ccs notes
ccs notes
Computer is an advanced electronic device that takes raw data as input from the user and processes it
under the control of set of instructions (called program), gives the result (output), and saves it for the
future use.
These notes provide a general introduction to computers systems. A computer system is made up
of both hardware and software. Software is another term for computer program. Software controls
the computer and makes it do useful work. Without software a computer is useless. Hardware
refers to the physical components that make up a computer system. These include the computer's
processor, memory, monitor, keyboard, mouse, disk drive, printer and so on. In these notes we
take a brief look at the functions of the different hardware components. In addition we describe the
some of the essential software required for the operation of a computer system.
1.1.1Functionalities of a computer
Definition
1) High Speed
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
accurate.
3)Storage Capability
4)Diligence
• Unlike human beings, a computer is free from monotony, tiredness and lack of concentration.
• It can work continuously without any error and boredom.
• It can do repeated work with same speed and accuracy.
5)Versatility
6)Reliability
7)Automation
• Computer is an automatic machine.
• Automation means ability to perform the given task automatically.
• Once a program is given to computer i.e., stored in computer memory, the program and instruction
can control the program execution without human interaction.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
• The use of computers for data processing in an organization leads to reduction in paper work and
results in speeding up a process.
• As data in electronic files can be retrieved as and when required, the problem of maintenance of large
number of paper files gets reduced.
9)Reduction in Cost
• Though the initial investment for installing a computer is high but it substantially reduces the cost of
each of its transaction.
1.1.4Disadvantages
task.
2)Dependency
3)Environment
4)No Feeling
All types of computers follow a same basic logical structure and perform the following five basic
operations for converting raw input data into information useful to their users.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
Input Unit
This unit contains devices with the help of which we enter data into computer. This unit makes link
between user and computer. The input devices translate the information into the form
understandable by computer.
CPU is considered as the brain of the computer. CPU performs all types of data processing
operations. It stores data, intermediate results and instructions(program). It controls the operation of
all parts of computer.
Output Unit
Output unit consists of devices with the help of which we get the information from computer. This
unit is a link between computer and users. Output devices translate the computer's output into the
form understandable by users.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
A PC can be defined as a small, relatively inexpensive computer designed for an individual user.
PCs are based on the microprocessor technology that enables manufacturers to put an entire CPU on
one chip. Businesses use personal computers for word processing, accounting, desktop publishing,
and for running spreadsheet and database management applications. At home, the most popular use
for personal computers is playing games and surfing Internet.
Although personal computers are designed as single-user systems, these systems are normally linked
together to form a network. In terms of power, now-a-days High-end models of the Macintosh and PC
offer the same computing power and graphics capability as low-end workstations by Sun Microsystems,
Hewlett-Packard, and Dell.
2)Workstation
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
Workstations generally come with a large, high-resolution graphics screen, large amount of RAM,
inbuilt network support, and a graphical user interface. Most workstations also have a mass storage
device such as a disk drive, but a special type of workstation, called a diskless workstation, comes
without a disk drive.
Common operating systems for workstations are UNIX and Windows NT. Like PC, Workstations
are also single-user computers like PC but are typically linked together to form a local-area
network, although they can also be used as stand-alone systems.
3)Minicomputer
4)Mainframe
Mainframe is very large in size and is an expensive computer capable of supporting hundreds or
even thousands of users simultaneously. Mainframe executes many programs concurrently and
supports many simultaneous execution of programs
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
5)Supercomputer
Supercomputers are one of the fastest computers currently available. Supercomputers are very
expensive and are employed for specialized applications that require immense amount of
mathematical calculations (number crunching). For example, weather forecasting, scientific
simulations, (animated) graphics, fluid dynamic calculations, nuclear energy research, electronic
design, and analysis of geological data (e.g. in petrochemical prospecting).
Hardware represents the physical and tangible components of a computer i.e. the components that can
be seen and touched.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
• Hardware and software are mutually dependent on each other. Both of them must work together to
make a computer produce a useful output.
• Software cannot be utilized without supporting hardware.
• Hardware without set of programs to operate upon cannot be utilized and is useless.
• To get a particular job done on the computer, relevant software should be loaded into the hardware
• Hardware is a one-time expense.
• Software development is very expensive and is a continuing expense.
• Different software applications can be loaded on a hardware to run different jobs.
• A software acts as an interface between the user and the hardware.
• If hardware is the 'heart' of a computer system, then software is its 'soul'. Both are complimentary to
each other.
• Memory is used to store the information (programs and data) that the computer is currently using. It
is sometimes called main or primary memory. One form of memory is called
• RAM - random access memory. This means that any location in memory may be accessed in the
same amount of time as any other location. Memory access means one of two things, either the CPU
is reading from a memory location or the CPU is writing to a memory location. When the CPU reads
from a memory location, the contents of the memory location are copied to a CPU register. When the
CPU writes to a memory location, the CPU copies the contents of a CPU register to the memory
location, overwriting the previous contents of the location. The CPU cannot carry out any other
operations on memory locations.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
• RAM is a form of short term or volatile memory. Information stored in short term storage is lost
when the computer is switched off (or when power fails e.g. if you pull out the power lead!). There is
therefore a requirement for permanent or long term storage which is also referred to as secondary
storage or auxiliary storage. This role is fulfilled by disk and tape storage.
RAM(Random Access Memory) is the internal memory of the CPU for storing data, program and
program result. It is read/write memory which stores data until the machine is working. As soon as
the machine is switched off, data is erased.
Access time in RAM is independent of the address that is, each storage location inside the memory is
as easy to reach as other locations and takes the same amount of time. Data in the RAM can be
accessed randomly but it is very expensive.
RAM is volatile, i.e. data stored in it is lost when we switch off the computer or if there is a power
failure. Hence a backup uninterruptible power system(UPS) is often used with computers. RAM is
small, both in terms of its physical size and in the amount of data it can hold.
The word static indicates that the memory retains its contents as long as power is being supplied.
However, data is lost when the power gets down due to volatile nature. SRAM chips use a matrix
of 6-transistors and no capacitors. Transistors do not require power to prevent leakage, so SRAM
need not have to be refreshed on a regular basis.
Because of the extra space in the matrix, SRAM uses more chips than DRAM for the same amount of
storage space, thus making the manufacturing costs higher. So SRAM is used as cache memory and
has very fast access.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
DRAM, unlike SRAM, must be continually refreshed in order to maintain the data. This is done
by placing the memory on a refresh circuit that rewrites the data several hundred times per second.
DRAM is used for most system memory because it is cheap and small. All DRAMs are made up of
memory cells which are composed of one capacitor and one transistor.
ROM stands for Read Only Memory. The memory from which we can only read but cannot write
on it. This type of memory is non-volatile. The information is stored permanently in such
memories during manufacture. A ROM, stores such instructions that are required to start a
computer. This operation is referred to as bootstrap. ROM chips are not only used in the computer
but also in other electronic items like washing machine and microwave
oven.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
The very first ROMs were hard-wired devices that contained a pre-programmed set of data or instructions.
These kind of ROMs are known as masked ROMs which are inexpensive.
PROM is read-only memory that can be modified only once by a user. The user buys a blank
PROM and enters the desired contents using a PROM program. Inside the PROM chip there are
small fuses which are burnt open during programming. It can be programmed only once and is not
erasable.
The EPROM can be erased by exposing it to ultra-violet light for a duration of up to 40 minutes.
Usually, an EPROM eraser achieves this function. During programming, an electrical charge is
trapped in an insulated gate region. The charge is retained for more than ten years because the
charge has no leakage path. For erasing this charge, ultra-violet light is passed through a quartz
crystal window(lid). This exposure to ultra-violet light dissipates the charge. During normal use
the quartz lid is sealed with a sticker.
The EEPROM is programmed and erased electrically. It can be erased and reprogrammed about
ten thousand times. Both erasing and programming take about 4 to 10 ms (milli second). In
EEPROM, any location can be selectively erased and programmed. EEPROMs can be erased one
byte at a time, rather than erasing the entire chip. Hence, the process of reprogramming is flexible
but slow.
Advantages of ROM
• Non-volatile in nature
• These cannot be accidentally changed
• Cheaper than RAMs
• Easy to test
• More reliable than RAMs
• These are static and do not require refreshing
• Its contents are always known and can be verified
1.4.1Input Devices
Following are few of the important input devices which are used in a computer:
• Keyboard
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
• Mouse
• Joy Stick
• Light pen
• Track Ball
• Scanner
• Graphic Tablet
• Microphone
• Magnetic Ink Card Reader(MICR)
• Optical Character Reader(OCR)
• Bar Code Reader
• Optical Mark Reader(OMR)
1)Keyboard
Keyboard is the most common and very popular input device which helps in inputting data to the
computer. The layout of the keyboard is like that of traditional typewriter, although there are some
additional keys provided for performing additional functions.
Keyboards are of two sizes 84 keys or 101/102 keys, but now keyboards with 104 keys or 108 keys are
also available for Windows and Internet.
2)Mouse
Mouse is most popular pointing device. It is a very famous cursor-control device having a small
palm size box with a round ball at its base which senses the movement of mouse and sends
corresponding signals to CPU when the mouse buttons are pressed.
Generally it has two buttons called left and right button and a wheel is present between the
buttons. Mouse can be used to control the position of cursor on screen, but it cannot be used to
enter text into the computer.
Advantages
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
• Easy to use
• Not very expensive
• Moves the cursor faster than the arrow keys of keyboard.
3)Joystick
Joystick is also a pointing device which is used to move cursor position on a monitor screen. It is a
stick having a spherical ball at its both lower and upper ends. The lower spherical ball moves in a
socket. The joystick can be moved in all four directions.
The function of joystick is similar to that of a mouse. It is mainly used in Computer Aided Designing(CAD)
and playing computer games.
4)Light Pen
Light pen is a pointing device which is similar to a pen. It is used to select a displayed menu item or
draw pictures on the monitor screen. It consists of a photocell and an optical system placed in a small
tube. When the tip of a light pen is moved over the monitor screen and pen button is pressed, its
photocell sensing element detects the screen location and sends the corresponding signal to the CPU.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
5)Track Ball
Track ball is an input device that is mostly used in notebook or laptop computer, instead of a mouse.
This is a ball which is half inserted and by moving fingers on ball, pointer can be moved. Since the
whole device is not moved, a track ball requires less space than a mouse. A track ball comes in
various shapes like a ball, a button and a square.
6)Scanner
Scanner is an input device which works more like a photocopy machine. It is used when some
information is available on a paper and it is to be transferred to the hard disc of the computer for
further manipulation. Scanner captures images from the source which are then converted into the
digital form that can be stored on the disc. These images can be edited before they are printed.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
7)Digitizer
Digitizer is an input device which converts analog information into digital form. Digitizer can
convert a signal from the television or camera into a series of numbers that could be stored in a
computer. They can be used by the computer to create a picture of whatever the camera had been
pointed at. Digitizer is also known as Tablet or Graphics Tablet because it converts graphics and
pictorial data into binary inputs. A graphic tablet as digitizer is used for doing fine works of
drawing and image manipulation applications.
8)Microphone
Microphone is an input device to input sound that is then stored in digital form. The microphone is
used for various applications like adding sound to a multimedia presentation or for mixing music.
MICR input device is generally used in banks because of a large number of cheques to be processed
every day. The bank's code number and cheque number are printed on the cheques with a special
type of ink that contains particles of magnetic material that are machine readable. This reading
process is called Magnetic Ink Character Recognition (MICR). The main advantages of MICR is
that it is fast and less error prone.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
OCR is an input device used to read a printed text. OCR scans text optically character by character,
converts them into a machine readable code and stores the text on the system memory.
Bar Code Reader is a device used for reading bar coded data (data in form of light and dark lines).
Bar coded data is generally used in labelling goods, numbering the books etc. It may be a hand
held scanner or may be embedded in a stationary scanner. Bar Code Reader scans a bar code
image, converts it into an alphanumeric value which is then fed to the computer to which bar code
reader is connected.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
Following are few of the important output devices which are used in a computer.
• Monitors
• Graphic Plotter
• Printer
1.4.3Monitors
Monitors, commonly called as Visual Display Unit (VDU), are the main output device of a
computer. It forms images from tiny dots, called pixels that are arranged in a rectangular form.
The sharpness of the image depends upon the number of pixels.
The CRT display is made up of small picture elements called pixels. The smaller the pixels, the
better the image clarity, or resolution. It takes more than one illuminated pixel to form whole
character, such as the letter ‘e’ in the word help.
A finite number of characters can be displayed on a screen at once. The screen can be divided into
a series of character boxes - fixed location on the screen where a standard character can be placed.
Most screens are capable of displaying 80 characters of data horizontally and 25 lines vertically.
There are some disadvantages of CRT:
• Large in Size
• High power consumption
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
The flat-panel display refers to a class of video devices that have reduced volume, weight and power
requirement in comparison to the CRT. You can hang them on walls or wear them on your wrists.
Current uses of flat-panel displays include calculators, video games, monitors, laptop computer,
graphics display.
1. 4.4Printers
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
• Impact Printers
• Non-Impact Printers
A)Impact Printers
The impact printers print the characters by striking them on the ribbon which is then pressed on the
paper.
• Character printers
• Line printers
Character Printers
Character printers are the printers which print one character at a time.
In the market one of the most popular printers is Dot Matrix Printer. These printers are popular
because of their ease of printing and economical price. Each character printed is in form of pattern
of dots and head consists of a Matrix of Pins of size (5*7, 7*9, 9*7 or 9*9) which come out to
form a character that is why it is called Dot Matrix Printer.
Advantages
• Inexpensive
• Widely Used
• Other language characters can be printed
Disadvantages
• Slow Speed
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
• Poor Quality
2)Daisy Wheel
Head is lying on a wheel and pins corresponding to characters are like petals of Daisy (flower name)
that is why it is called Daisy Wheel Printer. These printers are generally used for word-processing in
offices which require a few letters to be sent here and there with very nice quality.
Advantages
Disadvantages
3)Line Printers
Line printers are the printers which print one line at a time.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
• Drum Printer
• Chain Printer
4)Drum Printer
This printer is like a drum in shape so it is called drum printer. The surface of drum is divided into
number of tracks. Total tracks are equal to size of paper i.e. for a paper width of 132 characters,
drum will have 132 tracks. A character set is embossed on track. The different character sets
available in the market are 48 character set, 64 and 96 characters set. One rotation of drum prints
one line. Drum printers are fast in speed and can print 300 to 2000 lines per minute.
Advantages
Disadvantages
• Very expensive
• Characters fonts cannot be changed
5)Chain Printer
In this printer, chain of character sets are used so it is called Chain Printer. A standard character set
may have 48, 64, or 96 characters.
Advantages
Disadvantages
• Noisy
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
B)Non-impact Printers
Non-impact printers print the characters without using ribbon. These printers print a complete page at a
time so they are also called as Page Printers.
• Laser Printers
• Inkjet Printers
1)Laser Printers
These are non-impact page printers. They use laser lights to produce the dots needed to form the
characters to be printed on a page.
Advantages
Disadvantages
• Expensive.
• Cannot be used to produce multiple copies of a document in a single printing.
2)Inkjet Printers
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
Inkjet printers are non-impact character printers based on a relatively new technology. They print
characters by spraying small drops of ink onto paper. Inkjet printers produce high quality output
with presentable features.
They make less noise because no hammering is done and these have many styles of printing modes
available. Colour printing is also possible. Some models of Inkjet printers can produce multiple copies
of printing also.
Advantages
Disadvantages
A computer virus is a program designed to harm or cause harm on an infected computer. Its spreads
through e-mail attachments, portable devices, websites containing malicious scripts and file
downloads. A computer virus attaches itself to the host files and always activate whenever you
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
open the infected files. The virus can replicate itself and then infect the other files on your computer
causing more damage. Below is a list of different types of computer viruses and what they do.
1. Resident Viruses
This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and
interrupt all of the operations executed by the system: corrupting files and programs that are opened,
closed, copied, renamed etc.
2. Multipartite Viruses
Multipartite viruses are distributed through infected media and usually hide in the memory.
Gradually, the virus moves to the boot sector of the hard drive and infects executable files on the
hard drive and later across the computer system.
The main purpose of this virus is to replicate and take action when it is executed. When a specific
condition is met, the virus will go into action and infect files in the directory or folder that it is in
and in directories that are specified in the AUTOEXEC.BAT file PATH. This batch
file is always located in the root directory of the hard disk and carries out certain operations when the
computer is booted.
4. Overwrite Viruses
Virus of this kind is characterized by the fact that it deletes the information contained in the files that
it infects, rendering them partially or totally useless once they have been infected.
The only way to clean a file infected by an overwrite virus is to delete the file completely, thus
losing the original content.
5. Boot Virus
This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which
information on the disk itself is stored together with a program that makes it possible to boot (start) the
computer from the disk.
The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never
start your computer with an unknown floppy disk in the disk drive.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
6. Macro Virus
Macro viruses infect files that are created using certain applications or programs that contain
macros. These mini-programs make it possible to automate series of operations so that they are
performed as a single action, thereby saving the user from having to carry them out one by one.
7. Directory Virus
Directory viruses change the paths that indicate the location of a file. By executing a program (file
with the extension .EXE or .COM) which has been infected by a virus, you are unknowingly running
the virus program, while the original file and program have been previously moved by the virus.
8. Polymorphic Virus
Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and
encryption keys) every time they infect a system.
This makes it impossible for anti-viruses to find them using string or signature searches (because
they are different in each encryption) and also enables them to create a large number of copies of
themselves.
9. File Infectors
This type of virus infects programs or executable files (files with an .EXE or .COM extension).
When one of these programs is run, directly or indirectly, the virus is activated, producing the
damaging effects it is programmed to carry out. The majority of existing viruses belongs to this
category, and can be classified depending on the actions that they carry out.
This type of viruses consists of encrypted malicious code, decrypted module. The viruses use encrypted
code technique which make antivirus software hardly to detect them. The antivirus program usually can
detect this type of viruses when they try spread by decrypted themselves.
Companion viruses can be considered file infector viruses like resident or direct action types. They
are known as companion viruses because once they get into the system they "accompany" the other
files that already exist. In other words, in order to carry out their infection routines, companion
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
viruses can wait in memory until a program is run (resident viruses) or act immediately by making
copies of themselves (direct action viruses).
Network viruses rapidly spread through a Local Network Area (LAN), and sometimes throughout
the internet. Generally, network viruses multiply through shared resources, i.e., shared drives and
folders. When the virus infects a computer, it searches through the network to attack its new
potential prey. When the virus finishes infecting that computer, it moves on to the next and the
cycle repeats itself.
This type of viruses is similar to Resident Viruses by using replication of module. Besides that,
Nonresident Viruses role as finder module which can infect to files when it found one (it will select
one or more files to infect each time the module is executed).
Stealth Viruses is some sort of viruses which try to trick anti-virus software by intercepting its
requests to the operating system. It has ability to hide itself from some antivirus software
programs. Therefore, some antivirus program cannot detect them.
In order to spread widely, a virus must attempt to avoid detection. To minimize the probability of
its being discovered a virus could use any number of different techniques. It might, for example,
only infect every 20th time a file is executed; it might only infect files whose lengths are within
narrowly defined ranges or whose names begin with letters in a certain range of the alphabet.
There are many other possibilities.
Many viruses take the easy way out when infecting files; they simply attach themselves to the end
of the file and then change the start of the program so that it first points to the virus and then to the
actual program code. Many viruses that do this also implement some stealth techniques so you
don't see the increase in file length when the virus is active in memory.
A spacefiller (cavity) virus, on the other hand, attempts to be clever. Some program files, for a
variety of reasons, have empty space inside of them. This empty space can be used to house virus
code. A spacefiller virus attempts to install itself in this empty space while not damaging the
actual program itself. An advantage of this is that the virus then does not increase the length of the
program and can avoid the need for some stealth techniques. The Lehigh virus was an early
example of a spacefiller virus.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
The file allocation table or FAT is the part of a disk used to connect information and is a vital part of
the normal functioning of the computer.
This type of virus attack can be especially dangerous, by preventing access to certain sections of the
disk where important files are stored. Damage caused can result in information losses from
individual files or even entire directories.
18. Worms
A worm is technically not a virus, but a program very similar to a virus; it has the ability to self-replicate,
and can lead to negative effects on your system and most importantly they are detected and eliminated
by antiviruses.
Another unsavory breed of malicious code (not a virus as well) are Trojans or Trojan horses, which
unlike viruses do not reproduce by infecting other files, nor do they self-replicate like worms.
They are not considered viruses because they do not replicate. They are not even programs in their
own right but rather camouflaged segments of other programs.
Their objective is to destroy data on the computer once certain conditions have been met. Logic
bombs go undetected until launched, and the results can be destructive.
Antivirus (or anti- virus)software is used to safeguard a computer from malware, including viruses,
computer worms, and Trojan horses
Antivirus software may also remove or prevent spyware and adware, along with other forms of
malicious programs. Free antivirus software generally only searches your computer using
signature-based detection which involves looking for patterns of data that are known to be related
to already-identified malware. Paid antivirus software will usually also include heuristics to catch
new, or zero-day threats, by either using genetic signatures to identify new variants of existing
virus code or by running the file in a virtual environment (also called a sandbox), and watching
what it does to see if it has malicious intent.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
Virus designers, however, usually test their malicious code against the major antivirus types of
malware, specifically ransomware, use polymorphic code to make it difficult to be detected by
antivirus software. Besides using antivirus software to keep your computer safe and running
smoothly, it is also always a good idea to be proactive: make sure your web browser is updated to
the latest version, use a firewall, only download programs from websites you trust and always surf
the web using a standard user account, rather than your administrator one.
An Operating system is concerned with the allocation of resources and services, such as
memory, processors, devices and information. The Operating System correspondingly
includes programs to manage these resources, such as a traffic controller, a scheduler,
memory management module, I/O programs, and a file system
2.3 Functions of an Operating System:
Following are some of important functions of an operating System
• Memory Management
• Processor Management
• Device Management
• File Management
• Security
• Control over system performance
• Job accounting
• Error detecting aids
• Coordination between other software and users
1) Memory Management
Memory management refers to management of Primary Memory or Main Memory. Main memory
is a large array of words or bytes where each word or byte has its own address. Main memory
provides a fast storage that can be access directly by the CPU. So for a program to be executed, it
must in the main memory. Operating System does the following activities for memory
management.
• Keeps tracks of primary memory i.e. what part of it are in use by whom, what part are not in use.
• In multiprogramming, OS decides which process will get memory when and how much.
• Allocates the memory when the process requests it to do so.
• De-allocates the memory when the process no longer needs it or has been terminated.
2) Processor Management
In multiprogramming environment, OS decides which process gets the processor when and how
much time. This function is called process scheduling. Operating System does the following
activities for processor management.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
• Keeps tracks of processor and status of process. Program responsible for this task is known as traffic
controller.
• Allocates the processor (CPU) to a process.
• De-allocates processor when processor is no longer required.
3) Device Management
OS manages device communication via their respective drivers. Operating System does the following
activities for device management.
• Keeps tracks of all devices. Program responsible for this task is known as the I/O controller.
• Decides which process gets the device when and for how much time.
• Allocates the device in the efficient way.
• De-allocates devices.
4)File Management
A file system is normally organized into directories for easy navigation and usage. These
directories may contain files and other directions. Operating System does the following
activities for file management.
• Keeps track of information, location, uses, status etc. The collective facilities are often known
as file system.
• Decides who gets the resources.
• Allocates the resources.
• De-allocates the resources
5)Other Important Activities
Following are some of the important activities that Operating System does.
• Security -- By means of password and similar other techniques, preventing unauthorized
access to programs and data.
• Control over system performance -- Recording delays between request for a service and
response from the system.
• Job accounting -- Keeping track of time and resources used by various jobs and users.
• Error detecting aids -- Production of dumps, traces, error messages and other debugging and
error detecting aids.
• Coordination between other software and users -- Coordination and assignment of
compilers, interpreters, assemblers and other software to the various users of the computer
systems.
4 Importance of networking
4.1 Introduction
Information and communication are two of the most important strategic issues for the success of
every enterprise.
While today nearly every organization uses a number of computers and communication tools (like
telephone or fax), they are often still isolated. While managers today are able to use applications
like wordprocessors or spreadsheets, not very many of them use computer-based tools to
communicate with other departments or information retrieval programs. To overcome these
obstacles in an effective usage of information technology, computer networks are necessary. They
are a new kind of organization of computer systems produced by the need to merge computers
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
and communications. Computer networks can manage to put down the barriers between
information held on several systems. Only with the help of computer networks can a borderless
communication and information environment be built.
Computer networks allow the user to access remote programs and remote databases either of the
same organization or from other enterprises or public sources. Computer networks provide
communication possibilities faster than other facilities. Because of these optimal information and
communication possibilities, computer networks may increase the organizational learning rate
there are other reasons why any organization should have a computer network
A network is two or more computers connected together to share information and files between
them. Businesses aren't the only ones that can benefit from creating a network. Home users can
enjoy sharing music, movies and printers from any computer.
File Sharing : Computers connected to a network can share files and documents with each other.
Personal computers connected to a business network can choose which files and folders are
available to share on the network.
Printers : Computers can print pages to another computer with a printer on the network.
Additionally, printers can be connected using a print server, which allows direct printing from all
computers.
Local area networks (LANs) are used to connect networking devices that are in a very close geographic
area, such as a floor of a building, a building itself, or a campus environment.
C)Wide area networks (WANs) are used to connect LANs together. Typically, WANs are used
when the LANs that must be connected are separated by a large distance.
.
A computer network is an interconnection of various computer systems located at different places.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
In computer network two or more computers are linked together with a medium and data
communication devices for the purpose of communicating data and sharing resources. The computer
that provides resources to other computers on a network is known as server In the network the
individual computers, which access shared network resources, are known as workstations or nodes.
Computer Networks may be classified on the basis of geographical area in two broad categories.
1. Local Area Network (LAN)
2. Wide Area Network (WAN)
1 Every computer has the potential to communicate with any other computers of the network
2 High degree of interconnection between computers
3 Easy physical connection of computers in a network
4 Inexpensive medium of data transmission
• The reliability of network is high because the failure of one computer in the network does not
effect the functioning for other computers.
• Peripheral devices like magnetic disk and printer can be shared by other computers.
Disadvantages of LAN is
• If the communication line fails, the entire network system breaks down.
Use of LAN : Followings are the major areas where LAN is normally used
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
Topology refers to the way in which the network of computers is connected. Each topology
is suited to specific tasks and has its own advantages and disadvantages. The choice of
topology is dependent upon type and number of equipment being used, planned applications
and rate of data transfer required, response time, and cost. Topology can also be defined as
the geometrically interconnection pattern by which the stations (nodes/computers) are
connected using suitable transmission media (which can be point-to-point and broadcast).
Think of a topology as a network's virtual shape or structure. This shape does not necessarily
correspond to the actual physical layout of the devices on the network. For example, the
computers on a home LAN may be arranged in a circle in a family room, but it would be
highly unlikely to find a ring topology there. Network topologies are categorized into the
following basic types:
• bus
• ring
• star
• mesh
More complex networks can be built as hybrids of two or more of the above basic topologies.
1)Bus Topology
Bus networks (not to be confused with the system bus of a computer) use a common
backbone to connect all devices. A single cable, the backbone functions as a shared
communication medium that devices attach or tap into with an interface connector. A
device wanting to communicate with another device on the network sends a broadcast
message onto the wire that all other devices see, but only the intended recipient actually
accepts and processes the message. bus networks work best with a limited number of
Networking made it easy 2 Compiled by devices. If more than a few dozen computers are
added to a network bus, performance problems will likely result. In addition, if the
backbone cable fails, the entire network effectively becomes unusable
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
2)Ring Topology
In a ring network, every device has exactly two neighbors for communication purposes. All
messages travel through a ring in the same direction (either "clockwise" or
"counterclockwise"). A failure in any cable or device breaks the loop and can take down the
entire network. To implement a ring network, one typically uses FDDI, SONET, or Token
Ring technology. Ring topologies are found in some office buildings or school campuses.
Definition: Token Ring is a data link technology for local area networks (LANs). It operates
at layer 2 of the OSI model.
that device checks whether the frame contains a message addressed to it. If so, the device
removes the message from the frame. If not, the frame is empty (called a token frame).
• the device holding the frame decides whether to send a message. If so, it inserts message
data into the token frame and issues it back onto the LAN. If not, the device releases the
token frame for the next device in sequence to pick up
• the above steps are repeated continuously for all devices in the token ring
3)Star Topology
Many home networks use the star topology. A star network features a central connection
point called a "hub" that may be a hub, switch or router. Devices typically connect to the
hub with Unshielded Twisted Pair (UTP) Ethernet. Compared to the bus topology, a star
network generally requires more cable, but a failure in any star network cable will only take
down one computer's network access and not the entire LAN. (If the hub fails, however, the
entire network also fails.)
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
5)Mesh Topology
Mesh topologies involve the concept of routes. Unlike each of the previous topologies,
messages sent on a mesh network can take any of several possible paths from source to
destination. (Recall that even in a ring, although two cable paths exist, messages can only
travel in one direction.) Some WANs, most notably the Internet, employ mesh routing. A
mesh network in which every device connects to every other is called a full mesh. As shown
in the illustration below, partial mesh networks also exist in which some devices connect
only indirectly to others.
4.5.1Wireless networking
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
Moving data through a wireless network involves three separate elements: the radio
signals, the data format, and the network structure. Each of these elements is independent
of the other two. In terms of the OSI reference model, the radio signal operates at the
physical layer, and the data format controls several of the higher layers. The network
structure includes the wireless network interface adapters and base stations that send and
receive the radio signals. In a wireless network, the network interface adapters in each
computer and base station convert digital data to radio signals, which they transmit to
other devices on the same network, and they receive and convert incoming radio signals
from other network elements back to digital data.
A wireless network enables people to communicate and access applications and information
without wires. This provides freedom of movement and the ability to extend applications to
different parts of a building, city, or nearly anywhere in the world. Wireless networks allow
people to interact with e-mail or browse the Internet from a location that they prefer.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
WLANS allow users in a local area, such as a university campus or library, to form a network
or gain access to the internet. A temporary network can be formed by a small number of users
without the need of an access point; given that they do not need access to network resources.
The two current technologies for wireless personal area networks are Infra Red (IR) and
Bluetooth (IEEE 802.15). These will allow the connectivity of personal devices within an
area of about 30 feet. However, IR requires a direct line of site and the range is less.
This technology allows the connection of multiple networks in a metropolitan area such as
different buildings in a city, which can be an alternative or backup to laying copper or fiber
cabling.
These types of networks can be maintained over large areas, such as cities or countries, via
multiple satellite systems or antenna sites looked after by an ISP. These types of systems are
referred to as 2G (2nd Generation) systems.Comparison of Wireless Network Types
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
1
1.5 Use of Email
Email is one of the most important forms of communication in today's digital age. It's the
way that millions (if not billions) of people stay in touch with each other. Luckily, this form
of near-instant communication is completely free. Make a free email account today to start
sending and receiving email immediately. Read on below the jump for detailed instructions
on registering a new email account with several of the internet's most popular email
providers.
Go to Gmail.com. The first step to creating an email account with Gmail, Google's free email
service, is to visit Gmail's main site. Type "gmail.com" into your browser's navigation bar, or,
alternatively, type "Gmail" into your search engine of choice and click the relevant result.
The email is actually used to transfer messages between one to another. It is also used for :-
Both DOS and Windows are types of operating systems. DOS is a single-tasking, single-user and
CLI-based OS; whereas Windows is a multitasking, multiuser and GUI-based OS. Read this tutorial
to find out more about DOS and Windows and how these two operating systems are different from
each other.
What is DOS?
DOS (Disk Operating System) is a character-based operating system that was developed in the
1980s for IBM-compatible computers. DOS is one of the oldest and widely used computer operating
systems. It is a set of computer programs. DOS can perform major functions like file management,
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
What is Windows?
Windows is a graphical operating system that was first released by Microsoft in 1985. It is a multi-
user, multi-tasking operating system that provides a graphical user interface (GUI) for users to
interact with the computer. Windows allows users to launch and use multiple programs at the same
time, and it supports a wide range of hardware and software.
The windows operating system is basically the extension of the disk operating system. Windows is
the most popular and simplest operating system because it makes use of graphics and colors to
create a screen for the user interaction with the computer system. The greatest advantage of the
Windows operating system is that it does not require any special training to use it.
The Windows operating system needs DOS to run various application programs initially. Because
of this reason, DOS should be installed into the computer memory first and then Windows can be
executed.
Here are some important characteristics of the Windows operating system −
Windows is a Graphical User Interface based computer operating system.
It uses icons (pictures, documents, application, program icons, etc.) for user interaction.
Windows operating system has a taskbar.
It has a start button as a main menu button.
It supports pointing devices like mouse, joystick, touchpad, etc.
Difference between DOS and Windows
The following table highlights the major differences between DOS and Windows −
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
Conclusion
Both DOS and Windows are types of computer operating systems, but they are completely different
from each other in many aspects. The most significant difference between DOS and Windows is
that DOS is a single-user character-based (Command Line Interface) operating system, while
Windows is a multiuser, graphical user-interface based operating system.
In general, Windows is a more modern and user-friendly operating system than DOS. It is more
widely used today and supports a much wider range of programs and hardware than DOS.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
Selection Criteria:
1. Bandwidth: The greater bandwidth of the signal, the higher the data rate can be achieved.
2. Attenuation: Attenuation limit the distance (repeater spacing) for guided media. Twisted pair
generally suffer more impairment than co-axial cable.
3. Interference: In overlapping frequency bands from competing signals can distort or wipe out a signal.
This is an interference which is a problem for both guided and unguided media. For guided media
interference is caused by emissions from nearby cables. Since they are bounded together. Proper
shielding of guided media can minimize this problem.
4. Cost: Selection of transmission media can be depend upon cost factor. Select the media which provide
less initial, expansion, & maintenance cost.
5. Type: Depending on the type of application and geographical situation suitable transmission media is
chosen. For long distance point-to-point transmission guided media are suitable. For long distance
broadcasting transmission unguided media like microwave links are chosen.
6. Length: Media should be selected which can cover longer distance in terms of length.
7. Security: Chose the media which provide more security. Select the media which provide better
encryption for signal or data.
8. Ease of Installation: Select media which can be easily installed.
9. Speed: There are two different forms of speed which should be provided by transmission media.
Propagation speed: time to send first bit across the medium. Data transfer speed: the time to transmit
the remaining bits in the message. Media should be selected by these speed factors. Chose the media
which provides good propagation and data transfer speed.
10. Flexibility: Chose the media which provide flexibility with the respect of expandability, noiseless and
can be access easily.
Guided media:
• Guided media, which are those that provide a conduit from one device to another, include twisted-pair
cable, coaxial cable, and fiber-optic cable.
• A signal traveling along any of these media is directed and contained by the physical limits of the
medium.
Twisted-pair and coaxial cable use metallic (copper) conductors that accept and transport signals in
the form of electric current. Optical fiber is a cable that accepts and transports signals in the form of
light.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
1) Twisted Pair:
• A twisted pair consists of two conductors (normally copper), each with its own plastic insulation,
twisted together, as shown in Figure.
• Characteristics of UTP:
1. Transmission rate of 10-100 Mbps.
2. UTP is less expensive than fiber optic cable and coaxial cable.
3. UTP cable is very flexible and easy to work.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
Advantages:
1. UTP is easy to terminate.
2. Cost of installation is less.
3. High installed base.
Disadvantages:
1. It is very noisy.
2. It covers less distance.
3. UTP suffers from interference.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
2) Co-axial Cable:
• Coaxial cable (or coax) carries signals of higher frequency ranges than those in twisted pair cable, in
part because the two media are constructed quite differently.
• Instead of having two wires, coax has a central core conductor of solid or stranded wire (usually
copper) enclosed in an insulating sheath, which is, in turn, encased in an outer conductor of metal foil,
braid, or a combination of the two.
• The outer metallic wrapping serves both as a shield against noise and as the second conductor, which
completes the circuit. This outer conductor is also enclosed in an insulating sheath, and the whole
cable is protected by a plastic cover as shown in figure.
Advantages:
1. Co-axial used for both data transmission i.e. analog and digital data transmission.
2. It has higher bandwidth.
3. Easy to handle and relatively inexpensive as compared to fiber optic cables.
4. It uses for longer distances at higher data rates.
5. Excellent noise immunity.
Disadvantages:
1. Distance is limited.
2. Number of node connection is limited.
3. Proper connectors and termination is must.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
3. In Ethernet LANs.
4. In cable television network.
• Fiber optic cables are similar to coax, except without the braid. Figure (a) shows a single fiber viewed
from the side. At the center is the glass core through which the light propagates. In multimode fibers,
the core is typically 50 microns in diameter, about the thickness of a human hair. In single-mode fibers,
the core is 8 to 10 microns. The core is surrounded by
a glass cladding with a lower index of refraction than the core, to keep all the light in the core. Next
comes a thin plastic jacket to protect the cladding. Fibers are typically grouped in bundles, protected
by an outer sheath. Figure (b) shows a sheath with three fibers.
• FOC transmit light signals rather than electrical signals. Each fiber has an inner core of glass or plastic
that conducts light. The inner core is surrounded by cladding, a layer of glass that reflects the light
back into core.
• A cable may contains a single fiber, but often fibers are bundled together in the centre of the cable.
Advantages:
1. Very high data rate, low error rate. 1000 Mbps (1 Gbps) over distances of kilometers common. Error
rates are so low they are almost negligible.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
2. Fiber cables are more secure than other cables. It is almost impossible to tap into a fiber cable as they
do not radiate signals.
3. Much thinner (per logical phone line) than existing copper circuits. Because of its thinness, phone
companies can replace thick copper wiring with fibers having much more capacity for same volume.
This is important because it means that aggregate phone capacity can be upgraded without the need
for finding more physical space to hire the new cables.
4. Not susceptible to electrical interference (lightning) or corrosion (rust).
5. Greater repeater distance than coax.
6. Fiber cables are light weight because they are made of silica glass or plastic which is much lighter than
copper or aluminum cables. Light weight fiber cables are cheaper to transport.
Disadvantages:
1. The initial installation or setting up cost is very high compared to all other systems.
2. The maintenance and repairing of fiber optic system is not only difficult but expensive also.
3. Difficult to tap. It really is point-to-point technology. In contrast, tapping into coax is trivial. No special
training or expensive tools or parts are required.
4. One-way channel. Two fibers needed to get full duplex (both ways) communication.
Unguided Media:
• Unguided media, also called as wireless communication, transport electromagnetic waves without
using a physical conductor.
• Unguided transmission is used when running a physical cable (either fiber or copper) between two end
points is not possible. For example, running wires between buildings is probably not legal if the
building is separated by a public street.
• The signals propagates through air (or sometimes water). Signals are normally broadcast through free
space and thus are available to anyone who has a device capable of receiving them.
• Figure 7.17 shows the part of the electromagnetic spectrum, ranging from 3 kHz to 900 THz, used for
wireless communication.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
1) Microwave Communication:
• Electromagnetic waves having frequencies between 1 and 300 GHz are called microwaves.
• Microwaves are unidirectional. When an antenna transmits microwave waves, they can be narrowly
focused. This means that the sending and receiving antennas need to be aligned. A pair of antennas
can be aligned without interfering with another pair of aligned antennas.
• Microwave signals travels only in one direction at a time. This means that for two-way communication
such as in telephony, two frequencies need to be allocated.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
• At both ends, a transceiver is used which is a combination of a transmitter and receiver operating at
the two respective frequencies. Therefore, only one antenna can serve both the functions and cover
both the frequencies.
• Figure shows microwave communication.
Advantages:
1. Relatively inexpensive as compared to fiber optics cable.
2. Provides high data transmission rates of about 16 Gbps.
Disadvantages:
1. Very high-frequency microwaves cannot come through walls.
Applications:
1. Mobile telephone networks uses microwave communication.
2. Wireless LAN.
3. Point-to-point communication between stations.
4. Line of sight communication.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
• Radio waves, for the most part, are omnidirectional. When an antenna transmits radio waves, they are
propagated in all directions. This means that the sending and receiving antennas do not have to be
aligned.
• A sending antenna sends waves that can be received by any receiving antenna. The radio waves
transmitted by one antenna are susceptible to interference by another antenna that may send signals
using the same frequency or band.
• Radio waves, particularly those waves that propagate in the sky mode, can travel long distances. This
makes radio waves a good candidate for longdistance broadcasting such as AM radio.
• Radio waves, particularly those of low and medium frequencies, can penetrate walls. This
characteristic can be both an advantage and a disadvantage. It is an advantage because, for example,
an AM radio can receive signals inside a building. It is a disadvantage because we cannot isolate a
communication to just inside or outside a building.
• The radio wave band is relatively narrow, just under 1 GHz, compared to the microwave band. When
this band is divided into sub bands, the sub bands are also narrow, leading to a low data rate for digital
communications.
• In the Very Low Frequency (VLF), Low Frequency (LF) and Middle Frequency ( MF) bands, radio
wave follows the ground, as illustrated in figure (a ).
• In the High Frequency (HF) and Very High Frequency (VHF) bands, radio wave bounce off the
ionosphere i.e. they follow sky propagation.
• Radio waves are used for multicast communications, such as radio and television, and paging systems.
Disadvantages:
1. The properties of radio waves are frequency dependent. At low frequencies, radio waves pass through
obstacles well, but the power falls off sharply with distance from the source.
2. Low frequency and medium frequency range cannot be used for data transfer because of their very
small bandwidth.
3. Applications:
4. The omnidirectional characteristics of radio waves make them useful for multicasting, in which there
is one sender but many receivers. AM and FM radio, television, maritime radio, cordless phones, and
paging are examples of multicasting.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
3) Satellite Communication:
• Satellite communication is similar to the terrestrial microwave, except that the satellite acts as one of
the stations.
• Figure shows illustrate satellite communication.
Applications:
1. Television broadcasting.
2. Regional, national and international global communications.
3. Telephone and data circuits.
4. Mobile telephone services.
5. Private networks for corporations, government agencies.
6. Military applications.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
• A Bluetooth LAN can even be connected to the Internet if one of the gadgets has this capability.
• A Bluetooth LAN, by nature, cannot be large. They can cover up to range of 10 meters.
• Bluetooth technology is the implementation of a protocol defined by the IEEE 802.15 standard. The
standard defines a wireless personal-area network (PAN) operable in an area the size of a room or a
hall.
Advantages:
1. It is cheap.
2. Easy to install.
3. It makes connecting to different devices convenient.
4. It is free to use if the device is installed with it.
Disadvantages:
1. If installed on a cellphone it is possible to receiving cell phone viruses
2. It only allows short range communication between devices
3. It can only connect two devices at once
4. It can lose connection in certain conditions
Applications:
1. Peripheral devices such as a wireless mouse or keyboard can communicate with the computer through
this technology.
2. Monitoring devices can communicate with sensor devices in a small health care center.
3. Home security devices can use this technology to connect different sensors to the main security
controller.
4. Conference attendees can synchronize their laptop computers at a conference with the help of
Bluetooth.
2) Wi-Fi:
• Wi-Fi is a popular technology that allows an electronic device to exchange data or connect to the
internet wirelessly using radio waves.
• Wi-Fi is based on IEEE 802.11 standards.
• Many devices can use Wi-Fi, e.g. personal computers, video-game consoles, smartphones, some
digital cameras, tablet computers and digital audio players.
• These can connect to a network resource such as the Internet via a wireless network access point. Such
an access point (or hotspot) has a range of about 20 meters (65 feet) indoors and a greater range
outdoors. Hotspot coverage can comprise an area as small as a single room with walls that block radio
waves, or as large as many square miles achieved by using multiple overlapping access points.
• Wi-Fi can be less secure than wired connections (such as Ethernet) because an intruder does not need
a physical connection. Web pages that use SSL are secure but unencrypted internet access can easily
be detected by intruders. Because of this, Wi-Fi has adopted various encryption technologies such as
WEP, WPA, WPA2, etc.
• Wi-Fi networks have limited range. A typical wireless access point using 802.11 b or 802.11g with a
stock antenna might have a range of 35 m (120 ft) indoors and 100 m (300 ft) outdoors. IEEE 802.11n,
however, can more than double the range.
• Range also varies with frequency band. Wi-Fi in the 2.4 GHz frequency block has slightly better range
than Wi-Fi in the 5 GHz frequency block which is used by 802.11a and optionally by 802.11n.
Advantages:
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
1. Convenience: The wireless nature of such networks allows users to access network resources from
nearly any convenient location within their primary networking environment (a home or office). With
the increasing saturation of laptop-style computers, this is particularly relevant.
2. Mobility: With the emergence of public wireless networks, users can access the internet even outside
their normal work environment. Most chain coffee shops, for example, offer their customers a wireless
connection to the internet at little or no cost.
3. Productivity: Users connected to a wireless network can maintain a nearly constant affiliation with
their desired network as they move from place to place. For a business, this implies that an employee
can potentially be more productive as his or her work can be accomplished from any convenient
location.
4. Deployment: Initial setup of an infrastructure-based wireless network requires little more than a single
access point. Wired networks, on the other hand, have the additional cost and complexity of actual
physical cables being run to numerous locations (which can even be impossible for hard-to-reach
locations within a building).
5. Expandability: Wireless networks can serve a suddenly-increased number of clients with the existing
equipment. In a wired network, additional clients would require additional wiring.
6. Cost: Wireless networking hardware is at worst a modest increase from wired counterparts. This
potentially increased cost is almost always more than outweighed by the savings in cost and labor
associated to running physical cables.
Disadvantages:
1. Security: To combat this consideration, wireless networks may choose to utilize some of the various
encryption technologies available. Some of the more commonly utilized encryption methods, however,
are known to have weaknesses that a dedicated adversary can compromise.
2. Range: The typical range of a common 802.11g network with standard equipment is on the order of
tens of meters. While sufficient for a typical home, it will be insufficient in a larger structure. To obtain
additional range, repeaters or additional access points will have to be purchased. Costs for these items
can add up quickly.
3. Reliability: Like any radio frequency transmission, wireless networking signals are subject to a wide
variety of interference, as well as complex propagation effects that are beyond the control of the
network administrator.
4. Speed: The speed on most wireless networks (typically 1-54 Mbps) is far slower than even the slowest
common wired networks (100Mbps up to several Gbps). However, in specialized environments, the
throughput of a wired network might be necessary
.
Compiled by Zvinowanda S
COMMUNICATION AND COMPUTER SKILLS
Compiled by Zvinowanda S
Complied by Zvinowanda S