Académique Documents
Professionnel Documents
Culture Documents
90420305686
COMPUTER HARDWARE :
Hardware is the term used to describe the tangible parts of your computer system. This includes all of the devices, both internal and external, that connect to your computer so that it can perform all sorts of operations.
Usman Ghani
90420305686
Usman Ghani
90420305686
The control unit supervises all of the CPU's operations. It fetches the software instructions from the memory, and it also coordinates the times and order in which the instructions are carried out.
3. Registers:
Registers are special storage locations located inside the CPU. The data contained here can be accessed much quicker than the data contained in other memory locations, such as the RAM (random-access memory) and the ROM (read-only memory). Registers in different parts of the CPU are used for different functions.
4. Memory:
Memories are one of the most important parts of a computer system. The term memory refers to any device that can be used for storage. There are two basic ways to store memory. One way is to store the memory within the actual circuitry of the computer, which allows for it to be quickly accessed by the central processing unit. These memory devices are generally used for temporary storage of data and programs that are currently used by the CPU. The second type of memory storage is to store the memory in external storage devices. They include hard drives , floppy disks, and CD-ROMs.
2. Read-Only Memory
3
Usman Ghani
90420305686
Read- only memory, or ROM, stores permanent information. The data stored here can not be altered or changed in any way
3. Caches:
Caches are extremely fast, temporary memories. Sometimes, they are even located right within the CPU for extra-quick data retrieval!
4. Virtual Memory:
Virtual memory is a special memory that lets your computer handle many programs and applications with only a small amount of RAM
Usman Ghani
90420305686
Motherboard:
The motherboard is a very integral part of your computer system. The motherboard contains a complex array of circuits, chips, and wires. It is here that the most vital part of your computer system are located. Located on the motherboard are the:
1. Central Processing Unit (CPU) 2. Memory 3. System BIOs 4. System Bus Motherboards come in different sizes and shapes. Form factor is a term that relates to the physical shape and size of a motherboard. Two motherboards can have essentially the same components, but these parts can be arranged differently. Thus, the two motherboards would have different form factors. This section describes some of the more popular motherboard form factors. AT/Baby AT LPX/Mini LPX TX/Mini ATX NLX
Usman Ghani
90420305686
1. Magnetic Disk:
A magnetic disk's medium contains iron particles, which can be polarizedgiven a magnetic charge-in one of two directions.Each particle's direction represents a 1 (on) or 0 (off), representing each bit of data that the CPU can recognize. A disk drive uses read/write heads containing electromagnets to create magnetic charges on the medium.
2. Hard disk:
Data is stored by magnetising the surface of flat, circular plates called platters which have a surface that can be magnetized. They constantly rotate at very high speed. A read/write head floats on a cushion of air a fraction of a millimeter above the surface of the disc. The drive is inside a sealed unit because even a speck of dust could cause the heads to crash
3. Floppy disk:
In 1969 the first floppy disk was introduced. It was a read only 8 inch disk that could store 80kB of data. 4 years later, in 1973, the a similar floppy disk with the same size could store 256kB of data plus it was possible to write new data again and again. Since then the trend has been the same smaller floppy disks that could store more data. In the late 1990s you could get ahold of 3 inch disks that could store 250 MB of data. These can be found on most microcomputers and accept the usual 3.5 inch floppy discs. High density discs for a PC hold 1.44 MB of data (enough to store about 350 pages of A4 text). A floppy disc needs to be formatted before it can be used but most discs are now sold already formatted for PC's.
4. Magnetic Tape:
Magnetic tape is a medium for magnetic recording generally consisting of a thin magnetizable coating on a long and narrow strip of plastic. Nearly all recording tape is of this type, whether used for recording audio or video or for computer storage.
5. CD -Rom:
CD-ROM - means Compact Disc - Read Only Memory. This means you can only read from the disc, not write or store data onto it. They are also known as optical discs because the data is read by a laser beam reflecting or not reflecting from the disc surface. Like a floppy disc, a CD-ROM only starts spinning when requested and it has to spin up to the correct speed each time it is accessed. It is much faster to access than a floppy but it is currently slower than a hard disc.
Usman Ghani
90420305686
6. Photo CD:
Photo CD is a system designed by Kodak digitizing and storing photos in a CD. Launched in 1992 the discs were designed to hold nearly 100 high quality images, scanned prints and slides using special proprietary encoding. Photo CD discs are defined in the Beige Book and conform to the CD-ROM XA and CD-i Bridge specifications as well. They are intended to play on CD-i players, Photo CD players and any computer with the suitable software irrespective of the operating system The images can also be printed out on photographic paper with a special Kodak machine
Usman Ghani
90420305686
keyboard, or you can input data in picture form by using a scanner. On the other hand, output devices display the results of your computer's computations. Examples of these would be your computer's monitor, which displays all of the programs you're running, as well as the printer, which will print out a hard copy of the information!
2. Mouse:
Mouse have been around for some while now. Mouse are used to manuever the cursor on your computer screen to give instructions to your computer and to run programs and applications.
3. Scanner:
Scanners let you put pictures and images onto your computer. They convert pictures and iamges to digital form so that you can edit them by using the computer or put them on the Internet!
Usman Ghani
90420305686
4. Digital Camera:
Digital cameras are somewhat similar to regular cameras. You can take pictures of people, places, or things. However, digital cameras convert these pictures to digital form so they can be used on the computer.
Output Devices:
1. Monitor:
Your monitor is a fancy term for your computer screen. It displays the programs and applications you are running.
3. Printer:
Printers let you take documents, pictures, and other files and &quitrent" them out. They create a hard copy of these files on a piece of paper.
4. Audio Devices
Usman Ghani
90420305686
Sound effects and music are vital to the computer's success. Computer games are all equipped with amazing sound effects and music, while popular songs can be downloaded off the Internet. There are a few devices that make this possible.
a) Sound Cards:
Sound cards are devices that can record sound, playback sounds, or even manipulate sounds! They are a very important audio device.
b) Speakers:
Once you have recorded a sound file, you can use your speakers to listen to the music or other sound! Speakers change the electrical signals from your sound files and converts them into sound waves that we can hear.
5. Modems
Modem, a combination of the words modulator and demodulator, is a special device used to send data over a phone line to other computers! Most modems are connected to an ISP, or Internet Server Provider, which then connect us to the Internet and to the information super highway! In order to transfer information between computers via a phone line, the digital information of computers had to be translated into analog information, and then changed back to digital form when reaching its destination. This was done by modems. At one end, modems would modulate the data. This means that they would convert the data from digital form to a series of analog signals. Once the information successfully passed through the phone lines, another modem would demodulate the data- convert the data from analog form back to digital form.
10
Usman Ghani
90420305686
6. Connecting Cables
Computer system is made of a bunch of devices working together to get perform a certain function. Well, it makes sense that these devices all need some way to communicate with each other in order to function together. The cables we will describe in this section serve the purpose of connecting peripherals and other components of a computer system to each other, to the computer's memory, and to the computer's CPU.
11
Usman Ghani
90420305686
Computer networks may be classified according to the network topology upon which the network is based, such as bus network, star network, ring network, mesh network, star-bus network, tree or hierarchical topology network. Network topology signifies the way in which devices in the network see their logical relations to one another. Even if networked computers are physically placed in a linear arrangement, if they are connected via a hub, the network has a Star topology, rather than a bus topology. In this regard the visual and operational characteristics of a network are distinct; the logical network topology is not necessarily the same as the physical layout. Networks may be classified based on the method of data used to convey the data, these include digital and analog networks.
Network Connections
12
Usman Ghani
90420305686
A. Media:
Network media (sometimes referred to as networked media) refers to media mainly used in computer networks such as the Internet. Network media is essentially driven by technological development, emerging from the internet as a non-centralized medium in the late nineties, the term has more recently begun to be applied to both the arts and industry. The following features distinguish Network Media from classical media, such as broadcast media and the printed press:
Network Media is typically democratic and decentralized. The audience can also be the contributors. Network Media often requires the involvement of computers as an input/output device. Network media requires a community to participate and consume
With the rapidly increasing digital era, new aspects of digital networking are becoming more important. The benefits of the development of inter-networking ultimately has allowed for greater political, social comment and discussion but is also widely thought of in a much broader context of globalisation and the fragmentation of the world.
B. Topology:
13
Usman Ghani
90420305686
Network topology is the study of the arrangement or mapping of the elements(links, nodes, etc.) of a network, especially the physical (real) and logical (virtual) interconnections between nodes. A local area network (LAN) is one example of a network that exhibits both a physical topology and a logical topology. Any given node in the LAN will have one or more links to one or more other nodes in the network and the mapping of these links and nodes onto a graph results in a geometrical shape that determines the physical topology of the network. Likewise, the mapping of the flow of data between the nodes in the network determines the logical topology of the network. The physical and logical topologies might be identical in any particular network but they also may be different. Any particular network topology is determined only by the graphical mapping of the configuration of physical and/or logical connections between nodes. LAN Network Topology is, therefore, technically a part of graph theory. Distances between nodes, physical interconnections, transmission rates, and/or signal types may differ in two networks and yet their topologies may be identical.
C.
Sharing Information:
The term "information sharing" in the information technology lexicon has a long history. Traditional information sharing referred to one-to-one exchanges of data between a sender and receiver. These information exchanges are implemented via dozens of open and proprietary protocols, message and file formats. Electronic data interchange ("EDI") is a successful implementation of commercial data exchanges that began in the late 1970s and remains in use today. From the point of view of a computer scientist, the four primary information sharing design patterns are sharing information one-to-one, one-to-many, many-to-many, and many-toone. Technologies to meet all four of these design patterns are evolving and include blogs, wikis, really simple syndication, tagging, and chat.
14
Usman Ghani
90420305686
In a communications network, a network node equipped for interfacing with another network that uses different protocols. o A gateway may contain devices such as protocol translators, impedance matching devices, rate converters, fault isolators, or signal translators as necessary to provide system interoperability. It also requires the establishment of mutually acceptable administrative procedures between both networks. o A protocol translation/mapping gateway interconnects networks with different network protocol technologies by performing the required protocol conversions.
Gateways, also called protocol converters, can operate at any layer of the OSI model. The job of a gateway is much more complex than that of a router or switch. Typically, a gateway must convert one protocol stack into another.
B.
Hub:
A network hub or repeater hub is a device for connecting multiple twisted pair or fiber optic Ethernet devices together and thus making them act as a single network segment. Hubs work at the physical layer (layer 1) of the OSI model. The device is thus a form of multiport repeater. Repeater hubs also participate in collision detection, forwarding a jam signal to all ports if it detects a collision. Hubs also often come with a BNC and/or AUI connector to allow connection to legacy 10BASE2 or 10BASE5 network segments. The availability of low-priced network switches has largely
15
Usman Ghani
90420305686
rendered hubs obsolete but they are still seen in older installations and more specialized applications.
C.
Bridge:
A network bridge connects multiple network segments at the data link layer (layer 2) of the OSI model, and the term layer 2 switch is very often used interchangeably with bridge. Bridges are similar to repeaters or network hubs, devices that connect network segments at the physical layer; however, with bridging, traffic from one network is managed rather than simply rebroadcast to adjacent network segments. In Ethernet networks, the term "bridge" formally means a device that behaves according to the IEEE 802.1D standardthis is most often referred to as a network switch in marketing literature. Bridges tend to be more complex than hubs or repeaters. Bridges can analyze incoming data packets to determine if the bridge is able to send the given packet to another segment of the network.
D.
Switch:
16
Usman Ghani
90420305686
A network switch is a computer networking device that connects network segments. The term commonly refers to a Network bridge that processes and routes data at the Data link layer (layer 2) of the OSI model. Switches that additionally process data at the Network layer (layer 3 and above) are often referred to as Layer 3 switches or Multilayer switches. The term network switch does not generally encompass unintelligent or passive network devices such as hubs and repeaters. The first Ethernet switch was introduced by Kalpana in 1990.
E.
Router:
A router is a networking device whose software and hardware are usually tailored to the tasks of routing and forwarding information. For example, on the Internet, information is directed to various paths by routers. Routers connect two or more logical subnets, which do not necessarily map one-to-one to the physical interfaces of the router The term "layer 3 switch" often is used interchangeably with
17
Usman Ghani
90420305686
router, but switch is a general term without a rigorous technical definition. In marketing usage, it is generally optimized for Ethernet LAN interfaces and may not have other physical interface types. In comparison, a network hub does not do any routing, instead every packet it receives on one network line gets forwarded to all the other network lines.
Usman Ghani
90420305686
Under the structure of the client-server architecture, a business's computer network will have a server computer, which functions as the "brains" of the organization, and a group of client computers, which are commonly called workstations. The server part of the client-server architecture will be a large-capacity computer, perhaps even a mainframe, with a large amount of data and functionality stored on it. The client portions of the client-server architecture are smaller computers that employees use to perform their computer-based responsibilities. Businesses of various sizes have various computer needs. Larger businesses necessarily need to use more computers than smaller businesses do. Large businesses routinely have large computer setups, such as mainframes and networks. A network for a large business commonly has a clientserver architecture, also known as a two-tier architecture. No matter what it is called, this type of architecture is a division of labor for the computing functions required by a large business. Servers commonly contain data files and applications that can be accessed across the network, by workstations or employee computers. An employee who wants to access company-wide data files, for instance, would use his or her client computer to access the data files on the server. Other employees may use a common-access application by accessing the server through their client computers. This type of server is called an application server.It takes full advantage of the client-server architecture by using the server as a storage device for applications and requiring the clients to log in to the server in order to use those applications. Examples of this kind of application are numerous; among the most popular are word processors,spreadsheets, and graphic design programs. In each case, the use of the applications illustrates the client-server architecture. The server is not just for storage, however. Many networks have a client-server architecture in which the server acts as a processing power source as well. In this scenario, the client computers are virtually "plugged in" to the server and gain their processing power from it. In this way, a
19
Usman Ghani
90420305686
client computer can simulate the greater processing power of a server without having the requisite processor stored within its framework. Here, the client-server architecture describes a virtual sort of power plant. Even the World Wide Web is an example of client-server architecture. Each computer that uses a web browseris a client, and the data on the various Web pages that those clients access is stored on multiple servers.
20
Usman Ghani
90420305686
2)"N-port Ethernet switch" (where N is a number such as "4" or "5") or 3)"wired LAN ports" A mention of any of the above specs (and slight variations on these) indicate hybrid network capability. The majority of hybrid network routers allow connection of up to four wired devices. These can be 4 computers or any combination of computers and other Ethernet devices. Connecting an Ethernet hub to one of the router's ports allow more than 4 wired devices to be joined to the LAN through the method of daisy chaining. Wireless routers offering only one Ethernet port are generally incapable of hybrid networking. This one port will typically be reserved for use by the broadband modem and connection to the wide area network (WAN).
21
Usman Ghani
90420305686
1) DCC with Serial Port 2 )DCC with Parallel Port 3 )DCC with IR 4 )DCC with USB 5 )Windows Vista changes 6)References 8 )External links
Usman Ghani
90420305686
If using the serial ports of the computer, a null modem cable (or a null modem adapter connected to a standard serial cable) must be used to connect each of the two computers to communicate properly.
3) DCC with IR
Infrared communication ports, like the ones found on laptop computers (such as IrDA), can also be used.
both machines or causing a fire hazard. Therefore, Direct Cable Connection over USB is not possible; a USB link cable must be used, as seen in the Microsoft knowledge base article 814982. However, with a USB link cable, a program which supports data transfer using that cable must be used. Typically, such a program is supplied with the USB link cable. The DCC wizard or Windows Explorer cannot be used to transfer files over a USB link cable.
Usman Ghani
90420305686
A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. The defining characteristics of LANs, in contrast to wide-area networks (WANs), include their usually higher data-transfer rates, smaller geographic place, and lack of a need for leased telecommunication lines. ARCNET, Token Ring and many other technologies have been used in the past, and G.hn may be used in the future, but Ethernet over unshielded twisted pair cabling, and Wi-Fi are the two most common technologies currently in use.
History
As larger universities and research labs obtained more computers during the late 1960s, there was increasing pressure to provide high-speed interconnections. A report in 1970 from the Lawrence Radiation Laboratory detailing the growth of their "Octopus" network, gives a good indication of the situation. Cambridge Ring was developed at Cambridge University in 1974 but was never developed into a successful commercial product. Ethernet was developed at Xerox PARC in 19731975, and filed as U.S. Patent 4,063,220. In 1976, after the system was deployed at PARC, Metcalfe and Boggs published their seminal paper - "Ethernet: Distributed Packet-Switching For Local Computer Networks"
COMPONENTS OF LAN :
The three types lan components are:
Usman Ghani
90420305686
WIRELESS BRIDGES:
Locations closer to the centre of an access point radius will experience higher throughput than those that are closer to the outside of the cell coverage area. This is facilitated by auto shifting, which allows the data rate to downshift based on distance from access point. Again, this functionality will vary depending on the product and 802.11 standard used. One of the greatest benefits to roaming mobile users is the ability for one access point to hand off communication to the next access point in the roaming cell.
25
Usman Ghani
90420305686
The physical topology of a network refers to the configuration of cables, computers, and other peripherals. Physical topology should not be confused with logical topology which is the method used to pass information between workstations. MAIN TYPES OF PHYSICAL TOPOLOGIES: The following sections discuss the physical topologies used in networks and other related topics.
Linear Bus Star Star-Wired Ring Tree Considerations When Choosing a Topology Summary Chart
LINEAR BUS:
A linear bus topology consists of a main run of cable with a terminator at each end. All nodes (file server, workstations, and peripherals) are connected to the linear cable. Ethernet and LocalTalk networks use a linear bus topology.
Easy to connect a computer or peripheral to a linear bus. Requires less cable length than a star topology.
Entire network shuts down if there is a break in the main cable. Terminators are required at both ends of the backbone cable.
26
Usman Ghani
90420305686
Difficult to identify the problem if the entire network shuts down. Not meant to be used as a stand-alone solution in a large building.
STAR:
A star topology is designed with each node (file server, workstations, and peripherals) connected directly to a central network hub or concentrator (See fig. 2). Data on a star network passes through the hub or concentrator before continuing to its destination. The hub or concentrator manages and controls all functions of the network. It also acts as a repeater for the data flow. This configuration is common with twisted pair cable; however, it can also be used with coaxial cable or fiber optic cable.
Easy to install and wire. No disruptions to the network then connecting or removing devices. Easy to detect faults and to remove parts.
Disadvantages of a Star Topology Requires more cable length than a linear topology. If the hub or concentrator fails, nodes attached are disabled. More expensive than linear bus topologies because of the cost of the concentrators.
The protocols used with star configurations are usually Ethernet or LocalTalk. Token Ring uses a similar topology, called the star-wired ring.
27
Usman Ghani
90420305686
STAR WIRED RING: A star-wired ring topology may appear (externally) to be the same as a star topology. Internally, the MAU (multistation access unit) of a star-wired ring contains wiring that allows information to pass from one device to another in a circle or ring (See fig. 3). The Token Ring protocol uses a star-wired ring topology.
TREE:
A tree topology combines characteristics of linear bus and star topologies. It consists of groups of star-configured workstations connected to a linear bus backbone cable (See fig. 4). Tree topologies allow for the expansion of an existing network, and enable schools to configure a network to meet their needs.
Point-to-point wiring for individual segments. Supported by several hardware and software venders.
Overall length of each segment is limited by the type of cabling used. If the backbone line breaks, the entire segment goes down. More difficult to configure and wire than other topologies.
RING:
28
Usman Ghani
90420305686
In a ring network, every device has exactly two neighbors for communication purposes. All messages travel through a ring in the same direction (either "clockwise" or "counterclockwise"). A failure in any cable or device breaks the loop and can take down the entire network. To implement a ring network, one typically uses FDDI, SONET, or Token Ring technology. Ring topologies are found in some office buildings or school campuses.
MESH TOPOLOGY: Mesh topologies involve the concept of routes. Unlike each of the previous topologies, messages sent on a mesh network can take any of several possible paths from source to destination. (Recall that even in a ring, although two cable paths exist, messages can only travel in one direction.) Some WANs, most notably the Internet, employ mesh routing. A mesh network in which every device connects to every other is called a full mesh. As shown in the illustration below, partial mesh networks also exist in which some devices connect only indirectly to others.
HYBRID TOPOLOGY:
29
Usman Ghani
90420305686
A combination of any two or more network topologies. Note 1: Instances can occur where two basic network topologies, when connected together, can still retain the basic network character, and therefore not be a hybrid network. For example, a tree network connected to a tree network is still a tree network. Therefore, a hybrid network accrues only when two basic networks are connected and the resulting network topology fails to meet one of the basic topology definitions. For example, two star networks connected together exhibit hybrid network topologies. Note 2: A hybrid topology always accrues when two different basic network topology.
30
Usman Ghani
90420305686
31
Usman Ghani
90420305686
Guided Transmission Media uses a "cabling" system that guides the data signals along a specific path. The data signals are bound by the "cabling" system. Guided Media is also known as Bound Media. Cabling is meant in a generic sense in the previous sentences and is not meant to be interpreted as copper wire cabling only. There 4 basic types of Guided Media: 1) Open Wire: Open Wire is traditionally used to describe the electrical wire strung along power poles. There is a single wire strung between poles. No shielding or protection from noise interference is used. We are going to extend the traditional definition of Open Wire to include any data signal path without shielding or protection from noise interference. This can include multiconductor cables or single wires. This media is susceptible to a large degree of noise and interference and consequently not acceptable for data transmission except for short distances under 20 ft.
2) Twisted Pair Cable: Twisted pair cabling is a form of wiring in which two conductors (the forward and return conductors of a single circuit) are twisted together for the purposes of canceling out electromagnetic interference (EMI) from external sources; for instance, electromagnetic radiation from unshielded twisted pair (UTP) cables, and crosstalk between neighboring pairs. The wires in Twisted Pair cabling are twisted together in pairs. Each pair would consist of a wire used for the +ve data signal and a wire used for the -ve data signal. Any noise that appears on 1 wire of the pair would occur on the other wire. Because the wires are opposite polarities, they are 180 degrees out of phase (180 degrees - phasor definition of opposite polarity). When the noise appears on both wires, it cancels or nulls itself out at the receiving end. Twisted Pair cables are most effectively used in systems that use a balanced line method
32
Usman Ghani
90420305686
of transmission: polar line coding (Manchester Encoding) as opposed to unipolar line coding (TTL logic).
Twisted pair cables were first used in telephone systems by Alexander Graham Bell in 1881. By 1900, the entire American telephone line network was either twisted pair or open wire with similar arrangements to guard against interference. Today, most of the millions of kilometres of twisted pairs in the world are outdoor landlines, owned by telephone companies, used for voice service, and only handled or even seen by telephone workers.
Cable Shielding:
Twisted pair cables are often shielded in attempt to prevent electromagnetic interference. Because the shielding is made of metal, it may also serve as a ground. However, usually a shielded or a screened twisted pair cable has a special grounding wire added called a drain wire. This shielding can be applied to individual pairs, or to the collection of pairs. When shielding is applied to the collection of pairs, this is referred to as screening. The shielding must be grounded for the shielding to work.
33
Usman Ghani
90420305686
Screened unshielded twisted pair (S/UTP) Also known as Fully shielded] (or Foiled) Twisted Pair (FTP), is a screened UTP cable (ScTP). Shielded twisted pair (STP or STP-A) STP cabling includes metal shielding over each individual pair of copper wires. This type of shielding protects cable from external EMI (electromagnetic interferences). e.g. the 150 ohm shielded twisted pair cables defined by the IBM Cabling System specifications and used with token ring networks. Screened shielded twisted pair (S/STP or S/FTP) S/STP cabling, also known as Screened Fully shielded Twisted Pair (S/FTP), is both individually shielded (like STP cabling) and also has an outer metal shielding covering the entire group of shielded copper pairs (like S/UTP). This type of cabling offers the best protection from interference from external sources, and also eliminates alien crosstalk.
Coaxial Cable:
Coaxial Cable consists of 2 conductors. The inner conductor is held inside an insulator with the other conductor woven around it providing a shield. An insulating protective coating called a jacket covers the outer conductor. The outer shield protects the inner conductor from outside electrical signals. The distance between the outer conductor (shield) and inner conductor plus the type of material used for insulating the inner conductor determine the cable properties or impedance. Typical impedances for coaxial cables are 75 ohms for Cable TV, 50 ohms for Ethernet Thinnet and Thicknet. The excellent control of the impedance characteristics of the cable allow higher data rates to be transferred than Twisted Pair cable.
Usman Ghani
90420305686
An optical fiber cable is a cable containing one or more optical fibers. The optical fiber elements are typically individually coated with plastic layers and contained in a protective tube suitable for the environment where the cable will be deployed. Optical Fibre consists of thin glass fibres that can carry information at frequencies in the visible light spectrum and beyond. The typical optical fibre consists of a very narrow strand of glass called the Core. Around the Core is a concentric layer of glass called the Cladding. A typical Core diameter is 62.5 microns (1 micron = 10-6 meters). Typically Cladding has a diameter of 125 microns. Coating the cladding is a protective coating consisting of plastic, it is called the Jacket.
35
Usman Ghani
90420305686
Ionosphere:
The ionosphere is the uppermost part of the atmosphere, distinguished because it is ionized by solar radiation. It plays an important part in atmospheric electricity and forms the inner edge of the magnetosphere. It has practical importance because, among other functions, it influences radio propagation to distant places on the Earth. It is located in the Thermosphere.
Line Of Sight:
Line-of-sight propagation refers to electro-magnetic radiation including light emissions traveling in a straight line. The rays or waves are diffracted, refracted, reflected, or absorbed by atmosphere and obstructions with material and generally cannot travel over the horizon or behind obstacles. Especially radio signals, at low frequencies (below approximately 2 MHz or so) these signals travel as ground waves, which follow the Earth's curvature due to diffraction with the layers of atmosphere. This enables AM radio signals in low-noise environments to be received well after the transmitting antenna has dropped below the horizon.
36
Usman Ghani
90420305686
1) Microwave:
Microwaves are electromagnetic waves with wavelengths ranging from 1mm - 1m, or frequencies between 0.3 GHz and 300 GHz. As a consequence, practical microwave technique tends to move away from the discrete resistors, capacitors, and inductors used with lower frequency radio waves. Instead, distributed circuit elements and transmission-line theory are more useful methods for design and analysis. Open-wire and coaxial transmission lines give way to waveguides, and lumped-element tuned circuits are replaced by cavity resonators or resonant lines. Effects of reflection, polarization, scattering, diffraction and atmospheric absorption usually associated with visible light are of practical significance in the study of microwave propagation. The same equations of electromagnetic theory apply at all frequencies. Electromagnetic waves longer (lower frequency) than microwaves are called "radio waves". Electromagnetic radiation with shorter wavelengths may be called "millimeter waves", terahertz radiation or even T-rays. Definitions differ for millimeter wave band, which the IEEE defines as 110 GHz to 300 GHz.
2) Satellite:
In the context of spaceflight, a satellite is an object which has been placed into orbit by human endeavor. Such objects are sometimes called artificial satellites to distinguish them from natural satellites such as the Moon.
37
Usman Ghani
90420305686
Wireless networks:
Wireless network refers to any type of computer network that is wireless, and is commonly associated with a telecommunications network whose interconnections between nodes is implemented without the use of wires. Wireless telecommunications networks are generally implemented with some type of remote information transmission system that uses electromagnetic waves, such as radio waves, for the carrier and this implementation usually takes place at the physical level or "layer" of the network. Types of wireless network are:
Wireless LAN:
A wireless LAN (WLAN) is a wireless local area network that links two or more computers or devices using spread-spectrum or OFDM modulation technology based to enable communication between devices in a limited area. This gives users the mobility to move around within a broad coverage area and still be connected to the network. For the home user, wireless has become popular due to ease of installation, and location freedom with the gaining popularity of laptops. Large wireless network projects are being put up in many major cities. Google is even providing a free service to Mountain View, California and has entered a bid to do the same for San Francisco. New York City has also begun a pilot program to cover all five boroughs of the city with wireless Internet access.
Wireless MAN:
A MAN is optimized for a larger geographical area than a LAN, ranging from several blocks of buildings to entire cities. MANs can also depend on communications channels of moderate-tohigh data rates. A MAN might be owned and operated by a single organization, but it usually will be used by many individuals and organizations. MANs might also be owned and operated as public utilities. They will often provide means for internetworking of local networks. Metropolitan area networks can span up to 50km, devices used are modem and wire/cable. A Metropolitan Area Network (MAN) is a large computer network that spans a metropolitan area or campus. Its geographic scope falls between a WAN and LAN. MANs provide Internet connectivity for LANs in a metropolitan region, and connect them to wider area networks like the Internet.
38
Usman Ghani .
90420305686
39
Usman Ghani
90420305686
Click on the TCP/IP Ethernet adapter. Choose Properties. The TCP/IP Properties box will appear.
40
Usman Ghani
90420305686
41
Usman Ghani
90420305686
Ensure that NO gateways are installed. Click the DNS configuration tab. Check Disable DNS. Now restart the system if asked, or necessary.
Open Netscape Select Edit Select Preferences Select Advanced Select Proxies Check Automatic Proxy configuration. Click OK
42
Usman Ghani
90420305686
Netscape is now configured. The first time you access a web address outside the University of Queensland domain, you will be prompted for a username and a password.
Once successfully authenticated you will be able to browse other web sites. Internet Explorer configuration
Open Internet Explorer Select Tools Select Internet Options. A drop-down box will appear. Select Connections from the Internet Options box. Click LAN settings. A drop-down box will appear. Check Use Automatic configuration script.
EXPERIMENT: 7
43
Usman Ghani
90420305686
Usman Ghani
90420305686
Due to their speed, cost and ubiquity, fast Ethernet and (since 1998) Gigabit Ethernet have largely made FDDI redundant.
FRAME RELAY
45
Usman Ghani
90420305686
In the context of computer networking, frame relay consists of an efficient data transmission technique used to send digital information. It is a message forwarding "relay race" like system in which data packets, called frames, are passed from one or many start-points to one or many destinations via a series of intermediate node points. Network providers commonly implement frame relay for voice and data as an encapsulation technique, used between local area networks (LANs) over a wide area network (WAN). Each end-user gets a private line (or leased line) to a frame-relay node. The frame-relay network handles the transmission over a frequently-changing path transparent to all end-users.
HDLC High-Level Data Link Control (HDLC) is a bit-oriented synchronous data link layer protocol developed by the International Organization for Standardization (ISO). The current standard for HDLC is ISO 13239.HDLC provides both connection-oriented and connectionless service. HDLC can be used for point to multipoint connections, but is now used almost exclusively to connect one device to another, using what is known as Asynchronous Balanced Mode (ABM). The original master-slave modes Normal Response Mode (NRM) and Asynchronous Response Mode (ARM) are rarely used.
Usman Ghani
90420305686
PPP is used over many types of physical networks including serial cable, phone line, trunk line, cellular telephone, specialized radio links, and fiber optic links such as SONET. PPP is commonly used as a data link layer protocol for connection over synchronous and asynchronous circuit. PPP was designed to work with numerous network layer protocols, including Internet Protocol (IP), Novell's Internetwork Packet Exchange (IPX), NBF and AppleTalk. PPP is also used over broadband connections.
Usman Ghani
90420305686
UDP The User Datagram Protocol (UDP) is one of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer applications can send messages, in this case referred to as datagrams, to other hosts on an Internet Protocol (IP) network without requiring prior communications to set up special transmission channels or data paths. UDP is sometimes called the Universal Datagram Protocol. UDP uses a simple transmission model without implicit hand-shaking dialogues for guaranteeing reliability, ordering, or data integrity. Thus, UDP provides an unreliable service and datagrams may arrive out of order, appear duplicated, or go missing without notice. UDP stateless nature is also useful for servers that answer small queries from huge numbers of clients. Unlike TCP, UDP is compatible with packet broadcast (sending to all on local network) and multicasting (send to all subscribers). Common network applications that use UDP include: the Domain Name System (DNS), streaming media applications such as IPTV, Voice over IP (VoIP), Trivial File Transfer Protocol (TFTP) and many online games.
Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. Its use for retrieving inter-linked resources led to the establishment of the World Wide Web. HTTP is a request/response standard of a client and a server. A client is the end-user, the server is the web site. The client making a HTTP requestusing a web browser, spider, or other end-user toolis referred to as the user agent. The responding serverwhich stores or creates resources such as HTML files and imagesis called the origin server. In between the user agent and origin server may be several intermediaries, such as proxies, gateways, and tunnels. IMAP The Internet Message Access Protocol or IMAP is one of the two most prevalent Internet standard protocols for e-mail retrieval, the other being POP3. Virtually all modern e-mail clients and servers support both protocols as a means of transferring e-mail messages from a server, such as those used by Gmail, to a client, such as Mozilla Thunderbird, Apple Mail and Microsoft Outlook. Once configured, the client's use of such protocols remains transparent to the user.
48
Usman Ghani
90420305686
SMTP Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (e-mail) transmission across Internet Protocol (IP) networks. While electronic mail server software uses SMTP to send and receive mail messages, user-level client mail applications typically only use SMTP for sending messages to a mail server for relaying. For receiving messages, client applications usually use either the Post Office Protocol (POP) or the Internet Message Access Protocol (IMAP) to access their mail box accounts on a mail server.
You can also right-click Network Neighborhood, and then click Map Network Drive. To map to a computer or folder you have recently used, click the arrow to the right of the path, and then click the resource you want.
49
Usman Ghani
90420305686
You can also right-click Network Neighborhood, and then click Disconnect Network Drive.
On your desktop, double-click Network Neighborhood, and then double-click the computer you want. If you dont see the computer you want, double-click Entire Network. If the Network Neighborhood window is empty or the icon is missing, network is not available. You need to set up networking to connect to another computer on the network.
Double-click the Network Neighborhood. Click the name of the computer on which youd like to view shared resources. On the File menu, click Properties. Click the Tools tab, and then click Net Watcher. On the Net Watcher view menu, click the type of information you want to see. Before you can see resource use on another computer, it must first be setup for remote administration. You must have an administrator or access permission to view the resource use on another computer.
Double-click Network Neighborhood, and then double-click the computer where the data is located. To see more computers, double-click Entire Network. Double-click the folder you want to connect to. You may want to assign a drive letter for shared folders that you connect too often.
Double-click Network Neighborhood. To see additional printers and folders that are available, double-click Entire Network. Double-click the computer whose data you want to view. If you cant see a resource on the network, you might not have an access permission.
50
Usman Ghani
90420305686
51