0% found this document useful (0 votes)
8 views

BSC CSIT

The document discusses the history and generations of computers. It describes the first, second, third and fourth generations of computers, explaining the major technological developments that defined each generation, including the components used. It also covers other topics related to computers like types based on size, working principles, architecture, input and output devices.

Uploaded by

mishiyama00000
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

BSC CSIT

The document discusses the history and generations of computers. It describes the first, second, third and fourth generations of computers, explaining the major technological developments that defined each generation, including the components used. It also covers other topics related to computers like types based on size, working principles, architecture, input and output devices.

Uploaded by

mishiyama00000
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 188

Jiban pandit

Introduction to information Technology (CSC 109)


Generation of computer
The history of computer is often referred to in reference to different
generations of computing devices. In computer terminology , the word
generation is described as a stage of technological development or
innovation. Each generation of computer is characterized by a major
technological development that fundamentally changed the way
computers operated.
Figure of main component
Generation of computer
First generation computers used vacuum tubes as the main component.
These generation computers were very expensive and very large in size,
hence required special housing. ENIAC, EDVAC are the first generation
computers.
Hardware Technology: These computers were based on the vacuum
tubes. Thousands of vacuum were used, they generated a large amount
of heat so massive air cooling system was required. Punch card was used
as input and out put.
Software: The instructions were written in binary language. These
computers were difficult to program and use. The first generation
computers could solve one problem at a time.
Second Generation
In second generation, vacuum tubes were replaced by transistors.
Transistors were cheaper, smaller than vacuum tubes. Due to the use of
transistors, the computers became smaller and cheaper. IBM 1401 and
ICL 1300 were the second generation computers. One transistor could
replaced with 1000 vacuum tubes.
Hardware Technology : These computers were based on transistor
technology. They used magnetic taped and magnetic disks for secondary
storage.
software: The instructions were written using the assembly language.
Assembly language uses mnemonics like ADD for addition and SUB for
subtraction .
Third Generation
In this generation computer, integrated circuits (IC) were used as major
component. Examples of third generation computers are IBM 360, ICL-
1901 etc. These generation computer used mass storage: floppy disk,
Hard disk, Tape unit.
Hardware Technology: These computers were used based on integrated
circuit . The keyboard and monitor were used instead of punched card.
Software: The keyboard and the monitor were interfaced through the
operating system. Started to use multiprogramming OS like Unix. High
level language were used for programming, instead of machine
language.
Fourth generation
Fourth generation computers used VLSI as main component
These were very cheaper , smaller and faster than other computers. They
have also sophisticated systems software. Intel 4004, Macintosh Apple,
IBM PC are example of 4th generation computer.
Hardware Technology: These computers are microprocessor based
computers using Large scale integration.
Software: This generation of computers support Graphical User Interface
Operating System. GUI is user-friendly. Multimedia, networking and
distributed computing are introduced.
Fifth Generation
It is not very clear which direction the fifth generation will take. Fifth
generation computers are going to use Biochip. These computers will
be able to understand natural language and will have thinking power
called Artificial Intelligence. Features are
Biochips will be used as processing components.
Input and output will be in the form of speech and graphics images.
Based of parallel processing architecture.
Classification on the basis of size
Super computer: Super computers are the largest, fastest and the most
expensive computers. They have a large memory capacity and very high
processing speed. They are used in weather forecasting , nuclear
research, weapons research etc. CRAY XMP, CYBER 205, Param 8000 are
example of super computer.
Mainframe computer: Mainframe computer is large general purpose
computer designed for large scale data processing. It can support
hundreds or even thousands of user simultaneously. They are mainly
used by insurance companies, bank, airlines. IBM360, IBM370 are
examples of mainframe computer.
Mini computer
Mini computers are mid-sized multi processing computers. These
computes can support hundreds of user simultaneously. IBM AS, Prime
series are examples of Mini computer. These are less expensive than
Mainframe and expensive to micro computers.
Micro computers: Micro computer is the smallest computer of all. These
computers are extensively used in home and offices. They are cheap,
compact and can be easily accommodated on a study table. These
includes Desktop computers, Laptops, Notebooks, Handheld Devices
etc.
Mobile computing
• Mobile computing is a technology that allows transmission of data,
via a computer, without having to be connected to a fixed physical
link. Its main features is its mobility.
Types of computer on the basis
of working principle/work &
logic
Digital computer: A computer that performs calculations and logical
operations with quantities represented as digits, usually in the binary
number system (0 and 1 ) is called digital computer. Meaning of 0 is OFF
and 1 is ON. Some example of digital computers IBM PC,
Apple/Macintosh etc. Characteristic of these computers are:
These computers are based on discrete data which are not continuous.
Digital computers are normally used for general purpose.
These computers are more reliable and accurate.
These computers are programmable.
These computers are slower than analog computers.
Analog Computer
An analog computer is a form of computer that uses continuous physical
phenomena such as electrical, mechanical problem solved. These
computers process continuous values rather than discrete binary values.
Thermometers, Speedometers are examples of analog devices.
characteristics of analog computers are:
Analog computers are based on continuous varying data.
These computers measure only natural or physical values.
Analog computers are used for special purpose.
Generally, no storage facility is available.
Accuracy of these computers is very low.
Hybrid Computer
A combination of computers those are capable of inputting and
outputting both digital and analog signals is called hybrid computer. It
can perform the work done by analog computers as well as by digital
computers. Devices used in hospital to measure the heart beat is an
example of Hybrid computer.
It combines good qualities of analog as well as digital computers.
These computers can process both continuous and digital data.
These computers normally have high cost.
Computer Architecture
Computer architecture is defined as the structure and behavior of
computer system as seen by user. It includes instruction set and formats,
techniques for addressing memory, registers etc. It sets the standard for
all devices that connect to it and all the software that runs on it.
Harvard Architecture: The name is originate from a old computer
"Harvard Mark I". In this architecture, computers have two separate
memories for storing data and programs. Most of the modern computer
architectures are based on Harvard architecture.
Von Neumann Architecture: It is named after the mathematician and
early computer scientist John Von Neumann. According to this
architecture, computers have single memory that stores both programs
and data.
Input Devices
A device that is used to feed data into a computer is called input device.
It sends data into the CPU. There are different types of input devices.
some commonly used input devices are:
Keyboard: Keyboard is the primary input device of any computer
system. It is also called standard input device. It operates by converting
key presses to electronic signals in binary digital form. The keys on
computer keyboards are often classified as follows:
Alphanumeric keys [Letters and Numbers]
Punctuation keys [comma, period, semicolon]
Special keys [F1 to F12]
Scanner
Scanners are used to input images and texts printed on a paper into a
computer allowing the computer to read or display the scanned object.
A scanner works by digitizing an image.
MICR: MICR Stands for Magnetic Ink Character Recognition. It is a
character recognition system that uses special ink and characters. When
a document that contains characters written by this ink needs to be
read, it passes through MICR reader. It is mainly used in Banking
industry.
Mouse
Mouse is an input device that controls the movement of the cursor or
pointer on a display screen. It allows us to control the pointer in a
graphical user interface [GUI]. It is used to perform various functions
such as opening a program or file.
Touch panel: A touch panel or touch screen is an input device that lets
interact with a computer by touching the screen directly. A user can give
input or control the information processing system by touching the
screen with fingers.
Microphone: Microphone is an input device used to input sound that is
then stored in digital form. The microphone is used for various
applications like adding sound to a multimedia presentation or for
mixing music.
Uses of input Devices
As already mentioned, input devices include the keyboard, pointing
devices, scanners and reading devices, digital cameras, audio and video
input devices etc. primary uses of these input devices are listed below:
To feed data and programs into computer system.
To interact with computer system by providing commands by selecting
and clicking on buttons and menus.
To control the operation of computer system.
Output Devices
Any peripheral device that receives and displays output from a
computer is called an output device. An output device is also defined as
any piece of computer hardware equipment used to communicate the
results of a computer to the outside world. Broadly output devices can
be divided into two categories: Soft copy and Hard copy output devices.
Output Devices
Softcopy: Softcopy is an electronic display of digital information, such as
files viewed on the PC, monitor. A digital image file, a digital word
document are examples of softcopy output. Monitor, Speakers are
examples of softcopy output.
Hardcopy:
Softcopy Output
Monitor: Monitor is a common output device used to display data and
information in softcopy form. It is also called video display terminal or
display screen.
CRT Monitor: CRT stands for cathode ray tube. In CRT a beam of
electrons (cathode rays) emitted by an electron gun passes through
focusing and deflection systems and hits specified positions on the
phosphor- coated screen.
LCD Monitor : LCD stands for Liquid crystal display. LCD's are commonly
used in PDA's calculations, laptops and desktop computers.
LED Monitor: LED stands for Light Emitting Diode. It is flat panel that
uses an array of light emitting diodes as pixels for a video display.
CRT LCD

It is the monitor based on cathode ray tube. It is the monitor based on liquid crystal display technology.

Vacuum Tube and electron gun used as functional component. Liquid crystal used as functional component.

Light glow when electron beam strikes on phosphor coated screen of CRT. Light glow while supplying electricity and liquid crystal becomes transparent

CRTS are big and bulky LCD's are thin and light.

Harmful for human eyes. Less harmful for human eyes.

High power consumption and more heat production. Low power consumption and less heat production.

It is less expensive. It is more expensive.


Speaker
• A computer speaker is a hardware device that connects a computer
to generate sound. The signal used to produce the sound that comes
from a computer speaker is created by the computer's sound card.
Types of Hardcopy output
• The output in non-electronic form, obtained in a tangible form on a
paper or any surface is called hard copy output. The hard copy can be
stored permanently.
• Printer , Plotter are examples of Hardcopy output.
Impact Printer
It prints characters or images by striking print hammer or wheel on
inked ribbon.
Its speed is slower.
Its printing quality is lower.
It generates noise during printing.
It is less expensive
Dot matrix is an example of impact printer.
Non-impact printer
It prints characters and images without striking the papers.
It's speed is faster.
It's printing quality is higher.
It does not generate noise during printing.
It is more expensive.
Laser printer is an example of non impact printer.
Plotter
A plotter is a hardcopy output device like printer. It is specially used to
print big size of graphs, engineering drawing, posters etc.
Element of computer system
Input Unit:
CPU:
Primary Memory:
Secondary Memory:
Output Unit:
CPU
• CPU stands for central Processing Unit. It is a device capable of
performing various computing functions and making decisions to
change the sequence of program execution. Components of CPU are:
• Arithmetic Logic Unit
• Control Unit
• Register Array:
Functions of CPU
• Reads the instructions from Memory.
• Communicate with all peripherals using the system Bus.
• It controls the sequence of instructions.
• It controls the flow of data from one component to another
component.
• Performs the computing tasks specified in program.
Instruction Format
• A computer program is a set of instructions that describe the steps to be
performed for carrying out a computational task. The program and the data, on
which the program operates are stored in main memory, waiting to be processed
by the processor. This is called the stored program concept.
• The common fields of an instruction are –operation (op) code and operands code.

• An instruction format defines layout of bits of an instruction.


Instruction Set
• A processor has a set of instructions that it understands, called as
instruction set. An instruction set or an instruction set architecture is
a part of the computer architecture. It relates to programming,
instructions, registers, addressing, memory architecture etc. An
instruction set is the set of all the basic operations that a processor
can accomplish.
• It is the collection of machine language instructions that a particular
processor understands and executes.
Instruction cycle
• The primary responsibility of a computer processor is to execute a
sequential set of instructions that constitute a program. CPU executes
each instruction in a series of steps, called instruction cycle. A
instruction cycle involves four steps:
• Fetching: The processor fetches the instruction from the memory.
• Decoding: The instruction that is fetched is broken down into parts or
decoded.
• Executing: The decoded instruction or the command is executed .
• Storing: CPU writes back the results of execution, to the computer's
memory.
Microprocessor
CPU can be divided into
• ALU, Control Unit and Register Array
• This is the area of CPU where various computing functions are
performed on data. ALU consists of two units- arithmetic unit and
logic unit. The arithmetic unit performs arithmetic operations such as
addition, subtraction, Multiplication and division and the logic unit of
ALU is responsible for performing logic operations. It performs
comparisons of numbers, letters and special characters.
Control Unit
• The control unit provides the necessary timing and control signals to
all the operations in the computer. It organizes the processing of data
and instructions. It acts as supervisor and controls and coordinates
the activity of the other units of computer. It controls the flow of data
.
Registers Array
• Registers are the high speed temporary storage locations in the CPU
made from electronic devices such as transistors. It is primarily used
to store data temporarily during the execution of program. Some of
the register include register, program counter. Each register has a
specific function.
Buses
• Physically, bus is a set of wires used for moving data, instruction and control
signals from one component of a computer system to another component. Each
component of the computer is connected to these buses. There are three types
of buses: Address, Data, control bus.
• Address Bus: Address bus is used to specify the address of the memory location
to be accessed. CPU reads data or instructions from memory locations by
specifying the address of its location .
• Data Bus: Actual data is transferred via the data bus. CPU sends an address to
memory, the memory will send data via the data bus. The data bus is
bidirectional.
control Bus
• It is the path for sending the control signals generated by Control unit. Data and
address bus is shared by all the component of the system through the control
bus.
Memory
• There are two kinds of computer memory: primary and secondary.
• Primary Memory: RAM, ROM, Cache Memory, Register
• RAM: The memory that is accessible directly by the processing unit is called
primary memory, that is to say CPU, can read data directly from the primary
memory and can also write data directly to it. It is the memory that holds
instructions and data that are used frequently during processing. There are Two
types of RAM
• SRAM: SRAM stands for static Random Access Memory. It is more expensive than
DRAM. It is made of transistors only.
• DRAM: DRAM stands for Dynamic Random Access Memory. It is cheaper than
SRAM. It is made up of transistor and capacitors.
Figure of RAM
ROM
• ROM stands for Read Only Memory. IT is a primary memory that stores some
standard processing programs supplied by the manufacturers to operate the PC.
CPU can only read the content of ROM but it can not change the content of ROM.
Types of ROM
• PROM: PROM stands for Programmable Read Only Memory. A PROM is a
memory chip on which data can be written only once. Once a program has
written into a PROM, it remains there forever.
• EPROM: It stands for Erasable Programmable Read only Memory. It is a special
type of PROM that can be erased by exposing in to ultraviolet light. It clear the
content.
• EEPROM: It stands for Electrically Erasable Programmable Read Only Memory. Its
content can be erased by exposing it to an electrical charge and it can be
reprogrammed.
Cache Memory
• The data and instructions that are required during the processing of data are
brought from the secondary storage and stored in the RAM. For processing, it is
required that the data and instruction are accessed from the RAM and stored in
registers. The time taken to move the data between RAM and CPU registers is
large. This affects the speed of processing of computer and results in decreasing
the performance of CPU.
• Cache memory is a very high speed supplementary primary memory placed in
between RAM and CPU to store frequently used data and instructions needed by
CPU. It increases the speed of processing.
Secondary Memory
• The secondary memory stores data and instructions permanently. The
information can be stored in secondary memory for a long time . It is
non volatile memory.
• It provides back-up storage for data and instructions. Hard disk drive,
floppy drive and optical disk are some examples of secondary
Memory.
• Secondary memory has a high storage capacity than the primary
memory.
Magnetic Tape
• Magnetic tape is one of the most popular sequentially accessible
storage mediums for large data. It is a device used for storing back up
information. It is a serial access type storage device having low cost
and has large storage capacity.
• Magnetic Tape are durable, can be written, erased and re-written. Its
main drawback is that , it stores information sequentially.
Magnetic Disk
• Magnetic storage devices refer to system that keeps information or
data on a magnetized material. It offers high storage capacity,
reliability, and the capacity to directly accessing data. A magnetic disk
is a thin, circular metal plate/ plotter coated with magnetic material
such as iron oxide. There are two types of magnetic disk
• hard disk
• Floppy disk
Floppy Disk
• Floppy Disk is a secondary storage medium which is a round, flat
piece of flexible plastic, coated with ferric oxide. It is a removable
disk. It is used as a back up storage memory to transfer data and
information from one computer to another.
• Hard Disk: Hard disk is a common secondary storage medium of the
mini, micro and mainframe computer. The storage capacity of the
hard disk is very high which is measured in Gigabyte (GB).
• It stores programs, data, operating system, application programs,
database etc.
Optical Disk
• A part from magnetic tape, and magnetic disks, a new storage
medium, which is gaining popularity, is the optical disks. An optical
disk is an electronic data storage medium that can be written to and
read using a low powered laser beam.
• It is very useful for the distribution of large amount of data to a large
number of users.
• Types of optical Disk
• CD ROM DVD ROM
CD ROM and DVD
• CD stands for Compact Disk. It is portable and its capacity usually ranges from 650
to 750 MB.
• DVD stands for Digital Versatile Disk. It is used to store movies or music.
• Flash Memory: Flash memory is a type of electronically erasable programmable
read only memory.
• Memory card : Memory card is a type of storage media that is often used to store
photos, videos, or other data in electronic devices. Devices that commonly use a
memory card include digital cameras, handheld computers, MP3 players, game
consoles etc.
• SD card is one of the more common types of memory cards used with electronics.
The SD technology is used by over 400 brands of electronic equipment and over
8000 different models including digital cameras and cell phones.
Interfaces
• Interface may refer to a hardware interface, a software interface, or
sometimes it can refer to the interaction between the user and the
computer via an input device such as the keyboard. It is a boundary
across which two independent systems meet and act on or
communicate with each other. Motherboard has a certain number of
I/O sockets that are connected to the ports and interfaces found on
the read side of a computer.
Memory hierarchy
• Computer Software
Software
• Introduction to software
• Types of software
• Program
• Computer Virus
• Antivirus
Software
• Software is a general term used to describe a collection of computer
programs, procedures and documentation that perform some tasks
on a computer system. They are the programs that enable a computer
to perform a specific task.
• This includes application software such as a word processor, which
enables a user to perform a specific task and system software such as
an operating system which enables other software to run properly.
• Software is a set of programs that instructs the computer about the
tasks to be performed. software tells the computer how the tasks are
to be performed.
Types of Software
• System Software
• Application Software
Software Types
System Software
• The software which is designed to operate, control and manage the
actual operation of the computer hardware is called system software.
Being an artificial machine, a computer does not know how to do
ever a small task. It required instructions for each and every thing it
does.
• The system software controls internal computer operations like
reading data from input devices, sending processed information to
the output device, checking system components.
Types of System software
• Operating system
• Translating program
• Utility software or system support program
Operating system
Operating System
• It is a program which acts as an interface between the user,
application program and hardware. Without operating system, we can
not start the computer and run other programs. It is loaded at first
into computer by booting program, then it controls the execution of
computer program like scheduling, debugging, input / output control,
supervision and management of data.
Translating program
• A language translator helps in converting programming languages to
machine language. The translated program is called object code.
There are three different kinds of language translator.
• Assembler: It is used to convert the assembly languages into machine
language.
• Interpreter: This language processor converts a high level language
into machine language by converting it line by line.
• Compiler: It is used to convert the source code(user written in high
level) into machine language. Compiler reads whole source code at a
time.
Utilities Software
• These programs perform tasks related to the maintenance of the
computer system. These are the packages which are loaded into
computer during time of installation of OS. They used to support
,enhance expand and secure existing programs and data in the
computer system.

• Anti Virus
• Disk Cleaners
• Disk compression
Anti Virus
• It is the utility software which is used to scan computer for viruses
and prevent the computer system files from being corrupt.
• Disk Cleaners: It is used to find files that have not been used for a
long time. This utility also serves to increase the speed of a slow
computer.
• Disk Compression: It increases the amount of information that can be
stored on a hard disk by compressing all information stored on a hard
disk.
Application Software
• The software that is written by the user to solve a specific user
oriented problem using the computer is known as application
software.
• A software that allows us to do things like create text documents, play
games, listen to music or surf the web is called application software.
These program directs a computer to solve user oriented problems.
such as preparing bills, mark-sheet etc.
Types of Application software
• A. Packaged software: It is generalized set of program designed and
developed for general purpose. It is generally large sized, error free,
advance and standard software for special work. Word processing,
database, graphics animation, web designing software are packaged
software.
• Advantages: It is user friendly and easy to run, it is designed for
general purpose.
Packaged software examples
• Word Processor: Word processing software is used to manipulate a
text document, such as a resume or a report. Examples of Word
processing software are: Soft Word, WordStar, Word perfect,
Microsoft Word.
Functions of word processing software are:
• Creating, editing, saving and printing documents.
• Copying, pasting, saving and printing documents.
• Formatting text, such as font type, bolding text.
• Inserting elements from other software.
• Creating and editing tables.
MS word window Elements
Spreadsheet
• A spreadsheet is computer software that is mainly used for making
calculations. It sets out grid where users can analyze and organize
number, financial data and other information. It is an application
program that contains grid of rows and columns.
• Some of the examples of spread sheet software are: Microsoft excel,
Spread 32 etc.
• MS-Excel is spreadsheet software developed by Microsoft company.
Excel window
Presentation Software
• Presentation is a way of attracting audience towards our views and
arguments. MS-PowerPoint is a software application included in MS-
office package. Features of MS PowerPoint:
• Slide show for presenting information
• Transition effect can be included.
• Support different multimedia facilities.
• Automatic slide transitions and animations.
Types of application software
• B. Customized or Tailored Software: It is a small software designed to
meet the specific requirements of an organization or individuals. It is
developed on the demand of customer. It serves only one user or
organization. It is written using a high level programming language
such as c, C++, java etc.
• Advantages: It is easy to modify, It is very cheap.
Unit 6
• Operating System
OS
• Operating System: An operating System is a system software, which is
set of specialized programs that are used to control the resources of a
computer system. It is an organized set or collection of software that
controls the overall operation of the computer system and provides
an environment.
• It is a large and complex software consisting of several components.
Functions of OS
• Process Management: A process is a program basically a program
that is being currently run by a user on a computer system. The
process management activities handled by the OS are: create, execute
and delete a process, Schedule a process , synchronization,
communication and deadlock handling for processes.
• Memory management: The OS manages the memory resources of a
computer system. All the programs are loaded in the main memory
before their execution. It allocate memory, free memory, reallocate
memory.
Functions of OS
• File Management: The OS manages the files and directories of a
computer system. The file management tasks include: Create and
delete files, provide access to files, keep back up of files.
• Protection and security: The OS protects the resources of system
from various threats such unauthorized access.
• User Interface : Operating system provides an interface between the
computer user and the computer hardware.
Types of OS
• Single User and single Task OS: These Operating systems allow only
one user to operate at a time. DOS is the most popular single user OS.
These OS are mainly used on personal computers. In DOS we can not
run another program at same time. For this we will have to close the
first program.
• Single User and Multitasking OS: In multi-tasking , two or more
program's can be executed by one user concurrently on the same
computer with one central processor. It allows execution of more
than one task or process concurrently. For this the processor time is
divided in different tasks. This division of time is also called time
sharing. Windows 95, 98, windows 2000 etc.
Types of OS
• Multi User OS: It allows simultaneous access to a computer system
through two or more terminals. it is use in computer networks that
allow same data and applications to be accessed by multiple users at
the same time. A dedicated transaction processing system such as
railway reservation system that supports hundreds of terminal under
control of a single program is an example of multi- user operating
system eg Linux, Unix etc.
• Multiprogramming OS: In multiprogramming operating system more
than one job resides in main memory and hence the memory is
utilized. The CPU picks one job and starts executing it, when the job
required to perform input /output operation, the CPU does not sit
idle and picks next job and start executing its instruction.
Types of OS
• Multiprocessing OS: Multi- processing is a processing done by two or
more computers or processors linked together to perform work
simultaneously at the same time. Unix, Linux and windows 7 are
examples of multiprocessing OS.
• Real time OS: The real time operating system has well defined, fixed
time constraint and processing must be done within fixed time
constraint. This operating system provides quick response time. These
are used to respond to queries in areas like medical imagine system,
industrial control systems.
Batch processing OS
• Batch processing Operating Systems are the operating system that do not interact
with users during execution of task. Users prepare their jobs on an off-line device
like punch card or tape and submit it to the computer operator. After collecting
large number jobs, operators will provide it to computer and jobs are executed
one by one.
Open source Operating system
• Open source operating system is any operating system that is free to used and
which provides the original code where the source code is available to the public,
which enables them to use , modify/ enhance the OS. The different open source
OS are:
• Linux, FreeDOS[IBM PC], Phantom OS[ Russian developers] etc.
Unit VII
Computer Network: Introduction of Networking, Types of Networking, Data
transmission, Communication protocol, Topology
Computer Network
Network: A computer network is a group of computer systems and other
computing hardware devices that are linked together through communication
channels to facilitate communication and resource- sharing among a wide range
of users.
It is the interconnection of two or more than two nodes which are able to
exchange information by means of transmission medium either wire or wireless
and protocols.
Communication Network
Computer Network
Advantages of Computer Network
• Computers in a network can access network-connected hardware devices like
printers, disk drives etc.

• Information can exchange rapidly in computer network.

• Computers in a network system share different software packages.

• Data in a network environment can be updated from any computer.


Disadvantages of Computer Network
• Failure of server stops applications being available.

• Network failure cause loss of data.

• User work dependents upon network.

• System opens to hackers.


Types of Computer Network
• On the basis of geographical area
• LAN, MAN, WAN
• LAN: It is the computer network within a very limited area and connected in a
way that enables them to communicate with one another. It is confined with
small geographical area like exist in a single building.
Features:
It covers small geographical area.
It uses (mostly) guided transmission media.
Communication cost is low.
It is private network so, ownership is of single organization.
No special security is needed.
Metropolitan Area Network (MAN)
• MAN stands for Metropolitan Area Network. It is designed for city or
town. A MAN may either be operated as a joint activity by a number
of separate organizations.
• Features
a. It can support large geographical area like city.
b. Wireless media is used.
c. Communication cost is high in compare to LAN.
d. Special security is needed.
Wide Area Network
• WAN: A Wide Area Network is a network system of connecting two or more
computers generally around a wide geographical area such as districts and
countries. Internet is an example of WAN.
Features
• It covers a large geographical area.
• It is owned by multiple organizations.
• It uses public connection mediums such as wireless technology.
Network Architectures
• Peer-to Peer Architecture
• Client/Server Architecture
Network Architecture
• Peer to Peer Architecture: It is a type of network in which each workstation has
equivalent capabilities and responsibilities. Resources are directly available to
other network participants, without the need for central coordination by servers.
• Advantages: Reduced cost
• Easy to setup and maintain the network.
• No dedicated staff are needed for administering and controlling.
• Disadvantages: This system is not centralized, makes administration difficult.
• Difficult to apply security policies.
Client Server Architecture
• Client/Server architecture is a producer- consumer computing
architecture where the server acts as the producer and client as a
consumer.
• Client/server architecture works when the client computer sends a
resource or process request to the server over the network
connection, which is then processed and delivered to the client.
• Advantages: Simplified user accounts, security and access controls to
simplify network administration.
• Single password for network login delivers access to all.
Topologies
• A network topology is the layout of the cables and devices that
connect the nodes of the network. Speed and performance of the
computer network depends upon the topology used.
• It is the arrangement of computers, cables and other components on
a network or a map of geometrical shape of physical network of
computers is network topology. The topologies commonly used in
LAN are Bus topology, Ring topology, Star topology and Mesh
topology.
Bus Topology
• A topology in which all of the computers in a network are attached to
the continuous cable or segments that connects them in a straight
line is called bus topology. In a bus topology a set of clients are
connected through a shared communication line called a bus.
• Advantages: It required less cable media, so it is cheaper than other.
• It is easy to add a new node in the network. It is easy to setup.
• Disadvantages: if backbone is damaged the whole network failure.
Difficult to detect the errors.
Figure of Bus Topology
Ring Topology
Ring Topology
• In Ring topology computers are connected in the shape of a circle
without any end point. Each workstation contains two node for
communication or an input and an output connections.
• All computers get equal opportunity to access the token in ring
topology.
• Advantages: It is easy setup and configure. Each computer gets equal
opportunity to access the network resources.
• Disadvantages: Failure of cable or single computer may affect the
entire network.
• It is difficult to detect the errors.
Star Topology
• Star topology network is the most commonly used network topology
for LANs. In this topology all computers are connected through a
central device called hub and switch. It regenerate the signal, which
helps to transfer data to a longer distance.
• Advantages: Flexibility in adding and deleting the node from network.
Works faster than bus and ring topology. Failure of a cable or a
computer doesn't affect the whole network.
• Disadvantages: Failure of hub/switch may cause entire system failure.
• Extra hardware like hub or switch needed, therefore expensive.
Star Topology
Mesh Topology
Mesh Topology
• In mesh topology, each computer has a direct connection with every
other computer. So if any one connection fails, then there is another
connection through which data can be transferred. The mesh
topology is the most expensive topology to implement.
• Advantages: Direct connection between computers so it is more
reliable. Data transmission is faster. Failure of one node doesn't affect
the entire network.
• Disadvantages: More cables are required so it is expensive. Wiring is
complex. Difficult to manage.
Transmission Media
• Guided
• Unguided
Guided Media
• The media that transmits signal through some conductor is called
guided media. It is also called wired media. Guided media includes
coaxial cable, twisted-pair cable and fiber optic cable.
• Coaxial cable: Coaxial cable carries signals of higher frequency ranges
than twisted pair cable. It has a central core conductor of solid wire. It
is commonly used for televisions transmissions.
Figure of Coaxial and Twisted pair
by Jiban pandit
Twisted Pair cable
• A twisted pair cable is made of two plastic insulated copper wires
twisted together to form a single media. The twists between wires are
helpful in reducing noise and crosstalk.
• Fiber Optic cable: A fiber optic transmits signals in the form of light.
Optical fiber use reflection to guide light through a channel. It is
expensive guided media, and difficult to install.
Fiber Optic
• A fiber optic cable transmits signals in the form of light. Optical fiber use
reflection to guide light through a channel. It consists of two main parts: core and
cladding. Cladding acts as a protective cover to core.
Features:
• Optical fibers are being used for transmission of information over large distance
more cost effectively than the copper wire connection.
• Optical fiber transmits data as light signals instead of electric signals.
• It do not cause electrical interference in other cables, since they use light signals.
• It can carry more information.
Fiber optics
Unguided Media
• Unguided media transport electromagnetic waves without using a physical
conductor. This type of communication is also called wireless communication.
Signals are normally broadcasted through air and thus available to anyone who
has device capable of receiving them. It can be divided into three types.
• Radio Transmission
• Microwaves
• Satellite Transmission
Radio Transmission
• This transmission is also known as Radio Frequency transmission .
These are omnidirectional waves. This means when an antenna
transmits radio waves, they are propagated in all directions.
• Microwaves: Electromagnetic waves having frequencies between 300
MHz to 300 GHz are called microwaves. These are unidirectional.
Normally, microwaves are used for long distance communication. It
needs expensive towers and repeaters.
Satellite Transmission
• Satellite transmission can cover large geographical area of earth. It is
set in geo-stationary orbits. satellite are placed 36,000 km above the
earth's surface. The communication is carried through uplinks and
downlinks.
IP address
• An IP address is a unique address that identifies a device on the internet or a
local network. IP stands for "Internet Protocol," which is the set of rules
governing the format of data sent via the internet or local network.
IT
• Jiban pandit
Data Transmission Mode
• Simplex: The simplex transmission is the one that travels in only one
direction. It is a type of communication in which data can only be
transmitted in one direction. Radio broadcasts, Television broadcast,
Keyboard and monitors are examples of simplex mode.
• Half Duplex: It is a type of communication in which data can flow in both
direction but not simultaneously. Each device in a half duplex system can
send and receive data but only one device can transmit at a time. Walkie-
talkie, fax machines, Credit card verification systems.
• Full Duplex: In the full duplex mode of transmission, the communication is
bi-directional, and channel is used by both the connected device
simultaneously. Transmission of data between computers, Telephone
Network, Mobile communication are examples of Full duplex.
Connectors/ Network Devices
• Connectors act as an interface between the NIC of the computer and
the cable that passes data from one computer to another. The type of
connector depends on the type of cable or devices used in the
network.
• Hub
• Repeater
• Switch
• Router
Centralized vs. Distributed System
• Centralized processing is the processing in which a centrally located
computer system processes the data. In a centralized data processing
system, the CPU, the storage devices, software and the professional
data processing staff are located in one central facility.
Advantages:
• Centralized processing helps in reducing the cost because it will not
emphasize on more hardware and machine.
• It provides a better data security.
• The data and the program on each information system are
independent to other information systems.
Distributed System
• In the distributed multi- branch banking system, minicomputers are used at the
branch banks and are responsible for the local processing of services such as
savings and current accounts and loans. Each machine uses a copy of the same
software for these functions.
Advantages:
• Local control of local data.
• Lower Cost.
• Modularity.
• Better response time.
Unit 8
• History of Internet, Protocol, The Internet Architecture, connecting to
Internet, Internet services, IOT, Cloud computing, E-commerce, E-
governance, smart city , GIS
Internet
• In 1960s, the Department of Deafens of the United States started a
project of network to share data and information. This network was
called ARPA that stands for Advanced Research Project Agency.
• Internet is a network of networks. Millions of computers all over the
world are connected through the internet. Computer users on the
internet can contact one another anywhere in the world. If computer
is connected to the internet, one can connect to millions of
computers. In internet a huge resource of information is accessible to
people across the world. Information in every field starting from
education, science, health, medicine, history and geography to
business, news etc. can be retrieved through internet.
Uses of Internet

• Online communication

• Feedback about products

• Product promotion

• Customer support service

• On-line shopping
On-line journals and magazines
On-line banking.
Protocols
• Communication between computers would be impossible without protocols.
Protocols are set of rules that the computers on the network must follow to
communicate and to exchange data with each other. They are used to make
logical connection between different computers and transfer data from one node
to another.
• TCP/IP: Transmission control Protocol/ Internet Protocol. It is responsible for
addressing data converting them into packets and routing the data packets.
• HTTP: Hyper Text Transfer Protocol is used to transfer data and files on the
Internet. FTP: File Transfer Protocol provides a method to transfer files between
two computers.

• SMTP: Simple Mail Transfer Protocol is used to transfer mail and attachment on
the network.
• POP: Post Office Protocol is a common protocol used for fetching mails from the
mail server to a user's computer.
TCP/IP
TCP/IP TCP/IP stands for Transmission Control protocol and
Internet Protocol. The main design goal of TCP/IP was
to build an interconnection of networks, referred to as
an internetwork, or internet, that provided universal
communication services over heterogeneous physical
networks. The clear benefit of such an internetwork is
the enabling of communication between hosts on
different networks, perhaps separated by a large
geographical area. TCP/IP layers are:
• Application Layer: The top layer of the protocol stack
is the application layer. It refers to the programs that
initiate communication in the first phase. TCP/IP
includes several application layer protocols for mail,
file transfer, remote access, authentication.
TCP/IP Transport Layer[Host to Host]: The transport layer is
responsible for providing the application layer with
session and datagram communication services.
Internet Layer: The Internet layer handles the transfer
of information across multiple networks through the
use of gateways and routers. It deals with the routing
of packets across these networks as well as with the
control of congestion.
Network Layer/ physical layer: Physical layer is
responsible for placing TCP/IP packets on the network
medium and receiving TCP/IP packets of the network
medium.
The Internet Architecture
• Internet is a network of interconnected networks and is designed to operate
without a central control. If a portion of the network fails, connection is made
through alternative paths available. The architecture of Internet is hierarchical in
nature.
• Client (User of computer): Lowest level in hierarchy.
• ISP (Internet service Provider) is at the next higher level.
• A router is a special hardware system consisting of a processor, memory and I/O
interface used for the purpose of interconnecting networks.
• Regional ISP
Managing the Internet
• Internet is not controlled by any one person or an organization. A
number of organizations manage the Internet. The Internet Society
(ISOC), World wide web consortium (W3C), Internet Architecture
Board (IAB), which are giving directives and guidelines for the proper
use of the Internet.
• Connecting to Internet: A TCP/IP enabled computer, Software(like
web browser), an account with an ISP, Connection line( telephone
line, coaxial cable or fiber connection).
Internet Connections
• Different types of internet connections are provided by the ISPs. User
can select the internet connection on the basis of their requirement
i.e. bandwidth and cost.
• Dial –Up
• Leased Line
• Integrated services Digital Network (ISDN)
• Digital Subscribe Line (DSL)
• Cable Modem
Services of Internet
E-mail: E-mail consist of text based message and the optionally attached
attachments which are used for sending, receiving and saving message over
electronic communication system. The E-mail service allows an internet user to
send mail to another internet user in any part of the world in a very short time.
• Uses of E-mail
• Information exchange
• Staying in touch professionally
• Staying in touch socially
• transmitting documents
• Publish an online newsletter
• Publicize special promotions or events etc.
Services of Internet
• Video Conferencing: Video Conferencing refers to live , visual
connection between two or more people in which two or more sets
of hardware and software interact while simultaneously transmitting
and receiving video and audio signals from two or more geographic
locations.
• " A live connection between people in separate locations for the
purpose of communication, usually involving audio and often text as
well as video.
Services of Internet [Telnet]
• Telnet is a program that allows the user to log into a remote computer on the
Internet as a user on that system. It allows the user to log in to a remote
computer in such a way that a person may use it as if it is being used locally.
• WWW: The world wide web is the most important service available on the
Internet. It was created in 1990 European Particle Physics laboratory in Geneva,
Switzerland to exchange and share data through the Internet using a protocol
known as HTTP.
• Terms used in Internet
• Download: Download refers to copying files or documents or programs or data
from the Internet server to the user's computer.
• Upload: Upload refers to copying files or documents or programs or data from
users computer to the Internet.
Terms used in Internet
• Web browser: Web browser is client based application software that allows a
user to display and interact with a hypertext documents. It can be a graphical
interface or text based interface browser. Some common web browsers are
Microsoft Internet Explorer, Mozilla, Google Chrome, Netscape etc.
• Web page: The fundamental unit of web is the web page. Web page is the
collection of information that is stored in the website. It is a document that
contains links, texts, images, audio and video as well as other internet services.
Terms used in Internet
• Website: Website is the location of web pages created by any organizations,
government offices or personal site to provide information. Each and every
website has its own address, is called internet address. After connecting the
internet, we have to search any information by using related websites address.
• Web server : A web server is a program that, using the client/server model and
the World Wide Web's hypertext transfer protocol (HTTP), serves the files that
form web pages to web users. Every computer on the internet that contains a
web site must have a web server. Two leading web servers are Apache, the most
widely-installed web server and Microsoft's Internet Information sevices (IIS).
• Apache Web Server: One of the most popular web server in the world developed
by the Apache software Foundation. Apache is an open source software
which supports almost all operating systems including Linux, Unix, Windows,
Mac OS.
• IIS Web Server: Internet Information Services formerly known as Internet
Information Server, Is a web server produced by Microsoft. This server has all
the features just like apache. But it is not an open source .
Terms used in Internet
URL:Every resource on the Internet has its own location identifier or Uniform
Resource Locator (URL). URLs are used to address and access individual web pages
and internet services or access as well as the access method and the location. It is a
web addressing scheme that spells our exact location of an internet resource. The
protocol that the www uses is Hypertext Transport Protocol (HTTP), and web page
is programed using HTML codes.
• DNS (Domain Name System):
• DNS is used for converting host names and domain names into IP addresses on
the Internet or on local networks that use the TCP/IP protocol. IP address is a
unique number separated by period. DNS automatically converts the website
names types in web browser address bar to the IP addresses of web servers
hosting those sites. DNS implements a distributed database to store this website's
name and IP address information for all public hosts in the Internet.
Terms used in Internet
• Search Engine:
• A search engine is a web site that collects and organizes content from all over the
internet. Those wishing to locate something would enter a query about what
they'd like to find and the search engine provide links to content that matches
what they want. It constitutes of its various database and searches the term
relevant to the query or keyword entered, gathers and reports information that
contains, and display the URL of the website as a returned query related to
specified terms. For example: google.com, yahoo.com, bing.com etc.
ISP
• Internet service Provider is a company that offers its customers access
to the Internet. ISP connects to its customers using a data
transmission technology appropriate for delivering Internet Protocol
such as dial-up, Cable modem or dedicated high speed interconnects.
Proxy Server
• A proxy Server verifies and forwards incoming client requests to other
servers for further communication. A proxy server is located between
a client and a server where it acts as an intermediary between the
two, such as a web browser and a web server.
• The proxy server's most important role is providing security.
Intranets
• An intranet is a private computer network that uses Internet technologies to
securely share any part of an organization's information or operational systems
with its employees.
• An intranet can be understood as a private version of the Internet or as a private
extension of the Internet confined to an organization
Extranet: It is a business to business intranet that allows limited, controlled, secure
access between a company's intranet ad designated, authenticated users from
remote locations. It is an intranet that allows controlled access by authenticated
parties. An extranet can be viewed as part of a company's intranet that is extended
to users outside the company.
Internet of Things (IOT)
• The Internet of Things, also called the Internet of objects refers to a wireless
network between objects, usually the network.
• The term "Internet of Things" has come to describe a number of technologies and
research disciplines that enable the Internet to reach out into the real world of
physical objects.
Wearable Computing
• The terms "Wearable technology", "Wearable devices" and technologies or
computers that are incorporated into items of clothing and accessories which can
comfortably be worn on the body. These wearable devices can perform many of
the same computing tasks as mobile phones and laptop computers.
• Features of wearable computer:
• Consistency: The computer runs continuously and is user friendly.
• Enhancement, Privacy
Cloud Computing
• The term cloud has been historically as a metaphor for the Internet and has
become a familiar. Cloud computing is a model for enabling convenient, on
demand network access to a shared pool of configurable computing resources
that can be rapidly provisioned and released with minimal management effort or
service provider interaction.
• It entrusts remote services with a user's data, software and compution.
E-commerce
• E-commerce or electronic commerce, a subset of e-business, is the purchasing,
selling and exchanging of goods and services over computer networks through
which transactions or terms of sale are performed electronically. It is any form of
business transaction in which the parties interact electronically. E-commerce
provides the mechanism of selling and buying of goods and services using
Internet technologies.
Advantages: 24*7 operation, Knowledge of Customer behavior, Global reach.
E- governance
• E-governance stands for electronic governance which is composed of information
technology, people and governments. E-governance is the application of
electronic means to improve the interaction between government and citizens;
and to increase the administrative effectiveness and efficiency in the internal
government operations.
• Why e-governance?
• To bridge the gap between government and citizens.
• To provide effective and efficient services.
• To enhance participation of people in choice and provision of governance
products and services.
Advantages of e-governance
• It is easy to access data and information.
• It become one portal for delivering government services.
• The government services will be made a available to the citizens in a
convenient, efficient and transparent manner.
Smart City
• A smart city is an urban area that uses different types of electronic data collection
/ sensors to supply information used to manage assets and resources efficiently.
This includes data collected from citizens, devices and assets that is processed
and analyzed to monitor and manage traffic and transportation systems, power
plants, water supply networks, waste management, information systems, schools,
libraries, hospitals and other community services.
• Information and communication technology(ICT) is used to enhance quality,
performance and interactivity of urban services, to reduce costs and resource
consumption and to increase contact between citizens and government.
Geographical Information System
• GIS is a computer based tool for mapping and analyzing things that exist and
events that happens on earth. It is an information system that integrates stores,
edits, analyzes, shares and displays geographic information. GIS is a computer
based information system used to digitally represent and analyze the geographic
features present on the earth's surface and the events taking place on it.
• Applications of GIS
• Scientific investigations, Resource management, Urban planning, Geographic
history, marketing
Advantages of GIS
• Cost savings from greater efficiency
• Improved communication
• Better Decision making
• Better Record Keeping
• Managing Geographically
Unit 9 Fundamentals of Database
• Database system, Database Management System, applications, Data
warehousing, Data Mining and Big data.
DBMS
• Database and database technology are having a major impact on the growing use
of computers. Database plays a critical role in almost all areas where computers
are used including business, engineering, medicine, law, education, and library
science, etc.
• A database management system (DBMS) is a collection of interrelated data and a
set of programs to access those data. The collection of data, usually referred to as
the database, contains information relevant to an enterprise. The primary goals
of DBMS are to provide a way to store and retrieve database information that is
both convenient and efficient. Database systems are designed to manage large
bodies of information. Management of data involves both defining structure for
storage of information and provides mechanisms for the manipulation of
information. In addition, the database system must ensure the safety of the
information stored, despite system crashes or attempts at unauthorized access. If
data are to be shared among several users, the system must avoid possible
anomalous results. Because information is so important in most organization,
computer scientists’ have developed a large body of concepts and techniques for
managing data.
Application of DBMS
• Enterprise information : Sales: for customer, product, and purchase information.
• Accounting: for payments, receipts, account balance, assets and other accounting
information.
• Human resources: for information about employees, salaries, payroll taxes, and
benefits, and for generation of pay checks.
• Manufacturing: for management of supply chain and for tracking production of
items in factories, inventories of items in warehouses and stores and orders for
items.
• Banking and finance : Banking: for customer information, accounts, loans, and
banking transaction . Credit cards and transactions: for purchases on credit cards
and generation of monthly statements.
• Universities: for students information, course registrations, and grades (in
addition to standard enterprise information such human resources and
accounting). Telecommunications: for keeping records of calls made, generating
monthly bills, maintaining balances on prepaid calling cards, and storing
information about the communications networks
Functions of DBMS
• Systematic organization of Information:
• For performing Common Operation:
• Quick retrieve of information:
• To centralize the data and improve the security of the data.
SQL
• Structured Query Language a database computer language designed
for managing data in relational database management system
(RDBMS). SQL allows an individual to create, update, and retrieve
data from database. SQL is very easy to learn.
• Features of SQL:
• SQL is an English- like language. It uses words, such as select, insert,
delete .
• SQL is a non- procedural language.
• Creating, modifying and deleting database objects.
Data Security
• Data security refers to protective digital privacy measures that are applied to
prevent unauthorized access to computers, databases and websites. It is a
process of protecting files, databases, and accounts on a network by adopting a
set of controls, ,applications and techniques that identify the relative importance
of different datasets.
• Essential steps for data secure
• Establish strong Passwords:
• Anti virus protection:
• Secure systems:
• Backup regularly:
Data warehouse
• Data warehouse is a collection of data designed to support
management decision- making. It is a computer database that
collects, integrates and stores an organization's data . It is a subject
oriented, integrated, time variant and non volatile collection of data
in support of management decision making process. The primary goal
of a data warehouse are :
• Provide access to the data of an organization
• Capacity to separate and combine data.
• Drive business re-engineering
Advantages of Data warehouse
• More cost-effective decision-making
• Enhanced customer service
• Business reengineering
• Information System reengineering
Data Mining
• Data mining, the extraction of hidden predictive information from large
databases, is a powerful new technology with great potential to help companies
focus on the most important information in their data warehouses.
DBMS Model
Hierarchical Model: It is one of the oldest database Model. This model arranges the
files used in the database in a top-down structures. The top file is called the root,
the bottom files are called leaves and intermediates files have 1 parent and one or
several children files.
Advantages: It is easiest model of database. Searching is fast and easy if parent is
known. This model is very efficient in handling one to many relationship.
Disadvantages: It is outdated database model. Can't Handle 'many to many'
relationship.
Database Model
• Network Database Model: Network model systems are still popular for high
volume transaction. This model is very flexible as any relationship can
implemented. Advantages : More flexible than hierarchical because it accepts
many to many relationship. Reduce redundancy because data should not
repeated. Searching is fast because of multi- directional pointers.
• Disadvantage: Very complex type of database model. Needs long programs to
handle the relationship. Pointers need in the database increases overhead of
storage. Less security in comparison to hierarchical model because it is open to
all.
Relational Database Model
• It is most common database model for new systems . The relational model was
developed by E.F. codd . This model defines simple tables for each relation and
many to many relationship. Primary and secondary key indexes provide rapid
access to data based upon qualifications. Advantage: Rapid database processing
is possible. It has very less redundancy. Normalization is possible.
• Disadvantages: It is more complex than other models. Too many rules makes
database non user friendly.
E-R Model
• Entity Relationship model : E-R model is a model of the real world. E-R model
represents the entities contained in the database. The entities are further
described in the database using attributes. The relationship between the entities
is shown using the relationships.
• Entity: An entity is the basic unit for modeling. It is a real –world object that exists
physically or conceptually. An entity that exists physically is a tangible object like
student, employee, room etc. A set of entities of the same type having same
properties or attributes is defined as an entity set. For example, a set of all
persons who are students of the university can be defined as an entity set
student.
• Attribute: An attribute describes some property or characteristics of the entity.
For e.g. student name, student address, student age are attributes of the entity
student.
Relationship
• An association or link between two entities is represented using a relationship.
• One to one
• One to many
• many to one
• Many to many
Relationship
Relationship
DBA
• DBA is a person or a group of persons who manages the data, determine the
content, internal structure of Database, defines security and monitors
performance. DBA has centralized control of the database and coordinates all
activities of the database system.
• The function of DBA:
• Defining of schema
• Manage all the users who use database and apply security.
• Granting user authority to access the database.
• Make proper backup and also develop recovery procedure if database crashes.
Unit 9
• Multimedia Introduction
Introduction Multimedia
• The word multimedia is made up of two separate words: multi and media, which
mean many and materials, through which information may be transmitted. This
includes text, graphics, animation, video, sound and computer programs.
• Advantages :
• Multimedia enhances the information for better communication.
• It makes teaching learning easier in the classroom.
• It is portable.
• It makes presentation of the related subject matter attractive.
• Presentation can be done in a big screen, so that many people can see it.
Disadvantages of Multimedia
• It needs a multimedia computer set and techno man to prepare the multimedia
presentation. So it may be more expensive to prepare in the beginning.
• It is not possible to distribute and use in the remote area where poor people stay.
Elements of Multimedia
• Text: Displays alphanumeric characters on the screen to present information. It is
the base layer of almost all programs.
• Graphics /Image : Computer graphics make a computer capable of displaying and
manipulating pictures. It is a more powerful way to illustrate information than the
text. Quality of images determine by following two factors: Resolution [Higher the
resolution better will be the image quality] Color Depth [ Number of bits used to
represent a color is called color depth.]
• Animation: Animation is a simulation of movement created by displaying a series
of pictures or frames. Cartoons on television are an example of animation.
• Video: Video deals with recording and display of a sequence of images at a
reasonable speed to create an impression of movement.
• Sound: Sound is a significant aspect of exciting and successful multimedia
application. Sound effects are used to accompany animation and increased the
interactivity with the user.
Application areas of Multimedia
• Video Games : Multimedia technology is adopted in computer video games. Due
to the arrival of multimedia technology, it is making possible to keep interactive
and exciting sound, graphics or animation in the video games available in the
computer.
• Education and Training : Computer based training (CBT) is a type of multimedia
product which allows users to learn at their own place. Information is presented
using different media types and allows the user the opportunity to review
previous topics.
• Apply special effects in Film: Several movies nowadays contain many visual
tricks, which could never be accomplished without the aid of multimedia
computer technology. The English movies like Titanic, star war, superman, spider
man have used multimedia technology for providing special effects.
Application areas of Multimedia
• Product Promotion: Advertising is perhaps one of the biggest
industry's that use multimedia to send their message to the masses.
Using multimedia techniques can significantly make an item being
advertised better received by the masses and in many cases with
greater results.
Unit 11
• Computer Security: [ Confidentiality, Integrity, Availability]
• With the development of public networks like internet, it needs more and better
security. To make a system secure, various security dimensions are needed such
as, good physical security is necessary to protect physical assets like system.
• Confidentiality: Confidentiality is the concealment of information or resources.
Cryptography can be the better choice for maintaining the privacy of information,
which traditionally is used to protect the secret messages. Similarly, privacy of
resources, i.e. resource hiding can be maintained by using proper firewalls.
Confidentiality is sometimes called secrecy or privacy.
• Integrity: Integrity ensures the correctness as well as trustworthiness of data or
resources. For example, if we say that we have preserved the integrity of an item,
we may mean that the item is accurate, unmodified, modified only by authorized
people.
Computer security
• Availability: Availability refers to the ability to use the information or resource
desired.
It is present in a usable form.
It has capacity enough to meet the service's needs.
It is making clear progress, and if in wait mode, it has a bounded
waiting time.
The service is completed in an acceptable period of time.
Goals of Security
• prevention: Prevention is to prevent the attackers from violating security policy.
Prevention means that an attack will fail. Typically, prevention involves implementation
of mechanisms that users can not override and that are trusted to be implementation of
mechanisms that users can not override and that are trusted to be implemented in a
correct ways so that the attacker can not defeat the mechanism by changing it.
• Detection: Detection is to detect attacker's violation of security policy. so it occurs after
someone violate the policy. The mechanism determines that a violation of the policy has
occurred due to attack and reports it. Detection is most useful when an attack can not be
prevented.
• Recovery: Recovery is to stop attack and to assess and repair if any damage caused by
attack. With recovery, it should be such that the system continues to function correctly,
possibly after a period during which it fails to function correctly, due to attack.
Security Threat & Security Attack
• Threat: It is a potential for violation of security, which exists when there is a
circumstance, capability, action or event that could break security and cause
harm. Threats can be categorized into four classes:
• Disclosure: It leads to an unauthorized access to information. [Snooping]
• Deception: It leads to acceptance of false data.
• Disruption: It leads to an interruption of correct operation.
Types of Attack
• Attacks may be classified based on the nature. It may be an active attack or
passive attack. A passive attack attempts to learn or make use of information
from the system but does not affect system resources. An active attempts to alter
system resources or affect their operation.
• Passive attack
• Active attacks
Malicious Software
• Malicious software refers to a broad category of software threats to the
computer network and systems. The most sophisticated types of threats to
computer systems are presented by malicious codes or software that exploit
vulnerabilities in computer systems.
• Any code which modifies or destroys data, steals data, allows unauthorized
access, exploits or damage a system and does something that user did not intend
to do, is called malicious code.
Security Mechanisms
• To secure every system from attacks a set of security mechanism are
implemented. Security mechanism is a process that is designed to detect, prevent
or recover from a security attack.
• Cryptography: The word cryptography comes from Greek words Kryptos meaning
"hidden or secret", and graphein meaning writing thus cryptography means
"secret writing". It is an art and science of information hiding.
• It consist of encryption and decryption process. The encryption is the process of
encoding a message so that its meaning is not obvious i.e. converting information
from one form to some other unreadable form using some algorithm.
• The decryption is the reverse process, transforming an encrypted message back
into its normal, original form. In decryption process also the use of key is
important.
Digital Signature
• Digital signature schemes normally give two algorithms, one for
signing which involves the user's secret or private key, and one for
verifying signatures which involves the user's public key.
• A signature provides authentication of a "message", Messages may be
anything, from electronic mail to a contract or even a message sent in
a more complicated
Security services
• A processing or communication service that enhances the security of the data
processing systems and information transfers of an organization. The services are
intended to counter security attacks and they make use of one or more security
mechanisms to provide the service. Security services include following services,
• Authentication
• Access control
• Data confidentiality
• Data Integrity
Firewall
• Firewall is hardware device or software applications that act as filters between a
company's private network like Local Area Network and public Wide Area
Network (WAN) like Internet. It protects networked computers.
• The main purpose of a firewall system is to control access to or from a protected
network. It implements a network access policy by forcing connections to pass
through the firewall, where they can be examined and evaluated. A firewall
system can be a router, a personal computer. It provides several types of
protection.
They can block unwanted traffic.
They hide vulnerable systems, which can't easily be secured from the
Internet.
They can provide more robust authentication.
User Identification and Authentication
• identity is simply a compute's representation of an entity. A principal is a unique
entity and an identity specifies a principal.
• User identification(User ID) is a logical entity used to identify a user on a
software, system, website or within any generic IT environment.
• Authentication is the process of validating user identity. The fact that the user
claims to be represented by a specific object like user id does not necessarily
mean that this is true. Authentication is the binding of an identity to a subject.
• Password based authentication
• Biometric Authentication
Intrusion Detection Systems
• Intrusion Detection is a technique of detecting unauthorized access to a
computer system or a computer network. An intrusion into a system is an attempt
by an outsider to the system to illegally gain access to the system. An intrusion is
a deliberate unauthorized attempt, successful or not, to break into, access,
manipulate or misuse some valuable property .
• Security Awareness: Security awareness defines the knowledge and
consciousness regarding security measures. This also includes the attitude the
members of an organization possess regarding the protection of the physical and
logical assets of that organization. It includes the trade secrets, privacy concerns
and government classified information, employee and contractor responsibilities
in handling sensitive information.
Security Policy
Practical
• Prepare your bio data in MS word, Insert watermark in background of
your college name.[5]
• Prepare a mark sheet of ten student with total, result percentage,
division and remarks.[10]
• Create a power point presentation with customized animation on
your campus.[5]
Switching
• The controlling or routing of signals in circuits to transmit data between specific
points in a network is called switching. Networks allow sharing of communication
medium using switching. Switching routes the traffic(data traffic) on the network.
It sets up temporary connections between the network notes to facilitate sending
of data. There are there kinds of switching 1. packet switching 2. Circuit switching
3. Message switching.
Circuit switching
• It is a method of implementation a telecommunication network in
two network nodes establish a dedicated communication medium. It
is commonly used in the telephone communication network.
• Message Switching: Message switching is a network switching
technique in which data is routed in its entirety from the source node
to the destination node. In this switching, every intermediate switch
in the network stores the whole message.
• Message switching does not establish a dedicated path between the
two communicating devices i.e. no direct link is established between
sender and receiver. It uses the “store and forward” mechanism. In
this mechanism , the network nodes have large memory storage.
Packet switching
• Packet switching is a digital network transmission process in which data is broken
into suitably sized pieces or blocks for fast and efficient transfer via different
network devices. When a computer attempts to send a file to another computer,
the file is broken into packets of defined size so that it can be sent to the network
in the most efficient way. These packets are then routed by network devices to
the destination. Each packed is numbered. Packet switching is commonly used for
computer networks, including the Internet.

You might also like