Computer Awareness
Computer Awareness
Introduction
1. Computer
Computer is an electronic device or combination of electronic devices, capable
of solving problems by accepting data, performing prescribed operations on
the data and supplying the results of these operations. The computer in
organisation often compared with the human brain. Like the brain that designed
it, a computer can take in data and process it. It can store the data either in
raw form or as processed results and can deliver the raw or processed data to
the outside world on demand.
2. Characteristics of Computers
The ever increasing use of computers in all walks of life is due to its special
characteristics. Some of its important characteristics are described below:
Speed
Computers are fast. Electric pulses travel at incredible speeds and because the
computer is electronic, its internal speed is virtually instantaneous. Many of
todays computers can perform hundreds of millions of processing operations
in one second.
Accuracy
The computers physical processing circuits rarely make errors. If the correct
data and instructions are fed in, the computer processes the data and gives the
correct results.
Versatility
Computers can handle a variety of applications and jobs and can be used in
various fields.
Diligence
Computers can perform a given set of functions endlessly without getting
tired or bored.
Automation
No human intervention is required once the instructions and data are given.
The CPU follows these instructions until it meets a last instruction which
saysStop programme execution; hence leading to automation.
Storage
A computer can store massive amounts of information. Todays personal
computers can be equipped with disks capable of storing more than one billion
characters (letters or numbers). They are capable of handling voluminous
data and information.
Programmability
A computer is programmable; that is, what the computer does depends on the
programme the computer is using. (A programme is the list of instructions
telling the computer what to do).
K KUNDAN
Costs
With increasing speed and declining costs of the hardware unit, data processing
cost has been declining dramatically.
3.Classification of Computers
Computers can be classified on the basis of different factors. Present day
computers can be divided into three major classes based on the mode of data
representation used.
Analog Computers
l
l
l
Digital Computers
l
These are the systems that are computationally complete and capable of
solving all of the problems that can be solved algorithmically.
Introduction / 3
l
Hybrid Computers
l
l
K KUNDAN
Microcomputers
Microcomputers are small, low-cost and single-user digital computer. They
consist of CPU, input unit, output unit, storage unit and the software. Although
microcomputers are stand-alone machines, they can be connected together to
create a network of computers that can serve more than one user. IBM PC
based on Pentium microprocessor and Apple Macintosh are some examples of
microcomputers. Microcomputers include desktop computers, notebook
computers or laptop, tablet computer, handheld computer, smart phones and
netbook, as shown in Figure:
PC
Laptop
Notebook
Tablet
PDA
Smart Phone
K KUNDAN
(a) Desktop Computer or Personal Computer (PC) is the most common
type of microcomputer. It is a stand-alone machine that can be placed
on the desk. Externally, it consists of three unitskeyboard, monitor,
and a system unit containing the CPU, memory, hard disk drive, etc. It
is not very expensive and is suited to the needs of a single user at home,
small business units, and organizations. Apple, Microsoft, HP, Dell and
Lenovo are some of the PC manufacturers.
Introduction / 5
K KUNDAN
Minicomputers
Minicomputers are digital computers, generally used in multi-user systems.
They have high processing speed and high storage capacity than the
microcomputers. Minicomputers can support 4200 users simultaneously.
The users can access the minicomputer through their PCs or terminal. They
are used for real-time applications in industries, research centers, etc. PDP 11,
IBM (8000 series) are some of the widely used minicomputers.
Mainframe Computers
Mainframe computers are multi-user, multi-programming and high performance
computers. They operate at a very high speed, have very large storage capacity
Minicomputers
K KUNDAN
and can handle the workload of many users. Mainframe computers are large
and powerful systems generally used in centralized databases. The user accesses
the mainframe computer via a terminal that may be a dumb terminal, an intelligent
terminal or a PC. A dumb terminal cannot store data or do processing of its
own. It has the input and output device only. An intelligent terminal has the
input and output device, can do processing, but, cannot store data of its own.
The dumb and the intelligent terminal use the processing power and the storage
facility of the mainframe computer. Mainframe computers are used in
organizations like banks or companies, where many people require frequent
access to the same data. Some examples of mainframes are CDC 6600 and
IBM ES000 series.
Supercomputers
Supercomputers are the fastest and the most expensive machines. They have
high processing speed compared to other computers. The speed of a
supercomputer is generally measured in FLOPS (FLoating point Operations
Per Second). Some of the faster supercomputers can perform trillions of
calculations per second. Supercomputers are built by interconnecting thousands
of processors that can work in parallel.
Introduction / 7
Mainframe Computers
K KUNDAN
Supercomputers are used for highly calculation-intensive tasks, such as, weather
forecasting, climate research (global warming), molecular research, biological
research, nuclear research and aircraft design. They are also used in major
universities, military agencies and scientific research laboratories. Some
examples of supercomputers are IBM Roadrunner, IBM Blue gene and Intel
ASCI red. PARAM is a series of supercomputer assembled in India by C-DAC
(Center for Development of Advanced Computing), in Pune. PARAM Padma
is the latest machine in this series. The peak computing power of PARAM
Padma is 1 Tera FLOP (TFLOP).
Supercomputers
of generations. Computers are classified into following five types based on
their historical advancement and electronic components used:
K KUNDAN
l
l
Introduction / 9
l
l
They will be intelligent like human beings, and will use Artificial
Intelligence(AI) for working.
They will be able to think and take decisions like us.
They will be used in ares such as robotics, designing, defence.
5. Components of Computer
Computer components can be broadly divided into two categoriesHardware
and Software.
l
Hardware refers to physical component of a computer we can touch
or see. For example, CPU, Monitor, Keyboard, Hard Disk, Floppy Disk,
etc.
l
Software refers to the programs which are required to operate the
computer. For example, DOS, Windows 7, LINUX, MS-Office, etc.
K KUNDAN
An analogy of hardware can be the physical book, which we are reading, and
then software world is the text written on this book.
Number System
Characters and strings of characters are represented internally in a computer
by using digit 0 or digit 1. In simple words, computer understands only two
digits 0 and 1. All the characters, numbers, data entered in the computer is
first converted into binary form (0 or 1) before it is processed or stored by the
computer. Before we discuss binary number system in detail, let us discuss
Decimal System first.
3
1000
3000
4
100
400
5
10
50
5
1
5
Number System
/ 11
1
16
16
0
8
0
0
4
0
1
2
2
1
1
1
23 = 8
24 = 16
25 = 32
26 = 64
27 = 128
Step B to E:
220
128
92
64
28
16
(= 27)
(= 26)
(= 24)
12
8
(= 23)
4
4
(= 22)
0
Step F:
Thus used indices are 7,6,4,3, and 2.
7
1
6
1
5
0
4
1
3
1
2
1
1
0
0
0
K KUNDAN
20 = 1
21 = 2
22 = 4
23 = 8
24 = 16
25 = 32
26 = 64
27 = 128
Step B to E:
674
512
162
128
34
32
2
2
0
(= 29)
(= 27)
(= 25)
(= 21)
28 = 256
29 = 512
Number System
/ 13
Step F:
Thus used indices are 9,7,5 and 1.
9
8
7
6
5
4
1
0
1
0
1
0
Thus binary equivalent of 674 is 1010100010.
3
0
2
0
1
1
0
0
220
110
55
27
13
6
3
1
0
0
0
1
1
1
0
1
1
K KUNDAN
While writing the binary equivalent the digits are taken from bottom to top (as
indicated by arrow). The binary equivalent of 220 is 11011100.
Example 2: Convert 674 into binary number by using Remainder method.
2
2
2
2
2
2
2
2
2
2
674
337
168
84
42
21
10
5
2
1
0
0
1
0
0
0
1
0
1
0
1
17
8
4
2
1
0
Thus 17 = 10001
Fraction Part= .84375.
Fraction
.84375 2
=
1.68750
.68750 2
=
1.37500
.37500 2
=
0.75
.75 2
=
1.50
.50 2
=
1.00
.843755 = .11011
17.35 = 10001.11011
1
0
0
0
1
K KUNDAN
Example 2: Converting 0.2 to binary form:
Base = 2
Fraction
0.2 2
=
0.4
0.4 2
=
0.8
0.8 2
=
1.6
0.6 2
=
1.2
0.2 = .0011
Integer
1
1
0
1
1
Integer
0
0
1
1
Number System
/ 15
27 =
128
0
26 =
0
5
1
2
=
32
0
24 =
0
0
23 =
0
0
22 =
0
1
21 =
2
1
20 =
1
Sum
=
163
(10100011)2 = (163)10
2. (1101)2 =
1
23 =
8
1
22 =
4
0
21 =
0
1
20 =
1
Sum
=
13
(1101)2 = (13)10
K KUNDAN
23 =
8
0
22 =
0
1
21 =
2
1
20 =
1
Sum
=
11
Consider the fractional part now:
Fraction = (0.11011)2
= 1 21 + 1 22 + 0 23 + 1 24 +1 2 5
1
1
1
1
+
+0+
+
2
4
16
32
= (0.84375)10
Thus the decimal equivalent of (1011.11011) 2 is (11.84375) 10
Hardwares
Hardware refers to physical components of a computer we can touch or see.
Types of Hardwares
The hardware components of a microcomputer can be classified into the
following types:
(a) Motherboard
(b) Central Processing Unit or Processor
(c) Input Devices
(d) Output Devices
(e) Memory and Mass Storage Devices
(f) Cards
(g) Ports and cords
(h) Power Supply
All these hardware devices except Mother Board are called peripheral devices,
as they are connected to the motherboard.
(a) Motherboard
l
l
l
Hardwares
l
/ 17
On large machines, the CPU requires one or more printed circuit boards.
On personal computers and small workstations, the CPU is housed in a
singlechip called a microprocessor.
The CPU itself is an internal component of the computer. Modern CPUs
are small and square and contain multiple metallic connectors or pins on
the underside. The CPU is inserted directly into a CPU socket, pin side
down, on the motherboard.
Each motherboard will support only a specific type (or range) of CPU,
so you must check the motherboard manufacturers specifications before
attempting to replace or upgrade a CPU in your computer.
Modern CPUs also have an attached heat sink and small fan that go
directly on top of the CPU to help dissipate heat.
Two typical components of a CPU are:
1. The arithmetic logic unit (ALU), which performs arithmetic and logical
operations and
2. The control unit (CU), which extracts instructions from memory and
decodes and executes them, calling on the ALU when necessary.
Most input data is entered into the computer by using a keyboard. This
input method is similar to typing on a typewriter.
Most typewriters and computer keyboards are QWERTY KEYBOARDS.
The alphabetic keys are arranged so that the upper-left row of letters
begins with the six letters Q W E R T Y.
Designers of other keyboards claim that their boards are easier to learn
than the QWERTY keyboard. The Dvorak keyboard is one example. It
is not widely accepted because most people have already learn the
QWERTY keyboard.
(ii) Mouse
l
l
K KUNDAN
Mouse
Hardwares
/ 19
Track Ball
(iv) Touchpad
l
K KUNDAN
The touch pad is a stationary pointing device that many people find less
tiring to use than a mouse or a track ball.
The movement of a finger across a small touch surface is translated into
cursor movement on the computer screen.
The touch sensitivity surface may be just 1.52 inch square, so the finger
does not have to move much. Its size makes it most suitable for the
notebooks or the laptops.
Touchpad
A device that was released in 1995 enables the user to move the cursor
using an infrared pen. The pen is cordless and works when it is as far
as fifteen feet from the screen.
Although the mouse is still the most popular pointing device, these
innovations may change that in future.
(v) Joysticks
l
l
K KUNDAN
Joystick
Pen-based systems are especially useful for people who do not like to
type or who are frequently on the move.
Pen-based systems are not perfectthey do not always register
handwriting correctly. Pen-based computing is just beginnings to gain
widespread acceptance. For example, many stores no longer have you
Hardwares
/ 21
K KUNDAN
(viii) Optical Recognition Systems
l
Of all the scanning devices, you are probably most familiar with BAR
CODE READERS.
Many retail and grocery stores use some form of bar code reader to
determine the item being sold and to retrieve the item price from a
computer system. The code reader may be a handled unit or it may be
embedded in a countertop.
The bar code reader reads the Universal Product Code (UPC), a pattern
of bars printed on merchandise. The UPC has gained wide acceptance
since its introduction in the 1970s.
Initially, workers resisted the use of the code because the system was
used to check their accuracy and speed. Today, bar codes are used to
update inventory and ensure correct pricing.
Federal Express uses a unique bar code to identify and track each
package. Federal Express employees can usually tell a customer within
a matter of minutes the location of any package.
By taking exams, you are familiar with Mark Sense Character Recognition
systems. Every time you take a test with a fill in the bubble Scantron
form and use a HB2 lead pencil, you are creating input suitable for an
OPTICAL MARK READER (OMR).
A HB2 lead pencil works best because of the number of magnetic particles
in that weight lead. The OMR senses the magnetized marks, enabling
the reader to determine which responses are marked.
OMR is very helpful to researchers who need to tabulate responses to
large surveys. Almost any type of survey or questionnaire can be designed
to be suitable for OMR devices.
An OMR unit can be attached to a microcomputer and the data
transferred to a file directly.
K KUNDAN
Hardwares
/ 23
Optical Scanners
l
K KUNDAN
Voice input and control systems have the potential of revolutionizing the
way we communicate with computers.
Steady progress has been made in this area, although there are still some
problems. The day may soon come when we will be able to talk to our
computers the way the actors do in Star Trek.
Computer scientists and linguists have been working on VOICE
RECOGNITION SYSTEMS for two decades. The major difficulty has
been that people speak with different accents and intonations. For this
reason, most successful voice recognition systems require a period of
training for the system to get accustomed to an individuals accent
and intonation.
The first systems could recognize only a few dozen words. A system
recently released by IBM, known as Voice Type, is capable of recognizing
as many as 32,000 words and is speaker independent.
Voice recognition has unlimited possibilities and will make computers
much easier to use. Speech recognition systems are already being used
in many types of settings. In factories, workers use speech recognition
systems to control robotic arms when the workers own hands are busy.
Printer
l
l
K KUNDAN
Types of Printers
About 1500 types of printers are commercially available conforming to about
15 different printing technologies.
(i) Dot Matrix Printer
A dot-matrix printer creates the characters it prints by placing ink at specific
dot locations within a grid (matrix). Figure below shows how a dot-matrix
printer might form the number 21. The greater the number of dots the printer
uses to create a character, the sharper the characters image. Most tractorfeed
and inkjet printers use a limited number of dots to construct characters which
is why the page printed using such a printer is not as sharp as that by a laser
printer, which uses a greater number of dots.
Hardwares
/ 25
K KUNDAN
Inkjet Printer
K KUNDAN
Display Devices/Monitors
l
Hardwares
/ 27
K KUNDAN
The main memory also known as the primary memory is a part of the central
processing unit and is a combination of both RAM (random access memory)
and ROM (read only memory). The main memory contains the programs that
are currently being worked on. It passes on this information to the control unit
as and when required.
RAM
l
The random access memory is a read write memory i.e. information can
be read as well as written into this type of memory.
It is volatile in nature, i.e., the information it contains is lost as soon as
the system is shut down unless saved for further usage by users.
It is basically used to store programs and data during the computers
operation.
ROM
l
The read only memory as the name may suggest contains information
that can only be read, i.e., you cant write on this type of memory.
It is non-volatile or permanent in nature. It is basically used to store
permanent programs such as program for the functioning of the monitor.
K KUNDAN
l
l
l
Hardwares
/ 29
K KUNDAN
Cache Memory
l
K KUNDAN
Block Diagram Illustrating the Memory Hierarchy
Hardwares
/ 31
Floppy
l
l
l
K KUNDAN
They had a storage capacity of 1.4 MB.
These have become obsolete now.
These were used to move small files such as word processing, small
spreadsheets and databases from one computer to another and were
useful to backup small data files.
A hard disk drive is the device used to store large amounts of digital
information in computers and related equipment like iPods and games
consoles such as the Xbox 360 and PS3.
Hard disk drives are used to store operating systems, software and
working data. These are suitable for any application which requires very
fast access to data for both reading and writing to. However, Hard disk
drives may not be suitable for applications which need portability.
Almost all computers used a fixed hard disc. Used for on-line and real
time processes requiring direct access. Used in file servers for computer
networks to store large amount of data.
These may have storage capacity ranging from few GBs to 1 TB or more.
K KUNDAN
Portable hard discs are good fun because you can carry data about all
over the place and transfer information, programs, pictures, etc between
computers.
Hardwares
l
l
l
/ 33
Magnetic tape has been used for data storage for over 50 years. When
storing large amounts of data, tape can be substantially less expensive
than disk or other data storage options. Tape storage has always been
used with large computer systems. Modern usage is primarily as a high
capacity medium for backups and archives.
K KUNDAN
Magnetic Tapes
Writing and retrieving data is slow. It uses serial access for reading and
writing.
Magnetic tapes are used for application which requires extremely large
storage capacity where speed of access is not an issue. It is commonly
used for backups of file servers for computer networks, in a variety of
batch processing applications such as reading of bank cheques, payroll
processing and general stock control.
K KUNDAN
CDs tend to be used for large files (but smaller than 1Gb) which are too
big for a floppy disc to hold such as music and general animation.
DVDs are used to hold very large files (several Gb) such as movie films.
Both CDs and DVDs are portable i.e. they can be transported from one
computer to another. Both can be used to store computer data.
CD ROM/DVD ROM Applications which require the prevention of
deletion of data, accidental or otherwise. CDs used by software companies
for distributing software programs and data; by Music companies for
distributing music albums and by book publishers for distributing
encyclopaedias, reference books etc. DVDs used by film distributors.
CD R/DVD R Applications which require a single burning of data, e.g.
CDs - recording of music downloads from the Internet, recording of
music from MP3 format, recording of data for archiving or backup
purposes. DVDs recording of film movies and television programs.
CD RW/DVD RW Applications which require the updating of information
and ability to record over old data. Not suitable for music recording but
is very useful for keeping generations of files. DVDs have between five
and ten times the capacity of CDs.
Hardwares
/ 35
CDs
(vi) Solid state backing storage
l
l
l
l
These are the smallest form of memory available in the market today.
Widely used as removable storage.
They are more robust than other forms of storage.
Though expensive than other forms they can be easily written to and
updated.
Pen drives, Memory Cards are the examples:
K KUNDAN
Pen drives
hold much more data, have a more durable design, and operate more reliably
due to their lack of moving parts. Flash drives are widely used to transport
files and backup data from computer to computer.
(b) Flash memory cards
A memory card or flash memory card is a solid-state electronic flash memory
data storage device used with digital cameras, handheld and Mobile computers,
telephones, music players, video game consoles, and other electronics.
Nowadays, most new PCs have built-in slots for a variety of memory cards;
Memory Stick, Compact Flash, SD, etc. Some digital gadgets support more
than one memory card to ensure compatibility.
K KUNDAN
Flash memory cards
Softwares
Software is a general term which is used to describe the instructions that are
given to computer. These instructions can be either a single programme or a
group of programmes.
1. Types of Software
Software is generally classified into three specific categories in the computer
world:
1. System software
2. Application software
3. Utility software.
1. System software: This consists of all the programmes, languages and
documentation supplied by the manufacturer of the computer. This type
of software is required to use the computer efficiently and conveniently.
These programmes allow the application developer to write and develop
their own programmes.
Examples of system software: Operating Systems (Windows 98, Windows
7), Drivers (Sound card driver, Display Driver), Viruses etc.
2. Application software: These programmes are developed by the user in
order to perform some specific function for the organisation. For example
a payroll system to compute the salaries of the employees of an
organisation is termed as an application software.
Examples of Application Software: Microsoft Office, Payroll System,
Inventory System.
3. Utility software: Utility software may be considered as an application
software or a system software which is very often used in the
development of a programme.
Examples of Utility softwares: Winzip, Frontpage, Notepad, Web Browsers
etc.
K KUNDAN
2. Operating System
An operating system concerns itself with every single and minute detail of
your computer working. It manages everything that runs an your computer
straight from running an application software, entering data, displaying
information on monitor, printing a report to storing data on external storage
device (disk). Wherever you are working on your computer, an operating
K KUNDAN
Softwares
/ 39
files and maintaining the integrity of data stored in the files including file
directory structure.
Job Control: When the user wants to run an application program, he
must communicate with the OS, telling it what to do. He does this by
using the OSs job control language or JCL. JCL consists of a number
of OS commands, called system commands, that control the functioning
of the operating system.
House Keeping includes all the support services necessary to ensure
smooth operation of the computer system, viz., security, protection, and
resource accounting, back-up and restoration, etc.
OS as a Resource Manager for four major resources.
Resource
Examples
Task
Examples S/W
to Accomplish
1. Memory
Core (Main)
2. Processors
3. Devices
Spooling
K KUNDAN
3. BIOS
l
K KUNDAN
K KUNDAN
some version of its own code in the path of execution of another program.
Second it must replicate itself, i.e., copy itself to other executable files
or to the disks the user accesses. It can invade single user (desktop)
machines and network services alike.
PC viruses generally fall into three classes. (a) program viruses, (b) boot
sector viruses, (c) multipartite viruses.
Program viruses infect program files. These files have extensions such
as .com, .exe., dll...... and even .bat, etc. Boot sector viruses infect the
system area of a disk, i.e., boot record of floppy or hard disk. All physical
floppy diskettes and hard disk contain a small program in the boot record
that is run when the computer starts up.
Boot sector viruses attach themselves to this part of the disk and activate
when the user attempts to start up from the infected disk.
Third class multipartite viruses infect both program files and boot
records.
3. Spreading of Viruses
l
K KUNDAN
l
/ 43
4. Data Attacks
l
K KUNDAN
Software piracy is another attack that spans the categories weve identified
in this unit. In some sense, piracy is just another example of the
unauthorised copying of data.
The methods for detecting and preventing such a crime are the same
whether the copied data is national defense plans, commercial software,
or sensitive corporate or personal data.
Preventing and detecting this type of attack requires coordinated policies
among the different categories of computer security. In terms of
personnel security, user education is vital. In terms of operations security,
automated logging and auditing software can play a part as well.
6. Session Hijacking
l
7. Timing Attacks
l
K KUNDAN
l
/ 45
A skilled programmer can figure out how to penetrate the queue and
modify the data that is waiting to be processed or printed. He might use
his knowledge of the criteria to place his request in front of others waiting
in the queue. He might change a queue entry to replace someone elses
name or data with his own, or to subvert that users data by replacing
it. Or he could disrupt the entire system by changing commands so that
data is lost, programs crash, or information from different programs is
mixed as the data is analysed or printed.
8. Trojan Horses
l
Trojan horses, viruses, worms, and their kin are all attacks on the integrity
of the data that is stored in systems and communicated across networks.
Because there should be procedures in place for preventing and detecting
these menaces, they overlap with the operations security category as well.
During the Trojan War, the Greeks hid soldiers inside a large hollow
wooden horse designed by Odysseus. When the Trojans were persuaded
to bring the horse inside the gates of the city, the hidden soldiers emerged
and opened the gates to allow their own soldiers to attack the enemy.
In the computer world, Trojan horses are still used to sneak in where
theyre not expected. A Trojan horse is a method for inserting instructions
in a program so that program performs an unauthorised function while
apparently performing a useful one. Trojan horses are a common
technique for planting other problems in computers, including viruses,
worms, logic bombs, and salami attacks (more about these later). Trojan
horses are a commonly used method for committing computer-based
fraud and are very hard to detect.
Consider this typical situation: A Trojan horse is hidden in an application
program that a user is eager to trysomething like a new game or a
program that promises to increase efficiency. Inside the horse is a logic
bomb that will cause the entire system to crash the third time the user
runs the new program. If hes lucky, the user will thoroughly enjoy the
program the first two times its run, because when he tries to use it the
third time, the program he was eager to try will disable his whole system.
K KUNDAN
l
to operate. Viruses infect healthy living cells and cause them to replicate
the virus. In this way, the virus spreads to other cells. Without the living
cell, a virus cannot replicate.
In a computer, a virus is a program which modifies other programs so
they replicate the virus. In other words, the healthy living cell becomes
the original program, and the virus affects the way the program operates.
How? It inserts a copy of itself in the code. Thus, when the program
runs, it makes a copy of the virus. This happens only on a single system.
(Viruses dont infect networks in the way worms do, as well explain
below.) However, if a virus infects a program which is copied to a disk
and transferred to another computer, it could also infect programs on
that computer. This is how a computer virus spreads.
The spread of a virus is simple and predictableand it can be prevented.
Viruses are mainly a problem with PCs and Macintoshes. Virus infection
is fortunately hard to accomplish on UNIX systems and mainframes.
Unlike a virus, a worm is a standalone program in its own right. It exists
independently of any other programs. To run, it does not need other
programs. A worm simply replicates itself on one computer and tries to
infect other computers that may be attached to the same network.
An important distinction between worms and viruses: A worm operates
over a network, but in order to infect a machine, a virus must be
physically copied. Some viruses and worms are nondestructive
(comparatively speaking), while others are extremely malevolent.
Many common PC viruses, such as Michaelangelo, cause machine
crashes or data loss as a result of bugs or other unexpected interactions
with existing code. The Christmas Tree worm program which attacked
IBM systems started out as nondestructive. But, as it spread itself to
other computers, it became destructive when it proliferated into the system
to such a degree that no other work could be done and the entire network
had to be shut down to purge the infection.
K KUNDAN
K KUNDAN
The Internet
1. Introduction
(i) The Internet is a worldwide system of interconnected computer
networks that use the TCP/IP set of network protocols to reach
billions of users. The Internet began as a U.S Department of Defense
network to link scientists and university professors around the world.
(ii) A network of networks, today, the Internet serves as a global data
communications system that links millions of private, public,
academic and business networks via an international
telecommunications backbone that consists of various electronic and
optical networking technologies.
(iii) Decentralized by design, no one owns the Internet and it has no
central governing authority. As a creation of the Defense Department
for sharing research data, this lack of centralization was intentional
to make it less vulnerable to wartime or terrorist attacks.
(iv) The terms Internet and World Wide Web are often used
interchangeably; however, the internet and World Wide Web are not
one and the same.
(v) The Internet is a vast hardware and software infrastructure that
enables computer interconnectivity. The Web, on the other hand, is
a massive hypermedia database, a myriad collection of documents
and other resources interconnected by hyperlinks. Imagine the World
Wide Web as the platform which allows one to navigate the Internet
with the use of a browser such as Internet Explorer or Mozilla
Firefox.
1962:
1962:
USSR launches Sputnik into space. In response, the USA creates the
Advanced Research Projects Agency (ARPA) with the mission of
becoming the leading force in science and new technologies.
J.C.R. Licklider of MIT proposes the concept of a Galactic Network.
For the first time ideas about a global network of computers are
introduced. J.C.R. Licklider is later chosen to head ARPAs research
efforts.
Paul Baran, a member of the RAND Corporation, determines a way
for the Air Force to control bombers and missiles in case of a nuclear
event. His results call for a decentralized network comprised of packet
switches.
ARPA contracts out work to BBN. BBN is called upon to build the
first switch.
ARPANET created - BBN creates the first switched network by linking
four different nodes in California and Utah; one at the University of
Utah, one at the University of California at Santa Barbara, one at
Stanford and one at the University of California at Los Angeles.
Ray Tomlinson working for BBN creates the first program devoted to
email.
ARPA officially changes its name to DARPA Defense Advanced
Research Projects Agency.
Network Control Protocol is introduced to allow computers running
on the same network to communicate with each other.
Vinton Cerf working from Stanford and Bob Kahn from DARPA begin
work developing TCP/IP to allow computers on different networks
to communicate with each other.
Kahn and Cerf refer to the system as the Internet for the first time.
Ethernet is developed by Dr. Robert M. Metcalfe.
K KUNDAN
1968:
1969:
1972:
1972:
1972:
1973:
1974:
1976:
1976:
1976:
1976:
1979:
1979:
1981:
1983:
1983:
1983:
1984:
1984:
1985:
/ 49
K KUNDAN
1987:
1987:
1988:
1989:
1989:
1990:
1990:
1990:
1991:
1991:
1991:
1992:
1992:
1993:
1993:
1994:
1994:
1994:
1995:
1995:
1995:
1995:
1996:
1996:
1996:
1996:
1997:
1998:
1998:
K KUNDAN
1999:
2000:
2001:
2001:
2002:
2003:
2004:
2004:
2005:
2005:
2006:
2006:
2006:
2007:
2008:
2008:
2009:
2010:
2010:
/ 51
K KUNDAN
A local area network (LAN) is usually privately owned and links the
devices in a single office, building, or campus. Depending on the needs
of an organisation and the type of technology used, a LAN can be as
simple as two PCs and a printer in someones home office, or it can
extend throughout a company and include voice, sound, and video
peripherals. Currently, LAN size is limited to a few kilometers.
LANs are designed to allow resources to be shared between personal
computers or workstations. The resources to be shared can include
hardware (e.g., a printer), software (e.g., an application program), or
data. A common example of a LAN, found in many business
environments, links a work group of task-related computers, for example,
engineering workstations or accounting PCs. One of the computers may
be given a large-capacity disk drive and become a server to the other
clients. Software can be stored on this central server and used as needed
by the whole group. In this example, the size of the LAN may be
K KUNDAN
In addition to size, LANs are distinguished from other types of networks
by their transmission media and topology. In general, a given LAN will
use only one type of transmission medium. The most common LAN
topologies are bus, ring, and star.
Traditionally, LANs have data rates in the 4 to 16 Mbps range. Today,
however speeds are increasing and can reach 100 Mbps with gigabit
systems in development.
/ 53
K KUNDAN
l
K KUNDAN
(a) An application program, called the client, running on the local
machine, requests a service from another application program, called
the server, running on the remote machine.
(b) A server can provide a service for any client, not just a particular
client. In other words, the client-server relationship is many-to-one.
Many clients can use the services of one server.
(c) Generally, a client program, which requests a service, should run
only when it is needed. The server program, which provides a
service, should run all of the time because it does not know when
its service is needed.
(d) Services needed frequently and by many users have specific
clientserver application programs. For example, we should have
client-server application programs that allow users to access files,
send e-mail, and so on. For services that are more customised, we
should have one generic application program that allows users to
access the services available on a remote computer.
/ 55
5. Network Topologes
l
The term topology refers to the way a network is laid out, either physically
or logically. Two or more devices connect to a link; two or more links
form a topology. The topology of a network is the geometric
representation of the relationship of all the links and linking devices
(usually called nodes) to each other. There are five basic topologies
possible: mesh, star, tree, bus, and ring.
These five labels describe how the devices in a network are
interconnected rather than their physical arrangement. For example,
having a star topology does not mean that all of the computers in the
network must be placed physically around a hub in a s star shape.
A consideration when choosing a topology is the relative status of the
devices be linked. Two relationships are possible: peer-to-peer, where
the devices share the link equally, and primary-secondary, where one
device controls traffic and the others must transmit through it. Ring and
mesh topologies are more convenient for peer-to-peer transmission, while
star and tree are more convenient for primary-secondary; bus topology
is equally convenient for either.
Mesh Topology: In a mesh topology, every device has a dedicated pointtopoint link to every other device. The term dedicated means that the link
carries traffic only between the two devices it connects.
K KUNDAN
Mesh Topology
Star Topology :In a star topology, each device has a dedicated point-to-point
link only to a central controller, usually called a hub. The devices are not
directly linked to each other. Unlike a mesh topology, a star topology does not
allow direct traffic between devices. The controller acts as an exchange: If
one device wants to send data to another, it sends the data to the controller,
which then relays the data to the other connected device .
Star Topology
K KUNDAN
Tree Topology
/ 57
Bus Topology: In bus topology one long cable acts as a backbone to link all
the devices in the network.
Bus Topology
Ring Topology : In a ring topology, each device has a dedicated point-to-point
line configuration only with the two devices on either side of it.
K KUNDAN
Ring Topology
6. Network Protocols
In computer networks, communication occurs between entities in different
systems. An entity is anything capable of sending or receiving information.
Examples include application programs, file transfer packages, browsers,
database management systems, and electronic mail software. A system is a
physical object that contains one or more entities, Examples include computers
and terminals. But two entities cannot just send bit streams to each other and
expect to be understood. For communication to occur, the entities must agree
on a protocol. A protocol is a set of rules that govern data communication. A
protocol defines what is communicated, how it is communicated, and when it
is communicated. The key elements of a protocol are syntax, semantics, and
timing.
Syntax: Syntax refers to the structure or format of the data, meaning the
order in which they are presented. For example, a simple protocol might expect
the first eight bits of data to be the address of the sender, the second eight bits
to be the address of the receiver, and the rest of the stream to be the message
itself.
Semantics: Semantics refers to the meaning of each section of bits. How is a
particular pattern to be interpreted, and what action is to be taken based on
that interpretation? For example, does an address identify the route to be taken
or the final destination of the message?
Timing :Timing refers to two characteristics: when data should be sent and
how fast they can be sent. For example, if a sender produces data at 100
Mbps but the receiver can process data at only 1 Mbps, the transmission will
overload the receiver and data will be largely lost.
Protocols Example :There are a many standard protocols to choose from,
standard protocols have their own advantage and disadvantage i.e., some are
simpler than the others, some are more reliable, and some are faster. From a
users point of view, the only interesting aspect about protocols is that our
computer or device must support the right ones if we want to communicate
with other computers. The protocols can be implemented either in hardware
or in software. Some of the popular protocols are:
l
TCP/IP
l
HTTP
l
FTP
l
SMTP
l
POP
l
Token-Ring
l
Ethernet
l
Xmodem
l
Kermit
l
MNP, etc.
K KUNDAN
7. Communication Channels
A communication channel is a medium through which data is transmitted
among devices. It provides a way for data to be exchanged between remote
sites and a computer or among multiple computers. The main providers of
communication channels for computer users are the telephone companies and
long distance carriers. It is also possible for an organization to set up its own
wires, cables, or electronic links to establish a private a communication
capability. With either of these approaches, the primary types of channels
available for transmission of data include the following:
/ 59
Wire cables
Microwave
Fiber optics
Communication Satellites
8. Channel Sharing
The purpose of channel sharing is to increase the efficiency of use of a
communications channel. The following are three methods used to regulate
the flow of data from communications channels into a computer:
Multiplexing
It is the process of combining the transmission, character by character, from
several devices into a single data stream that can be spent over a single
communication channel. A multiplexer is the hardware that produces
multiplexing. It is also used at the receiving end to separate the transmissions
back to their original order for processing. The rationale for this process is
that most communication channels can transmit much more data at any one
time than a single device can send. A multiplexer allows the communication
channels to be used more efficiently and thus reduces the cost of using the
channel.
K KUNDAN
Concentration
Digital Transmission
In digital transmission, wave patterns are translated into discrete bits and are
separated by intervals. Bit (contraction for binary digits) are the smallest unit
of information in data processing. They may be compared to a lightbulb,
which is either on or off. An example of digital is data stored in the memory of
a computer in the form of 0s and 1s. It is usually converted to a digital signal
when it is transferred from on position to another inside or outside or outside
the computer.
K KUNDAN
Baud Rate
The rate at which data is transferred is called the baud rate. In fact, baud rate
is the number of times per second the signal being transmitted modulates or
demodulates. Baud rate is measured in terms of bits per second (bps). Although
higher speeds are possible, typical data transmission speeds are 300, 1200,
2400, 4800, 9600, 14,400 bps. There are two factors that determine the rate
at which data can be transmitted over communication channels:
l
Channel bandwidth
l
Method of data transmission (asynchronous or synchronous)
Channel Bandwidths
The bandwidth, or grade, of a communication channel determines the rate, or
speed, at which data can be transmitted over a channel. The term bandwidth
is often shortened to band. There are three bands for communication channels:
l
Narrow-hand
l
Voice-band
l
Broad-band
/ 61
K KUNDAN
K KUNDAN
Keyboards and traditional monitors are both examples of simplex devices.
The keyboard can only introduce input; the monitor can only accept
output.
Half-Duplex
In half-duplex mode, each station can both transmit and receive, but not at the
same time. When one device is sending, the other can only receive, and vice
versa. The half-duplex mode is like a one-lane road with two-directional traffic.
While cars are traveling one direction, cars going the other way must wait. In
a half-duplex transmission, the entire capacity of a channel is taken over by
whichever of the two devices is transmitting at the time. Walkie-talkies and
CB (citizens band) radios are both half-duplex systems.
/ 63
Full-Duplex
l
In full-duplex mode (also called duplex), both stations can transmit and
receive simultaneously.
K KUNDAN
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
K KUNDAN