0% found this document useful (0 votes)
28 views

BIT41US Lecture Notes

Basic IT notes.

Uploaded by

musekosimeon
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views

BIT41US Lecture Notes

Basic IT notes.

Uploaded by

musekosimeon
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 93

WELCOME TO THE CLASS

OF BASIC IT SKILLS 2024


(BIT41US)

OF

Lesson 1
1
Lecturer: Mr. T. A Sheepo
Lesson 1 Outline:
• Generation of computers
• Types of computers
• Main components of a computer
• Software
• Types of software
• Information processing
• Online, offline processing, real-time, batch processing, single tasking
and multitasking
• Current IT issues
• Data communications
• Introduction to Networks
• Central and distributed computing
• Wide area and global networks.
• Wi-Fi 2
Introduction
Microcomputers, also known as personal computers,
have revolutionized the way we process information
and interact with technology. In this lecture, we'll delve
into the fundamental aspects of microcomputers, their
components, software, information processing, and
their integration into broader IT frameworks.

What are computers?


•Computers are electronic devices that can follow
instructions to accept input, process the input and
then produce information.
3
Computer
Generations
Intro to Computers

4
Computer Generations
• Computers can be categorized into 5 generations based on the
technology used to build the machine. The evolution of the
computer basically rests on the development of its electronic
components.

• The size, power consumption and heat generation are a few


computer aspects that have decreased over the generations. On
the other hand, processing speed and performance are some
features that have increased over the years.

The 5 generations of computers are as follows.


i. First Generation Computers
ii. Second Generation Computers
iii. Third Generation Computers
5
iv. Fourth Generation Computers
v. Fifth Generation Computers
The Five Generations of
Computers

6
First generation computers
(1940-1956)
• The first computers used vacuum tubes for circuitry
and magnetic drums for memory.
• They were often enormous and taking up entire room.
• First generation computers relied on machine language.
• They were very expensive to operate and in addition to
using a great deal of electricity, generated a lot of heat,
which was often the cause of malfunctions.
• The UNIVAC and ENIAC computers are examples of
first-generation computing devices.
7
First generation computers
• 1st

8
Second generation computers
(1956-1963)
• Transistors replaced vacuum tubes and ushered in the
second generation of computers.
• Second-generation computers moved from
cryptic binary machine language to symbolic.
• High-level programming languages were also being
developed at this time, such as early versions of COBOL
and FORTRAN.
• These were also the first computers that stored their 9
instructions in their memory.
Second generation computers
2nd

10
Third generation computers
(1964-1971)
• The development of the integrated circuit was the hallmark
of the third generation of computers.
• Transistors were miniaturized and placed on silicon chips
called semiconductors.
• Instead of punched cards and printouts, users interacted with
third generation computers through keyboards
and monitors and interfaced with an operating system.
• Allowed the device to run many different applications at one 11

time.
Third generation computers

12
Fourth generation computers
(1971-present)
• The microprocessor brought the fourth generation of
computers, as thousands of integrated circuits were built onto a
single silicon chip.
• The Intel 4004 chip, developed in 1971, located all the
components of the computer.
• From the central processing unit and memory to input/output
controls—on a single chip.
• Fourth generation computers also saw the development
13
of GUIs, the mouse and handheld devices.
Fourth generation computers
• 4th

14
Fifth generation computers
(present and beyond)
• Fifth generation computing devices, based
on artificial intelligence.
• Are still in development, though there are some
applications, such as voice recognition.
• The use of parallel processing and superconductors
is helping to make artificial intelligence a reality.
• The goal of fifth-generation computing is to
develop devices that respond to natural
language input and are capable of learning and
self-organization. 15
Fifth generation computers
5th

16
Types of
computers

17
Four types of Computers
1. Microcomputers 2. Minicomputers

3. Mainframe computers 4. Supercomputers

18
Types of Computers
• Microcomputer =Personal Computer
(PC)

• There are 3 types of the Microcomputers


1.Laptop
2.Desktop
3.Workstation
19
• Personal Computer: A small, single-user
computer based on a microprocessor.

• Workstation: A powerful, single-user computer. A


workstation is like a personal computer, but it has :
 a more powerful microprocessor and,
 in general, a higher-quality monitor.

20
Minicomputer, Mainframe, and
Supercomputer
• Minicomputer: A multi-user computer capable
of supporting up to hundreds of users
simultaneously.
simultaneously

• Mainframe: A powerful multi-user computer


capable of supporting many hundreds or
thousands of users simultaneously.
simultaneously

• Supercomputer: An extremely fast computer


that can perform hundreds of millions of
instructions per second. 21
Minicomputers
• Desk-sized
• More processing speed and
storage capacity than
microcomputers
• General data processing needs at
small companies
• Larger companies use them for
specific purposes

22
Mainframe Computers

• Larger machines with


special wiring and
environmental controls
• Faster processing and
greater storage than
minicomputers
• Typical machine in large
organizations
23
Supercomputers
• The most powerful of the four categories
• Used by very large organizations, particularly
for very math-intensive types of tasks

24
Supercomputers

25
Characteristics of Computers
1. Store a large amount of data and
information for a long
period of time.
2. Process data and information in high
accuracy level .
3. Speed in processing data information.
26
4. Sharing of information / network.
Why a Computer is a powerful
tool
• A computer is a powerful tool because
it is able to perform the information
processing cycle operations ( input,
process, output and storage) with
amazing speed, reliability and
accuracy, store huge amounts of data
and information and communicate
usually via telephone lines or cable. 27
Understanding the difference between Data,
Information and Knowledge:
•Processing data in order to produces information, and
processing information produces knowledge.

Data Information
Computer
Knowledge
Figure 0.0 Processing data into information cycle

28
 Data:
Data is the name given to basic facts such
as names and numbers.

 Information:
Information is data that has been converted
into a more useful or intelligible form.

 Knowledge:
Knowledge arrangement of information and
classifying information of the
same type or the same topic. 29
Main components
of a computer

30
SOFTWARE

Computers are made up of


HARDWARE
1. HARDWARE
2. SOFTWARE

31
Hardwar
e
Is the electric, electronic and mechanical equipment that
makes up a computer.
The parts of computer itself (tangible objects) including:

 CPU (or Processor) and Primary memory (or


Main Memory)
 Input devices i.e. the keyboard and mouse
 Output devices
 Storage devices
32
The Case (System Unit or System Cabinet)

33
Hardware

1. Central Processing Unit (CPU)


2. Input units
3. Output units
4. Memory (Main or Primary Memory
& Secondary or Auxiliary Memory)
34
Components of a Computer System
Central
Central Processing
Processing Unit
Unit
Data (CPU)
(CPU)
control unit (CU)

Memory output
Arithmeti
c RAM units
Input
logic
units ROM
Unit
(ALU)

35
Primary Information
Memory /Knowledge
Hardware Organization
Input Devices ...

CPU

memory

motherboard
36

hard drive
Central Processing Unit (CPU)
• CPU stands for Central Processing Unit. It is often
referred to as the brain of the computer because
it performs most of the processing inside the
computer. The CPU interprets and executes
instructions, performs calculations, and manages
the flow of data through the computer system.

37
Key aspect of the CPU
• Function: The CPU is responsible for executing instructions
stored in the computer's memory. It performs arithmetic and
logic operations, controls input and output operations, and
coordinates the activities of other hardware components.

• Components: The CPU typically consists of several key


components:

• Control Unit (CU): The control unit manages the execution of


instructions by interpreting instructions, fetching data from
memory, and directing the operation of other components
within the CPU.

• Arithmetic Logic Unit (ALU): The ALU performs arithmetic


operations (such as addition, subtraction, multiplication, and 38
division) and logical operations (such as AND, OR, and NOT)
on data.
Key aspect of the CPU
cont…
• Registers: Registers are small, high-speed storage locations within
the CPU used to hold data temporarily during processing. They
include the instruction register (IR), program counter (PC), and
various general-purpose registers.

• Clock Speed: The clock speed of a CPU, measured in gigahertz


(GHz), determines how many instructions the CPU can execute per
second. Higher clock speeds generally result in faster processing
performance, although other factors such as architecture and
efficiency also play a role.

• Cache Memory: CPUs often have built-in cache memory, which is a


small, high-speed memory used to store frequently accessed data
and instructions. Cache memory helps improve performance by
reducing the time it takes for the CPU to access frequently used 39
data.
Input Devices
• Is any hardware component that allows a user to enter data and
instructions into a computer
• Translate data from form that humans understand to one that the
computer can work with.
• Most common are keyboard and mouse

40
Output Devices
• An output device is any piece of hardware that receives
data from the computer. Usually, this data is used to
display information to the user in some form.

41
Hardware Organization
CPU

memory

motherboard
42

hard drive
Primary Memory

Memory is a temporary holding place for


data and instructions.

•Two general parts:


1. RAM
2. ROM

43
RAM (Main Memory)

• RAM stands for Random Access Memory. It is a


type of volatile memory that is used in computers
and other electronic devices to temporarily store
data and program instructions that the CPU
(Central Processing Unit) needs to access quickly.

44
Key characteristics and uses of RAM
• Volatile Nature: RAM is volatile memory, meaning that its contents are lost when
the power to the computer or device is turned off. This is in contrast to non-volatile
memory like ROM (Read-Only Memory), which retains its data even when the power
is off.

• Fast Access: RAM provides fast access to stored data and instructions. It is much
faster for the CPU to read from and write to RAM compared to accessing data from
storage devices like hard drives or solid-state drives (SSDs).

• Temporary Storage: RAM serves as temporary storage for data and program
instructions that are actively being used by the CPU. This includes the operating
system, application software, and data being processed by programs.

• Dynamic Memory: RAM is often referred to as dynamic memory because it can be


both read from and written to by the CPU as needed during program execution. Data
stored in RAM can be quickly accessed and manipulated.

• Capacity and Speed: The capacity and speed of RAM can significantly impact the
performance of a computer system. Higher-capacity and faster RAM modules allow 45
for more data to be stored and accessed quickly, resulting in smoother multitasking
and faster program execution.
ROM: Read Only Memory

ROM stands for Read-Only Memory. It is a type of


non-volatile memory that is used primarily in
computers and other electronic devices to store
firmware or permanent software instructions. Unlike
RAM (Random Access Memory), ROM retains its
contents even when the power is turned off.

46
Key characteristics and uses of
ROM
• Non-Volatile: ROM retains its data even when the power is turned
off, making it suitable for storing essential system instructions that
must remain intact at all times.

• Read-Only: The term "read-only" indicates that the data stored in


ROM cannot be easily modified or altered. It is typically programmed
during the manufacturing process and cannot be changed by the user
under normal circumstances.

• Firmware Storage: ROM is commonly used to store firmware, which


is a type of software that provides low-level control for the hardware
components of a device. Examples include the BIOS (Basic
Input/output System) in computers and the firmware in embedded
systems like microcontrollers.

• Boot Instructions: In many systems, ROM contains the initial boot


instructions that the computer executes when powered on. These 47
instructions are crucial for starting up the system and loading the
operating system into memory.
Secondary storage devices
• Also known as secondary storage or auxiliary storage,
are hardware components used to store data
permanently in a computer system. Unlike primary
storage devices (e.g., RAM) which are volatile and lose
their data when the power is turned off, secondary
storage devices retain data even when the power is off.
These devices are essential for long-term storage of
programs and data in computing systems. Here are some
48
common examples of secondary storage devices:
Secondary Storage cont…
• Hard Disk Drive (HDD): HDDs are one of the most common types of
secondary storage devices. They use magnetic storage to store data
on rotating disks called platters. A read/write head accesses and
modifies data on the spinning platters. HDDs offer relatively large
storage capacities and are commonly used in desktop computers,
laptops, and servers.

• Solid State Drive (SSD): SSDs are storage devices that use flash
memory to store data. Unlike HDDs, SSDs have no moving parts,
which makes them faster, more durable, and less prone to
mechanical failure. SSDs are commonly used in modern computers
and laptops due to their superior performance and reliability.

• External Hard Drive: External hard drives are portable storage


devices that connect to a computer via USB, Thunderbolt, or other 49
interfaces. They provide additional storage capacity and can be used
for data backup, file storage, and transfer.
Secondary Storage cont…
• USB Flash Drive: USB flash drives, also known as thumb drives or
memory sticks, are small, portable storage devices that use flash
memory to store data. They are convenient for transferring files
between computers and for storing small amounts of data.

• Memory Cards: Memory cards, such as Secure Digital (SD) cards and
CompactFlash (CF) cards, are commonly used in digital cameras,
smartphones, and other portable devices to store photos, videos,
and other data. They are also used as secondary storage devices in
some computing systems.
50
Secondary Storage cont…
• Optical Discs: Optical discs, such as CDs, DVDs, and Blu-
ray discs, are secondary storage devices that use optical
technology to store data. They are commonly used for
distributing software, music, movies, and other digital
content.

• Network Attached Storage (NAS): NAS devices are


specialized storage devices that connect to a network
and provide storage capacity and file sharing services to
multiple users and devices. NAS devices often contain
multiple hard drives configured in RAID arrays for data
redundancy and performance.
51
Kinds of Disk Drives

External Hard disk 52


Software
Types of software

53
Type of Software
Software is a set of instructions, programs, or data used to
operate computers and execute specific tasks. There are
several types of software, each serving different purposes
and functions.

Here are some common types of software:


• System Software
• Application Software

54
System Software:

• Operating Systems (OS): Operating systems are the core


software that manages computer hardware and provides
services for other software applications. Examples include
Windows, macOS, Linux, and Unix.
• Device Drivers: Device drivers are software programs that
facilitate communication between hardware devices and the
operating system.
• Utility Software: Utility software includes programs designed
to perform specific tasks such as disk management, antivirus
scanning, system optimization, and file compression. 55
Application Software:
• Productivity Software: Productivity software helps users create documents,
presentations, spreadsheets, and databases. Examples include Microsoft
Office (Word, Excel, PowerPoint), Google Workspace (Docs, Sheets, Slides),
and Apple iWork.

• Graphics and Multimedia Software: Graphics and multimedia software


enable users to create and manipulate images, videos, and audio files.
Examples include Adobe Photoshop, Adobe Premiere Pro, and CorelDRAW.

• Communication Software: Communication software facilitates


communication and collaboration among users. Examples include email
clients (Microsoft Outlook, Gmail), instant messaging applications (WhatsApp, 56

Slack), and video conferencing tools (Zoom, Microsoft Teams).


Application Software:
• Entertainment Software: Entertainment software includes video games,
multimedia applications, and streaming services designed for leisure and
entertainment purposes.

• Educational Software: Educational software is designed to facilitate learning


and educational activities. Examples include interactive tutorials, language
learning programs, and educational games.

• Business Software: Business software includes applications used for


managing business operations, such as accounting software, customer
relationship management (CRM) systems, enterprise resource planning
57
(ERP) software, and project management tools.
Application Software:

• Enterprise Software: Enterprise software is designed for large


organizations and includes solutions for managing business
processes, data, and resources across departments and
locations.

• Vertical Market Software: Vertical market software is tailored


to specific industries or vertical markets, such as healthcare,
finance, retail, and manufacturing.

58
Information
processing

59
Information processing

Refers to the manipulation, organization, storage, and


retrieval of data to generate meaningful information.
In computing, information processing involves various
operations performed by hardware and software
components to transform raw data into valuable insights
and knowledge.
In this lecture we will explore the key concepts, stages,
and techniques involved in information processing. 60
Stages of Information Processing:
Input:
• The input stage involves capturing raw data from external sources
such as sensors, keyboards, mice, scanners, or other input devices.
• Data can be in various forms, including text, numbers, images,
audio, and video.

Processing:
• The processing stage involves transforming and manipulating raw
data to generate meaningful information.
• This stage typically involves performing logical and arithmetic
operations, executing algorithms, and applying predefined rules
and instructions.
• The central processing unit (CPU) plays a central role in executing
processing tasks. 61
Stages of Information Processing:
Storage:
• The storage stage involves retaining processed data for future
reference or retrieval.
• Data storage can occur in various forms, including primary storage
(e.g., RAM) and secondary storage (e.g., hard drives, SSDs).
• Storage technologies and architectures vary in terms of capacity,
speed, durability, and volatility.

Output:
• The output stage involves presenting processed information to
users in a human-readable format.
• Output devices such as monitors, printers, speakers, and displays
are used to convey information to users.
• Output can be in various forms, including text, graphics, audio, and
video.
62
Challenges and Considerations
• Scalability: Information processing systems must scale to
handle increasing volumes of data and user requests efficiently.
• Reliability: Reliability measures ensure that information
processing systems operate consistently and accurately under
various conditions.
• Speed: Processing speed is critical for real-time applications
and time-sensitive tasks.
• Interoperability: Information processing systems should
seamlessly integrate with other systems and platforms to 63
enable data exchange and interoperability.
Online, offline processing,
real-time, batch processing,
single tasking and
multitasking

64
Online Processing vs. Offline
Processing:
Online Processing:
• Online processing refers to handling data and tasks in real-time
over a network or communication channel.
• Examples include online banking transactions, real-time chat
applications, and online gaming.
• Online processing often involves immediate interaction and
response with users or external systems.

Offline Processing:
• Offline processing involves performing tasks and operations
without a direct connection to a network or external system.
• Examples include batch processing of data, offline document
editing, and offline data analysis.
• Offline processing typically allows for more flexible scheduling and 65
does not require constant network connectivity.
Real-Time Processing vs. Batch Processing:
Real-Time Processing:
• Real-time processing refers to handling tasks and data with
minimal delay or latency, often in response to immediate events or
inputs.
• Examples include real-time monitoring systems, control systems, and
financial trading platforms.
• Real-time processing requires fast response times and continuous
data processing to meet strict timing constraints.
Batch Processing:
• Batch processing involves collecting and processing data in
discrete batches or groups, typically at scheduled intervals or in
offline mode.
• Examples include nightly data backups, batch processing of payroll
systems, and bulk data uploads.
• Batch processing allows for efficient handling of large volumes of 66
data but may introduce delays and may not be suitable for real-
time applications.
Batch processing
QUESTION: When money is withdrawn from an automatic
teller machine (ATM), why is batch processing not
suitable?
• If batch processing was used, data about transactions would be
collected over a period of time and processed some time later
• Once cash has been withdrawn from an account at the ATM this
must be reflected in the state/record of the account in the bank’s
database
• Batch processing would be too slow to enable this to happen
67
Current IT issue
• Cybersecurity Threats:
• Cybersecurity threats continue to evolve, posing significant risks to
individuals, organizations, and critical infrastructure.
• Challenges: Sophisticated cyber attacks, ransomware, phishing,
and data breaches are among the top challenges facing
cybersecurity professionals.
• Implications: Data breaches can lead to financial losses,
reputational damage, and compromise sensitive information.
• Strategies: Implementing robust cybersecurity measures, including
encryption, access controls, security awareness training, and
regular vulnerability assessments, is essential to mitigate risks. 68
Current IT issue
• There are numerous issues or threats that we may
looked at under Information Technology such as:
• Hardware failures
• Software failures
• Upgrade issues
• Disasters
• Malicious intent

• We will also looked at issues of ethical and


69
copyright
Current IT issue
• Ethical issues for social networking Web sites are:
• Cyberbullying
• Cyberstalking
• Sexual predators
• Uploading inappropriate material
• Copyright
• Ownership of an original work created by an author
• A form of intellectual property protection covers the
‘look & feel’ and content of printed media
• Gives author the right to exclude others from using the
finished work 70
New technology = new ethical problems
• Traditional rules of conduct are not always
applicable to a new medium

• A question that often arises: Should a device,


a technique or technology be restricted
because people can use it for illegal or
harmful actions as well as beneficial ones?
Example: Mobile phones with cameras.
Pupils at school take photos of other pupils in
the shower, and publish the pictures on the
Internet (social network).
• Discuss. How to deal with this? 71
What Is Information
Security?
• The protection of information and its critical elements,
including the systems and hardware that use, store, and
transmit that information
• Tools, such as policy, awareness, training, education, and
technology are necessary
• The C.I.A. triangle was the standard based on
confidentiality, integrity, and availability
• The C.I.A. triangle has expanded into a list of critical
72
characteristics of information
Information System
Security
• Confidentiality
• Requires information in a computer system only be
accessible for reading by authorized parties
• Integrity
• Assets can be modified by authorized parties only
• Availability
• Assets be available to authorized parties
• Authenticity
• Requires that a computer system be able to verify the
73
identity of a user
Critical Characteristics Of
Information
The value of information comes from the
characteristics it possesses.
• Availability
• Accuracy
• Authenticity
• Confidentiality
• Integrity
• Utility
• Possession 74
Securing the Components
• The computer can be either or both the subject of an
attack and/or the object of an attack
• When a computer is:
• the subject of an attack, it is used as an active tool to
conduct the attack
• the object of an attack, it is the entity being attacked

75
Figure 1-5 – Subject and
Object of Attack

76
Data Communications
• The term telecommunication means communication at a
distance. The word data refers to information presented in
whatever form is agreed upon by the parties creating and
using the data. Data communications are the exchange of
data between two devices via some form of transmission
medium such as a wire cable

77
Components of a data communication system

78
Data communication: transmission
modes
• Simplex
• Transmission in one way only
• Half duplex
• Transmission in both directions, but not at
the same time
• Full duplex !
• Transmission in both directions at the same
time 79
Data flow (simplex, half-duplex, and full-duplex)

80
Types of Networks
What is Network
• Collection of computers and devices connected together
• Used to transfer information or files, share resources, etc.
• What is the largest network?
• Characterized based on their geographical coverage,
speed, capacities
• Networks are categorized based on the following
characteristics:
• Network coverage: LAN, MAN, WAN
• Network topologies: how the computers are connected
together
• Network technologies
• Network architecture 81
Network coverage
• Local Area Networks:
• Used for small networks (school, home, office)
• Examples and configurations:
• Wireless LAN or Switched LAN
• Peer-2-PEER: connecting several computers together
• Client/Server: The serves shares its resources between different
clients
• Metropolitan Area Network
• Backbone network connecting all LANs
• Can cover a city or the entire country
• Wide Area Network
• Typically between cities and countries
• Technology:
• Circuit Switch, Packet Switch,
• Examples:
• Internet P2P: Networks with the same network software can be
connected together 82
LAN v.s WAN
LAN - Local Area Network a group of
computers connected within a building or a
campus (Example of LAN may consist of
computers located on a single floor or a
building or it might link all the computers in
.a small company

WAN - A network consisting of


computers of LAN's connected
across a distance WAN can cover
small to large distances, using
different topologies such as
telephone lines, fiber optic
cabling, satellite transmissions 83
.and microwave transmissions
Network Topologies
• Is a physical arrangement in which devices are connected
together
• BUS networks: Single central cable connected a number of
devices
• Easy and cheap
• Popular for LANs
• RING networks: a number of computers are connected on a
closed loop
• Covers large distances
• Primarily used for LANs and WANs
• STAR networks: connecting all devices to a central unit
• All computers are connected to a central device called hub
• All data must pass through the hub
• What is the problem with this?
84
• Susceptible to failure
Network Topologies Examples
Bus topology Ring Topology
personal personal personal
compute compute compute
r r r

personal personal
compute compute
r r

Star Topology

personal computer

personal computer

personal computer

personal computer
host 85
computer

printer
file server
Network Architecture
• Refers to how the computer or devices are designed in a network
• Basic types: Centralized – using mainframes
• Peer-2-Peer:
• Each computer (peer) has equal responsibilities, capacities, sharing
hardware, data, with the other computers on the peer-to-peer network
• Good for small businesses and home networks
• Simple and inexpensive
• Client/Server:
• All clients must request service from the server
• The server is also called a host
• Different servers perform different tasks: File server, network server,
etc.

cli cli cli


en en en
t t t

86

laser se
printe rv
P2P vs Client-Server
Peers make a portion of their resources, such as processing
power, disk storage or network bandwidth, directly available
to other network participants, without the need for central
coordination by servers or stable hosts

Peer-to-Peer
Examples

87
Network Technologies
• Personal area network (PAN)
• A low range computer network
• PANs can be used for communication among the personal devices
themselves
• Wired with computer buses such as USB and FireWire.
• Wireless personal area network (WPAN)
• Uses network technologies such as IrDA, Bluetooth, UWB, Z-Wave
and ZigBee
• Internet Mobile Protocols
• Supporting multimedia Internet traffic
• IGMP & MBONE for multicasting
• RTP, RTCP, & RSVP (used to handle multimedia on the Internet)

88
Wide area Vs Global Area networks
Wide Area Network Global Area Network
• A network that connects two or • A global area network (GAN)
more local-area networks over a refers to a network composed of
potentially large geographic
different interconnected
distance
networks that cover an unlimited
Often one particular node on a geographical area. The term is
LAN is set up to serve as a loosely synonymous with
gateway to handle all
Internet, which is considered a
communication going between
global area network.
that LAN and other networks
Communication between networks
is called internetworking
The Internet, as we know it
today, is essentially the ultimate 89
wide-area network, spanning the
entire globe
Wi-Fi
• Wi-Fi is trademarked name for popular wireless technology that
uses radio waves to provide high-speed Internet and network
connections.

• The governing body that owns the term Wi-Fi, the Wi-Fi Alliance,
defines it as any WLAN (wireless area network) products that are
based on the Institute of Electrical and Electronics Engineers’
(IEEE) 802.11 standards.

• The way Wi-Fi works is through the use of radio signals like in
phones. The wireless adapter card that is found inside of computers
then uses the data that is being sent to change it into a radio signal
to then be transmitted by the antenna. A router then receives these
signals and decodes them in order to send the information
contained within to the Internet via a Local Area Network or a 90
wired Ethernet connection like a cable network connection.
What is Wi-Fi?
• Short for wireless fidelity.
• It is a wireless technology that uses radio frequency to
transmit data through the air.
• Wi-Fi is based on the 802.11 standard:
• 802.11a
• 802.11b
• 802.11g

91
Application of Wi-Fi
• Many electronic devices use
Wi-Fi due to its simple
functions.

• Companies use Wi-Fi to


create wireless networks
within their company.

• Phone companies use Wi-Fi


Hot Spots for their users to
get free calling/internet
access. 92
END
ENJOY YOUR
READING!!

93

You might also like