Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
ON
COMPUTER HARDWARE
AND
NETWORKING
ACCOMPLISHED AT
JAIPUR
ACKNOWLEDGEMENT
PANKAJ
ACHARYA
PREFACE
Today is the world of technology. There will be 5 crore computers
and 10 crore mobile phones in the country by the end of the year 2008,
bringing plethora of related job opportunities in manufacturing, services
and maintenance in this arena of technology.
• 4)NETWORKING
a) Introduction to networking.
b) Types of networking.
c) Topologies.
• 5)NETWORK DEVICES
a) Hub, switch, router.
b) Ccommunication channel.
c) Cbles and connector.
• 6)RULES OF NETWORK
a) Layers architecture.
b) Protocol.
c) Ip addressing.
d) Network model.
• 7) CONNECTIVITY
a) Workgroup network using WINDOWS XP
b) Domain networking using WINDOWS 2000 SERVER & WINDOWS XP
• 8) FUTURE OF NETWORKING.
COMPUTER HARDWARE:-
3. Increase in the use of IT technologies in the government’s interface with the public
has also stimulated the demand for computer hardware.
Migration from the old manual system to computing is taking place in large
portion of government –public interaction, especially in providing statutory services
such as land records, property transactions, authentication services, dealings of
publicly owned utilities, collections of variety of taxes and transportation (Railways,
Roadways and Airways etc). it will lead to a phenomenal demand for increase in
hardware and would provide a big boost to the sagging national economy.
There are many vendor of the cpu in the market same of them are
Intel, AMD, VIA/CYRIX, Transumeta / Motorola but the most popular are Intel
and AMD Athelon. The X86 CPU architecture invented by Intel is the most
popular for desktop computers today all the computers run the windows_9X
operating system use X86 CPU
Intel corporation manufactured various kind of CPU’s but in market the most
selling CPU we are concerning. P-3 , Celeron and P-4
This is a memory associated with CPU, and often the motherboard. This is a type
of memory that’s used to hold a duplicate of a larger store. This is faster than the
main memory .By placing the most often accessed data in the cache memory,
overall system speed increases.
Type of cache memory.
(1) L1 cache
(2) L2 cache
This is closet to the CPU is the level 1 or L1 since 80486 an L1 cache has been
built in to the CPU itself. This cache run at the CPU’s internal speed and so is
very fast.
Celeron ---------- L1 cache is 16KB+16KB
Pentium 3 ------- L1 cache is 16KB+16KB
AMD athlon----- L1 cache is 128KB
A L2 cache is more copious than an L1 cache, but it’s also slower. For CPU after
Pentium Processor this is coated on the CPU package.
Modern CPU’S run at two separate speeds: the core speed and the bus speed. The
core speed is the no. associate most strongly with the CPU and is the speed at
which most of CPU circuitry runs. The bus speed is the speed of interface
between CPU and the motherboard. Now a days bus speed range from 66 MHz
To theoretical maximum of 400 MHz for slot A.(Main socket).
In order to set the CPU core speed motherboard includes jumpers or BIOS
settings to specify a clock multiplier. The CPU runs its core at the bus speed
multiplied by the clock multiplier.
E.g. 113.3MHz bus speed with a 10X clock gives CPU speed 1133 MHz(core
speed).
CPU VOLTAGE
As the CPU speed increases it becomes desirable to reduce the CPU voltage. In
order to reduce the heat buildup inside the chips. For cooling a heat sink fan is
mounted on the CPU.
MEMORY.
ROM-BIOS It is short form for read only memory -basic input output
system. The ROM-BIOS is a set of Program built into the computer ROM
memory that Provides the most basic, low level and intimate control And
supervision operation for the computer.
=>The task of the bios is to take care of the immediate needs of the
hardware and to isolate all other programs from the details of how the hardware
works.
=>fundamentally the bios is an interface a connection and a Translator
between the computer hardware and the software Programs.
PARTS OF BIOS
First part:-
This part is used only when the computer is first turned ON;
these are Test and Initialization program that check to see that the computer is
working. The delay between powering on the computer and The moment when it
start working for you is due to running of these test and initialization program
which sometimes are Called the POWER ON SELF TEST (POST).
Second part:-
Important parts of the bios are its routimes.These
programs provides the detailed and intimate control of The various part of the
computer, particularly for the input/output Peripherals, such as the disk drives.
Third part:-
Rom-bios are the boot strap loader program.
Booting:-
The time duration between the appearance of the dos prompt or any
window and the switch on the power supply the whole process is known
as the booting process.
TYPE OF BOOTING
A) COLD BOOTING
B) WARM BOOTING
COLD BOOTING:-
When we switch off the computer completely and properly after some
time we start Computer again is known as the cold booting.
WARM BOOTING:-
When we restart the computer from the restart button or using the key by
simply pressing them i.e. ctrl+alt+del key is known as warm Booting.
If the CPU is the heart of the system the motherboard is its circulatory
system. The CPU has to be fitted on the socket on the Board. The board has input
output ports, ram, PCI slots, IDE port, chipset, Power connector, AGP slot, other
expansion slots, floppy port.
A head crash happens when the surface of the read write head or
particles on its surface come into contact within the surface of the hard disk
platter, causing the loss of some or all of the data on the disk.
Both EIDE(enhanced integrated device electronics) and SCSI(small
computer System interface) disks suffer from the limit of 1024 cylinder. The
difficulty is that the old CHS (cylinder/head/sector) addressing mode uses a 10 bit
number can hold a value of between 0 and 1023 , So the number of cylinders
accessible by the BIOS is limited to 1024 hard disk performance measurements
are-
A drive with fewer cylinders but more sectors per cylinder faster than one
with more cylinders and fewer sectors per cylinder, all other things being equal.
As hard drives have spun faster they are developed increasing problems
with heat. The faster spin rate produce increased heat and from friction and from
the increased demands placed on electronic circuits that process the data. The
most common method of providing extra cooling to extra hot drives cooling fan to
your system. These device mount in a 5.25 Inch drive bay and allow to mount a
3.5 inch drive within adapter rails the front bezel incorporates two or three small
fans that blow air onto the hard disk.
All modern hard drives incorporate a disk cache typically between 512kb
and 2mb in size. This cache is composed of RAM chips. Most Operating systems
including LINUX maintain their own disk Cache in computer’s RAM this is more
faster. In case of LINUX the disk cache can grow and shrink as necessary.
FLOPPY DISK DRIVE
It only reads a CD and cannot after its contents A CD-ROM disk capacity
is 650 mb -750mb the speed of a cd is read in x eg.’52x’ , which menas ->
1x=150 kb/s of transfer rate, so 44x gives 6600 kb persecond.
(2)CD-R(Compact disk recordable)
The disk can be written once but can be read many times.
This is an erasable optical disk allows user to record and erase data so that
the disk can be used over and over again CD-RW disks can not be read by CD-
ROM.
CONNECTORS:
(1)keyboard connector
(2) mouse connector
(3) usb connector
(4)serial port connector
(5)power supply connector
(6)ATX connector
(7)AT and baby AT connector
(8)fan connector
(9)vcore connector
(10)cd audio jack connector
USB Connector
When computer Boot up IRQ is reserved for all the peripherals connected
to board but in case of the mouse or some other device is connected to the port
than its driver will not be loaded and after starting operating system the
connecting of mouse will not work but for the USB port whether the drive is
connected or not the IRQ is reserved so that whenever we want to attach USB
Camera it does not bother.
Generally it has 4 wires for power conduction .these are plugged into the
device in only one way .3.5 inch floppy use smaller connectors. Power splitter is
used to split the power to connect more devices. One or two splitter probably does
not constitute problem.
The connector has 4 wires.
(a)Red +5v DC
(b)Black GND
(c)Black GND
(d)Yellow +12v DC
ATX Connector
This kind of connectors are used in small system like laptop and small
cabinets this was used before ATX come for home uses.Generally they have 5-pin
DIN connector.
FAN Connector
CPU cooling FAN, system FAN has required power supply to move
fan .these have 3 pin connector inserted at motherboard at particular place.
V-core Connector
In some m/B there is no provision for internally give voltage to CPU like
new boards. They have this connector which is key locked to m/B and give
required voltage to CPU.
CD audio jack Connector.
This connector has double ended. One inserted into CDROM drive and
other end is connected to CD IN near the sound chip on motherboard. This is used
in case of running audio CD without as interface.
(1)DISPLAY CARD
(a) CGA->
color graphical adaptor
This is of 9 pin card.
8088,80286,80386
8bit isa slot
(b) VGA->
video graphical adaptor
15 pin cards.
m/b 80486,PI
16bit/32bit/64bit.
16 bit cards.
These cards are used for H.D.D and F.D.D control.
F.D.C/H.D.C/MOUSE/PRINTER/GAME CONTROLLER
16bit/32bit
Com1->mouse
Com2->external modem[10 pin]
(4)SOUND CARD
(a) non-pci->
16bit/32bit
(b) pci->
64bit
in this card there is a 15 pin game controller and au out
,mic,Line in
4 MB in size
(5)NETWORK CARD (LAN card)
(6)MODEM.
b) Internal Modem.
Having same speed as external card .it is also PCI
Card (64bit).its speed which is now a day used is
56.6Kbps.
(7)TV-TUNNER CARD
It is also a PCI card of 64 bit.
it is two types
(a) Internal
(b)External
POWER SUPPLY
Most of the cases come with power supplies. Each variety of case -ATX,
AT tower. It is possible to overload a power supply but power splitter. Since we
know
WATTS=VOLTS*AMPS
Adding up these values, this computer requires 50.16w from 3.3v, 77.5w
from 5v and 70.5w from 12v for a total of 198.16w. The motherboard consumes a
few more watts, as well perhaps 25w or so depending on the board and cpu. Not
all devices require their max. amounts of power at the same time. Typically for
instance, harddisk require a great deal of power when they start up to over come
the inertia inherent in stopped disk platters.
It is the power supply system used in the system box. The switch mode
power supply(SMPS) is use 220v as the input and at the out it gives DC current
with different values used by different component of the computer as +5v used by
keyboard LED , +12v used by SMPS cooling fan and +12v for processor cooling
fan. The out put power supply so we get form the SMPS while using the different
type of color. They are basically of six color.
Different color wire from SMPS with the voltage they have-
yellow ----------->+12v
red ------------>+5v
black ------------>GND
blue ------------>-12v
white ------------>-5v
orange------------->power signal identify
• ATX cabinate has ATX SMPS have 20 pin with lock system.
• AT cabinate has AT SMPS have 12 pin with center wire black color.
It is an device which is used to store the elecric power when the main
power supply is cut off by any reasion. Then we can use the power of the ups
which is allready store in the UPS. It basically contain the storage battery which
store the power supply. It take 220v as the input and gave 220v as the output. It
also contain the transformer used to step up the electricity.
N
ETWORKING
INTRODUCTION
A computer network is group of computers that are connected together to
share resources, such as hardware, data, and/or Software. It is a data
communication system that interconnects computer Systems at different sites.
Networking is a collection of individual networks, connected by Intermediate
Working devices that function as a single large network. Industries, colleges &
many business organizations use internetworking. For many purpose such as fast
communications internally, sharing a device for many computers and for many
other purposes also.
The first networks were timesharing networks that use mainframes and
attached terminals. LAN evolved around PC evaluation. LAN enabled multiple
users in a limited geographical area. Lack of management and duplication of
resources resulted in evolution of LAN. Challenges were connecting various
systems together having various Technologies. Making standards was again a big
challenge. Challenges were face in mostly these areas such as connectivity,
reliability, network management & flexibility. The final concern was related to
network expansion & new technologies.
TYPES OF NETWORKS
LOCAL AREA
NETWORK
INTRODUCTION TO LOCAL AREA NETWORK(LAN)
1. Application Layer
2. Presentation Layer
3. Session Layer
4. Transport Layer
5. Network Layer
6. Data-link Layer
7. Physical Layer
Network
• translates logical networkIP;
addressing; address and names to their MAC addressARP; RARP,
responsible for addressing, determiningICMP;
routing routes for sending , managing network
problem IGMP;
Router
• If router can’t send dataIPX
ATM Switch
frame as large as the source computer sends,
OSI
the network layer compensates by breaking
the data into smaller units. At the receiving
end, the network layer reassembles the data
SYSTEM -1 SYSTEM -2
Components of LAN
(d) Protocols
What is Network Cabling?
Cable is the medium through which information usually moves from one
network device to another. There are several types of cable which are commonly
used with LANs. In some cases, a network will utilize only one type of cable,
other networks will use a variety of cable types. The type of cable chosen for a
network is related to the network's topology, protocol, and size. Understanding
the characteristics of different types of cable and how they relate to other aspects
of a network is necessary for the development of a successful network.
The following sections discuss the types of cables used in networks and
other related topics.
• Coaxial Cable
twisting, the higher is supported transmission rate and the greater the cost per
foot. The EIA/TIA (Electronic Industry Association/Telecommunication Industry
Association) has established standards of UTP and rated five categories of wire.
Coaxial Cable
Coaxial cabling has a single copper conductor at its center. A plastic layer
provides insulation between the center conductor and a braided metal shield .The
metal shield helps to block any outside interference from fluorescent lights,
motors, and other computers
Fiberoptics
NETWORK DEVICES
INTRODUCTION
SWITCH
Hubs and switches are different types of network equipment that connect
devices. They differ in the way that they pass on the network traffic that they
receive. Switches differ in some ways. They can be of the store-and-forward type,
storing each incoming packet in an internal buffer before forwarding it, or cut-
through, beginning to forward packets already after their header is in and before
the rest of the packet has been received. Hubs repeat everything they receive and
can be used to extend the network. However, this can result in a lot of
unnecessary traffic being sent to all devices on the network. Hubs pass on traffic
to the network regardless of the intended destination.
In a small network (less than 30 users), a hub (or collection of hubs) can
easily cope with the network traffic generated and is the ideal piece of equipment
to use for connecting the users.
When the network gets larger (about 50 users), you may need to use a
switch to divide the groups of hubs, to cut down the amount of unnecessary traffic
being generated.
TOPOLOGY
The physical topology of a network refers to the configuration of cables,
computers, and other peripherals. Physical topology should not be confused with
logical topology which is the method used to pass information between
workstations.
Linear Bus
A linear bus topology consists of a main run of cable with a terminator at
each end. All nodes (file server, workstations, and peripherals) are connected to
the linear cable. Ethernet and Local Talk networks use a linear bus topology
Star
A star topology is designed with each node (file server, workstations, and
peripherals) connected directly to a central network hub on a star network passes
through the hub before continuing to its destination. The hub manages and
controls all functions of the network. It also acts as a repeater for the data flow.
This configuration is common with twisted pair cable & also used with coaxial
cable or fiber optic cable.
Tree
A tree topology combines characteristics of linear bus and star topologies.
It consists of groups of star-configured workstations connected to a linear bus
backbone cable.
PROTOCOLS
A protocol is a set of rules that governs the communications between
computers on a network. These rules include guidelines that regulate the
following characteristics of a network: access method, allowed topologies, types
of cabling, and speed of data transfer.
The most common protocols are:
♦Ethernet
♦Token ring
♦FDDI
♦ATM
♦IP protocol
♦TCP protocol
Ethernet
The Ethernet protocol is by far the most widely used. Ethernet uses an
access method called CSMA/CD (Carrier Sense Multiple Access / Collision
Detection). This is a system where each computer listens to the cable before
sending anything through the network. If the network is clear, the computer will
transmit. If some other node is already transmitting on the cable, the computer
will wait and try again when the line is clear.
Sometimes, two computers attempt to transmit at the same instant. When
this happens a collision occurs. Each computer then backs off and waits a random
amount of time before attempting to retransmit. With this access method, it is
normal to have collisions. However, the delay caused by collisions and
retransmitting is very small and does not normally effect the speed of
transmission on the network.
The Ethernet protocol allows for linear bus, star, or tree topologies. Data
can be transmitted over twisted pair, coaxial, or fiber optic cable at a speed of 10
Mbps up to 1000 Mbps.
Fast Ethernet
To allow for an increased speed of transmission, the Ethernet protocol has
developed a new standard that supports 100 Mbps. This is commonly called Fast
Ethernet. Fast Ethernet requires the use of different, more expensive network hubs
and network interface cards.
Token Ring
The Token Ring protocol was developed by IBM in the mid-1980s. The
access method used involves token-passing. In Token Ring, the computers are
connected so that the signal travels around the network from one computer to
another in a logical ring. A single electronic token moves around the ring from
one computer to the next. If a computer does not have information to transmit, it
simply passes the token on to the next workstation. If a computer wishes to
transmit and receives an empty token, it attaches data to the token. The token then
proceeds around the ring until it comes to the computer for which the data is
meant. At this point, the data is captured by the receiving computer.
The Token Ring protocol requires a star-wired ring using twisted pair or
fiber optic cable. It can operate at transmission speeds of 4 Mbps or 16 Mbps.
Due to the increasing popularity of Ethernet, the use of Token Ring in school
environments has decreased.
IP Addressing
IP Address Format
IP Subnet Mask
A subnet address is created by "borrowing" bits from the host field and
designating them as the subnet field. The number of borrowed bits varies and is
specified by the subnet mask
The default subnet mask for a Class B address that has no subnetting is
255.255.0.0, while the subnet mask for a Class B address 171.16.0.0 that specifies
eight bits of subnetting is 255.255.255.0. The reason for this is that eight bits of
subnetting or 28 - 2 (1 for the network address and 1 for the broadcast address) =
254 subnets possible, with 28 - 2 = 254 hosts per subnet.
The subnet mask for a Class C address 192.168.2.0 that specifies five bits
of subnetting is 255.255.255.248.With five bits available for subnetting
The router performs a set process to determine the network (or more
specifically, the subnetwork) address. First, the router extracts the IP destination
address from the incoming packet and retrieves the internal subnet mask.
It then performs a logical AND operation to obtain the network number.
This causes the host portion of the IP destination address to be removed, while the
destination network number remains.
The router then looks up the destination network number and matches it
with an outgoing interface. Finally, it forwards the frame to the destination IP
address. Specifics regarding the logical AND operation are discussed in the
following section
CASE STUDY
Our aim was to establish a LAB of e-learning for the students of MASS
INFOTECH through wire networking.
We were given :
Ten computer
Ten 3com LAN card
Twenty two RJ 45 connectors
UTP cable
One 12 port switch
One multimeter
Screwdriver
Windows 98cd
Crimping tool
We check the voltage between earth and neutral with the help of
multimeter which must be less than two Volts .
We check the voltage between phase and neutral with the help of
multimeter which should be 220 Volts.
We cut the UTP cable as required. We made the patch chords as per
the lucent standards followed by MASS TNFOTACH.
Φ assembling of system
We check the RAM, CMOS battery and confirm that each and
every system is ready to be assembled.
We plug the network card in PCI bus and connect the system
Start the system, computer will deduct the new hardware device
Which is 3comm network card?
We load the driver of 3COM NIC card and Microsoft client
We loaded TCP/IP protocol
We install TCP/IP protocol & give the IP address to each computer
as per given .
RESULT:
Each of the system are in network and PINGING with our
network with no loss
• Network administrator
Network administrator is responsible for analysis, installation and
configuration of company networks. Daily activities include monitoring network
performance, troubleshooting problems and maintaining network security.
• Network(system) Engineer
Network engineers focus primarily on system upgrade, evaluating
vendor products, security testing, and so on.
• Network(service) Technician
Network technician tends to focus more on the setup,
troubleshooting and repair of specific hardware and software products. Service
technicians in particular often travel to remote customer sites to perform “field”
upgrades and support.
• Network Programmer/Analyst
They generally write scripts that aid in network analysis, such as
diagnostics or monitoring utilities. They also specialize in evaluating third party
products and integrating new software/hardware technologies into an existing
network environment or to build a new environment.