraviolet light through a window that is designed into the memory chip.
EEPROM:
EEPROM (electrically erasable programmable read-only memory) is user-modifiable read-
only memory (ROM) that can be erased and reprogrammed. EEPROM chip has to be erased
and reprogrammed as a whole, not selectively. It also has a limited life - that is, it can be
reprogrammed 10000 times. A special form of EEPROM is flash memory.
SECONDARY MEMORY:
That type of memory which is permanent. It is also called auxiliary memory. It is non-volatile
memory. The stored data can be read any time if it is stored on secondary storage. It is slow
technology than primary memory. These are removable devices means we can carry them to
move data from one to another computer. Storage capacity of this device is large.
MAGNETIC TAPES:
These are also secondary storage devices. That stores data in sequential way. The data can be
retrieved only in sequence. If the file to be read is 20th file. Files from 1 to 19 will also be
read once to reach 20th. Tape is made up of magnetic material which is enclosed in plastic
jacket. Its reading is slower than Hard disk and CD due to sequential nature of storage. There
are no addresses on tapes.
MAGNETIC DISKS:
FLOPPIES:
Another kind of secondary storage device. It is smaller in size and capacity than hard disk. Its
capacity may be 1.44 MB. Floppies are magnetic coated (Ferric Oxide) circular plastic tapes
enclosed in plastic jacket. New floppy is formatted before use to create sectors and tracks to
make it able to store data. In floppies data was saved in different addresses. They also had a
write protect button to forbid writing, when it was enabled.
ZIP DISKS:
A Zip disk was an advanced version of the floppy disk. The disk needed a special drive called
the Zip drive in order to be used. Zip disks were available in 100-MB and 250-MB capacities
and were used to store, share and back up large amounts of data, which was not possible with
ordinary floppy disks.
HARD DISK:
It is secondary storage device. It is combination of circuit and thick metallic plates. They are
permanently sealed in metallic jacket to protect from dust and moisture. Each plate is
polished with magnetic material (Ferric Oxide). Each plate has one Read and one Write head.
They are faster media than floppies. They are costly due to large space. I.e. 500 GB or 1TB.
They are rarely removed to take data to another computer. Data of hard disk is accessible
directly as all data has addresses on hard disk. To use hard disk it is formatted and many
partitions can be created e.g. C, D, E and F etc., to use disk space efficiently. HDDs are
connected to systems by standard interface cables such as PATA (Parallel ATA), SATA
(Serial ATA), USB or SAS (Serial Attached SCSI) cables.
HDD has two electric motors; a spindle motor that spins the disks and an actuator (motor)
that positions the read/write head.HDDs spin at either 5,400 rpm or 7,200 rpm.
New Hard disk is formatted before use, to create sectors (slices) and tracks (circular rings) on
it. Sectors have blocks in which data is stored. A few of the most popular hard drive
manufacturers include Seagate, Western and Digital.
OPTICAL DISK:
COMPACT DISK (CD):
It is also a secondary storage device. This is used to read data stored on it with the help of
CD-ROM Driver. To write on CD-ROM we use CD-Writer. It is also called optical disk
because LASER beam is used to read data. Disk is made up of plastic, having diameter of
4.75 inches and capacity of 700 or more. There are two types of CD-ROMs:
a. CD-R it can be written once, it is cheap.
b. CD-RW it is costly and can be rewritten.
DVD (digital versatile disc):
DVD is a digital optical disc storage format developed in 1995, which can store 4 to 16 GB
data like software and other computer files as well as videos. DVD Drive is used to read this
disk. DVDs offer higher storage capacity than compact discs . DVD-ROMcan only be read
and not written or erased. Blank recordable DVD discs (DVD-R) can be recorded once using
a DVD Writer and then function as a DVD-ROM. Rewritable DVDs (DVD-RW) can be
recorded and erased many times.
Blue-ray
Blue-ray or Blue-ray Disc (BD) is a digital optical disc data storage format. It was designed
to supersede the DVD format, and is capable of storing several hours of video in high-
definition (HDTV 720p and 1080p) and ultra high-definition resolution (2160p). The main
application of Blue-ray is as a medium for video material such as feature films The name
"Blue-ray" refers to the blue laser (actually a violet laser) used to read the disc, which allows
information to be stored at a greater density than is possible with the longer-wavelength red
laser used for DVDs.
The plastic disc is 120 millimeters (4.7 in) in diameter and 1.2 millimeters (0.047 in) thick,
the same size as DVDs and CDs. Conventional or pre-BD-XL Blue-ray discs contain
25 GB per layer, with dual-layer discs (50 GB) being the industry standard for feature-length
video discs. Triple-layer discs (100 GB) and quadruple-layer discs (128 GB) are available
for BD-XL re-writer drives.
Flash memory:
Flash memory is a non-volatile memory chip used for storage and for transferring data
between a personal computer (PC) and digital devices. It has the ability to be electronically
reprogrammed and erased. It is often found in USB flash drives, MP3 players, digital cameras
and solid-state drives.
Flash memory is a type of electronically erasable programmable read only memory
(EEPROM), but may also be a standalone memory storage device such as a USB drives.
EEPROM is a type of data memory device using an electronic device to erase or write digital
data. Flash memory is a distinct type of EEPROM, which is programmed and erased in large
blocks.
Volatile Memory:
Volatile memory is computer storage that only maintains its data while the device is powered.
Most RAM (random access memory) used for primary storage in personal computers
is volatile memory. Volatile memory contrasts with non-volatile memory, which does not
lose content when power is lost.
Non-Volatile Memory:
Non-volatile memory is computer memory that can retain the stored information even when
not powered. Examples of non-volatile memory include read-only memory (see ROM), flash
memory, most types of magnetic computer storage devices (e.g. hard disks, floppy discs and
magnetic tape), optical discs, and early computer storage methods such as paper tape and
punched cards.
Cache Memory:
A Cache (Pronounced as ―cash‖) is a small and very fast temporary storage memory. It is
designed to speed up the transfer of data and instructions. It is located inside or close to the
CPU chip. It is faster than RAM and the data/instructions that are most recently or most
frequently used by CPU are stored in cache.
Program Counter (PC): Program Counter register is also known as Instruction Pointer
Register. This register is used to store the address of the next instruction to be fetched for
execution. When the instruction is fetched, the value of IP is incremented. Thus this register
always points or holds the address of next instruction to be fetched.
System Bus:
The path through which data is send to the memory or received from memory is called a bus.
A set of parallel lines used to send addresses or data to several components within the CPU is
called a bus.
Buses may be unidirectional or bi-directional. Unidirectional buses send data in one direction
like system bus. Whereas, the bi-directional buses sends data in both the directions (E.g. Data
bus and Address bus).
A bus that connects the major components (processor, memory and I/O) of the computer
system is called system bus.
ADDRESS:
The binary words are stored in ROM as a long number list. A number that identifies the
location of each stored word in the list is called its address.
TYPES OF BUSES
Data Bus:
The data bus transfer data between the microprocessor and the memory and I/O attached to
the system. Data bus consists of 8,16,32,64 parallel lines. Data bus lines are bi-directional
lines. This means that the CPU can read data from memory or from ports on these lines or it
can send data out to memory or to the other port on these lines. These lines also indicate the
speed of computer. A computer containing a 32-bit data bus lines determine the word length
for computer.
8-bit data bus=one byte word length
16-bit data bus=2 byte word length
Address Bus:
The address bus provides a memory address of the system memory and also the I/O addresses
to the system I/O devices.
The address bus have 8, 16, 32 parallel lines. These lines are used to designate the source and
destination of data that is to be carried by the data bus.
If CPU has N address lines then it can address 2N locations. E.g. a CPU with 8 bit bus can
represent 28 i.e.256 unique addresses. A 16 bit bus can address 65536 unique addresses.
3. Control Bus:
These are unidirectional lines. The control bus provides control signals that cause the
memory and I/O devices to perform read (RD) or a write (WR) operation.
Control bus consists of 8 or 16 parallel lines. The CPU sends out signals on the control bus to
enable the outputs of addressed memory devices or port devices.
Typical signals are:
I. Memory Read signal ii. Memory Write signal
Iii. I/O Read signal IV. I/O Write signal
These signals control the overall operation of microprocessor. E.g. to read a byte of data from
a memory location. The CPU sends out the memory address of the desired byte on the
address bus and then sends out a memory Read signal to the control bus.
A computer case, also known as a computer chassis, tower, system unit, or cabinet, is the
enclosure that contains most of the components of a personal computer. Cases are usually
constructed from steel, aluminum and plastic.
A system unit is the part of a computer that houses the primary devices that perform
operations and produce results for complex calculations. It includes the motherboard, CPU,
RAM and other components, as well as the case in which these devices are housed.
The computer cases are a visible part of our computers which are also called PC towers and
Computer towers. It is used to serve as a protective structure for the rest of the internal
components like motherboard, RAM, Hard drive, cooling fans, and other expansion cards
from the external influences.
Desktop Case:
Considered the most classical version of computer cases, these are primarily designed for
personal/business computers that are placed on top of a desk. The basic objective of these
cases is to conserve the available desk space as the monitor is placed on top of the computer.
Interestingly, it is beneficial for the users when a computer is placed in this position because
it enables the computer screen to be present at an angle that is most convenient for viewing.
Tower Cases:
These cases are used in the manufacture of computers that can be kept on the floor or on top
of a computer desk. Depending on the specific number of internal drive bays present inside
and the height of the tower
Power Supply:
A power supply is an electronic circuit that converts the voltage of an alternating current
(AC) into a direct current (DC) voltage. It is basically consisting of the following
elements: transformer, rectifier, filter and regulator circuits
Motherboard:
The motherboard is the backbone that ties the computer's components together at one spot
and allows them to talk to each other. Without it, none of the computer pieces, such as the
CPU, GPU, or hard drive, could interact. Total motherboard functionality is necessary for a
computer to work well.
BIOS:
Is the program a computer's microprocessor uses to start the computer system after it is
powered on? It also manages data flow between the computer's operating system (OS) and
attached devices, such as the hard disk, video adapter, keyboard, mouse and printer.
Ports:
In computer hardware, a port serves as an interface between the computer and other
computers or peripheral devices. In computer terms, a port generally refers to the part of a
computing device available for connection to peripherals such as input and output devices.
Expansion Slots:
An expansion slot is a socket on the motherboard that is used to insert an expansion card (or
circuit board), which provides additional features to a computer such as video, sound,
advanced graphics, Ethernet or memory.
AGP:
Accelerated graphics port, is an advanced port designed for video cards and 3D accelerators.
Developed by Intel and introduced in August 1997, AGP introduces a dedicated point-to-
point channel that allows the graphics controller direct access to the system memory. Below
is an illustration of what the AGP slot may look like on your motherboard.
PCI:
A PCI slot is a built-in slot on a device that allows for the attachment of various hardware
components such as network cards, modems, sound cards, disk controllers and other
peripherals.
There are 5 common types of PCIe slots and cards: x1, x2, x4, x8 and x16. The numbers
represent the number of lanes on the card or slot. Just like the lanes on a road, these lanes are
paths for data to travel on.
Ribbon Cable:
Ribbon cables are usually used as interconnects for internal peripherals in computers, such as
hard drives, CD drives, and floppy drives. On some older computer systems they were also
used for external connections.
SerialAdvancedTechnologyAttachment(SATA):
SATA is a computer bus interface or standard hardware interface introduced in the year
2003. It connects hard drives, Solid State Drives (SSD) and CD/DVD drives to the
computer. In SATA data transfer speed ranges from 150 MB/s for SATA I and 300 MB/s
for SATA II. It is a serial connector. It gives a faster performance with support of hot
plugging. It is a newer concept. SATA cables are better than IDE.
FD Cable:
A floppy cable is a ribbon cable found in PC's that allow one or more floppy disk drives to
connect to a computer. The floppy channel, FDD header, or floppy connection is where the
floppy drive connects to the computer motherboard.
Memory Slots:
A memory slot, memory socket, or RAM slot allows RAM (computer memory) to be inserted
into the computer. Most motherboards have two to four memory slots, which determine the
type of RAM used with the computer. ... It is not uncommon for computers to have all
memory slots occupied.
Disk Controller:
The disk controller is the controller circuit which enables the CPU to communicate with
a hard disk, floppy disk or other kind of disk drive. It also provides an interface between the
disk drive and the bus connecting it to the rest of the system.
Cooling System:
Computer cooling systems are passive or active systems that are designed to regulate and
dissipate the heat generated by a computer so as to maintain optimal performance and protect
the computer from damage that will occur from overheating.
Computer Bus:
A bus is a high-speed internal connection. Buses are used to send control signals and data
between the processor and other components. ... Address bus - carries memory addresses
from the processor to other components such as primary storage and input/output devices.
The address bus is unidirectional.
Data Bus:
A data bus is a system within a computer or device, consisting of a connector or set of wires,
that provides transportation for data. Different kinds of data buses have evolved along with
personal computers and other pieces of hardware.
Address Bus:
Control Bus:
Control bus is used to send control signals to different components of the computer system.
Serial ports:
Parallel Ports:
A parallel port is a type of interface found on early computers for connecting peripherals. The
name refers to the way the data is sent; parallel ports send multiple bits of data at once, as
opposed to serial communication, in which bits are sent one at a time.
PS/2 Port:
The PS/2 port is a 6-pin mini-DIN connector used for connecting keyboards and mice to a PC
compatible computer system. Its name comes from the IBM Personal System/2 series of
personal computers, with which it was introduced in 1987.
USB Port:
A USB port is a standard cable connection interface for personal computers and consumer
electronics devices. USB stands for Universal Serial Bus, an industry standard for short-
distance digital data communications. USB ports allow USB devices to be connected to each
other with and transfer digital data over USB cables.
Fire wire Ports:
FireWire, which is also called IEEE 1394, is a connecting device used primarily for adding
peripherals to a computer. FireWire is often used for connecting external hard drives and
digital camcorders that benefit from a high transfer rate.
Sound card:
The sound card can accept an analog sound (as from a microphone or audio tape) and convert
it to digital data that can be stored in an audio file, or it can accept digitized audio signals (as
from an audio file) and convert them to analog signals that can be played on the computer's
speakers.
Video Card:
Video card, also called graphics card, integrated circuit that generates the video signal sent to
a computer display. It contains a graphics processing unit (GPU), which is a processor
dedicated to creating images; a digital-to-analog converter; and memory chips that store
display data.
Modem Card:
A modem card is an internal type of modem that is plugged into the PCI slot of a PC
motherboard. A modem is a communications device that allows a computer to send and
receive data through telephone or cable lines.
Network interface Card(NIC):
The definition of a network card is a part of a computer that connects to a local area network
(LAN) or the Internet wirelessly or through an Ethernet cable. An example of a network card
is the hardware that was once an external device that is now commonly part of the
motherboard of a new computer.
Memory Chips:
A memory chip is an integrated circuit made out of millions of capacitors and transistors that
can store data or can be used to process code. Memory chips can hold memory either
temporarily through random access memory (RAM), or permanently through read only
memory (ROM). Read only memory contains permanently stored data that a processor can
read but cannot modify. Memory chips come in different sizes and shapes. Some can be
connected directly while some need special drives. Memory chips are essential components
in computer and electronic devices in which memory storage plays a key role.
Single in line Memory Module(SIMM):
Single inline memory module (SIMM) is a type of RAM (random access memory) that was
popular in the early 1980s to late 1990s. SIMMs have 32-bit data paths and were standardized
under the JEDEC JESD-21C standard. Non-IBM PC computers, UNIX workstations and the
Mac IIfx used the non-standard SIMMS.
1. Message:
The message is the information (data) to be communicated. Popular forms of information
include text, numbers, pictures, audio, and video.
2. Sender:
The sender is the device that sends the data message. It can be a computer, workstation,
telephone handset, video camera, and so on.
3. Receiver:
The receiver is the device that receives the message. It can be a computer, workstation,
telephone handset, television, and so on.
4. Transmission medium:
The transmission medium is the physical path by which a message travels from sender to
receiver. Some examples of transmission media include twisted-pair wire, coaxial cable,
fiber-optic cable, and radio waves.
5. Protocol:
A protocol is a set of rules that govern data communications. It represents an agreement
between the communicating devices. Without a protocol, two devices may be connected but
not communicating, just as a person speaking French cannot be understood by a person who
speaks only Japanese.
5.1.2 Modes of communication:
Transmission mode means transferring data between two devices. It is also known as a
communication mode. Buses and networks are designed to allow communication to occur
between individual devices that are interconnected. There are three types of transmission
mode.
1.SimplexMode:
In Simplex mode, the communication is unidirectional, as on a one-way street. Only one of
the two devices on a link can transmit, the other can only receive. The simplex mode can
use the entire capacity of the channel to send data in one direction.
Example: Keyboard and traditional monitors. The keyboard can only introduce input the
monitor can only give the output.
2.Half-DuplexMode:
In half-duplex mode, each station can both transmit and receive, but not at the same time.
When one device is sending, the other can only receive, and vice versa. The half-duplex
mode is used in cases where there is no need for communication in both directions at the
same time. The entire capacity of the channel can be utilized for each direction.
Example: Walkie-talkie in which message is sent one at a time and messages are sent in
both directions.
Channel capacity=Bandwidth * Propagation Delaythe same time. Channel Capacity=2*
Bandwidth*propagation Delay
3.Full-DuplexMode:
In full-duplex mode, both stations can transmit and receive simultaneously. In full duplex
mode, signals going in one direction share the capacity of the link with signals going in
another direction, this sharing can occur in two ways:
Either the link must contain two physically separate transmission paths, one for sending
and the other for receiving.
Or the capacity is divided between signals travelling in both directions.
Full-duplex mode is used when communication in both directions is required all the time.
The capacity of the channel, however, must be divided between the two directions.
Example: Telephone Network in which there is communication between two persons by a
telephone line, through which both can talk and listen at
SynchronousTransmission:
In Synchronous Transmission, data is sent in form of blocks or frames. This transmission is
the full duplex type. Between sender and receiver the synchronization is compulsory. In
Synchronous transmission, there is no gap present between data. It is more efficient and
more reliable than asynchronous transmission to transfer the large amount of data.
Asynchronous Transmission:
In Asynchronous Transmission, data is sent in form of byte or character. This transmission
is the half duplex type transmission. In this transmission start bits and stop bits are added
with
data.
It
does
not
requir
e
synch
roniza
tion.
(You can get Cat 5e and Cat 6 UTP Patch Cable from us)
For horizontal cables, the number of pairs is typically 4 pair as shown below
Infrared:
Infrared is used in wireless technology devices or systems that convey data through infrared
radiation. Infrared technology allows computing devices to communicate via short range
wireless signals. With infrared transmission, computers can transfer files and other digital
data bidirectional.
Router:
A router is a networking device that forwards data packets between computer networks.
Routers perform the traffic directing functions on the Internet. Data sent through the internet,
such as a web page or email, is in the form of data packets.
Gateway:
A gateway is a node (router) in a computer network, a key stopping point for data on its way
to or from other networks. ... In a workplace, the gateway is the computer that routes traffic
from a workstation to the outside network that is serving up the Web pages.
Gateways are basically protocol converters, facilitating compatibility between two protocols
and operating on any layer of the open systems interconnection (OSI) model.
5.1.5 Network Architecture:
Network architecture is the design of a computer network. It is a framework for the
specification of a network's physical components and their functional organization and
configuration, its operational principles and procedures, as well as communication protocols
used.
Server:
A computer network in which one centralized, powerful computer (called the server) is a hub
to which many less powerful personal computers or workstations (called clients) are
connected. The clients run programs and access data that are stored on the server. Compare
peer-to-peer network.
Client:
Client-server networks are computer networks that use a dedicated computer (server) to store
data, manage/provide resources and control user access. The server acts as a central point on
the network upon which the other computers connect to. A computer that connects to the
server is called a client.
Users can access shared data which is If any part of the network fails a lot of
centrally controlled disruption can occur
Wireless Personal Area Network: Wireless Personal Area Network is developed by simply
using wireless technologies such as Wi-Fi, Bluetooth. It is a low range network.
Wired Personal Area Network: Wired Personal Area Network is created by using the USB.
Advantages:
It is very reliable – if one cable or device fails then all the others will still work
It is high-performing as no data collisions can occur
Less expensive because each device only needs one I/O port and wishes to be connected
with hub with one link.
Easier to put in
Robust in nature
Dis Advantages:
Requires more cable than a linear bus.
If the connecting network device (network switch) fails, nodes attached are disabled and
can‘t participate in network communication.
More expensive than linear bus topology due to the value of the connecting devices
(network switches)
If hub goes down everything goes down, none of the devices can work without hub.
Ring Topology:
A ring network is a network topology in which each node connects to exactly two other
nodes, forming a single continuous pathway for signals through each node – a ring. Data
travels from node to node, with each node along the way handling every packet.
Bus Topology:
Bus topology is a specific kind of network topology in which all of the various devices in the
network are connected to a single cable or line. In general, the term refers to how various
devices are set up in a network.
A bus network is a network topology in which nodes are directly connected to a common
half-duplex link called a bus.
Mesh Topology:
A mesh topology is a network setup where each computer and network device is
interconnected with one another. This topology setup allows for most transmissions to be
distributed even if one of the connections goes down. It is a topology commonly used for
wireless networks.
Session Layer:
The Session Layer is the 5th layer in the Open System Interconnection (OSI) model. This
layer allows users on different machines to establish active communications sessions between
them. It is responsible for establishing, maintaining, synchronizing, terminating sessions
between end-user applications.
Presentation Layer:
Presentation Layer is the 6th layer in the Open System Interconnection (OSI) model. This
layer is also known as Translation layer, as this layer serves as a data translator for the
network. ... The main responsibility of this layer is to provide or define the data format and
encryption.
Application Layer:
Presentation Layer is the 6th layer in the Open System Interconnection (OSI) model. This
layer is also known as Translation layer, as this layer serves as a data translator for the
network. ... The main responsibility of this layer is to provide or define the data format and
encryption.
5.3 TCP/IP:
TCP/IP, in full Transmission Control Protocol/Internet Protocol, standard Internet
communications protocols that allow digital computers to communicate over long distances.
TCP/IP was developed in the 1970s and adopted as the protocol standard for ARPANET
(The predecessor to the Internet) in 1983.
Application Layer:
The final layer of the TCP/IP model is known as the Application Layer. The
Application Layer is responsible for managing, setting up, coordinating, and
terminating conversations between the applications at each end of the
communication. It also makes sure that the data from the sending host is
received in a format that is acceptable to the receiving host while supporting
software application and end-user processes. In other words, the Application
Layer interacts with the software application to determine whether network
services will be required. For example, HTTP is an application that actually runs
at the application layer while Internet Explorer.
Transport Layer:
The third layer of the TCP/IP model is known as the Transport layer. The
Transport Layer interacts with the application data and prepares it to be
transmitted across a network. This layer ensures reliable connectivity, error
recovery, and flow control from end-to-end through the sequencing of data
packets during transmission using either TCP or the User Datagram Protocol
(UDP) over IP.
Internet Layer:
The Internet layer is responsible for logical transmission of data packets over the internet. It
can be compared to the network layer of the OSI model. It transmits data packets to the link
layer. It routes each of the data packets independently from the source to the destination,
using the optimal route.
What is a port?
A port is a virtual point where network connections start and end. Ports are software-based
and managed by a computer's operating system. Each port is associated with a specific
process or service. Ports allow computers to easily differentiate between different kinds of
traffic: emails go to a different port than Webpages, for instance, even though both reach a
computer over the same Internet connection.
The Internet Assigned Numbers Authority (IANA) maintains the full list of port numbers and
protocols assigned to them.
Well known Port Number:
Well-known ports are numbered 0 through 1023, and include 25 for SMTP (Simple Mail
Transfer Protocol), 80 for HTTP (Hyper Text Transport Protocol), and 107 for Remote
TELNET Service. See also dynamic port, port, private port, and registered port.
Register Port Number:
Registered ports are in the range 1024 to 49151. Dynamic ports are in the range 49152 to
65535. As mentioned, most new port assignments are in the range from 1024 to 49151.
Registered port numbers are non–well-known ports that are used by vendors for their own
server applications
Dynamic Port Number:
Dynamic ports—Ports in the range 49152 to 65535 are not assigned, controlled, or
registered. They are used for temporary or private ports. They are also known as private or
non-reserved ports. Clients should choose ephemeral port numbers from this range, but many
systems do not.
5.3.2 Similarities between the TCP/IP model and the OSI model:
Here are some important differences between the OSI and TCP/IP model:
A uniform path is followed throughout the There is no uniform path that is followed end to
session. end through the session.
It is most ideal for voice communication, It is used mainly for data transmission as the
while also keeping the delay uniform. delay is not uniform.
Without a connection, it cannot exist, as the A connection is not necessary, as it can exist
connection needs to be present on a physical without one too. It needs to be present on a
layer. network layer.
Data to be transmitted is processed at the Data is processed and transmitted at the source
source itself. as well as at each switching station.
5.3.4 IP Addressing:
An IP addressing is a unique address that identifies a device on the internet or a local
network. IP stands for "Internet Protocol," which is the set of rules governing the format of
data sent via the internet or local network.
In essence, IP addresses are the identifier that allows information to be sent between devices
on a network: they contain location information and make devices accessible for
communication. The internet needs a way to differentiate between different computers,
routers, and websites. IP addresses provide a way of doing so and form an essential part of
how the internet works.
Static IP Addressing:
A static IP address is simply an address that doesn't change. Once your device is assigned a
static IP address, that number typically stays the same until the device is decommissioned or
your network architecture changes.
Dynamic IP Addressing:
Use advanced settings for your network to configure dynamic DNS. When your IP address
changes, the DNS entry for your server is automatically updated with its new IP address, so
outside users can use the same domain name. You can choose the Dynamic DNS
provider and don't have to install additional software on your computer.
Class A:
Class A addresses are for networks with large number of total hosts. Class A allows for 126
networks by using the first octet for the network ID. The first bit in this octet, is always zero.
The remaining seven bits in this octet complete the network ID.
Class B:
An IP address which belongs to class B has the first two bits in the first octet set to 10, i.e. Class B IP
Addresses range from 128.0. X.x to 191.255. x.x. The default subnet mask for Class B is 255.255.
Class C:
Class C network numbers use 24 bits for the network number and 8 bits for host numbers.
Class C network numbers are appropriate for networks with few hosts--the maximum being
254. A class C network number occupies the first three bytes of an IP address. Only the
fourth byte is assigned at the discretion of the network owners.
Class D:
Class D IP addresses are not allocated to hosts and are used for multicasting. Multicasting
allows a single host to send a single stream of data to thousands of hosts across the Internet at
the same time. It is often used for audio and video streaming, such as IP-based cable TV
networks. Another example is the delivery of real-time stock market data from one source to
many brokerage companies.
Class E:
Class E IP addresses are not allocated to hosts and are not available for general use. These are
reserved for research purposes.
Range: 240.0.0.0 to 255.255.255.255
First octet value range from 240 to 255
Number of Networks: N/A
Number of Hosts per Network: Research/Reserved/Experimental.
Subnet Masks:
A subnet mask is a 32-bit number created by setting host bits to all 0s and setting network
bits to all 1s. In this way, the subnet mask separates the IP address into the network and host
addresses. The phrase ―mask‖ is applied because the subnet mask essentially uses its own
32-bit number to mask the IP address.
Radio Signals:
A radio wave is a type of electromagnetic signal designed to carry information through the air
over relatively long distances. Sometimes radio waves are referred to as radio frequency (RF)
signals. In addition, radio waves are the primary means for carrying data over a wireless
network.
Radio Transceiver(Transmitter and Receiver):
A transceiver is an electronic device which is a combination of a radio transmitter and a
receiver, hence the name. It can both transmit and receive radio waves using an antenna, for
communication purposes. Radio transceivers are widely used in wireless devices.
Wireless Access Point:
A wireless access point (WAP) is a hardware device or configured node on a local area
network (LAN) that allows wireless capable devices and wired networks to connect through a
wireless standard, including Wi-Fi or Bluetooth. WAPs feature radio transmitters and
antennae, which facilitate connectivity between devices and the Internet or a network. A
WAP is also known as a hotspot.
Line of Sight Communication:
Line of sight (LoS) is a type of propagation that can transmit and receive data only where
transmit and receive stations are in view of each other without any sort of an obstacle
between them. FM radio, microwave and satellite transmission are examples of line-of-sight
communication.
Short Distance Wireless Communication:
Short-region wireless technology refers to the technology that can communicate wirelessly
within a smaller diameter region, within a minimum level of one millimeter. The common
short-region wireless communication modes are UWB, Wi-Fi, ZigBee and Bluetooth.
Long Distance Wireless Communication:
Telephone, telegraph, photo telegraph, and television signals are transmitted simultaneously
over long distances over air, cable, and radio communications lines in which hundreds or
thousands of independent communications channels are formed by multiplexing
communications lines.
6.2.1 Wi-Fi:
A WiFi network is simply an internet connection that‘s shared with multiple devices in a
home or business via a wireless router. The router is connected directly to your internet
modem and acts as a hub to broadcast the internet signal to all your Wi-Fi enabled devices.
This gives you flexibility to stay connected to the internet as long as you‘re within your
network coverage area.
6.2.2 WI MAX:
WiMAX technology is a wireless broadband communications technology based around the
IEE 802.16 standard providing high speed data over a wide area.
7.1 Introduction:
A database is an organized collection of data, generally stored and accessed electronically
from a computer system. It supports the storage and manipulation of data. In other words,
databases are used by an organization as a method of storing, managing and retrieving
information.
7.1.1Data:
Data is a collection of raw, unorganized facts and details like text, observations, figures,
symbols and description of things etc. In other words, data does not carry any specific
purpose and has no significance by itself. Moreover, data is measured in terms of bits and
bytes – which are basic units of information in the context of computer storage and
processing.
Information:
Information is the processed, organized and structured data. It provides context for data and
enables decision making. For example, a single customer‘s sale at a restaurant is data – this
becomes information when the business is able to identify the most popular or least popular
dish.
Difference between Data and Information
Data Information
Data is an individual unit that contains raw materials Information is a group of data that collectively
which do not carry any specific meaning. carries a logical meaning.
Raw data alone is insufficient for decision making Information is sufficient for decision making
An example of data is a student‘s test score The average score of a class is the information
derived from the given data.
2. Inconsistency
Due to the effect of data redundancy this often leads to data inconsistency. Which means that
the same copies of data located in different places contain different values. For preventing
this, there should be paper listing among different files.
3. Accessibility
Accessing data in file management system is not an easy process. It is not convenient as it
should be. Whenever a user needs to access an information using different approaches, they
must execute a special program.
4. Integrity
The data that is present on a file management system can get integrated. Meaning it is not
correct and consistent. Most often this is caused in the presence of consistency constraints.
Constraints are imposed by the programmers using programming codes. If the integrity
continues, it can make the process of adding new constraints to be difficult.
5. Atomicity
Atomicity refers to the data that is incomplete. This often happens if the data is either
completely entered or not entered at all. For an example, your system could fail in the middle
of a transaction leading to data atomicity. Unlike in database management system, it is
difficult to ensure atomicity in file management system.
6. Data duplication
Since data is stored in more than one location, there is a possibility of data duplication to take
place. If file management system undergoes data duplication it will cause problems in the
storage space. These duplications are difficult to correct due to the fact that they are
independent to each other. Hence, it requires manual correction which can take time and
effort.
7. Data isolation
If the data is stored in different locations, this could essentially mean that they are isolated in
file management system. Under this circumstances, the formats of each file can vary
significantly. As a result, extracting data from files can be difficult as it requires complex
programming.
7.1.3 Database:
A database is information that is set up for easy access, management and updating. Computer
databases typically store aggregations of data records or files that contain information, such
as sales transactions, customer data, financials and product information.
Databases are used for storing, maintaining and accessing any sort of data. They collect
information on people, places or things. That information is gathered in one place so that it
can be observed and analyzed. Databases can be thought of as an organized collection of
information.
7.1.4 Database Management System(DBMS):
Database Management Systems (DBMS) are software systems used to store, retrieve, and run
queries on data. A DBMS serves as an interface between an end-user and a database,
allowing users to create, read, update, and delete data in the database.
Database management systems are set up on specific data handling concepts, as the practice
of administrating a database evolves. The earliest databases only handled individual single
pieces of specially formatted data. Today‘s more evolved systems can handle different kinds
of less formatted data and tie them together in more elaborate ways.
The database development life cycle has a number of stages that are followed when
developing database systems.
The steps in the development life cycle do not necessarily have to be followed religiously in a
sequential manner.
On small database systems, the process of database design is usually very simple and does
not involve a lot of steps.
In order to fully appreciate the above diagram, let‘s look at the individual components listed
in each step for overview of design process in DBMS.
Requirements analysis:
Planning – This stages of database design concepts are concerned with planning of
entire Database Development Life Cycle. It takes into consideration the Information
Systems strategy of the organization.
System definition – This stage defines the scope and boundaries of the proposed
database system.
Database designing:
Logical model – This stage is concerned with developing a database model based on
requirements. The entire design is on paper without any physical implementations or
specific DBMS considerations.
Physical model – This stage implements the logical model of the database taking into
account the DBMS and physical implementation factors.
Implementation:
Data conversion and loading – this stage of relational databases design is concerned
with importing and converting data from the old system into the new database.
Testing – this stage is concerned with the identification of errors in the newly
implemented system. It checks the database against requirement specifications.
1. Normalization
2. ER Modeling
7.4.1 Entity:
A single unique object in the real world that is being mastered. Examples of an entity are a
single person, single product, or single organization.
Entity Instance:
Entities are the basic objects of ERDs. These are the tables of your database. ... A specific
example of an entity is called an instance. Each instance becomes a record or a row in a table.
Attribute:
A characteristic or trait of an entity type that describes the entity, for example, the Person
entity type has the Date of Birth attribute.
Relationship:
A relationship type represents the association between entity types. For example, ‗Enrolled
in' is a relationship type that exists between entity type Student and Course. In ER diagram,
relationship type is represented by a diamond and connecting the entities with lines.
Degree of a Relationship:
Degree of relationship is the number of entity sets that are participated (associated) in that
relationship. That is, the number of entity sets that are connected through the relationship in
question is called the degree of relationship.
i. Unary relationship: A unary relationship, also called recursive, is one in which a
relationship exists between occurrences of the same entity set. In this relationship, the
primary and foreign keys are the same, but they represent two entities with different
roles.
ii. Binary relationship: A binary relationship is when two entities participate and is the
most common relationship degree. For Example: A unary relationship is when both
participants in the relationship are the same entity. For Example: Subjects may be
prerequisites for other subjects.
iii. One to one: A one-to-one relationship is a link between the information in two tables,
where each record in each table only appears once. For example, there might be a
one-to-one relationship between employees and the cars they drive.
iv. One to many: a one-to-many relationship occurs when a parent record in one table
can potentially reference several child records in another table. The opposite of a one-
to-many relationship is a many-to-many relationship, in which a child record can link
back to several parent records.
Key:
A key is an attribute in ER diagrams whose values are distinct for each individual entity in an
entity set. For example for a student entity set Roll Number or Registration Number can be a
key because these are unique for each student entity.
i. Candidate Key: is a set of attributes that uniquely identify tuples in a table.
Candidate Key is a super key with no repeated attributes.
ii. Primary key: a column or group of columns in a table that uniquely identify every
row in that table.
iii. Foreign Key: is a column that creates a relationship between two tables. The purpose
of foreign keys is to maintain data integrity and allow navigation between two
different instances of an entity.
iv. Composite primary key: is a combination of two or more columns that uniquely
identify rows in a table. The combination of columns guarantees uniqueness, though
individual uniqueness is not guaranteed.
v. Super key: A super key is a group of single or multiple keys which identifies rows in
a table.
vi. Alternate key: is a column or group of columns in a table that uniquely identify
every row in that table.
Secondary key: Secondary Key is the key that has not been selected to be the primary key.
Therefore, a candidate key not selected as a primary key is called secondary key. Candidate
key is an attribute or set of attributes that you can consider as a Primary key.
Cardinality: cardinality refers to the relationship between a row of one table and a row of
another table. The only two options for cardinality are one or many.
Example: Think of a credit card company that has two tables: a table for the person who gets
the card and a table for the card itself. A row from the cardholder table would have a
relationship with a row in the card table because the cardholder holds the card.
Modality: Modality, it turns out, is another word for what we database people call
cardinality, or ―the number of unique things in a set‖. ... In other words, one row in a table
can be related to rows of data in another table. It doesn't have to be, but it can be, depending
on what real-world relationships you are trying to model.
7.5 Relational Schema: A relational schema is a blueprint used in database design to
represent the data to be entered into the database and describe how that data is structured in
tables (called relations in relational schemas). The schema describes how those tables relate
to each other.
Normalization:
i. Normalization is the process of organizing the data in the database.
ii. Normalization is used to minimize the redundancy from a relation or set of relations.
It is also used to eliminate the undesirable characteristics like Insertion, Update and
Deletion Anomalies.
iii. Normalization divides the larger table into the smaller table and links them using
relationship.
iv. The normal form is used to reduce redundancy from the database table.