Académique Documents
Professionnel Documents
Culture Documents
Computer Hardware
Types of Computers
Super Computers Extremely powerful computers With massive computing power Large banks of processors Used for scientific purposes Mainframe Computers Very large and powerful Hundreds of simultaneous users Kept in data centers Temp. Humidity and dust is controlled Specialized computer operators use them
2
Vid
Computer Hardware
Types of Computers
Mini Computers Much smaller Fewer than 100 users Can be used in office environment Staff can use it after training Micro Computers ( PC / workstation) On desktop Generally one user Connected to a network (W/S) or can be standalone (PC)
Computer Hardware
Servers Powerful micro computers (PC servers ) That server applications (web servers ) Routers Are computers or computer software that looks at the
destination of information and determines how best to get it there Allows the connectivity of two different type of networks (LAN to WAN )
Gateways / Communication servers Connect LAN to WAN Connect different types of LANs Repeaters Amplifies the signal Bridges Connect two LANS of same type to each other
4
Computer Hardware
Standards and Protocols There should be a standard to allow communication between computers and this is called Protocols Most are governed by OSI (Open System Interconnection ) model developed by ISO
Computer Hardware
OSI reference Model
Vid
Computer Hardware
Computer Addresses IP Address
Eg. 203.118.0.1 , 192.168.50.1, 172.16.5. Address of each computer in the network Internet routable addresses (Public IP) LAN only addresses ie. Private IP addresses
10.0.0.0 through 10.255.255.255 172.16.0.0 through 172.31.255.255 192.168.0.0 through 192.168.255.255
Computer Hardware
Components of a URL
Protocol Host name Port number (FTP 20,21,telnet 23, smtp 25, pop3
html http://www.smib.lk:8080/user/Login.jsp
8
Computer Hardware
HTTP (Hyper Text Transfer Protocol ) Basic communication mechanisum in the web Four stages of information retrieval
Connect Connection between the web client ( browser ) and web server (site) is made Request Request an object from the server Respond Responds to the request Disconnect
Computer Hardware
Cookies
HTTP is a stateless protocol No information is maintained across series of connections between the server and the client No way to know that we have already connected to
a particular web site This was over come by placing a small file in the users computer with values Privacy issues are associated with cookies
10
11
Microcomputers (PC or W/S) Gateway to connect other LANs or WAN Repeaters to extend the LAN Bridges and routers to connect to other LANs
12
BUS LAN
Most simplest network
STAR LAN
Ring LAN
Multi-station Access Unit MAU
15
Modem
Modem
Multiplexor
Modem Modem Multiplexor Main Frame
16
Multiplexed WAN
WAN Technology
Multiplexing Frequency Division Multiplexing (FDM)
Transmit all of the signals along
17
the same high speed link simultaneously Each signal set at a different frequency. Frequency overlap must be avoided Operates similar way to radio broadcasting In order to prevent signal overlap there are strips of frequency that separate the signals called guard bands.
WAN Technology
Multiplexing Time Division Multiplexing (TDM)
Multiplexor collect and store the incoming
transmissions and allocating a time slice on the fast link to each in turn. Messages are sent down the high speed link one after the other.
Two ways of implementing TDM are:
Synchronous TDM Asynchronous TDM
18
WAN Technology
Multiplexing Time Division Multiplexing (TDM)
Synchronous TDM Gives exactly the same amount of time to each device even if a device has nothing to transmit Asynchronous TDM Length of time allocated is not fixed for each device Time is given to devices that have data to transmit. Works by tagging each frame with an identification number to note which device it belongs to.
19
WAN Technology
Packet Switched
Networks
Data is Broken in to
small parts called packets Packets are given the IP address that they should reach Then they are dropped to the network They will use the best path to reach the destination
20
Complex Networks
21
Internet Technology
Hypertext Mark-up Language (HTML)
Form of text Information includes links Used to connect to another page Load more information like pictures, video etc.
Vid
XML (Extensible Markup Language) Is a set of rules for encoding documents in machinereadable form It is a textual data format
22
Internet Technology
Java & ActiveX
Java Programming language Browsers have inbuilt java interpreters Is a object-oriented programming language (OOP) Can be run on any platform It runs on Java Run time environment Features Increased Interaction Graphics Reduced Server Load
23
Internet Technology
Java Applets
Is a Java Program specifically written for the
Java Script
Programming script that can be embedded in HTML Developed by Netscape ( this is different to java
24
Internet Technology
JavaBeans
Reusable components of java programming Created by JavaSoft (business unit of SUN)
25
Other Devices
Mobile Telephones
SMS
GSM WAP ( Wireless
application protocol)
Strips complex graphics
3G (3rd Generation
telephony)
26
Vid N95
Other Devices
How WAP works
27
Other Devices
Use of 3G in Enterprises
28
Other Devices
Bluetooth
is an open wireless technology standard for exchanging data over short distances (using
short length radio waves) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security
29
Other Devices
Bluetooth Network
30
Computer Threats
From Viruses to Cybercrime In the past, PCs were mainly under threat from
31
viruses and worms. The main purpose of these programs was to spread; however, some programs were also designed to cause damage to files and PCs. Such malicious software, or malware, could be described as cyber vandalism. In the majority of cases, the goal of viruses and worms was to spread as much as possible, with a high infection rate leading to fame for that program. But in recent years, the situation has changed drastically. Today, the biggest threat faced by computers is crimeware. This malicious software is written by cybercriminals with the purpose of making money illegally. Crimeware may take the form of viruses, worms, Trojans or other malicious programs.