Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Hardware
The physical component of a computer is known as hardware.
Speaker
Web cam
Printer
Mouse
Scanner
Key board Joy stick
Headphone / Microphone
• Mother board
• Processor
• RAM & ROM
• Hard disk
1
Mohamed Simad B - 49
• Key board
• Mouse
• Monitor
• Scanner
• Printer
• Webcam
• Headphone & Microphone
• Joy stick
• Speaker
2
Mohamed Simad B - 49
Network Topologies
1. What is Topologies?
Topology is the shape of the network.
2. What are the types of Topologies?
• Bus Topology
• Star Topology
• Ring Topology
• Mesh Topology
• Hybrid Topology
3. What is the first topology?
Bus topology
4. What is the most common topology now?
Star topology
Bus Topology
• All the computer (servers, client computers) and other networking devices (Printers) are
connected in a linear Backbone Cable.
Printer
Client 1 Client 3
‘T’ connector
Terminator Terminator
Client 2 Server
3
Mohamed Simad B - 49
Star Topology
Printer
Client 1 Client 2
Switch
Client 5
File server
Database server
Client 3
4
Client 4
Mohamed Simad B - 49
• All the components and other networking devices are connected with the centralized hub or
switch.
• Star topology is one of the most common computer network topology today.
• The primary disadvantage of star Topology is the high dependence of the centralized hub or
switch.
• If the centralized hub or switch fails due to power failure or hardware failure the entire network
will fail.
Ring Topology
Client 1
Client 4 Client 2
Client
5 3
Mohamed Simad B - 49
Client 1
Ring
Client 4
Client 2
Client 3
Advantages
6
Mohamed Simad B - 49
• Every device has access to the token and the opportunity to transmit.
Disadvantages
• If any one of the node fails or any problem in the cable can create problems for the entire
network.
• Slower than an Ethernet network.
• Network cards are expensive than Ethernet network cards.
• Moves, adds and charges of devices can affect the entire network.
Mesh Topology:
• All the computers are interconnected with every other computer in mesh topology.
• Dedicated connection.
Node 1 Node 2
Node 3 Node 4
7
Mohamed Simad B - 49
Advantages:
Disadvantages:
Hybrid Topology
BUS
Terminator Terminator
T-Connector
Server
SWITCH
SWITCH
STAR 1 STAR 2
8
Mohamed Simad B - 49
Client 1 Client 2
Server
‘T’ connector
Terminator
Switch
Client 3
File server
Database server
Client 5
Client 4
Switch
Client 6
Client 7
9
Mohamed Simad B - 49
Types of networks:
1. LAN
2. MAN
3. WAN
4. PAN
Switch
Printer
File server
Client 1 Client 3
Client 2
10
Mohamed Simad B - 49
SWITCH SWITCH
Server Printer Server Printer
Power
Hub
Printer
File server
Client 1 Client 3
Client 2
11
Mohamed Simad B - 49
Protocol
• Protocol is set of rules that govern the information or data flow between computer within the
network and between computer networks.
• There are number of protocols exist in computer networks.
Hub
• A hub is a small electronic devices, that joins multiple computers and other networking devices
such as printers, routers, modems, together within a local area networking (LAN).
• A hub is common connection point for networking devices in a network.
• Hub receives signals from one device and broadcasts it to all other devices in the network.
12
Mohamed Simad B - 49
Power
Hub
Printer
File server
Client 1 Client 3
Client 2
Types of Hub
1. Active Hub
2. Passive Hub
Passive Hub
• A passive hub passes signals along (or) broadcasts signals but has no addition capability ie, it
doesn’t contain amplifier to regenerate the signals.
• It doesn’t require external power supply
Active Hub
• An active hub is a hub that includes a signal amplifier. It regenerate or amplifies signals and
passes them along.
• It requires external power supply.
Active hub = Hub + repeater
13
Mohamed Simad B - 49
Switch
• Switch is a common connection point in a network to connect multiple computers and other
networking devices together.
• It join multiple connectors and other networking devices within one local area network (LAN)
Switch
Printer
File server
Client 1 Client 3
Client 2
Types of switch
1. Unmanaged switch
2. Managed switch
Unmanaged switch
14
Mohamed Simad B - 49
Hub Switch
Hub works in the physical layer of the OSI model; it Switch works in the data link layer of the OSI
is a layer 1 device. model; It is a layer 2 device.
Hub always broadcasts data packets Switch broadcasts data packets for the first time,
second time own wards it unicasts data packets.
Hub shoes the band width Switch doesn’t share the band width
Hub doesn’t understand the MAC address Switch can understand the MAC address
Hub doesn’t maintains the MAC table Switch maintains the MAC table
Network traffic and data collision is high Network traffic and data collision is very less
Router Switch
Router is used to connect two different networks Switch connects different computers within one
network.
Router works in the network layer of the OSI Switch works in the data link layer of the OSI
model, It is a layer 3 devices. model. It is a layer model.
A router works on the principal of IP address A switch work on the principal of MAC address.
Routers have their own in built operating system Most of the switches do not require any prior
and they need to be configured before used. configuration and are usually ready to use.
Routers are much more sophisticated and In comparison with router switches are less
intelligent network device as compared to sophisticated and less intelligent.
switches.
A routers inbuilt hardware and software makes A switch does not perform any such activity.
use of routing algorithms to compute the best
possible path for routing data packets across
different computer networks.
FAT NTFS
File Allocation Table New Technology File System
FAT volume can be converted to NTFS volume NTFS cannot be converted to FAT32 volume
FAT does not support file compression NTFS support file compression & encryption
FAT provides very little security. It support share NTFS provide high level security it supports share
level security only. It doesn’t support file level and level, file level and folder level security.
folder level security.
FAT volume are recognized by all versions of NTFS volume are not recognized by windows
windows O/S starting from win-98 up to win -7 95/98/ME (Lower version of windows)
15
Mohamed Simad B - 49
Operating System
4 users
1 Computer
hardware
16
Mohamed Simad B - 49
Troubleshooting steps
RAM ROM
1-Random Access memory 1-Read only memory
2-Read and write operation is possible 2-Only read operation is possible / write is not
possible
3-User can interact with RAM 3-User can’t interact with ROM
4-Volatile Memory 4-Non-volatile
5-RAM is temporary memory 5-ROM is permanent memory
17
Mohamed Simad B - 49
18
Mohamed Simad B - 49
• Wireless NIC
• Wired NIC
Name of port
• 45 port to conne
NIC has got 1 RJ-45 connect a computer with a network.
• ASCII is code for representing English character (alphabet) and special symbols as numbers,
with each letter assigned number from 0 to 127.
• Most computer use ASCII cod
codes
es to represent text, which makes it possible to transfer data from
one computer to another.
• ASCII developed from telegraphic codes.
• ASCII was developed under the auspices of committee of the American Standards Association,
called the X3 committee.
Unicode
19
Mohamed Simad B - 49
• Unicode provides a unique number for every chapter, no matter what the O/S, no matter what
the program, no matter what the language.
• The Unicode standard has been adopted by such industry leaders Apple, HP, IBM, Microsoft,
Oracle, SAP, Sun, Sybase, Unisys character set.
• Microsoft software uses Unicode at its core.
• Major operating system windows, Macintosh, Linux, Unix, support Unicode.
• We use both FTP and TFTP protocol in a computer network to transfer file in between the
computers
FTP TFTP
FTP uses TCP protocol TFTP uses UDP protocol
FTP needs secure user name and password TFTP doesn’t require secure username and
password
Secured protocol Unsecured protocol
FTP more commands TFTP less commands
FTP reliable but slower than TFTP TFTP unreliable but faster than FTP
FTP uses TCP ports 20 & 21 TFTP uses UDP port 69
20
Mohamed Simad B - 49
Motherboard layout
Processor fan
Processor slot connector
DIM memory
modules
Chassis cooling fan connector
Key board connector
PS2 ports
Mouse connector BIOS memory chip
Parallel port
Floppy drive connector
USB port
Inbuilt speaker
21
Mohamed Simad B - 49
1. Dial-up:
• The internet connection that is established by using telephones and telephone lines as a
medium is known as dialup internet connection.
• Telephone remains busy while ac accessing the internet
• A modem is used to connect the computer to the ISP. Once the connection is established an
activity called “handshaking” takes place between the modem and the remote server.
• The dialup internet connection is also known as ‘transient connection’. This is because the
connection can be terminated by either the ISP or the other user
• Dialup connection supports up to 56kbps bandwidth.
2. Broadband:
• If any internet connection that support 512kbps or higher bandwidth will be considered as
broadband internet connection.
• Broadband means a wide range of frequencies used to transmit and receive data.
• In broadband IC, the data transfer rates are very high as compared to the dialup internet
connection.
• We can use telephone while accessing the int
internet.
22
Mohamed Simad B - 49
• There are various types of broadband internet connections, depending upon the cost , speed
and availability.
1. ADSL
2. SDSL
3. Wireless broadband
4. Cable broadband
5. Satellite broadband
6. Fiber optic broadband
23
Mohamed Simad B - 49
Sender PC Receiver PC
at india at USA
Data Link Layer Data Link Layer Data Link Layer Data Link Layer
0101010011010110101 0101010011010110101
24
Mohamed Simad B - 49
1. Application Layer
This layer is point of contact between the user and the network therefore; it brings the basic
network service to the user, such as file transfer, email, remote login.
• Protocols: HTTP, HTTPS, FTP, SMTP, Telnet, Pop3
2. Presentation Layer
This layer deals with the syntax and semantics of the transmitted data, it processes the data so
as to make it compatible between communicating tasks. This layers can covert, format, encrypt
and compress the data
3. Session Layer
This layer sets up and synchronizes the exchange between distant processes. It binds logical
addresses for distributable tasks.
4. Transport Layer
• The layer is responsible for the good/reliable delivery of messages to the recipient /
destination. Its main road is to take the messages of the session layer, split them in to
smaller units (segments) and give them to the network layer.
• This layer can use one network connection to transport several messages at the same time
using multiplexing unit.
• This layer is also responsible for flow control. The information unit for this layer is the
message or segment.
• Protocols in Transport layer(TCP/UDP)
5. Network Layer
• This layer is in charge of sub network ie. The routing packets over the subnet work and the
inter connection on the various sub networks.
• The information unit for this layer is the ip packets.
• Protocols of the network layer: IP, IPSEP, ICMP, IGMP, RIP, IGRP, EGRP, OSPF.
Network Layer IP IP IP IP IP IP IP
IP Packets
Data Link Layer Mac Mac Mac Mac Mac Mac Mac
Mac address
010011010101110011110101010101010110110101011001
25
Mohamed Simad B - 49
Physical Layer
Binary Bits
7. Physical Layer
TCP / IP model
Application Layer 4
Transport Layer 3
Internet Layer 2
Host - to – Network
1
layer (or) link layer
1. Application Layer
• This layer is point of contact between the user and the network therefore; it brings the basic
network service to the user, such as file transfer, email, remote login.
26
Mohamed Simad B - 49
• This layer is immediately bound to the transport layer simply because the session and
presentation layers in TCP/IP model are useless.
• Protocols: HTTP, HTTPS, FTP, SMTP, Telnet, Pop3
2. Transport Layer
• The layer is responsible for the good/reliable delivery of messages to the recipient /
destination. Its main road is to take the messages of the session layer, split them in to
smaller units (segments) and give them to the network layer.
• This layer can use one network connection to transport several messages at the same time
using multiplexing unit.
• This layer is also responsible for flow control. The information unit for this layer is the
message or segment.
• Protocols in Transport layer(TCP/UDP)
• It has the same role as the transport layer of the original model.
• Its role is to split up the message to be transmitted into a form the internet layer can
handle.
3. Internet layer
• This layer is in charge of sub network ie. The routing packets over the subnet work and the
inter connection on the various sub networks.
• The information unit for this layer is the ip packets.
• Protocols of the network layer: IP, IPSEP, ICMP, IGMP, RIP, IGRP, EGRP, OSPF.
• This layer is responsible for the inter connection of the remote networks without
establishing a physical connection. Its role is to inject packets in to any network and
deliver to the destination independently to one another.
27
Mohamed Simad B - 49
Packet format
Application Layer
Session Layer
• TCP packet contains only port numbers not the IP address or MAC address
IP Packet
28
Mohamed Simad B - 49
• Ethernet frames packet contains only MAC address not the IP address.
Similarities:
• They share similar architecture both of them are constructed with layers
• They share a common application layer
• Both models have comparable transport and network layers
• Both models assume that packets are switched; basically this means that individual packets may
take different path in order to reach the same destination.
Differences
PC switch
Similar devices
Dissimilar devices
29
Mohamed Simad B - 49
Configuration cable
• Wireless communication is the transfer of information over a distance without the use of
electrical conductors or wires.
Wireless
Source Pc Router or Destination PC
WAP
• Wireless communications permit services such as long distance communications, which are
impossible or impractical to implement with the use of wires.
• It covers greater distance.
• No need of cables and connectors.
30
Mohamed Simad B - 49
Bluetooth
• Bluetooth is an open wireless protocol for exchanging data over short distance (using short
length radio waves) from fixed and mobile devices.
• Bluetooth is a standard and a communication protocol primarily designed for low power
consumption, with a short range based on low – cost transceiver microchips in each devices.
• Bluetooth makes it possible for these devices to communicate each other when they are in
range, because the devices use radio waves, they do not have to be in line of sight of each other.
Infrared
• Infrared radiation is electromagnetic radiation with the wave length between 07 and 300 micro
meters, which equates to a frequency range between approximately 1 and 400 htz.
• Its wave length is longer when the frequency is lower
• Its wave length is Shorter when the frequency is higher
• Shorter
§ Shorter infrared waves are not hot at all in fact you cannot even feel them. These
shorter wave lengths are the ones used by your TV’s remote control.
§ Far infrared waves: we experience this type of infrared radiation everyday in the form of
heat.
§ The heat that we feel from sunlight, a fire, a radiator is infrared.
§ Wi-Fi is a wireless LAN technology that enables laptops, PDAs, and other devices to connect
easily to the internet.
§ Wi-Fi is sometimes called “Wireless Ethernet”
§ Wi-Fi is less expensive and nearing he speeds of standard Ethernet and other common wire-
based LAN technologies.
§ Wi-Fi uses the same radio frequencies as Bluetooth but with higher power, resulting a stronger
connection.
§ Wi-Fi enables a faster connection, better ranges from the base station , and better security than
Bluetooth.
31
Mohamed Simad B - 49
Difference between plug & play and Non plug & Play.
Hot Swapping
• The ability to add and remove devices to a computer while the computer is running and have the
operating system automatically recognize the change
• Two external bus standards
1- Universal Serial Bus (USB)
2- IEEE 1394 – Support hot plugging
1- The World Wide Web (www) or simply the web is global information medium. Users can read and
write via computers connected to the internet.
2- The term is often mistakenly as a synonym for the internet itself, but the web is a service that
operates over the internet, as e-mail does -> the World Wide Web is a system of interlinked hyper
text documents accessed via the internet.
3- The world wide web was invented in 1989 by the English physicist Tim Berners – Lee
32
Mohamed Simad B - 49
Various Memory
1. Cache memory
2. Virtual memory
3. Secondary memory
4. Main memory
Main Memory
ROM RAM
ROM SRAM
PROM DRAM
EPROM SDRAM
EEPROM RDRAM
DDR I
DDR II
DDR III
33
Mohamed Simad B - 49
• Secondary storage devices are used to store huge amount of data permanently for future use.
• Data is kept for a longer time on secondary storage devices.
• Secondary storage does not loss the data when the device is power down.
• Eg. Internal Hard Disk, External Hard Disk, CD/DVD, Floppy Disk, Magnetic Tape, Pen Drive
Virtual Memory
Virtual memory is a computer system technique which use an application program the impression that it
has contagious working memory. While in fact it may be physically fragmented and may even over
flower on to disk storage.
800 MB 512 MB
RAM
Program Size
Main memory
300MB
512 + 300 = 812 MB
800MB
9.7 GB
Hard disk
Cache memory
34
Mohamed Simad B - 49
• WINS & DNS are both name resolution service for TCP / IP networks.
• Environments that include some computers that use NetBIOS names (win-98, Win-NT, Win-me)
and other computers that use domain names (win-XP, vista, 7, 2000, 2003, 2008) most include
both wins and DNS servers.
• The server which provides wins services to the client computers is called as wins server.
• The server which provides DNS services to t he client computers is known as DNS servers.
• If you are using NetBIOS over TCP / IP you will need to have Wins server running so that each
computer can find the correct IP address of the other to communicate.
• If you are using Domain names over TCP / IP you will need to have DNS server running so that
each computer can find the correct IP address of the other to communicate.
What is an IP address?
• An IP address is a unique numeric identifier for a host, printer, router, modem, placed in
network.
• An IP address (internet Protocol address) will allow the host to communicate with other host in
a network.
• Networking devices will be assigned IP addresses in order to identify and communicate with
each other in a network utilizing the internet protocol.
• Any participating network device including routers, switches, client and server computers,
network printers, internet fax machines, modems, and some IP telephones can have it own IP
address that is unique within the scope of the specific network.
• IP addresses are created and managed by the Internet Assigned Numbers Authorities (IANA).
• If IP address is not assigned to a computer that particular device cannot participate in the
network.
35
Mohamed Simad B - 49
Private IP Public IP
1. Non routable IP address 1. Routable IP address
2. Un-Registered IP address 2. Registered IP address in the internet
3. No need to pay for private IP address 3. Need to pay for public IP address
4. Intranet purposes 4. Internet Purposes
Class A:
10.0.0.0 to 10.255.255.255
Class B:
172.16.0.0 to 172.31.255.255
Class C:
192.168.0.0 to 192.168.255.255
36
Mohamed Simad B - 49
24/8
Subnet mask:255.255.255.0
Class D: 224-239 224.0.0.0 to 239.255.255.255
(not defined)
Subnet mask: (not defined)
Class E: 240-255 240.0.0.0 to 255.255.255.255
(not defined)
Subnet mask: (not defined)
Types of IP addresses
IPV4 IPV6
32 bits 128 bits
192.168.1.1 A6C2:884F:C849:f 864:AC29:C375:Df1E (0-9,A-F)
We use classes in IPV4 class A,B,C,D,E No classes in IPV4
It supports unicast broadcast and multicast It support unicast, multicast and anycast it doesn’t
support broadcast.
0.0.0.0 0:0:0:0:0:0:0:0 - protocol implementation.
127.0.0.0 Special purpose IP address 0:0:0:0:0:0:0:1 - loop back IP address.
255.255.255.255
37