Vous êtes sur la page 1sur 23

DEPARTMENT OF INFORMATION TECHNOLOGY

NAME: AAKASH SAINI SUBJECT: SOFTWARE LAB IV(DC)


COLLEGE ROLL NO.: IT/04/4701 SUBJECT CODE: CS-218
UNIV. ROLL NO. 41708001 GROUP: A

Familiarization with computer hardware


For our purposes, a computer can be defined as a machine for processing and storing information
electronically. To be useful, it must have a way for us to get information into the machine, and
some way to get it out afterwards so we can see it.

Therefore a computer has four basic functions:

1. input
2. processing
3. Storage
4. output
Every part of a computer system, and everything it does, is connected to one or more of these
basic functions. Computers can seem complex because there are many ways of doing of these
functions, and because everything has a new name, often made up of what appear to be nonsense
initials like RAM or CPU.

To keep it simple, first look up any word or technical term you don’t understand. There is a
glossary and the back of this course pack with definitions for all the technical terms we use here
thought that you are likely to hear in talking to technicians. Second, when you encounter any part
of a computer for the first time, find out which of these four functions it is used for.

Input

The most obvious device for getting information (also called data) into a computer system is the
keyboard. Another common input device is the mouse. Almost any time we use a computer we
use one or both of these to get text data or instructions into the system. To get the large amounts
of Information into the computer we would probably use a CD (compact disc), floppy diskette, a
modem connected to a phone line, or our network card connected to a network.
With the right sound equipment, a microphone or musical instrument can be used to bring in
sound, and a digital camera can download visual information, so these are all being used as
input.

Processing

If we just put information into the computer and to get out again later, computers could be much
simpler. Most of the time, we want to do something with it or change it in some way. Doing
something with it is called processing, or data processing. Most of this takes place in a part
called the processor, or Central Processing Unit. This is usually abbreviated to CPU.
The CPU is such an important part of the computer that we often refer to a system by the type of
CPU it contains. To help the CPU there is another part that takes over a lot of arithmetic. It is
called the co-processor and also the Numerical Processing Unit or NPU.
The smallest piece of data that a computer can process is called a bit, and each bit will be either
of one or a zero. For the sake of efficiency, the computer normally deals with a minimum of
DEPARTMENT OF INFORMATION TECHNOLOGY
NAME: AAKASH SAINI SUBJECT: SOFTWARE LAB IV(DC)
COLLEGE ROLL NO.: IT/04/4701 SUBJECT CODE: CS-218
UNIV. ROLL NO. 41708001 GROUP: A

eight bits at a time, and eight bits together is called a byte. This is an important word to
remember, because in working with computers you will hear about bytes frequently, and also
Megabytes which is 1 million bytes. Megabyte is usually abbreviated MB.
Storage

Information is stored in a computer in several different ways, but the main two are RAM and
hard drive, also called a hard disk.
The hard drive can store huge amounts of information, and it can keep the information when the
computer is turned off. The only problem with hard drives is that it takes too long to get the data
from them, because the system must wait as the disk spins until the right part of the disks surface
comes under the red heads, and then the drive transfers a block of data in sequence.
For information being used at the moment, the system needs to be able to get to any part of that
information very quickly. The storage for this information RAM, which stands for Random
Access Memory. Random access means the system can ask for any piece of stored data at
random and get it immediately, without waiting for to come up in sequence.
Random access is faster than sequential access. The main reason that computers don’t just store
everything in RAM is that information in RAM is lost whenever the power is turned off. So, the
computer and needs both RAM and disk storage. Everything stored long-term is on the disk, and
whatever is needed at the moment is copied into the RAM. If changes are made to the data in
RAM, the changes must be copied to the disk before that computer is turned off so those changes
are not lost.

Output

There are a number of ways to get data back out of the computer. One of them is right there in
front of your face, and that’s the monitor. It has a screen that shows you information from the
computer, so it is an output device. The monitor and the parts of the computer that run it are
known as video. Another common output is a printer, which of course puts the computer’s output
on a paper for you.

Some devices are both input and output, like the floppy diskette mentioned earlier. If you have a
modem on a network connection, information can go both ways over the line so it’s both input
and output. In many cases it is practical to consider input and output together, in which case they
are called Input/Output and abbreviated as I/O.

Software

The physical parts of as computer are called hardware. These are things can see and touch, and
yes, they are hard.
DEPARTMENT OF INFORMATION TECHNOLOGY
NAME: AAKASH SAINI SUBJECT: SOFTWARE LAB IV(DC)
COLLEGE ROLL NO.: IT/04/4701 SUBJECT CODE: CS-218
UNIV. ROLL NO. 41708001 GROUP: A
These same pieces of hardware are used whether you want to write a letter, balance your
checkbook or play a game of computer solitaire, so how does this hardware know what to do,
and when to do it? Actually the hardware parts don’t have a clue. They need instructions to tell
them
what to do, so some of that information we’re sorting and processing must be the instructions
telling the computer what to do.

These instructions are called software, and they are organized into set of instructions and called
programs. If you want to play a game on the computer the computer must have a program with
the instructions for that particular game. If you want to send e-mail, there must be an e-mail
program. One program called the operating system contains the instructions for actually running
the computer. Certain things need to be done no matter what you are using the computer for.
These are things like getting data on and off the disk, getting information to the monitor screen,
and so forth. A program called Windows is the most common operating systems for PCs, and the
one used in this office. It comes from a little company called Microsoft. Perhaps you have heard
of it.

Anyway, the operating system takes care of the basic details of running the computer, and allows
other programs and to concentrate on their particular and task. When we say software, that can
mean the applications, the operating system, or both.

There are other little chunks of software that attach to the operating system and tell it how to run
particular hardware components or applications. These little chunks are called the drivers, and
any time you add a piece of hardware to a system or upgrade to a new version of device, you will
need to have the right driver for that new piece of hardware.

Circuits

The word ‘circuit’ means a path something follows goes back to where it started. In an electrical
or electronic circuit, the thing following the path is of course electricity. Whatever work it does
and whatever work components it must go through on the way, the ‘circuit’ just means there is a
complete path back to the starting point. And the word ‘circuitry’ means the components, and the
connections between them, that make up the path. It’s as simple as that.

In a computer, this word ‘circuit’ shows up in a couple of places. Most of the components will be
found soldered to a ‘circuit board’, also going to a printed circuit board. This is a thin board of

fiberglass, within the connections between components (called traces) printed right on the board
in Copper.

The components themselves are often something called an Integrated Circuit, abbreviated IC. To
integrate means to combine things together, so an integrated circuit is one that combines many
circuits into the same part. These are formed on a thin wafer or ‘chip’ of silicon and you will
sometimes hear an IC being called a ‘chip’. This is also where we get the name ‘Silicon Valley’,
for the area in Central California where many of them are made.
DEPARTMENT OF INFORMATION TECHNOLOGY
NAME: AAKASH SAINI SUBJECT: SOFTWARE LAB IV(DC)
COLLEGE ROLL NO.: IT/04/4701 SUBJECT CODE: CS-218
UNIV. ROLL NO. 41708001 GROUP: A
This chip of silicon is put into a case with metal legs, and tiny wires between the wafer and the
legs connect those circuits with the outside world. There are now ICs containing millions of
transistors and other components, all in a package that will fit in your palm with lots of room to
spare.

The Motherboard

The biggest and most important circuit board in a computer is the motherboard. It’s called the
motherboard because every other part of the computer is connected to it. The CPU plugs into the
motherboard, and so does the memory. And all and the components that plug into the back of the
case, like the keyboard and monitor, are connected from there to the motherboard. It is also
called the system board.

There is a set of slots near the back edge of the board for plugging in other circuit boards, called
adapter cards. These plug-in slots are for things like modems, sound cards, network cards and
just about any other add-on feature you can think of. There is a set of traces connecting these
slots to each other. A trace goes from Pin 1 of each of the other slots, and other traces connect
each of the Pin 2s, each of the Pin 3s, etc. These traces then go on to connect to the memory,
CPU, disk drives and other parts of the computer.

The Bus

These traces are called a bus, and they provide a way for each part of the system to exchange
information with every other part. There are different types of bus that have been developed over
the years, and your computer may have more than one. The most common one, found in every
the PC sold today, is called the PCI bus. An older version still seen in some new computers is the
ISA bus. These are fairly easy to tell apart, because the connector that fits in the PCI slot has
smaller pins and more of them.

One of the differences is between PC I and I SA is that PCI supports a feature plug-and-play,
which allows you to add new hardware and have the system detect and configure it
automatically. As anyone knows who has used the old method, plug-and-play is a great
convenience.

Resources

Since just about everything in the computer uses the bus to exchange data, there must be a way
to decide whose turn it is. This is done with something called an Interrupt Request, abbreviated
IRQ. Each component or device that will need access to the bus is assigned an IRQ level, from
IRQ 0 to IRQ 15, and there are lines on the bus that correspond to these levels. When a device
needs to transfer data on the bus, it tugs on the appropriate Interrupt Request line and waits until
the CPU grants an interrupt for that level. It’s all very nice and orderly. IRQs are an example of a
DEPARTMENT OF INFORMATION TECHNOLOGY
NAME: AAKASH SAINI SUBJECT: SOFTWARE LAB IV(DC)
COLLEGE ROLL NO.: IT/04/4701 SUBJECT CODE: CS-218
UNIV. ROLL NO. 41708001 GROUP: A
system resource, which is a feature available in limited quantity that must be assigned to specific
components.

Introduction With Network Computing

The broad term “Network Computing” represents a way ofdesigning systems to take advantage
of the latest technology and maximize its positive impact on business solutions and their ability
to serve their customers.

Metwork Computing represents the current wave in the progress of IS architectures from
mainframe to mini to PC-LAN and onward.Information systems adhere to the network
computing paradigm when functions are appropriately distributed between clients and servers
connected by local and wide-area networks.Functionality is centralized to the extentthat
performance constraints allow and sufficient intelligence provide locally to support a powerful
user interface. Furthermore, server capabilities are physically distributed as necessary to
improve performance and resilience. This differs from the earlier “mainframe/terminal”-based
paradigms where everything is centralized and later “fat-client” where alost everything is held
on client PC or Workstation.

A simple example of nerworkcomputing is the use of a browser to view static information on


the World Wide Web. A more complex example is the case of an order entry system where
there is a central database that is accessed throygh Java applet running in a browser.Any
changes of data are validated by a Java program associated with th ebrowser before the
amended data is transferred and used to update the central database.The Java program may also
manipulate the data for display.

To achieve success for network computing we must have:

• Guaranteed functionality

• Ease of integration

• Competitive and cooperative suppliers

• Avoidance of fragmentation

• A critical mass
DEPARTMENT OF INFORMATION TECHNOLOGY
NAME: AAKASH SAINI SUBJECT: SOFTWARE LAB IV(DC)
COLLEGE ROLL NO.: IT/04/4701 SUBJECT CODE: CS-218
UNIV. ROLL NO. 41708001 GROUP: A

Features of Network Computing

The claimed features and advantages of network computing and computer networks can be
grouped accordingly to the likely business benefit.

Feature Business Advantage

1. Flexibility Productivity and Competitiveness with the


ability to respond to change more quickly.

2. Optimization-the right software Productivity and service Avatlability


data at the right time

3. Availability and Reliability Productivity and service Avatlability

4. Management Control Increased productivity

5. Improved System Management Effective control of infrastructure and lower


costs

6. Improved Security Higher confidence leading to new types of


applications, e.g. web-based commerce

7. Greater Access to Shared Resources Increased productivity and organixational


effective

8. Cheaper Equipment Cost Savings

9. Environmental Factors Lower costs and greater ease in achieving


environmental targets

10. Competition Flexibility,wider choice,improved services and


support
DEPARTMENT OF INFORMATION TECHNOLOGY
NAME: AAKASH SAINI SUBJECT: SOFTWARE LAB IV(DC)
COLLEGE ROLL NO.: IT/04/4701 SUBJECT CODE: CS-218
UNIV. ROLL NO. 41708001 GROUP: A

CLIENT SERVER ARCHITECTURE


Direct Cable Connection

We have the need to connect two Windows systems to be able to exchange some data.
We are not willing to install network cards and to deal with Ethernet cables.

Requirement:

• 1 or 2 Serial ports(also called COM-ports) connector with 9 pins(9-pin male”)


• Parallel port(also called printer port) connector with 25 holes(“25-pin female”)
• 1 or 2 USB(Universal System Bus) Desktop system having usually 2
ports,Notebook computers usually having only 1 port.

These plugs/connectors can be used to connect 2 systems together. Such connection is called :
Direct Cable Connection)DCC)

Hardware
All these connectors on the back of our PC had been originally designed to connect add-on
components to a system(like parallel port:Printers; serial ports:external modems;
USB:scanners,digital cameras etc.) with 1 system as “controller”.The cables used to plug into
these connectors are designed for this use.

Via Serial or Parallel Cable:Direct Cable Connection

When now using these plugs to connect 2 systems(i.e. 2 controllers) we need special
cables(either purchased or self made) taking care that the two systems communicate with each
other. When using a parallel or serial connection, we can connect only 2 systems, not more.

Depending on the cable,we will get different data-transfer speeds:

• Serial Cable(1 bit connection) upto 10Kbytes/sec


• Base Parallel Cable(4 bit,LapLink compatible cable) upto 60-80 Kbytes/sec

A quick and easy way to connect two PC’s is to use a Direct Cable Connection.
DEPARTMENT OF INFORMATION TECHNOLOGY
NAME: AAKASH SAINI SUBJECT: SOFTWARE LAB IV(DC)
COLLEGE ROLL NO.: IT/04/4701 SUBJECT CODE: CS-218
UNIV. ROLL NO. 41708001 GROUP: A
We need to purchase either a USB cable,parallel port cable,null modem serial cable, or a
crossover cable. After we’ve tracked a cable down,connect the two by intersecting the two
cables into the correct port.
When using a DCC, we must determine which computer is going to be delegated “host”, and
which is to be designated the “guest”. Generally, if we were to connect a laptop to a PC, the

laptop would be considered a guest computer. But in this case we’ll be delegating the new
computer, we are transferring files into as the guest. The old computer will then be considered
as the host. We now will need to see if DCC is installed on either computer before we begin to
transfer files.

Verifying Direct Cacle Connection installation

To check if DCC is installed on the host computer, follow the below given instructions:

1. Press Windows Start>Settings>click Control Panel


2. Double click the Add/Remove icon
3. Click on the Windows Setup tab
4. Double-click the Communications icon
5. Check to see if Direct Cable Connection is checked
6. If the box is check marked, hit OK.If the box is blank,check it and hit Apply
7. Now, follow these same instructions to verify DCC exists on the guest computer

Using Direct Cable Connection

The DCC control panel is relatively easy to understand. Basically, it uses a setup wizard that
guides through the process of the program.

To start using DCC , follow these instructions:

1. Access the DCC control panel on both computers by clicking


start,Programs,Accessories,Communications and select DCC
2. Be sure to set the guest Pc and host PC correctly
3. Once we’ve finished with the setup wizard, we now should be able to share files
between the two computers we just connected.

Peer-to Peer Networking

Often referred to simply as peer-to –peer , or abbreviated P2P, is a type of network in which
each workstation has equivalent capabilities and responsibilities. This differs from client/server
architectures, in which some computers are dedicated to serving th eothers.Peer-to Peer
DEPARTMENT OF INFORMATION TECHNOLOGY
NAME: AAKASH SAINI SUBJECT: SOFTWARE LAB IV(DC)
COLLEGE ROLL NO.: IT/04/4701 SUBJECT CODE: CS-218
UNIV. ROLL NO. 41708001 GROUP: A
networks are generally simpler, but they usually do not offer the same performance under
heavy loads.

Setting up a Win9x Peer to Peer Network

Hardware Required:

1. At least two computers.


2. Network adapters for each computer.
3. If you have a 10 Base-T adapter, and only 2 computers, you can directly connect two
computers to one another.You will need to modify the cable by connecting connect
pins:1—3,2—6,3—1,6—2, pins 4,5,7, and 8 are unused,but are normally connected
straight through.
4. If you have more than two computers, you will need a 10 Base-T Hub or Router to
connect them

Adding Your Network Adapter

1. Open up the Control Panel


2. Click on Add New Hardware
3. Click the Next button
4. You can either have Windows9x search for the adapter by selecting YES or select NO
to manually enter the adapter
5. Click the Next button
6. If you selected No,you will need to manually select anadapter
7. Reboot if requested
DEPARTMENT OF INFORMATION TECHNOLOGY
NAME: AAKASH SAINI SUBJECT: SOFTWARE LAB IV(DC)
COLLEGE ROLL NO.: IT/04/4701 SUBJECT CODE: CS-218
UNIV. ROLL NO. 41708001 GROUP: A

Hybrid Computing

In order for an application to fall into the hybri computing category, it has to be able to follow
two conditions:

• The device or software program should be able to work on its own, without being
connected to the net at all time.
• The device or software package is enhanced through its connection to the net.

It’s a simple piece of software that hooks up to your outlook directory and allows you to
exchange electronic business cards over the web.If for example, I update my informationin that
contact manager,the change is sent to the web.If you have the same application, the next time
you synchronize your address book, my contact information will be made current in your
contact manager.It’s a great concept if people start using the application. After all, who really
has the time to keep track of all th econtacts info lines for everyone they’ve encountered. Once
again, this is an application that takes a non-networking concept(address book) and creates an
hybrid application around it.

Those hybrid applications harness the power of a local machine and use the net to enhance
that power. Either way,they can work on their own or connect. For years to come,until we
make the net truly ubiquitious, we will have to live in a world where large areas are off the
grid.

Over the next few years,a scomputing devices become more pervasive, we should start seeing
more of those hybrid devices because after all, the internet is nothing more than another
evolutionary step in the computing and communication world.
DEPARTMENT OF INFORMATION TECHNOLOGY
NAME: AAKASH SAINI SUBJECT: SOFTWARE LAB IV(DC)
COLLEGE ROLL NO.: IT/04/4701 SUBJECT CODE: CS-218
UNIV. ROLL NO. 41708001 GROUP: A

INTRODUCTION WITH LAN AND WAN

Wide Area Network (WAN)


A wide area network(WAN) is a geographically dispersed telecomminications network. The
term distinguishes a broader telecommunication structure from a local area network(LAN). A
wide area network may be privately owned or rented, but the term usually connotes the illusion
of public(shared user) networks.

Local Area Network (LAN)


A computer network that spans a relatively small area. Most LANs are confined to a single building or
group of buildings. However, one LAN can be connected to other LANs over any distance via telephone
lines and radio waves. A system of LANs connected in this way is called a wide-area network (WAN).
Most LANs connect workstations and personal computers. Each node (individual computer ) in a LAN
has its own CPU with which it executes programs, but it also is able to access data and devices
anywhere on the LAN. This means that many users can share expensive devices, such as laser
printers, as well as data. Users can also use the LAN to communicate with each other, by sending e-
mail or engaging in chat sessions.
There are many different types of LANs Ethernets being the most common for PCs. Most Apple
Macintosh networks are based on Apple's AppleTalk network system, which is built into Macintosh
computers.
The following characteristics differentiate one LAN from another:
 topology : The geometric arrangement of devices on the network. For example, devices
can be arranged in a ring or in a straight line.
 protocols : The rules and encoding specifications for sending data. The protocols also
determine whether the network uses a peer-to-peer or client/server architecture.
 media : Devices can be connected by twisted-pair wire, coaxial cables, or fiber optic cables.
Some networks do without connecting media altogether, communicating instead via radio
waves.
LANs are capable of transmitting data at very fast rates, much faster than data can be transmitted over
a telephone line; but the distances are limited, and there is also a limit on the number of computers that
can be attached to a single LAN
DEPARTMENT OF INFORMATION TECHNOLOGY
NAME: AAKASH SAINI SUBJECT: SOFTWARE LAB IV(DC)
COLLEGE ROLL NO.: IT/04/4701 SUBJECT CODE: CS-218
UNIV. ROLL NO. 41708001 GROUP: A

CONCEPT OFPROTOCOLS AND THEIR


CONFIGURATION

ADDING TCP/IP PROTOCOL CONFIGURING


TCP/IP IP
Click on the ADD button ADDRESS

Click on PROTOCOL 1. Click on


TCP/IP.
Click on MICROSOFT
2. Select IP
Click on TCP/IP address
If you have a
DHCP serviced
Highlight NETBEUI-click on remove subnet,
3. (i).Select
Highlight IPX/SPX-click on remove obtain an IP
address
automatically
Click on OK and reboot if necessary (ii).go to
configure WINS
Your network setup should look like; server for DHCP.
4. If not,enter
your IP
address and subnet mask.
5. Click on WINS configuration.
DEPARTMENT OF INFORMATION TECHNOLOGY
NAME: AAKASH SAINI SUBJECT: SOFTWARE LAB IV(DC)
COLLEGE ROLL NO.: IT/04/4701 SUBJECT CODE: CS-218
UNIV. ROLL NO. 41708001 GROUP: A

CONFIGURING TCP/IP DNS ADDRESSSES

1. Type in your HOST NAME

2. Type in your DOMAIN NAME

3. Type in the IP address for your network’s domain name server(s)

4. Click on ADD

5. If you have more than one DNS server, add subsequent IP addresses.

6. BINDING and ADVANCED should not to be modified.

7. Click on ok and reboot .you should then have network access

CONFIGURING TCP/IP WINS CONFIGURATION

1. IF you do not have a WINS server, select disable WINS resolution.

If you have a WINS server but not a DHCP serviced subnet:

2. (I) Select enable WINS resolution.


II).Type in the primary and secondary IP addresses for your WINS servers.

3. If you have a DHCP serviced subnet, select use DHCP for WINS resolution

4. Click on gateway configuration.

CONFIGURING TCP/IP GATEWAY CONFIGURATION

1. Type in the IP address of your gateways or routers

2. Click on ADD after each one

3. Click on DNS configuration


DEPARTMENT OF INFORMATION TECHNOLOGY
NAME: AAKASH SAINI SUBJECT: SOFTWARE LAB IV(DC)
COLLEGE ROLL NO.: IT/04/4701 SUBJECT CODE: CS-218
UNIV. ROLL NO. 41708001 GROUP: A

FAMILIRIZATION WITH TRANSMISSION MEDIA


The purpose of the physical layer is to transmit raw bit stream from one machine to
another. Various physical media can be used for the actual transmission. Each one has its own
niche in terms of bandwidth, delay, cost and ease of installation and maintenance. Media are
roughly grouped into guided media, such as copper wire and fiber optics, and guided media,
such as radio and lasers through air.

1. MAGNETIC MEDIA

One of the most common ways to transport data from computer to another is to write them
onto magnetic tape or removable media, physically transport the tape or disks to the
destination machine, and reads them back in again. Although this method is not as
sophisticated as using a geostationary communication satellite, it is often more cost
effective, especially for applications in which high bandwidth or cost per bit transported is
the key factor.

A simple calculation will make this point clear. An industry standard Ultrium tape can
hold 200 GB. A box 60×60×60 cm can hold about 1000 of these tapes, for a total capacity
of 200 terabytes, or 1600 terabits. A box of tapes can be delivered in United States in 24
hours by federal express and other companies. The effective bandwidth of this transmission
is 1600 terabits/86400 sec or 19 Gbps. If the destination is only an hour away by road the
bandwidth is increased to over 400 Gbps. No computer network can even approach this.

For a bank with many Giga bytes of data to be backed up daily on a second machine, it
is likely that no other transmission technology can even being to approach magnetic tape
for performance.

A magnetic tape amounts to shipping a Gigabytes for under 3 cents. No network can
beat that.

2. TWISTED PAIR

Although the bandwidth of magnetic tape is excellent, the delay characteristics


are poor. Transmission time is minutes or hours, not milliseconds. For many
applications an online connection is needed. One of the oldest and still most common
transmission media is twisted pair. A twisted pair consists of two insulated copper
wires typically about 1 mm thick. The wires are twisted together in a helical form, just
like a DNA molecule. Twisting is done because 2 parallel wires constitute a fine
antenna. When the wires are twisted, the waves from different twists cancel out, so the
wire radiates less effectively.
DEPARTMENT OF INFORMATION TECHNOLOGY
NAME: AAKASH SAINI SUBJECT: SOFTWARE LAB IV(DC)
COLLEGE ROLL NO.: IT/04/4701 SUBJECT CODE: CS-218
UNIV. ROLL NO. 41708001 GROUP: A

The most common application of twisted pair is the telephone system. Nearly
all telephone are connected to the telephone company office by a twisted pair. Twisted
pair can run several kms without amplification, but for longer distances, repeaters are
needed. When many twisted pairs run in parallel for a substantial distance, such as all
the wires from an apartment building to the telephone company office, they are bundled
together and encased in a protective sheath. The pairs in these bundles would interfere
with lines run on poles above ground, it is common to see bundles several cms in
diameter.

Twisted pairs can be used for transmitting either analog or digital signal. The
bandwidth depends on the thickness of the wire and the distance traveled, but several
megabits/seconds can be achieved for a few kms in many cases. Due to their adequate
performance and low cost, twisted pairs are widely used and are likely to remain so for
years to come.

Twisted pair cabling comes in several varieties, two of which are important for
computer networks. Category 3 twisted pair consists of two insulated wires gently
twisted together. Four such pairs are typically grouped in a plastic sheath to protect the
wires and keep them together. Prior to about 1988, most office buildings had 1 category
cables running from a central wiring closet on each floor into each office. This scheme
allowed up to four regular telephones or two multiline telephones in each office to
connect to the telephone company equipment in the wiring closet.

Starting around 1988, the more advanced category 5 twisted pair were
introduced. They are similar to category 3 pairs, but with more twists per cm, which
results in less cross-talks and better quality signal over longer distances making them
more suitable for high speed computer communication. Up and coming categories are 6
and 7 which can handle higher bandwidth.

All these wiring types are often referred to as UTP (unshielded twisted pair).
DEPARTMENT OF INFORMATION TECHNOLOGY
NAME: AAKASH SAINI SUBJECT: SOFTWARE LAB IV(DC)
COLLEGE ROLL NO.: IT/04/4701 SUBJECT CODE: CS-218
UNIV. ROLL NO. 41708001 GROUP: A

The twisted pairs wires consists of 8 wires of different colours forming four pairs,

These pairs are connected and shown below


DEPARTMENT OF INFORMATION TECHNOLOGY
NAME: AAKASH SAINI SUBJECT: SOFTWARE LAB IV(DC)
COLLEGE ROLL NO.: IT/04/4701 SUBJECT CODE: CS-218
UNIV. ROLL NO. 41708001 GROUP: A

Figure: twisted pair and coaxial cable

3. COAXIAL CABLE

Another common transmission medium is the coaxial cable. It has better shielding than
twisted pairs so it can span longer distances at higher speeds. Two kinds of coaxial
cables are widely used. One kind, 50 ohm cable, is commonly used when it is indented
for digital transmission from the start. The another kind, 75 ohm cable, is commonly
used for analog transmission and cable television but is becoming more important with
the advent of internet over cable.

A coaxial cable consists of a stiff copper wire as the core surrounded by an insulating
material. The insulator is encased by a cylindrical conductor, often as a closely woven braided
mesh. The outer conductor is covered in a protective plastic sheath.
DEPARTMENT OF INFORMATION TECHNOLOGY
NAME: AAKASH SAINI SUBJECT: SOFTWARE LAB IV(DC)
COLLEGE ROLL NO.: IT/04/4701 SUBJECT CODE: CS-218
UNIV. ROLL NO. 41708001 GROUP: A

The construction and shielding of the coaxial cable give it a good combination o
Of high bandwidth and excellent noise immunity. The bandwidth possible depends on
the cable quality, length and signal to noise ratio of the data signal. Modern cables have
a bandwidth of close to 1 Ghz. Coaxial cables used to be widely used within the
telephone system for long distance slide but have now largely been replaced by fiber
optics on long haul routes. Coax is still used for television and metropolitan area
networks, however.

4. FIBER OPTICS
An optical transmission system has three key components: the light source, the
transmission medium and the detector. Conventionally, a pulse of light indicates a bit
and the absence of light indicates a zero bit. The transmission medium is a ultra thin
fiber of glass. The detector generates an electrical pulse when light falls on it. By
attaching a light source to one end of an optical fiber and a detector to the other, we
have a unidirectional data transmission system that accepts an electrical signal, converts
and transmits it by light pulses, and then reconverts the output to an electrical signal at
the receiving end.

When a light ray passes from one medium to another, for example, from fused silica to air, the
ray is refracted at the silica/air boundary. Here we see a light ray incident on the boundary at
one angle and emerge at another angle. For angles of incidence above a certain critical value
the light is reflected back into the silica; none of it escapes into the air. Thus a ray of light
incident at or above critical angle is trapped inside the fiber and can propagate for many
kilometers with virtually no loss.
DEPARTMENT OF INFORMATION TECHNOLOGY
NAME: AAKASH SAINI SUBJECT: SOFTWARE LAB IV(DC)
COLLEGE ROLL NO.: IT/04/4701 SUBJECT CODE: CS-218
UNIV. ROLL NO. 41708001 GROUP: A

Fiber optics cable is similar to coax, except without the braid. At the center of the glass
core through which the light propagates. In multimode fibers, the core is typically 50
microns in diameter, about the thickness of a human hair. In single mode fibers the core
is 8 to 10 microns.

The core is surrounded by a glass cladding with a lower index of refraction than
the core, to keep all light in the core. Next comes a thin plastic jacket to protect the
cladding. The fibers are typically grouped in bundles, protected by an outer sheath.

Fibers can be connected in 3 different ways. First, they can terminate in


connecters and be plugged into fiber sockets.

Connectors lose about 10%-20% of the light, but they make it easy to
reconfigure systems.

Second, they can be spliced mechanically. Mechanical splices just lay the two
carefully cut ends next to each other in a special sleeve and clamp them in place. Third,
two pieces of fiber can be fused to form a solid connection. A fusion splice is almost as
good as a single drawn fiber, but even here small amount of attenuation occurs. Two
kind of light sources are typically used to do signaling, LEDs and semiconductor lasers.
DEPARTMENT OF INFORMATION TECHNOLOGY
NAME: AAKASH SAINI SUBJECT: SOFTWARE LAB IV(DC)
COLLEGE ROLL NO.: IT/04/4701 SUBJECT CODE: CS-218
UNIV. ROLL NO. 41708001 GROUP: A
DEPARTMENT OF INFORMATION TECHNOLOGY
NAME: AAKASH SAINI SUBJECT: SOFTWARE LAB IV(DC)
COLLEGE ROLL NO.: IT/04/4701 SUBJECT CODE: CS-218
UNIV. ROLL NO. 41708001 GROUP: A

CONFIGURING THE NETWORK NEIGHBOURHOOD

CONFIGURING THE
NETWORK
Under Control Panel / Network /
Identification make sure each computer has a
1 unique name.

Make sure that the Workgroup name is the


2 same for all computers.

Do not have any spaces in either the Computer


3 or Workgroup names. Keep them simple.

Select different IP address for each computer.


Use the same subnet mask. If you are
4 connecting to the internet, enter in the Gateway
and DNS IP addresses.

Click on the File and Print Sharing button and


check off whether you want share Files or
5 Printers.
DEPARTMENT OF INFORMATION TECHNOLOGY
NAME: AAKASH SAINI SUBJECT: SOFTWARE LAB IV(DC)
COLLEGE ROLL NO.: IT/04/4701 SUBJECT CODE: CS-218
UNIV. ROLL NO. 41708001 GROUP: A

To assign a (map) a drive letter to a network computer or folder

Notes
• You can also right-click Network Neighborhood , and then click Map Network Driver
• To map to a computer or folder you have used recently, click the arrow to the right of path , and then
click the resource you want.
In path, type the path to the you want. For example:
\\computername\foldername
If a password is required, windows prompts you.

To remove a drive-letter assignment


You can also right-click network Neighborhood, and then click Disconnect Network Drive.

To connect to another computer on your network


On your desktop, double-click Network neighborhood, and then double-click the computer you
want.
If you don’t see the computer you want, double-click Entire Network.
• If the Network Neighborhood window is empty or the icon is missing, network is not
available.you need to set up networking to connect to another computer on your network.

To see resource use on another computer


Double-click Network Neighborhood.
Click the name of the computer on which you`d like to view shared resources.
On the File menu, click Properties.
Click the tools tab, and then click Net Watcher.
On the Net watcher View menu, click the type of information you want to see.
• Before you can see resource use on another computer , it must first be set up for remote
administration.
• You must have administrator or access permission to view resource use on another computer.

To open a shared folder on another computer


Double-click Network Neighborhood , and then double-click the computer where the or located .
To see more computers, double-click Entire Network.
Double-click the folder you want to connect to .
• You may want to assign a drive letter for shared folders that you connect to often

To see what network printers and folders are available


Double-click network neighborhood .
To see additional printers and folders that are available, double-click Entire Network .
Double-click the computer whose you want to view .
• If you can’t see a resource on the network , you might not have access permission .
DEPARTMENT OF INFORMATION TECHNOLOGY
NAME: AAKASH SAINI SUBJECT: SOFTWARE LAB IV(DC)
COLLEGE ROLL NO.: IT/04/4701 SUBJECT CODE: CS-218
UNIV. ROLL NO. 41708001 GROUP: A

To use a shared network printer

Double-click Network Neighborhood, and then locate the computer with the printer you want
to use.
Click the computer with the printer you want, and then click the printer icon.
To set up the printer ,follow the instructions on the screen.
After you have set up a network printer ,you can use it were attached to your computer.
To see which computers have , on theView menu ,click Details ,and look for printer names or
descriptions in the Comment column.

To detach from a server by using Who Am I


Right –click Network Neighborhood ,and then click Who Am I.
Click the name of the server you want to detach from, and then click Detach.

Vous aimerez peut-être aussi