Vous êtes sur la page 1sur 31

Computer Systems and Networks

Indrajith Hapuarachchie agmit@smib.lk

Computer Hardware
Types of Computers
Super Computers Extremely powerful computers With massive computing power Large banks of processors Used for scientific purposes Mainframe Computers Very large and powerful Hundreds of simultaneous users Kept in data centers Temp. Humidity and dust is controlled Specialized computer operators use them
2

Vid

Computer Hardware
Types of Computers
Mini Computers Much smaller Fewer than 100 users Can be used in office environment Staff can use it after training Micro Computers ( PC / workstation) On desktop Generally one user Connected to a network (W/S) or can be standalone (PC)

Computer Hardware
Servers Powerful micro computers (PC servers ) That server applications (web servers ) Routers Are computers or computer software that looks at the

destination of information and determines how best to get it there Allows the connectivity of two different type of networks (LAN to WAN )
Gateways / Communication servers Connect LAN to WAN Connect different types of LANs Repeaters Amplifies the signal Bridges Connect two LANS of same type to each other
4

Computer Hardware
Standards and Protocols There should be a standard to allow communication between computers and this is called Protocols Most are governed by OSI (Open System Interconnection ) model developed by ISO

Computer Hardware
OSI reference Model

Vid

Computer Hardware
Computer Addresses IP Address

Eg. 203.118.0.1 , 192.168.50.1, 172.16.5. Address of each computer in the network Internet routable addresses (Public IP) LAN only addresses ie. Private IP addresses
10.0.0.0 through 10.255.255.255 172.16.0.0 through 172.31.255.255 192.168.0.0 through 192.168.255.255

URL Uniform Resource Locator


Used instead of IP addresses Central list is used to translate URLs in to IPs Domain Name Servers (DNS)

Computer Hardware
Components of a URL
Protocol Host name Port number (FTP 20,21,telnet 23, smtp 25, pop3

110, http 80, 53 Dns) Directory/ path File name


http://www.cbsl.gov.lk/htm/english/04_mp/mp.

html http://www.smib.lk:8080/user/Login.jsp
8

Computer Hardware
HTTP (Hyper Text Transfer Protocol ) Basic communication mechanisum in the web Four stages of information retrieval
Connect Connection between the web client ( browser ) and web server (site) is made Request Request an object from the server Respond Responds to the request Disconnect

Separate connection is made for each object


9

Computer Hardware
Cookies
HTTP is a stateless protocol No information is maintained across series of connections between the server and the client No way to know that we have already connected to

a particular web site This was over come by placing a small file in the users computer with values Privacy issues are associated with cookies

10

LAN & WAN Local Area Network Components


File server SAN architecture to attach remote computer storage devices (such as disk arrays, tape libraries, and optical jukeboxes) to servers in such a way that the devices appear as locally attached to the operating system NAS uses file-based protocols such as NFS where it is clear that the storage is remote, and computers request a portion of an abstract file rather than a disk block

11

LAN & WAN


Local Area Network Components
Print server
Print spooling

Microcomputers (PC or W/S) Gateway to connect other LANs or WAN Repeaters to extend the LAN Bridges and routers to connect to other LANs

12

BUS LAN
Most simplest network

Use of Carrier Sense Multiple Access with Collision Detect (CSMA/CD)


13

STAR LAN

Use of Carrier Sense Multiple Access with Collision Detect (CSMA/CD)


14

Ring LAN
Multi-station Access Unit MAU

15

Use of Token to pass data

Wide Area Network - WAN


Simple WAN

Modem

Modem

Multiplexor
Modem Modem Multiplexor Main Frame

16

Multiplexed WAN

WAN Technology
Multiplexing Frequency Division Multiplexing (FDM)
Transmit all of the signals along


17

the same high speed link simultaneously Each signal set at a different frequency. Frequency overlap must be avoided Operates similar way to radio broadcasting In order to prevent signal overlap there are strips of frequency that separate the signals called guard bands.

WAN Technology
Multiplexing Time Division Multiplexing (TDM)
Multiplexor collect and store the incoming

transmissions and allocating a time slice on the fast link to each in turn. Messages are sent down the high speed link one after the other.
Two ways of implementing TDM are:
Synchronous TDM Asynchronous TDM

18

WAN Technology
Multiplexing Time Division Multiplexing (TDM)
Synchronous TDM Gives exactly the same amount of time to each device even if a device has nothing to transmit Asynchronous TDM Length of time allocated is not fixed for each device Time is given to devices that have data to transmit. Works by tagging each frame with an identification number to note which device it belongs to.

19

WAN Technology
Packet Switched

Networks
Data is Broken in to

small parts called packets Packets are given the IP address that they should reach Then they are dropped to the network They will use the best path to reach the destination
20

Complex Networks

21

Internet Technology
Hypertext Mark-up Language (HTML)
Form of text Information includes links Used to connect to another page Load more information like pictures, video etc.

Vid

XML (Extensible Markup Language) Is a set of rules for encoding documents in machinereadable form It is a textual data format

22

Internet Technology
Java & ActiveX
Java Programming language Browsers have inbuilt java interpreters Is a object-oriented programming language (OOP) Can be run on any platform It runs on Java Run time environment Features Increased Interaction Graphics Reduced Server Load

23

Internet Technology
Java Applets
Is a Java Program specifically written for the

browsers Strictly controlled access to host machine


Can not normally read or write files to the computer

Java Script
Programming script that can be embedded in HTML Developed by Netscape ( this is different to java

programming ) Used to provide dynamic content in web pages

24

Internet Technology
JavaBeans
Reusable components of java programming Created by JavaSoft (business unit of SUN)

Application Programming Interface (API)


This is where JavaBeans comes in JavaBeans offers platform independent and

Architecture independent API for java software


ActiveX
Microsofts answer to Java

25

Other Devices
Mobile Telephones
SMS
GSM WAP ( Wireless

application protocol)
Strips complex graphics

from websites Slow

3G (3rd Generation

telephony)

26

Vid N95

Other Devices
How WAP works

27

Other Devices
Use of 3G in Enterprises

28

Other Devices
Bluetooth
is an open wireless technology standard for exchanging data over short distances (using

short length radio waves) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security

29

Other Devices
Bluetooth Network

30

Computer Threats
From Viruses to Cybercrime In the past, PCs were mainly under threat from

31

viruses and worms. The main purpose of these programs was to spread; however, some programs were also designed to cause damage to files and PCs. Such malicious software, or malware, could be described as cyber vandalism. In the majority of cases, the goal of viruses and worms was to spread as much as possible, with a high infection rate leading to fame for that program. But in recent years, the situation has changed drastically. Today, the biggest threat faced by computers is crimeware. This malicious software is written by cybercriminals with the purpose of making money illegally. Crimeware may take the form of viruses, worms, Trojans or other malicious programs.

Vous aimerez peut-être aussi