Your SlideShare is downloading. ×
Learning&Teaching Systems Ppt
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Learning&Teaching Systems Ppt

1,715
views

Published on

Published in: Technology, Art & Photos

1 Comment
0 Likes
Statistics
Notes
  • Be the first to like this

No Downloads
Views
Total Views
1,715
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
51
Comments
1
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Outcome 1 - Contents
    • 1 Data Representation
    • 2 Computer Structure
    • 3 Computer Performance
    • 4 Peripherals
    • 6 Using Networks
    • 7 Computer Software
    • 8 Supporting Software
    • 5 Networking
  • 2. 1 Data Representation 1.1 Introduction
    • Lowest level in computer only binary numbers can be used.
    • We work in base 10.
    • Computer must be able to process +ive and –ive, very large and very small numbers.
    • We look at how the computer uses numbers to represent text and graphics
  • 3. 1 Data Representation 1.2.1 Decimal Numbers
    • We use base 10
    • When expressing large numbers in terms of powers of 10 the following abbreviations are used:
    • 10 1 = 10
    • 10 2 = 100
    • 10 3 = 1000 = 1 kilo
    • 10 6 = 1,000,000 = 1 Mega
    • 10 9 = 1,000,000,000 = 1 Giga
    • 10 12 = 1,000,000,000,000 = 1 Tera
  • 4. 1 Data Representation 1.2.1 BinaryNumbers Computers work in number base 2 which uses 2 symbols, 0 and 1 to represent a value. In computing systems, large numbers are expressed in terms of powers of 2 and use the following abbreviations: 2 1 has a decimal equivalent of 2 2 2 has a decimal equivalent of 4 2 3 has a decimal equivalent of 8 2 4 has a decimal equivalent of 16 2 5 has a decimal equivalent of 32 2 6 has a decimal equivalent of 64 2 7 has a decimal equivalent of 128 2 8 has a decimal equivalent of 256 2 9 has a decimal equivalent of 512 2 10 has a decimal equivalent of 1024 and is abbreviated to 1 kilo 2 20 has a decimal equivalent of 1,048,576 and is abbreviated to 1 Mega 2 30 has a decimal equivalent of 1,073,741,824 and is abbreviated to 1 Giga 2 40 has a decimal equivalent of 1,099,511,627,776 and is abbreviated to 1 Tera
  • 5. 1 Data Representation 1.2.2 Decimal to Binary
        • How to convert decimal to binary e.g. 29
    Giving 11101
    • Using 1 byte for storage gives 256 possible numbers.
    • 2 byte gives 65536, 0-65535
    • Increasing the size of the storage for numeric data increases the range of numbers which can be stored.
    R1 0 2 R1 1 2 R1 3 2 R0 7 2 R1 14 2 29 2
  • 6. 1 Data Representation 1.2.3 Binary to Decimal
      • Numbers converted to binary – number base 2
      • Example of 154 represented as a binary number
    =154 +0 +2 +0 +8 +16 +0 +0 128 0 1 0 1 1 0 0 1 1 2 4 8 16 32 64 128
  • 7. 1 Data Representation 1.2.4 Hexadecimal Long binary numbers can be difficult to read correctly. Computers have memory addresses of 2 or 4 bytes long which give addresses of 16 or 32 bits. Hexadecimal is base 16 and organises the bits into groups of four. The conversion between base 2 and base 16 is very simple. Hex needs the digits 0-9 and letters A-F. E.g. 11010100010110010011001010010110 becomes 1101 0100 0101 1001 0011 0010 1001 0110 which in Hex is D459 3256
  • 8. 1 Data Representation 1.2.5 Why Binary
    • Logic circuits based on two state logic – use only 0 and 1.
    • We only need two voltages 0 and a voltage of any value = 1
    • There are only 4 rules of arithmetic with binary (100 in base 10).
    • Robust – can cope with degradation of signal.
  • 9. Data Representation 1.2.6 & 1.2.7 Integers
    • Positive numbers
      • Converted directly to binary
      • 2 bytes = 16 bits gives 0 to 2 16 -1 or 0 to 65535
      • n bytes gives n*8 bits - 2 n*8 - 1
    • Negative Numbers
      • 2 16 : Same range but –32768 to 32767
      • Using sign bit 0 +ive and 1 –ive e.g. 011 = 3 and 111 = -3
        • Sign and magnitude does not work because:
        • Addition does not work properly (-5+-10 gives 15)
        • Two 0’s (00000000 and 10000000)
  • 10. Data Representation 1.2.8 Twos Complement
      • Two’s Complement is another way of representing negative numbers.
      • Addition works and there is only one zero
      • All 0’s are converted to 1’s and 1’s to 0’s then 1 is added.
      • To convert 5 to –5
    OR 5 OR -5 0 +1 1 0 1 1 1 1 1 1 1 0 1 1 1 1 1 1 0 1 0 0 0 0 0
  • 11. Data Representation 1.2.9 Real Numbers
    • Real numbers are stored as floating point or scientific notation. Numbers stored as base and exponent.
    • E.g 34008.6 is .340086*10 5
    • In binary 1101.1001 is .11011001*2 100 (the 4is 100 in binary)
    • The mantissa is 11011001 and the exponent is 100
    • Usually 4 bytes used for mantissa and 2 for exponent
    • Increasing the size of the mantissa increases accuracy
    • Increasing the size of the exponent increases the range of numbers which can be stored
  • 12. 1 Data Representation 1.3 Text
    • ASCII
      • Each character is stored in an 8 bit binary code called the ASCII system.
      • E.g. A is stored as 65 (01000001 in Binary).
      • 1 byte can store 256 different characters – enough for all the keys on the keyboard and several foreign symbols (for currency etc.).
    • Unicode
      • Need to represent non-Latin chars e.g. Japanese and Chinese
      • Characters encoded using 16 bits – 65,536 symbols.
      • MS Office stores documents in Unicode
  • 13. Data Representation 1.4 Graphics Most displays use Raster graphics – same as TV. Displays store images as a matrix of pixels in the refresh buffer. Separate images now stored in VRAM (Video RAM). VRAM represents the entire screen area and the term bit map is used to describe the one-to-one mapping of pixels in VRAM to pixels on the screen.
  • 14. Data Representation 1.4.1 Bit-mapped Graphics
    • For a graphic drawn in a painting package the computer stores the data as a 2 dimensional array of pixels.
    • Each pixel in a black and white image is 1 bit in memory.
    • 2 bits can store 4 colours or shades of grey.
    • 8 bits can store 256 colours.
    • The number of bits used for each pixel is the bit depth.
    • The resolution is the number of pixels in the height and width of the image.
    • Bit mapped images are often generated from scanned pictures and can create huge files.
    • Editing can be performed at pixel level.
    • When images are enlarged they can become “lumpy” and lose definition.
  • 15. Data Representation 1.4.2 Calculating Memory Requirements
    • We need to know the size of the image, resolution and bit depth.
      • Size – usually inches e.g. 6” x 4”
      • Resolution – say 500 dpi (pixels per inch)
      • Bit Depth – e.g. 1 bytes for 256 colours
    No of bytes is 6,000,000 bytes / 1024 = 5859K = 5.7 MB 24 x 250,000 = 6,000,000 4 x 500 6 x 500 * Bit depth Total Pixels Pixels down Pixels Across
  • 16. Data Representation 1.4.3 Arranging The Bytes
    • There are many different ways of arranging the bytes that hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:
    The image is saved as a series of bytes to a storage device, such as memory or disk.If we wish to review the image then it is a simple matter to transfer the image data back into the video memory as a direct copy. As this image is also in a bit mapped format, we can still move it to and from other storage devices without any translation.
  • 17. Data Representation 1.4.4 Greyscale A rudimentary greyscale effect provides a ’black’, ’white’ and two levels of ’grey’. As this comprises four different values we need two bits to represent each pixel (00 for black, 01 for darker grey, 10 for lighter grey and 11 for white ). As each pixel now requires twice as many bits, we will require twice as much memory for a given screen size as a black and white image. We can provide more levels of grey by allocating more bits to each pixel. By the time we have eight bits (one byte) to one pixel we can represent 256 different intensities. Monochrome displays are often clearer, especially for text than colour display. The requirement to use colour for such items as colour pictures and user interface issues, dictates that colour displays are more likely to be purchased.
  • 18. Data Representation 1.4.6 Compression
    • A colour bit – mapped image with a high resolution and 24 bit colour needs a lot of storage (50MB for a smallish photo).
    • File compression is used to reduce storage requirements.
    • Different techniques – coding using and index of colours actually used and not coding differences indistinguishable to the human eye.
  • 19. Data Representation 1.4.5 Colour One colour can be represented by one byte giving 256 colours (GIF format). Monitors etc. have 3 primary (additive) colours, Red, Blue and Green. Other colours obtained from adding light. We use 8 bits for Red, 8 for Blue and 8 for Green which give us 256 x 256 x256 colours – over 16 million. We need 3 bytes to describe RGB coded colours. Codes can be used by a programmer to describe colours in Hex code.
  • 20. Data Representation 1.4.7 Vector Graphics
    • Objects not described pixel by pixel but by its attributes (start & end positions, thickness & colour of lines etc.)
    • Sometimes called object-orientated graphics.
    • Vector graphics are resolution independent . Rasterisation need for conversion to bit map for display or printing.
    • Editing at pixel level not possible.
    • Can be scaled without losing original image quality
    • Less storage required
    • Can be grouped and edited at the object level.
    • Can be placed over another graphic without rubbing it out as happens with bit-mapped.
  • 21. 2 Computer Structure 2.1 An Introduction This unit on Computer Structure describes in detail the function of the component parts of a processor in the manipulation of data. This is extended to the methods of transferring data within a processor and between a processor and memory. The concept of a stored program is considered and the steps in the fetch-execute cycle to access and run programs. Memory types are considered, from registers to backing storage and how memory is defined and addressed.
  • 22. 2 Computer Structure 2.2 Computer Organisation
    • Computers play a significant role in meeting our everyday requirements. You can now browse the Internet for:
    • a new home,
    • Shop on-line and have home delivery
    • import a new car from abroad
    • order clothes from a catalogue company
    • communicate with friends overseas.
    • The ways in which you learn are also changing.
    • On-line homework
    • Computer based learning tools
  • 23. 2 Computer Structure 2.2 Computer Organisation
    • It makes sense to find out how they work and how you can make use of them.
    • How are they structured?
    • How do they operate?
    • How is data represented?
    • Why are some computers more powerful than others?
    • What devices can you attach?
    • How do they communicate?
    • Answers can be found in the following Topic
  • 24. 2 Computer Structure 2.2. Calculating Machines- From Babbage to VLSI
    • Abacus developed about 1300 AD by Chinese
    • Logarithms developed by John Napier
    • Other manual devices developed by Pascal & Liebniz
    • First mechanical calculator developed by Charles Babbage (1792 – 1871) Difference Engine and then Analytical Engine.
    • Idea of stored program concept developed.
    • First Electrical machine Enigma codebreaker in WW2.
    • Vacuum tubes (40’s replaced by transistors (60’s)
    • From 1965 to present circuitry all on one chip Integrated circuits.
    • Now we have VLSI (Very large Scale Integration)
  • 25. 2 Computer Structure 2.2.1 A Two State Machine
    • Typical 4 box diagram
    • Only 2 states used in all components and data storage, on or off, 1 or 0.
    • Advantages of 2 state.
      • Simplicity – 2 voltage levels.
      • Good tolerance
      • Simple calculations.
    Input Processor Memory RAM & ROM Output Backing Storage CPU
  • 26. 2 Computer Structure 2.2.2.1 The structure of the CPU (a) Memory Processor Control unit ALU Registers, A, MAR, MDR, PC, SP Address bus – 1 way Data bus – 2 way Control Bus Internal buses
  • 27. 2 Computer Structure 2.2.2.1 The structure of the CPU (b)
    • ALU (Arithmetic & Logic Unit)
      • Data is processed and manipulated.
      • Involves arithmetic operations and logical comparisons.
    • Control Unit
      • Manages execution of instructions.
      • Sends control signals around the computer.
    • Registers
      • Storage location with the CPU
      • Hold calculations, store addresses etc.
    • Main Memory
    • External Memory
    • Peripheral Devices
  • 28. 2 Computer Structure 2.2.3 The stored program concept All computers based on same basic design, known as the Von Neumann Architecture . Computers carry out tasks by executing machine instructions. A series of these instructions is called a machine code program held in main memory as a stored program , a concept first proposed by John Von Neumann in 1945. Central Processing Unit (CPU) fetches, decodes and executes the machine instructions. By altering the stored program it is possible to have the computer carry out a different task.
  • 29. 2 Computer Structure 2.2.4 The fetch execute cycle To execute a machine code program it must first be loaded, together with any data that it needs, into main memory (RAM). Once loaded, it is accessible to the CPU which fetches one instruction at a time, decodes and executes it at electronic speed. Fetch, decode and execute are repeated until a program instruction to HALT is encountered. This is known as the fetch-execute cycle .
  • 30. 2 Computer Structure 2.2.4.1 The fetch execute cycle in detail
    • This is how the:
    • Address bus
    • Data bus
    • Control Bus
    • Registers
    • All take part in reading an instruction from memory and executing it.
  • 31. 2 Computer Structure 2.2.4.3 The fetch phase
    • .
    1. The contents of the PC are copied into the MAR; 2. The contents of memory at the location designated by the MAR are copied into the MDR; 3. The PC is incremented; 4. The contents of the MDR are copied into the IR. 2.2.4.4 The Execute phase 1. Decode the instruction in the IR; 2. Execute the instruction in the IR.
  • 32. 2 Computer Structure 2.2.8 Computer Components and Their Function The components of the CPU and the connections to devices that are external to it are shown.
  • 33. 2 Computer Structure 2.3 Memory Main memory (RAM and ROM) stores programs and data while the computer is operating.
    • Any location in memory can be read from or written to by referring to its address.
    • Memory can be organised as:
    • 8- bit wide (PC-8088)
    • 16-bit wide (XT-8086, AT-80286)
    • 32-bit wide (386DX, 486SX, 486DX)
    • 64-bit wide (Pentium)
  • 34. 2 Computer Structure 2.3.1 RAM
    • RAM
        • Has same access time for all locations.
        • Volatile – loses contents on power off.
      • 2 Types of RAM Static and Dynamic
        • Static – holds contents as long as there is power.
        • Dynamic – has to be refreshed (every 2 ms).
    • Each memory location has a unique address .
  • 35. 2 Computer Structure 2.3.2 ROM
    • ROM
        • Contents permanent or non-volatile.
        • Software & data fixed into ROM at manufacture.
        • Operating systems and specialised ROMs (e.g. cameras and CD players etc.).
      • Some ROMs can be reprogrammed
        • EPROM – electrically programmable read only memory (data erased by ultraviolet light and new program burned onto ROM
        • EEPROM – electrically erasable programmable read only memory – selective parts can be reprogrammed & used in developmental work
  • 36. 2 Computer Structure 2.3.4 Cache Memory
    • Faster processors mean data is being processed before the next instructions can be read from memory (system busses slow).
    • Most systems have 2 nd smaller area of fast SRAM. Next instructions read into cache – much faster than RAM.
  • 37. 2 Computer Structure 2.3.6 External Memory
    • External memory , such as the hard disk, holds quantities of data too large to store in main memory.
    • It is also used to keep a permanent copy of programs and data.
    • Examples of external memory devices are:
    • hard disk;
    • floppy disk;
    • zip disk;
    • CD-R;
    • magnetic tape;
    • flash drive.
  • 38. 2 Computer Structure 2.4 Central Processing Unit Central Processing Unit. The CPU coordinates and controls the activities of all other units in the computer system. It executes program instructions and manipulates data in accordance with the instructions. It uses a standard architecture composed of the following three components: Arithmetic and logic unit (ALU); Control unit; Registers. All three components work together to form the processor.
  • 39. 2 Computer Structure 2.4.1 Architecture of the microprocessor We will now study the internal architecture of the microprocessor (CPU) itself. Because of the stored program concept , we must consider the relationship between the CPU and memory. This is a diagram of a fairly typical microprocessor design, showing the internal structure of the CPU and its relationship to the memory of the computer.
  • 40. 2 Computer Structure 2.4.2 Accessing Memory The CPU has to access memory both for instructions and to receive and transmit data from or to memory. Memory Address Register (MAR) - specifies the address in memory for the next read or write operation from or to memory; The Memory Data Register (MDR) or Memory Buffer Register (MBR) - contains the data to be written to memory or receives the data read from memory.
    • MAR register connected to the address bus
    • MDR register connected to the data bus.
  • 41. 2 Computer Structure 2.4.2 Accessing Memory (2) To read data from memory , CPU places the address of the memory location into the MAR and activates the memory-read control line of the system bus. This will cause the required data to be transmitted from memory via the data bus to the MDR; To write from the CPU to memory , the CPU places the data to be written in theMDR; the address of the memory location where they are to be written is placed in the MAR; and the memory-write control line is activated. The MAR and MDR registers have a large part to play in the fetch-execute cycle.
  • 42. 2 Computer Structure 2.4.3 Functions of Control Bus
    • Control bus has several lines, used singly to initiate a process.
        • Read Line – initiates memory read operation.
        • Write Line - initiates memory write operation.
        • Clock – Generates pulse to synchronise components.
        • Interrupt – Signal to processor of an interrupt like a key press or mouse click. Processor saves stack and deals with the interrupt.
        • NMI – Non-Maskable Interrupt. Interrupt which cannot be ignored.
        • Reset – Clears all registers, aborts program and gives control back to the operating system.
  • 43.
    • Polling
      • The processor checks each part of the system in turn and if any part wants the processors attention it signals to the processor.
    • Interrupts
      • This is how a PC works. When a key is pressed or mouse clicked an interrupt is generated and the processor carries out that task (sometimes it is “doing nothing” and is interrupted.
      • Some interrupts need not be actioned (Maskable Interrupts), others must be actioned (NMI) e.g Ctrl+Alt+Del
    2 Computer Structure 2.4.3.1 Getting the processors attention
  • 44. 2 Computer Structure 2.4.4 The Arithmetic Logic Unit
    • ALU
      • Where data is processed and manipulated.
      • ALU involves arithmetic operations and logical operations .
      • ALU uses temporary registers to hold data.
      • Accumulator is main register.
  • 45. 2 Computer Structure 2.4.5 Registers
    • memory address register (MAR) holds address of a location in main memory.
    • memory buffer register (MBR) holds data that has just been read from main memory or is to be written to main memory.
    • instruction register (IR) holds the current instruction that is being executed.
    • program counter (PC) holds the address of the next instruction to be fetched from memory.
    • Processor also has a set of general purpose registers . They are called general purpose because their role is not defined at manufacture and can be used by programmers as appropriate.
  • 46. 2 Computer Structure 2.5 Buses
    • Data is transferred between memory and processor by buses.
    • Address Bus
      • Pinpoint memory location.
      • One-way Bus
    • Data Bus
      • Transfers the data
      • Same size as Word size
      • Two-way Bus
    • Control Bus
      • Initiates and controls operations.
    • Inside the processor.
    Memory Processor Address Bus Data Bus Control Unit Control Bus
  • 47. 2 Computer Structure 2.5.1 Addressability
    • The Word Length is the size of data, in bits, which can be manipulated as a single unit by the processor.
    • In an ideal computer the size of the data pathways and the size of memory locations will match.
    • Address bus determines amount of addressable memory
      • 8 bit address bus can access 2 8 = 256 locations
      • 16 bit address bus can access 2 16 = 65,536 locations (64K)
      • 24 bit address bus can access 2 24 = 1,677,216 locations (16MB)
      • 32 bit address bus can access 2 32 = 4294967296 locations (4GB)
      • If we have 2 bytes or 4bytes for each memory location we get for a 24 bit bus 16MB of addressable locations, but 32MB or 64MB of actual storage.
  • 48. 3 Computer Performance 3.2 Measuring Performance
    • When we measure performance we usually mean how fast the computer carries out instructions. The measure we use is MIPS, millions of instructions per second.
    • MIPS affected by
      • The clock speed of the processor
      • The speed of the buses
      • The speed of memory access.
  • 49. 3 Computer Performance 3.2.1 The Clock
    • Every processor has a clock which ticks continuously at a regular rate.
    • Synchronises all the components.
    • Cycle time measured in MHz or GHz
    • 200 MHz (megahertz) means the clock ticks 200,000,000 times a second (P1 -1995)
    • 1.4 GHz (gigahertz) is 1,400,000,000 times a second (P4 – 2001)
    • 2.3 – 4+ GHz on P5 in 2004
  • 50. 3 Computer Performance 3. 2 Measures of Processor Speed
    • Clock Speed
      • Generally the faster the clock speed the faster the processor – 3.2 GHz is faster than 933 MHz
    • Mips – Millions of Instructions per Second
      • Better comparison but beware of false claims e.g. only using the simplest & fastest instructions and different processor families.
    • Flops – Floating Point Operations per sec.
      • Best measure as FP operations are in every processor and provide best basis.
    • Benchmark Tests
      • Well defined standardised routine to test the performance of a computer.
        • Dhrystone – tests string and frequently used functions
        • Whetstone – test using arithmetic functions
  • 51. 3 Computer Performance 3.3.1 Data Bus Width
    • A WORD is the basic number of bits a processor can handle in one operation.
      • If word size and data bus same size then data transfers carried out in single operation.
    • Width of data bus defines how much data can be carried in one fetch.
      • 32 bit data bus (word length) carries twice as much data as a 16 bit bus and a 32 bit system should be faster.
      • Most modern processor 32 bit but some AMD 64 bit.
    • Width of Address bus affects the amount of memory which can be accessed.
  • 52. 3 Computer Performance 3.3.2 Peripherals & System Performance
    • Peripherals work at much slower speeds than the CPU.
      • Buffers and spooling can help.
      • Sound cards can have their own processor, RAM and ROM.
      • Video cards their own RAM (up to 256Mb)
  • 53. 3 Computer Performance 3.3.2 Interfaces & Input/output Devices
    • An interface makes the link between the processor and a peripheral (disk drive, printer etc.).
    • Peripherals work at different speeds, use different formats.
    • Parallel to serial conversion is often needed
      • Some devices are serial – 1 bit at a time is transferred. Serial used for long (over 2m) distances.
      • Some are parallel (printers) – 8 bits at a time. Used for short distances problems with skewing – loss of data integrity.
    • Interface transfers data so the processor is delayed as little as possible. It has buffers to store blocks of data in transit.
    • Memory mapped I/O uses memory linked to peripheral.
    • Spool files are used when large quantities of data are sent to a slow peripheral, like a printer. Enables background printing .
  • 54. 3 Computer Performance 3.3 Memory & System Performance
    • Speed of access & Word size
      • 15-120 nanosecond but memory speed and word size dictated by motherboard and processor
    • Amount of memory
      • Adding memory (upgrade) usually improves system performance esp. graphics & multimedia.
      • Usually 2 slots on motherboard so max memory is 2 x largest modules (currently 512MB largest affordable.
    • Cache (pronounced cash ) memory
      • Cache exists between memory and processor
      • Very fast memory speeding data transfer in shorter fetch cycle.
  • 55. 4 Peripherals 4.1 Introduction
    • Examine a range of hardware devices which carry out typical tasks.
    • We will examine devices in terms of:-
      • Speed
      • Cost
      • Resolution
      • Compatibility
    • Developments and trends in storage devices
    • Serial & parallel interfaces and wireless communications
  • 56. 4.2 – Input & Output Devices 4.2.1 Keyboards
    • QWERTY keyboard
      • has its roots in mechanical typewriters – to slow down operators to avoid jamming the keys.
      • Key press causes a scan code to be sent to the computer.
        • Sent via serial coble to keyboard controller.
        • Sent as ASCII Codes
    • Modified Keyboards
      • Used to alleviate Repetitive Strain Injury (RSI)
      • Customised keypads can have more (or fewer) keys all programmable to suit particular situations.
      • Adjustable split keyboard in 3 parts to allow flexibility.
  • 57. 4.2 – Input & Output Devices 4.2.2 Scanners
    • Scanners
      • Flat bed scanner allows for up to A4 size documents
        • Document placed face downwards on glass panel and scanned.
        • Light beam reflects light from the document and photocells measure the light reflected.
        • Analogue data needs converted to digital (A DC)
      • Modern scanners use high bit depths to allow high resolutions.
      • Images must be matched to their purpose
        • No point in scanning at a resolution of more than 75 dpi for a screen based display.
        • No point in scanning at 600 dpi for a printer rated at 300 dpi.
  • 58. 4.2 – Input & Output Devices 4.2.2 Scanners
    • Accuracy – measured by how close the image is to the original.
      • Resolution is the dots per inch (dpi) that can be detected by the scanner hardware. A 600 dpi scanner has 600 photocells per linear inch.
      • Bit depth usually 24 bits (8 red, 8 green, 8 blue).
    • Capacity
      • Little internal buffering, rely on techniques to transfer the data.
      • Storage can be high e.g. A4 page at 600 dpi requires 33.28MB for 8 bit and around 100MB for full colour.
    • Cost
      • Dropped dramatically in recent years
      • Bundled software often the major selling point.
  • 59. 4.2 – Input & Output Devices 4.2.3 Sound
    • Naturally Occurring Sound
      • Natural sound is analogue in form
      • To input sound to a computer
        • Software samples the incoming signal
        • Coverts the signal into digital form
        • Usually compresses the file
      • This is called ADC – Analogue to Digital Conversion
      • Simplest input device is a microphone with sound card but sound files can be taken from a CD and downloaded from the Internet.
      • Sound card performs the ADC and compression
  • 60. 4.2 – Input & Output Devices 4.2.3 Sound sampling
    • Sampling
    Sampler listens to sound repeatedly and stores a number representing the amplitude each time
    • Sampling Rate
      • No of times per second sampler listens to the sound e.g. 22 kHz is 22,000 times a second
    • Sample Size
      • No of bits stored per sample e.g. 8 or 16 bit samples
    • Compression
      • Reduce storage space and reduce quality
  • 61. 4.2 – Input & Output Devices 4.2.3 Sound
    • Accuracy
      • Resolution – Three sampling resolutions in common use.
        • 11.025 KHz (8-bit) – voice quality
        • 22.05 KHz (8-bit) – Quality of AM radio
        • 44.1 KHz (16-bit) – CD quality stereo [data sampled 44,100 times per second]
      • Bit-Depth
        • 8-bit sample size can hold 256 amplitudes per sample
        • 16-bit sample size can hold 65,536 amplitudes per sample
    • Capacity
      • No built-in cache. Depends on fast access via the sound card to hard disk storage. 10.09MB to store 2 mins stereo audio.
      • Compression required e.g. reduce sample rate / size or use a compression technique to reduce file size.
  • 62. 4.2 – Input & Output Devices 4.2.4 Video
    • Video Digitising
      • is performed by special video digitising circuitry installed on the motherboard of the computer.
      • File Formats
        • Quick Time
        • MPEG
        • AVi
  • 63. 4.2 – Input & Output Devices 4.2.4 Video
    • To playback video on a standard computer it will need to be decompressed by hardware or software, usually on the card.
    • Standards
    • AVI – (Audio Video Interleave) or Video for Windows. Being replaced by Active Movie which will playback AVI, QuickTime and MPEG.
    • QuickTime – CODEC s/w developed by Apple but used by both Mac and PC.
    • MPEG – Video board uses hardware to make compression much faster.
    • Accuracy – Depends on Compression Technique, frame rate and resolution.
    • Speed – Hardware must be fast enough to cope with stream of data to memory and to the hard disk.
    • Cost – Not only card but good Multiscan Monitor required (17” and 19” nowadays)
  • 64. 4.2 – Input & Output Devices 4.2.5 Digital Camera
    • Film replaced by an array of photosensitive cells.
      • Images stored electronically using photosensitive diodes called charge coupled devices (CCDs)
      • Intensity of light recorded in an image.
      • Analogue values converted to digital using ADC
    • Compression usually takes place.
      • Bit map files turned into JPEG
    • Image transferred to computer
      • Serial Cable
      • “ Floppy Disk” adapter
      • Can then be printed, e:mailed etc.
  • 65. 4.2 – Input & Output Devices 4.2.5 Digital Camera
    • Accuracy
      • Resolution
      • Measured in pixels or mega pixels – the more the better. E.g. 640 x 480 pixels or in megapixel mode 1280 x 960.
      • Accuracy depends on the array of photosensitive cells.. The more sensors and the smaller they are the higher the resolution.
      • Bit Depth
      • Number of bits is proportional to the number of colours that can be represented.
    • Capacity
      • Based on resolution and memory in the device.
      • Compression v altering resolution
    • Cost
      • Dropping as they become more common.
      • Resolution main factor and also facilities (zoom, flash etc.).
  • 66. 4.2 – Input & Output Devices 4.2.6 Printers – Ink Jet Printer
    • Ink-jet Printers are based on one of three different types of technology: continuous flow ink-jet, liquid ink-jet or phase-change ink-jet. We will look at how a liquid ink-jet printer works.
    • Liquid ink-jet or bubble-jet , operates by squirting tiny droplets of ink onto the page. The ink is first heated by passing an electric current through a coil. In milliseconds a bubble of vapour appears, forcing a tiny drop of ink from the nozzle onto the paper.
    • Resolution is typically 300 to 600 dots per inch, support the printing of text and graphics, colour and a range of shades.
    • Speed is pretty slow with a range of 4 pages per minute to 8 pages per minute, depending upon the model.
  • 67. 4.2 – Input & Output Devices 4.2.6 Printers – Laser Printer
    • This type of printer uses lasers to "write" a page image onto a special drum as an electrostatic charge. The charged drum attracts toner particles which are transferred to the page and heated to set the image.
    • Usually a page is composed in the printer (often PostScript ).
    • Capacity
      • On board RAM & processor needed to compose pages. The more RAM the higher quality graphics can be printed.
    • Resolution
      • 600 dpi quite common (300 cheaper, 1200 expensive)
    • Speed
      • The faster in pages per minute (ppm) the dearer ranges from 4 ppm to 20 ppm with 12 ppm being about average.
  • 68. 4.2 – Input & Output Devices 4.2.7 Multiscan Monitor The CRT is the basis of most visual display technology. The screen is arranged as a series of lines of dots and each dot is made up of three small areas of red, green and blue called a triad. The intensity of light shone on each triad determines the actual colour of the pixel. The picture is redrawn between 50 and 100 times a second. This is the refresh rate. A monitor which operate at different refresh rates is known as a multiscan or multisync monitor. The refresh rate is controlled by the video adapter. Screen resolution is quantified by the dot pitch, the distance between the dots on the screen. Typically between 0.28 and 0.38mm, corresponding to 100 to 70 dpi.
  • 69. 4.3 Selecting hardware to match operational requirements
    • When given a scenario like setting up a library system you will have to consider:-
      • RAM requirements
        • Memory must be enough to run the software and support all the data in the system.
      • Backing Storage
        • Big enough to hold the O/S, Applications and data.
      • Processor Performance
        • Usually as fast as you can afford but must be fast enough to support all the applications recommended.
      • Peripherals
        • Specify type of printer, monitors etc.
      • Communications
        • Attached to a network or set up a new network. Internet connection (broadband?)
  • 70. 4.4 Buffers and Spoolers 4.4.1 Buffering
    • Buffer
        • area of memory used to transfer data between the computer and a peripheral.
        • Used when a fast acting part of the system exchanges data with a slow peripheral
        • Buffer stores the data until peripheral can act on it.
      • Peripheral Buffer
        • E.g. printer – very slow. Has on board RAM to store the incoming data (laser may have 32MB)
        • E.g. Mass storage (disks). Data transferred in blocks so whole block transferred, managed by buffering
      • Interface Buffer
        • Universal Asynchronous Receiver/Transmitter (UART) handles transfer of serial to parallel and vice versa.
  • 71. 4.4 Buffers and Spoolers 4.4.2 Spooling When large amounts of data are to be sent to a peripheral device, or when the peripheral is shared across a network then spooling is a preferred method of compensating for the difference in speeds of the processor and the peripheral. Spooling involves the input or output of data to a tape or a disk. This, for example, allows output to be queued from many different programs and sent to a printer by a print spooler (special operating system software). The print spooler stores the data in files and sends it to the printer when it is ready, using a print queue . Once the data has been printed it is deleted from the storage device.
  • 72. 4.5 – Storage Devices 4.5.1 Magnetic Magnetic storage devices include hard disks, floppy disks, Zip disks and magnetic tape. They are called magnetic storage devices because their recording surfaces are coated with a material that responds to magnetic fields to enable data to be stored. Storage devices can be fixed or removable. Removable storage devices allow the user to disconnect the device and physically transport data from one computer to another. Varieties of removable devices include the Iomega and Syquest hard disks and Jaz cartridges.
  • 73. 4.5 – Storage Devices 4.5.1.1 Magnetic Disk
    • All the sectors around the disk, equidistant from the centre, form a track . With multiple platters, the collection of tracks on each platter, equidistant from the spindle is called a cylinder. When data is to be read or written, the read and write heads are moved to the appropriate track, where they wait until the relevant sector spins past.
    • Speed
    • Rotational speed of hard disks has improved, from 3000 (rpm) of early disks, to current rotational speeds of 5,400 and even 7,200 rpm.
    • Performance is also measured in terms of the rate of data transfer from the disk.
    • SCSI - transfer rate 5Mb/sec
    • Ultra Fast SCSIIII transfer rates - 40 Mb/sec .
  • 74. 4.5 – Storage Devices 4.5.1.1 Magnetic Disk
    • Capacity
    • Hard disks have improved tremendously in their capacity to store data in the last 10 years. From the modest 10Mb disks of the early 80s to current 80 Gbyte disks on many of today’s PCs.
    • Access
    • The hard disk is a direct access device, meaning that data can be directly read or written to any portion of the disk.
  • 75. 4.5 – Storage Devices 4.5.1.2 Magnetic Tape Storing data on tapes used to be the only solution to backing up hard disks of large capacity. Now, with large, removable magnetic disks and optical CR-RW technology, this is no longer the case. However, removable storage media is comparatively expensive, costs 10 times tape. Tape, therefore, still has the edge in this market. Tape is read and written on a tape drive. Data is written to tape in blocks with inter-block gaps between them. A single operation writes each block Data is stored on magnetic tape as magnetised regions on the surface of the tape induced by the magnetic recording head. To read data, the tape passes under the read/write head and the stored magnetised regions produce very small voltages in the head, leading to a current in the head coil. This current can be analysed to give a representation of the stored binary data.
  • 76. 4.5 – Storage Devices 4.5.1.2 Magnetic Tape Capacity Magnetic tapes have large capacities, reaching up to several gigabytes and come in a variety of sizes and formats. Since their introduction, tape drives have passed through many stages of improvement with extremely reliable Digital Audio Tape (44.1 kHz, 16-bit record and playback DAT) drives representing the current state of the art. A 4mm DAT tape can now store up to 24 Gbytes of data! Access Tapes are sequential access devices. Accessing data on tapes is therefore much slower than accessing data on disks. They are not suitable as storage media for applications where data needs be used regularly - where a disk is a more appropriate medium. Because tapes are so slow, they are generally used only for long-term storage and backup.
  • 77. 4.5 – Storage Devices 4.5.2 Optical Storage
    • CD-ROM
    A plastic disk is scanned using a laser. It reflects off pits on the surface differently from lands (bumps) Re-writeable CD-ROM becoming more common. Capacity – About 650Mb Speed – from single (150KB/sec) to 32x (or even 40x). The x refers to the times faster than CD Audio. Cost – CD-ROM Drives fairly cheap. Access – Always random
  • 78. 4.5 – Storage Devices 4.5.3Magneto Optical Storage
    • Based on a combination of magnetic and optical technologies.
    • Active layer is magnetic material.
    • Recording – magnetic material heated beyond a particular temperature by laser, allows magnetisation to be reversed.
    • Reading – laser operates at much lower temp and reflected beam rotated by magnetic field and detected by read head.
    • Capacity – 3.5” disks of 128, 230 and 384 Mb
    • Speed – Varies as multiple of standard single speed
    • Cost – decreasing with time with different formats and capacities becoming available.
  • 79. 4.5 – Storage Devices 4.5.4 Solid State Storage Devices (SSSD)
    • Solid-state storage devices are made up entirely from electronic components i.e. they have no moving parts.
    • They are also called RAM disks, as they take the place of a magnetic disk as a mass storage device.
    • They can be in the form of a plug-in card or cartridge containing memory chips.
    • The chips of a SSSD are typically static RAM or Electrically Erasable Programmable ROM (EEPROM or Flash EPROM).
    • SSSD are used with devices where space is at a premium e.g. in a camera, or when portability is desirable e.g a USB flash drive.
  • 80. 4.6 Interfacing (1)
    • Interfacing means making the hardware connections so that two devices can communicate effectively.
    • Data Format – data has to be consistent e.g. serial output to a serial device. Interface makes data consistent (also ADC)
    • Parallel/Serial – time & space division. Time separates transmission of actual bits and space can be used for multiple bits in parallel. Serial can be slow but use of fibre-optic cable very fast.
    • Voltage – different voltage levels between peripheral & computer need to be ironed out.
    • Protocols – rules that govern transmission of data. E.g. no of bits per packet, voltage levels etc.
  • 81. 4.6 Interfacing (2)
    • Status signals from a device indicate what the device is doing at any given moment. E.g.if a device is unable to receive data, then a transmitting device can delay transmission and retry later.
    • Speed - Different devices send and receive data at different rates. The devices agree a rate prior to transmission by utilising a protocol.
    • Wireless communications can be achieved using WAP (Wireless Application Protocol) - a specification for a set of communication rules to standardise the way that wireless devices, such as cellular telephones and radio transceivers, can be used for Internet access, including e-mail, the World Wide web , newsgroups , and Internet Relay Chat (IRC). Interconnecting devices centred around an individual person is called a wireless personal area network (WPAN). Typically, a WPAN uses technology that permits communication between devices in a
    • short radius of about 10 metres. One such technology is Bluetooth.
  • 82. 5 Networking 5.1 Introduction
    • This unit on Networking considers the basic system topologies and functions that allow computers to operate on a network.
    • Various types of networks are considered ranging from small peer-to-peer networks to LANs, WANs and the Internet.
    • Comparisons are made between the various networks in terms of type and scale and the effects of network failures.
  • 83. 5 Networking 5. 2 Networks
    • connecting t wo or more computers together turns them into a computer Network .
    • connecting two computer networks together creates an Internetwork .
    • connecting millions of computers and computer networks together forms a huge internetwork or what we now refer to as the Internet .
    • Economic and Social reasons for networks – desire to communicate probably most powerful reason.
    • We take e-mail, Internet, Video conferencing for granted but none of the were obvious when networks first appeared.
  • 84. 5 Networking 5. 2 Categorising Computer Networks
    • Computer networks can be categorised by the rate at which data can be transferred between machines (Bandwidth), and the physical distance between them.
    • Greater distance suggests lower bandwidth.
    • Local Area Networks (LANs) – high bandwidth.
    • Wide Area Networks (WANs) – low bandwidth (even broadband is slow compared to typical modern LAN bandwidth)
  • 85. 5 Networking 5. 2.1 Local Area Networks (LANs)
    • LANs very popular now and the technology has become much cheaper .
    • Sharing resources
      • LAN belongs to single organisation on a single site so a high level of trust develops.
      • Share printers, scanners, hard disk space, applications and Internet connections
    • Sharing Information
      • Files and data. E-mail and appointments diaries, Intranet.
    • Sharing Services
      • Centralised backup, technical support, anti-virus, software installation and update.
  • 86. 5 Networking 5. 2.1 (LANs) - Hardware
    • Reduced Hardware costs have helped dramatic increase in LANs
      • Network Interface Card – every PC on network needs a card to interface with the network. Provides the machine with a unique address on the network (MAC)
      • Hubs – typically 24 ports, each PC connects to port. Can be slow and cause bottlenecks.
      • Switches – intelligent hubs (24 or racks of 24 x 8) – help reduce bottlenecks.
      • Software is now much cheaper. Each station needs a network licence and server software needs to be licensed for the number of stations on the network
  • 87. 5 Networking 5. 2.1.1 Sharing Resources on a LAN
    • Hardware resources
      • Expensive printers (laser and colour laser), plotters and hard disks not only shared to save money but installation and maintenance cheaper and easier.
    • Software Resources
      • Can set up an Intranet, use internal e:mail and Newsgroups.
      • Also search facilities across the network.
      • Software can be shared according to licensing agreements.
  • 88. 5 Networking 5. 2.1.2 Sharing Services on a LAN
    • Network Manager
      • Controls the network from any location
      • Controls software installation and upgrades centrally.
      • Control shared Internet access and Firewall protection.
      • Provide automatic virus protection
      • Do regular full backups and frequent (daily) incremental backups.
  • 89. 5 Networking 5. 2.2 Wide Area Networks - WANs
    • A WAN allows an organisation to maintain its management structure despite being geographically distributed around the world.
    • WAN’s & Internet increasingly popular as cost of communication drops.
    • Easier and cheaper to conduct business and communicate around the world.
  • 90. 5 Networking 5. 2.2.1 Metropolitan Area Networks - MANs
    • A MAN is a wide area network which has a city or metropolitan area as its geographical limit.
      • MANs are usually under the control of a single local authority
      • typically consist s of a WAN which is administered centrally, providing networked services to local government offices, schools, libraries, community centres etc.
      • advantages of a MAN are the economies of scale and the improved communications which can be achieved by connecting local government offices together.
      • Local authorities usually host an Intranet for use of a staff on-line newsletter
      • MANs rely on a high bandwidth and are really only suitable for Urban areas. Rural authorities have to use lower bandwidths (e.g. up to 2 Mbits/sec)
  • 91. 5 Networking 5. 2.2.2 Improved communications on a WAN
    • E:mail allows users to communicate.
      • Text and graphic messages
      • File transfer by attaching files to e:mails
    • Newsgroups are electronic bulletin boards
      • Organised by threads of messages
      • Can be set up and accessed if you have access to a News Server
    • Electronic Forums
      • Similar to newsgroups but controlled by a particular organisation e.g. on the BBC website forums exist for news, sport etc.
    • List Servers
      • Use e:mail to distribute messages rather than the user having to log onto a forum.
  • 92. 5 Networking 5. 2.2.2 Improved communications on a WAN -2
    • File Transfer Facilities
      • Being able to transfer files over a WAN means that if the product you sell can be stored or transmitted electronically, then you can sell it to anyone who is connected to the Internet without having to transfer a physical object.
      • Items on sale over the Internet which can be electronically distributed are things like software, music, photographic images, video and information in the form of data files.
      • Some companies are now offering services such as remote backup and data storage over the Internet.
    • Distributed Processing
      • Different parts of a suite of programs can be run on different machine across the network.
      • Allows software vendors to rent software rather than sell it.
      • Search for Extraterrestrial Intelligence (SETI) uses volunteers whose computers process distributed data when idle.
  • 93. 5 Networking 5. 2.2.3 Access to information on a WAN
    • Information Services
      • Internet access means you have instant access any time of the day or night without having to travel, to news, technical information and other data.
      • Use a search engine on the web e.g. google
    • Entertainment Services
      • Internet radio, music channels and network games all possible on a low bandwidth. Information is broadcast once rather than being requested and transmitted separately for each user.
      • Video on demand needs a high bandwidth and other services benefit from high bandwidth.
  • 94. 5 Networking 5. 2.2.4 Teleworking
    • Tele- working
      • mean s working from home instead of traveling to an office every day
      • Us e communications technology to keep in touch with your employer.
      • Can work in different country.
      • Any job where the results of your labour can be transmitted electronically can be classed as teleworking.
    • Video conferencing
      • Allows people to see and hear the people they are having a meeting with.
      • Need specialised equipment and a high bandwidth.
  • 95. 5 Networking 5. 2.2.4 Teleworking – advantages and disadvantages
    • Advantages
      • Employee saves time and money travelling, on childcare and can live in cheaper housing away from city. Deliver your work electronically.
      • Employer saves money on office space; tele-workers usually work harder – no distractions. Save wages by employing people in countries where wages are low.
    • Disadvantages
      • Employee feelings of isolation, office chat and miss out on promotion. May work much harder and put in more hours than being paid.
      • Employer needs to pay for training and installation of communications equipment. Security issues if employees log into the company network from home
  • 96. 5 Networking 5. 2.3 Intranets
    • Intranets
      • Used by organisations to distribute information on a LAN
      • Often used as a portal for the Internet and difficult to tell whether you are on the LAN or WAN
      • Usually private and internal
      • Can be used by companies with branches all over the world as secure information service.
  • 97. 5 Networking 5. 2.4 Mainframe Networks
    • Mainframe network with “Dumb” terminals
      • Original communication method everyone used the same computer.
      • Terminal has no processing power.
      • Mainframe processor, memory and disks used by each terminal in turn.
      • Current mainframes combined with conventional client-server networks. Client access mainframe via terminal emulation software
    • Thin client Networks
      • Low power workstations run applications on the server.
      • Load O/S and software from the server.
      • Server must be very powerful high spec with lots of memory.
      • Useful for single application stations e.g. Internet Browser only.
  • 98. 5 Networking 5. 3 Network Operating Systems
    • Improved networking operating systems
      • Easier to connect computers together
      • Modern O/S has networking built-in
      • Common standards such as TCP/IP
      • has made networking easier and cheaper.
    • Main Functions of Network O/S
      • Allows users to treat resources on other computers as if they were local resources
        • Mapping directories or drives of remote machines
        • Copying remote files to local drives
        • Managing different operating systems on the network
        • Ensuring data integrity
        • Providing privacy and security of network resources
  • 99. 5 Networking 5. 3.1 Client-Server Network
    • Central server or servers
      • Usually most powerful computers on the network.
      • RAID drives and lots of memory
      • Often run a different O/S to clients
      • Provide access to shared resources without affecting the performance of any one machine.
      • May act as mail servers, Intranet or proxy servers, networked storage or applications servers or news servers.
  • 100. 5 Networking 5. 3.1 Client-Server Network Services
    • Security
      • Network software allows only users with correct passwords to access the system and files they have permission to use.
    • Networked storage
      • You can access centrally stored files from any machine on the network.
    • Communications
      • Internal & external e:mail, Intranet services.
      • Internet and Firewall services
    • Applications
      • Applications stored centrally mean you always have access to that application even if it is not installed on your workstation.
    • Support Services
      • Virus checking, remote control, remote monitoring and central backup strategy.
  • 101. 5 Networking 5. 3.1.1 Advantages of Client-Server Network
    • Centralised control
      • Of software installation
      • Over software versions
      • Ability to configure stations to a common format.
    • Resources shared
      • Hard disk space, expensive peripherals (laser & colour laser printers), modems and routers.
    • Security
      • Access to file and other resources easily implemented.
    • Backup routines
      • Easy to backup central server to tape either full or incremental backup
    • Ease of expansion
      • Most LANs can easily be extended by adding cables and stations.
  • 102. 5 Networking 5. 3.1.1 Disadvantages of Client-Server Network
    • Cable Faults
      • In a bus topology can bring down whole sections of the network
    • Server Failure
      • Will bring down the entire network.
    • Software incompatibility
      • Some network s/w is proprietary and difficult to link to other LANs
    • Management & Control
      • The bigger the network the more highly trained and expensive the technician or controller is to employ.
  • 103. 5 Networking 5. 3.2 Peer to Peer Networks
    • Peer to peer
      • All machines on network of equal status.
      • No server on network
      • Suitable for small (up to 5 stations) LANs.
      • Used in home situations
      • Also in small offices where all staff are trusted
      • Security difficult to implement
      • Bottlenecks can occur if more than one user wishes to access the same resource (e.g. hard disk) at the same time.
  • 104. 5 Networking 5. 3.2 Advantages of Peer to Peer Networks
    • P eer to peer networks are cheap and easy to implement .
    • M odern operating systems like Windows 98 and Apple OSX have this sort of networking built in
    • you do not have the expense of providing a dedicated machine to function as a server
    • I f security is not a problem, then it is very convenient to be able to share files, access peripherals and have several people using the same Internet connection without having to set up a more complex network structure.
  • 105. 5 Networking 5. 3.2 Disadvantages of Peer to Peer Networks
    • Organisation and management become difficult when several machine connected together and sharing files
    • Versions of installed software are difficult to control.
    • Backup difficult as files distributed across several machines.
    • Proper security difficult as no easy way to restrict access to shared files or resources.
  • 106. 5 Networking 5. 3.3 Stations and servers
    • Network stations and servers are nodes on the network .
    • Servers
      • A server usually refers to a program and the computer it is running on.
      • Servers provide access to resources on a network.
      • On a network, one machine may provide access to a number of different resources
      • T here may be a number of different machines acting as servers, each one providing access to different resources.
    • Machine identification
      • All nodes on a network, whether they are servers or network stations, will have a unique identity which identifies that particular machine.
      • The type of identity a node has will be determined by the protocols running on the network.
  • 107. 5 Networking 5. 3.3 Stations and servers - 2
    • Machine identification – Ethernet Standard
      • Every network interface card has a Media Access Control (MAC) address – 6 bytes
      • In TCP/IP every node has its own IP address – 4 bytes.
      • Nodes may also have a network name.
  • 108. 5 Networking 5. 3.3 Stations and servers – Network Servers
    • File Server
      • Controls log-ins and gives users access to files
    • Print Server
      • Allows a user access to a shared printer.
    • Applications Server
      • Distributes applications around the network (read only access) to users.
    • E:mail Server
      • Stores users’ e:mails and account details. Regularly contacts external e:mail server to send and receive external mail.
    • News Server
      • Stores and forwards messages posted by users on a bulletin board system.
    • Web Server
      • Transmits and stores Web pages and provides access to to an Intranet.
    • Proxy Server
      • Connects a LAN to the Internet. Allows many users simultaneous access.
  • 109. 5 Networking 5. 4 Network Topology
    • A network topology describes the arrangement of computers to form a network. The actual physical layout is determined by the buildings or other locations that house the parts of the network.
    • We will look at four local area network topologies.
      • Bus
      • Star
      • Ring
      • Mesh
  • 110. 5 Networking 5.4.1 Network Topology - Bus 4 Factors Affecting Performance 4.6. Network Topology - Bus Bus Topology- easy to expand and cheap to set up. e.g. Ethernet in school or college. Data Security – data encryption methods used. High collision rates requiring re-transmission Bandwidth – available bandwidth shared amongst all stations accessing network. Data compression used. Reliability – fault in one station has no effect on rest. Cable fault will lose all that section. Cost – relatively cheap
  • 111. 5 Networking 5.4.2 Network Topology - Star Data Security – higher security as data routed only to the computer that is to receive it. No collisions. Reliability – if a link fails then only that station is off the network. Failure to central controller is fatal. Cost – can be quite expensive due to high cost of cabling. Popular in small self-contained networks as not too expensive (small office). All nodes connected to one central node that routes traffic to the appropriate place.
  • 112. 5 Networking 5.4.3 Network Topology - Ring Ring Topology Similar to Bus in many respects with similar security problems. Control system in charge of transmissions and stations guaranteed access to transmissions. Collisions avoided by use of a token Additional expense for control s/w and system. May have to wait turn to transmit. Network down to add station, but few if any crashes.
  • 113. 5 Networking 5.4.4 Network Topology - Mesh Mesh Topology Fault in one cable does not affect network. Multiple transmissions Lots of wiring Expensive Excellent performance
  • 114. 6 Using Networks 6.1 Introduction
    • This unit considers :-
    • T he hardware and software required to use networks
    • The associated communications issues.
    • The misuse of networks is also considered and the implications discussed .
  • 115. 6 Using Networks 6.2.1 Network Hardware – The Hub
    • A hub in an Ethernet network is a multi-port repeater.
    • Hubs are most often used on networks using UTP cabling as the limit for this type of cable is 100 metres.
    • A hub will divide the network up into a series of different segments, reducing the likelihood that a cable fault will bring the whole network down.
    • Hubs are commonly supplied with 12 or 24 ports, and are suitable for distributing a UTP cable to a room or office full of network stations.
    • A hub also functions at the lowest level of the OSI networking model, the Physical Layer .
  • 116. 6 Using Networks 6.2.2 Network Hardware – The Switch
    • A switch (sometimes called a switched hub) divides the network up into collision domains. A Switch is often regarded as an intelligent Hub
    • A Collision occurs when a station begins transmission and then receives the beginning of a frame from another station.
    • T he station will immediately stop transmission and issue a JAM signal onto the segment.
    • This will indicate to the other transmitting station that a collision has occurred and both stations will back off for a random amount of time and try to re-transmit.
    • This back-off time is dependent on the number of consecutive collisions that were issued before a successful transmission.
    • The more collisions, the longer the maximum back-off time.
    • This mechanism requires that stations be close enough together for each station to see any possible attempted transmission before the first 64 bytes of its frame have been transmitted.
    • This is because 64 bytes is the minimum frame size for an Ethernet network.
  • 117. 6 Using Networks 6.2.3 Network Hardware – The Router
    • A router works like a bridge on inter-networks using IP addresses.
    • Routers are used to link Ethernet networks to the Internet via fibre or ISDN and ADSL lines.
    • Routers can be programmed remotely to restrict access to certain IP addresses.
    • Possible to connect over 200 stations to the Internet and share the bandwidth intelligently.
  • 118. 6 Using Networks 6.2.4 Network Hardware – Network Interface Card
    • Network Interface Card (NIC)
      • Circuit board installed inside a computer to connect it to the network.
      • NIC must be designed for the network it is connected to e.g. Ethernet card for Ethernet LAN.
      • Provides a dedicated full time connection to the network.
  • 119. 6 Using Networks 6.3 Hardware & Software Factors
    • 6.3.1 Processors
      • Processor hungry applications run on networks (Browser, P2P. Virtual Private Networks)
      • Features to consider
        • Performance (High Speed and throughput)
        • Flexibility (Ability to adapt to changing O/S and Application S/W)
        • Power (High power leads to heat – need cooling etc.)
        • Software Support (compilers, operating systems and libraries available to the processor)
  • 120. 6 Using Networks 6.3 Hardware & Software Factors
    • 6.3.2 Memory
      • Factors defining the memory that supports a network processor can be categorised as follows:
        • Shared, distributed or a combination
        • Size and type of memory used
        • Caches that are included on or off the chip
      • Memory is available as RAM, on the NIC and shared from a server. Also can use a NMS (Network Memory server) – provides RAM as fast network memory paging.
      • Special Features
        • Memory / buffer controllers
        • Packet management units
        • Address generation units
  • 121. 6 Using Networks 6.3 Hardware & Software Factors
    • 6.3.3 Backing Storage
      • Local storage on PC and remote network storage.
      • Hard disks used throughout
      • Specialised RAID systems used on shared network disks
      • Some systems separate from main server and accessed via a storage server.
      • Shared drives are assigned a network address allowing them to be accessed. E.g. Each “Home” drive has an address tied in with its owner’s account.
  • 122. 6 Using Networks 6.3 Hardware & Software Factors
    • 6.3.4 Browsers
      • A browser is the application program that enables a computer user, to look at, and interact with World Wide web.
      • It makes requests to web servers throughout the Internet.
      • Netscape Navigator and Microsoft Internet Explorer are the only two browsers that the vast majority of Internet users are likely to use.
      • The notion of a browserless web describes communication over the World Wide web between programs rather than between people using browsers and web servers and does not involve an interactive user.
  • 123. 6 Using Networks 6.3 Hardware & Software Factors
    • 6.3.5 Network Operating Systems
      • Server runs a specialised NOS
        • Windows NT, Server 2000, Server 2003
        • Unix based variations including Linux (open source).
      • Workstations run client based O/S
        • NT for Workstations, Widows 98, 2000, XP
        • Server can cope with mixture of client O/S on the network (inc Mac OS)
      • Transparency needed e.g.
        • Printing or Saving a file should be the same operation whether locally or on the network.
        • Achieved using a network driver called a Redirector
  • 124. 6 Using Networks 6.4 Technical Factors Affecting Communications The technical factors which have led to the growth of computer networks have emerged in parallel with t he economic factors which have driven the research into networking technology. As the economic demand or networking technology has grown, the trend has been for equipment prices to fall and performance to increase. Although still in its infancy, the development of wireless networking is likely to follow the same pattern.
  • 125. 6 Using Networks 6.4.1 Cabling
    • Cabling can affect bandwidth and different cabling is used in different situations.
      • As more networks are installed the cost of cabling has fallen.
      • Different cables used in different situations (even on one network)
        • Ethernet uses UTP cabling (developed by Xerox) running at 100Mb/sec.
        • Fibre Optic cable used to join areas of the network to the server. Very fast (e.g. 2Gb/sec) allowing many stations to share the bandwidth. Connects Hubs/Switches to a server.
  • 126. 6 Using Networks 6.4.2 Bandwidth
    • The term bandwidth describes the rate at which data can be transmitted over a segment of a network.
    • As users share networks the Bandwidth available to each user depends on the number of users. To maximise bandwidth either increase overall or reduce the demand.
      • Reducing the demand
        • Data Compression – remove redundant information
        • Caching – Commonly viewed or used data stored locally to avoid transmission e.g. Internet home page. Most of a network profile.
        • Broadcasting - - if data such as video or audio is transmitted live, then although the user only has one chance of viewing it, the bandwidth requirements will be a lot less than if users are continually downloading their own copy of the data.
      • Increasing capacity
        • Fibre Optic and satellite links on a LAN, ISDN and ADSL on the Web.
  • 127. 6 Using Networks 6.4.3 Wireless
    • Features
      • Slower than conventional cabling.
      • Convenience of being able to move around rooms and buildings.
      • Quick and easy to install
      • Bluetooth allows devices such as mobile phones, printers and laptops to form a mini network when they are in close proximity.
      • Mobile phones can access the Internet via Wireless Application Protocol (WAP)
  • 128. 6 Using Networks 6.5.1 Misuse of Networks – Social Issues
      • Personal privacy
        • The monitoring of individuals’ Internet and email use is a contentious issue. Many governments would like to have access to this sort of information. Many individuals would not like them to have this kind of access. With modern communications networks it is theoretically possible to trace the movements of any individual around the world - they use cash machines, pay with credit cards, use the Internet, use mobile phones, appear on surveillance cameras, and may use electronic road tolling systems. All of these systems could be combined to track an individual’s movements.
        • Even organisations who manage LANs are becoming concerned about the security and employment issues surrounding email, and are starting to monitor all email activity on their networks to make sure that their employees are not divulging company secrets or using the network facilities for their own personal use.
  • 129. 6 Using Networks 6.5.1 Misuse of Networks – Social Issues
    • Encryption
      • Encrypting data is a method of coding it, in order to make it difficult or even impossible for someone to read it unless they have authorisation from you. Some governments make encrypting data illegal, others regard it as an individual right. T here is a trade-off between security and convenience.
      • Encryption is classified according to the number of bits needed for the key used to encode the data. The more bits that are used, the longer it takes for the code to be cracked. As computers increase in power, the time and resources needed to crack such codes decreases, so the minimum encryption key size needs to increase as computer technology improves.
      • At the moment email on most networks is un-encrypted and insecure, as messages are sent as plain ASCII text. One popular and free encryption system currently available is Pretty Good Privacy (PGP), although until recently PGP was regarded as “ mutinous “ by the USA government and its inventor was prosecuted for allowing details of how his system worked to be posted on the Internet.
  • 130. 6 Using Networks 6.5.1 Misuse of Networks –Disconnection
    • Disconnection
      • Many people feel that the Internet has accentuated the difference between the rich and the poor. People in western countries are described as "Information rich" whereas most people in the Third World are "Information poor", since connecting to to the Internet requires expensive equipment and access to a networking infrastructure which does not exist in many poor countries.
  • 131. 6 Using Networks 6.5.1 Misuse of Networks – Social Isolation
      • Social isolation
        • There is a fear that the increased use of electronic communication will mean that many people will become physically more isolated from each other. The Internet encourages the creation of global communities, but may result in neighbours not seeing each other for weeks on end.
  • 132. 6 Using Networks 6.5.2 Misuse of Networks – Ethical Issues
    • Netiquette
      • There are several conventions and a whole new vocabulary which has developed with regard to how you should behave on Internet newsgroups, using email, etc. Simple rules such as not sending " spam " (unsolicited commercial email), not shouting (writing in capital letters) and respecting people’s privacy may seem obvious, but it is easy to make mistakes without realising it. The best policy when subscribing to a newsgroup or joining a list server is to "listen" quietly for a while to see how others behave before you submit any contributions yourself.
  • 133. 6 Using Networks 6.5.2 Misuse of Networks – Ethical Issues
    • Misrepresentation
      • The ability to post messages on newsgroups or discussion lists anonymously means that offensive statements can be made without the person making them being held to account.
  • 134. 6 Using Networks 6.5.2 Misuse of Networks – Ethical Issues
    • Surveillance and monitoring
      • The email you send and receive, the pages you view and the files you download via the Internet can all be logged by a number of organisations. These organisations may not always have your best interests at heart.
  • 135. 6 Using Networks 6.5.2 Misuse of Networks – Ethical Issues
    • Chatrooms
      • A re popular with young people who use the Internet as they enable users to communicate in real time with others from all over the world. A chatroom on the Internet is an area where users can type messages which can be read immediately by anyone else connected to the same server. Communication is slow because of the need to type the messages, but this disadvantage is outweighed by the immediacy of the system. One problem with chatrooms is that there is no way of verifying that the person you are communicating with is who they say they are. They may have lied about their age, their sex, or why they are interested in chatting with you.
  • 136. 6 Using Networks 6.5.3 Misuse of Networks – Network Etiquette
    • Netiquette
      • While there are no international standards of behaviour on networks, there is an accepted code of conduct often referred to as netiquette.
      • Netiquette is usually just common sense. Network administrators are the only users of a network who have access to all the files on a network - it is considered unprofessional for a network administrator to access any personal file unless they are required to do so to perform their job.
  • 137. 6 Using Networks 6.5.3 Misuse of Networks – Network Etiquette Rules
    • Some network rules of etiquette on a LAN are:
      • do not use other peoples identities and passwords;
      • do not attempt to access files which are not yours; avoid wasting disk storage space or bandwidth unnecessarily. (Keeping your entire music collection in MP3 format on your network drive or downloading large video files at peak times of Internet use are activities unlikely to endear you to your network administrator);
      • avoid causing other people unnecessary work. It may be entertaining to install the latest screen-saver on your network station, but the next user is unlikely to appreciate having to re-boot the machine because they do not know the password, and the network administrator is unlikely to enjoy un-installing it.
  • 138. 6 Using Networks 6.5.3 Misuse of Networks – Network Etiquette 2
    • Some network rules of etiquette on a WAN are:
      • Avoid wasting bandwidth by sending unnecessary emails, attaching uncompressed files or creating web pages with large or unnecessary graphics on them;
      • Be aware that the Internet is used by people with a large variety of different machines running different operating systems and different browsers. If you want other users to access information, try to store the files in a format which is going to be easy to read for everyone. ASCII code is the simplest format for text. CSV is the simplest format for a database;
      • Try to create web pages which are readable no matter what resolution your monitor is set to use.
  • 139. 6 Using Networks 6.5.3 Misuse of Networks – Network Etiquette
    • Email etiquette
      • email messages should be concise and to the point;
      • remember to make the subject line relevant to the message you are sending.
      • do not repeat email messages. Give the recipient time to read your email and to respond to it;
      • be professional and careful what you say about others.
      • email is not a secure means of communication as it is transmitted without encryption.
      • when being humorous, use emoti c ons to express humor. (Tilt your head to the left to see the emoti c on smile) :-) means happy face;
      • typing mail messages all in upper case is considered SHOUTING! and rude;
      • do not send people chain letters or hoax virus warnings. Such email just reduces the bandwidth available for everyone;
      • avoid sending anyone spam ;
      • do not attach large files to an email message without asking the recipient’s permission first.
  • 140. 6 Using Networks 6.5.3 Misuse of Networks – Network Etiquette
    • Usenet etiquette
      • All of the email etiquette rules apply to Usenet.
      • remember to be courteous and respect others:
      • when quoting someone else, remove what is not directly applicable to your reply.
      • Do not automatically quote the entire body of messages you are replying to when it is not necessary. Leave only the minimum necessary to provide context for your reply.
      • it is extremely rude to forward personal email to mailing lists or a newsgroup without the original author’s permission. only messages meant to be read by the entire group should go to the list. Send a personal mail message aimed at one person to that person.
      • posting an advertisement in news groups, unless it is specially chartered for that purpose like the for-sale newsgroup, or sending unsolicited advertisements with email is considered rude.
  • 141. 6 Using Networks 6.5.3 Misuse of Networks – Network Etiquette
    • Listserver etiquette
      • All of the Usenet etiquette rules apply to listservers, though as your messages will arrive as emails to the members of the list, it is best to be even more careful than when posting to a newsgroup. Some list servers generate large amounts of email every day. It is often wiser to receive the messages in digest form as one single email containing all the messages posted that day.
      • Here are a few guidelines:
        • when signing up for a group, save your subscription confirmation email for reference, so that if you go on holiday or no longer wish to receive the list messages, you will have the subscription address for suspending mail;
        • if you lose interest in a list-server, un-subscribe from it so that the messages being sent to you do not clog up the network.
  • 142. 6 Using Networks 6.5.3 Misuse of Networks – Network Etiquette
  • 143. 6 Using Networks 6.5.4 Hacking
    • Controlling access to the network
      • The network operating system is responsible for security on the network. The most obvious example of this is when a user logs on. The user must supply an identity and a password. The operating system compares the data entered with the identities and passwords in its database and if the two do not match up then it will not allow that user any access to the resources on the network.
      • If the identity and password do match, then the resources which the user has access to will depend on the level of access that user has been given by the network manager.
      • The access a user has to resources depends on that user’s level of permissions .
  • 144. 6 Using Networks 6.5.4 Hacking
    • Controlling access to network resources
      • The easiest way to control different levels of access is to divide users into groups. Each group can have different levels of access to the shared network resources. Such as a printer or need to be able to alter files in a particular section of the organisation’s Intranet. Once groups have been set up with different permission levels, it is easier to give one or more users access to a resource by making them a member of a group than to individually change the permissions for each user. When a user tries to access a resource, whether it is a printer, a file or an area of disk storage, the operating system checks against the permissions for that resource. If the user or the group they belong to does not have permissions for that resource then their access is denied. Users will probably be given full permissions to their own file area, but only read access to parts of the Intranet, read/execute access to applications areas, and no access at all to network management areas or other user’s files.
  • 145. 6 Using Networks 6.5.4 Hacking
    • Security on the Internet
      • This is of particular concern to anyone purchasing goods or services using e-commerce. Many people are concerned that their credit card details are being transmitted over the Internet when they use e-commerce systems.
      • Anyone using an online bank account also needs to be reassured that the system they are using to access their financial details is secure.
      • A secure web browsing protocol named Secure Hyper Text Transmission Protocol (SHTTP) has been developed for this kind of transaction. SHTTP ensures that data transmitted using this protocol encrypts the data before it is transmitted using SSL (Secure Sockets Layer) originally developed by Netscape.
      • Other security systems on the Internet depend on the issuing of digital certificates which guarantee that you are who you say you are.
  • 146. 6 Using Networks 6.5.5 Viruses
    • A virus is a piece of programming code that causes some unexpected and usually undesirable event in a computer system.
    • They are often designed so that they automatically spread to other computer users on a network. Viruses can be transmitted as attachments to an e-mail, as a download, or be present on a disk being used for something else.
    • Some viruses take effect as soon as their code takes residence in a system whilst others lie dormant until something triggers their code to be executed by the computer.
    • Viruses can be extremely harmful and may erase data or require the reformatting of a hard disk once they have been removed.
  • 147. 6 Using Networks 6.5.6 Legal Protection
    • Censorship and pornography
      • What is legal in one country may not be legal in another.
      • Not all governments encourage the free debate of political subjects and many governments try to block access to political debate which is critical of them.
      • Many people believe that children should be protected from violent, pornographic or extreme political material, though of course what is considered to be extreme depends on the society.
      • T he world-wide nature of the Internet makes it very difficult if not impossible to control. An international standard of "rating" web pages for violent or sexual content has been developed which makes controlling access easier .
      • Many educational institutions and some Internet Service Providers install filtering software on their Proxy Server which can be set to deny access to web pages or news groups which contain offensive material.
      • Commercial organisations may deny their users access to entertainment or other services because they believe that their employees should only access material which is relevant to their work.
  • 148. 6 Using Networks 6.5.6 Legal Protection
    • Taxation
      • Buying and selling on the Internet makes it very difficult indeed to impose taxes, import duties or other fees, particularly if the item purchased such as software, music, or access to information can be transmitted electronically and does not have to be physically delivered to the purchaser.
      • If you work in one country but are employed in another (tele-commuting) where should you pay tax? Who should pay for your National Insurance? Which country’s employment laws should apply?
  • 149. 6 Using Networks 6.5.6 Legal Protection
    • Copyright
      • The Internet has made the distribution of software cheap and easy, but of course this also means that the distribution of illegal copies of software is just as easy.
      • Software piracy is a major problem in many parts of the world. Many people argue that software piracy increases the cost of software because software distributors need to charge more to recover the cost of research and development if only a percentage of those using the software are actually paying for it.
      • In addition to conventional software licensing, there are a number of alternative software distribution models in existence, including Shareware , Adware and even Freeware .
      • The Internet has made many of these distribution models viable because it provides a large enough market and removes the cost of distribution from the developer.
      • There is also concern over copyright concerning images and other data available on the Internet. The fact that this data is on a web page and anyone can access it does not make it freely available for anyone to take for themselves and publish it under their own name.
  • 150. 6 Using Networks 6.5.6 Legal Protection
    • Computer Misuse Act
      • In the United Kingdom, the Computer Misuse Act (1990) covers using computers to damage or steal data.
      • The Computer Misuse Act covers crimes such as breaking into computer systems or networks to destroy or steal data and propagating viruses which destroy or damage information or computer systems.
  • 151. 6 Using Networks 6.5.6 Legal Protection
    • Data Protection Act
      • In the United Kingdom, the Data Protection Act (1998) describes the duties and responsibilities of those holding data on individuals.
      • It also describes the right of these individuals.
      • In general, it is the duty of those holding data on individuals to register with the Data Protection Registrar, to keep the information secure, make sure it is accurate, and to divulge it only to those persons who are authorised to view it.
      • It is the right of an individual who has data stored concerning them to view that information and to have it changed if it is inaccurate.
      • There are a number of organisations which may be given exemption from this act - namely the Police, Customs, National Security and Health Authorities.
  • 152. 6 Using Networks 6.5.6 Legal Protection
    • Copyright Designs and Patents Act
      • Copyright is the ownership of intellectual property outlined by a particular nation’s or international law.
      • In the UK, the Designs and Patents Act of 1988, and legislation in other countries who signed the Berne Convention, provide protection.
  • 153. 7 – Computer Software 7.1 Introduction
    • This unit on computer software considers the software that is required to support the use of computer systems.
    • We consider the Different Categories of Software
      • Emphasis is on systems software
      • Also look at applications software & graphics
      • Selection of software and file formats in LAN, Multimedia applications and web sites
  • 154. 7 – Computer Software 7.2 Systems Software
    • System software is designed to enable you to run a computer without having to know exactly what’s going on inside.
    • System software controls the actual operation of the computer system.
    • You can enter instructions to the computer by typing at the keyboard or clicking on a mouse and the system software will convert these instructions into the low-level operations needed for the computer to carry them out appropriately.
    • T he operating system is part of the system software.
  • 155. 7 – Computer Software 7.2 Systems Software – Operating System
    • Manages the hardware & communicates with the user in 5 key areas.
      • User Interface
      • File Management
      • Input and Output
      • Memory Management
      • Kernel
    • O/S is broken down into layers so updates can be written for specific layers.
    • Some parts of O/S held in ROM chips, but most parts held on disk – can be corrupted.
    • O/S manages processes – programs in execution
  • 156. 7 – Computer Software 7.2.1 Starting up
    • The most essential and frequently used instructions of the operating system are held in main memory. This part of the operating system is known as the supervisor, executive or kernel.
    • The remaining part of the operating system can be loaded into memory whenever it is needed.
    • On power up computer carries out tasks to check that the basic hardware is operating correctly. It then tries to load the o/s program into main memory. Checking hardware, locating and loading the operating system is carried out by a small program called a boot program that is held in ROM.
    • Booting means " to pull yourself up by your own bootstraps". The o/s builds its capability using what it already has, the ROM boot program, to load itself from disk into RAM.
    • Once the operating system is loaded into main memory, it runs until the computer is switched off.
  • 157. 7 – Computer Software 7.2.1.1 ROM Based Operating Systems
    • In ROM based operating systems, the operating system is held on a ROM chip.
    • A dvantages
      • releases main memory for applications
      • P revent s the o/s from being corrupted.
      • tak es very little time to load and be up and running.
    • Changes to the operating system require an alteration to the ROM program and subsequent chip replacement.
  • 158. 7 – Computer Software 7.2.1.2 Disk Based Operating Systems
    • With a disk based operating system the system software is held on backing storage and loaded into main memory when the machine is switched on.
    • Some computers have the operating system and utility software pre-installed on the hard disk otherwise the user must install and configure the software.
    • Originally , systems software was distributed on floppy disks. These days, desktop operating systems are so large that they are distributed on CD-ROM, or upgrades can be downloaded directly from manufacturer’s websites.
    • Features of Disk Based Systems
      • Easy to upgrade via CD or the Internet
      • Can get corrupted or damaged but easily re-installed
  • 159. 7 – Computer Software 7.2.2 User Interfaces
    • The most common styles include:
      • form filling
        • Seen in specialised applications such as configured database systems. Used to control the information entered.
      • menu driven
        • Provide users with a set of options. Restricts users to those options but easy to use for novices.
      • command
        • User types in commands. Can be very powerful, but hard to learn. For expert users usually.
      • graphical user interfaces
        • Generally uses the desktop metaphor> Users mouse as pointing/selecting/initiating device.
      • natural language.
        • Speech input and written language.
  • 160. 7 – Computer Software 7.2.3 File Management
    • The operating system supervises the creation, deletion and updating of files.
    • It deals with floppy & hard disks, CD-ROM and DVD, Memory sticks etc.
    • Disks are divided into tracks and sectors. Each sector has an address.
    • Simplest way of finding free space - search the disk until a suitable space can be found. Too slow for practical purposes, - better approach is to use an index file to keep track of the files and space on a disk.
    • The use of an index means that some of the space on the disk is used to keep the index file, reducing the amount of space available for user files.
  • 161. 7 – Computer Software 7.2.3 File Management
    • Index on a disk
      • File Allocation Table (FAT). Set aside a fixed amount of space on the disk for the index, related to the number of files that the system can manage.
      • E.g. a FAT12 system is capable of dealing with 2 12 or 4096 entries, uses little space on the disk. FAT12 is used for MS-DOS floppy disks and very small hard disks.
      • FAT16 gives 2 16 entries - much larger hard disks.
      • FAT32, which provides 2 32 entries for very large disks.
      • Files allocated to clusters of sectors – reduces no of entries in FAT table
      • A sector can contain either part of a file or 1 file. Lots of wasted space with many small files. A very large disk may have very large sectors and minimum file size may be 128K.
  • 162. 7 – Computer Software 7.2.3 Hierarchical Filing System
    • A hierarchical filing system is shown.
      • folder icons represent directories
      • rectangle icons represent files.
      • users can group related data into directories.
      • It is possible to have many files of the same name existing in different directories.
      • The file management system holds pathnames, providing unique identifiers for every file and directory that is created.
  • 163. 7 – Computer Software 7.2.4 Memory Management
    • The operating system decides what programs and data a re to be placed in memory.
    • It also keeps track of what stage a program is at and this applies equally to the operating system's own memory space .
    • If corrupted it could cause the computer to crash
  • 164. 7 – Computer Software 7.2.4.1 Multitasking
    • The simplest method of memory management is to have just one process in memory at a time. It uses all the memory there is. One problem is that a program needs to be entirely self-reliant and contain, for example, drivers for all I/O devices it needs to use. This method is no longer used.
    • The technique simple PCs was to have the o/s and one user program at a time in memory. Basic Input Output System (BIOS) containing device drivers in ROM. This is called monoprogramming because there is only one user program in memory at a time. DOS works in this way.
    • Windows offers multi-tasking . where several applications or tasks are (apparently) available at the same time, and the user can switch easily between one application and another.
    • Similarly, Windows offers foreground/background processing. The foreground task can claim sole use of the processor but other background tasks can make use of the processor whenever the foreground task doesn’t need it.
  • 165. 7 – Computer Software 7.2.5 Input / Output
    • The I/O system handles the interactions between the processor and all the devices that are part of the computer system. E.g. keyboard, the mouse, disk drives, modems and monitor.
    • The I/O system also has to deal with external devices. E.g. printers and scanners.
    • Peripherals work in different ways and at different speeds. All slower than the computer’s processor and memory.
    • I/O system getting devices to work at their highest useful rates.
    • Software can be thought of as organised in layers.
    • lower layer deals directly with the hardware.
      • consists of device drivers, software that handles one device or type of device.
    • upper layer presents an interface to the user or application.
      • The upper level is the I/O control system, which takes commands from the user checks them, and sends them to the appropriate part of the lower level. The lower level consists of device drivers.
  • 166. 7 – Computer Software 7.2.5 Input / Output - 2
    • This diagram shows how these levels are related. An application starts things off by making a system call that demands action from the I/O system.
  • 167. 7 – Computer Software 7.2.5.1 Direct Memory Access
    • A device controller usually has its own memory on board. This enables it to use Direct Memory Access (DMA) to get data to and from the computer’s memory.
    • In DMA, the processor only sets up the transfer. Thereafter, some clock cycles are used by the I/O system for the data transfer. During these cycles, the processor is doing nothing but, during the other cycles, the processor can be getting on with its work: it doesn’t have to suspend the current process or spend time on context switches. On the whole, DMA saves time by saving the processor for other things than supervising data transfer.
  • 168. 7 – Computer Software 7.2.5.2 Virtual Devices
    • A virtual device seems, to the user, like an actual device but is, in fact, a simulation maintained by the I/O system.
    • E.G A Print spooler
      • a virtual device, that takes data sent to the printer, stores data temporarily on disk, and prints the data when the system is ready to do so.
      • Several print jobs can be sent to the printer at the same time and will be dealt with in an orderly manner.
      • The jobs are placed in a print queue and serviced one by one.
      • a user does not have to wait while the actual printing takes place but, having sent a print job to the spooler, can get on with other work on the computer.
  • 169. 7 – Computer Software 7.2.5.3 Buffering
    • All I/O is relatively slow.
      • Input by typing is painfully so. Screens and printers work a fair bit faster. I/O system needs to use the devices efficiently so as not to waste the CPU.
    • A buffer is an area of memory set aside to help in the transfer of data between the computer and a device.
      • A buffer provides a sort of barrier between parts of the computer system that work at different speeds.
      • Buffering is used in sending blocks of data. Data is transferred into the buffer until it is full. Then the entire block is sent at once. This is more efficient than having the data trickle through the system.
      • single buffering, the receiver has to wait for a block before it can do anything with it, and the transmitter of the data has to wait for the receiver to have processed the block before it can send another.
      • With double buffering, two buffers are used and, as one is emptied, the other is being filled up. This makes more efficient use of both transmitter and receiver of the data.
  • 170. 7 – Computer Software 7.2.5.4 Device Drivers
    • Device drivers are specialist software components that facilitate the operation of physical devices attached to the system. Without an appropriate device driver the system cannot communicate with a device, rendering the device useless.
    • Each variety of device will have different hardware. For optimum performance, each device should be used with a device driver specifically written for use with that device. Some devices such as CD-ROM drives are currently so similar that it is possible to use a ’generic’ driver in conjunction with just about any CD-ROM.
    • Modern operating systems offer the facility of adding device drivers to a system, at the same time that the device itself is added.
  • 171. 7 – Computer Software 7.2.5.5 Plug and Play
    • Adding a new device to a system
      • Historically a difficult and fiddly process. Often a new control card has to be plugged into the computer. Very often, switches on the device would have to be set by hand. Then the computer system would need a lot of tweaking before the operating system and the device could communicate in a satisfactory way.
    • Plug and play
      • tries to make installation more automatic.
      • Standard agreed between the companies responsible for the different parts of a computer system.
      • Windows automatically detects all plug and play devices on the system.
      • The user has to supply very little information during installation and nothing at all from then on.
  • 172. 7 – Computer Software 7.2.6 Kernel
    • The kernel
      • central component of the system, upon which all of the other components depend.
      • The kernel co-ordinates the activities of the system.
      • typical operations of the kernel of single user system include:
        • if a key is pressed, the device driver will notify the kernel which will pass the request to the user interface.
        • If the user interface requests that a file be moved, the kernel will pass the request to the file system. Once the file system has finished, any messages from the file system will be sent to the user interface;
        • if the user interface wishes to send a message to the user, the kernel will notify the device drivers for the output device (such as monitor or printer).
        • In multi-tasking / multi-user systems the kernel will usually also be responsible for managing the processes as well.
  • 173. 7 – Computer Software 7.3 Utility Programs
    • Utility programs enhance the operating system.
      • Utility used to maintain a system
      • Applications external to the use of the system.
    • Examples
      • 1 Disk partitioning tools
      • 2 disk formatting programs
      • 3 file compression utilities
      • 4 disk defragmentation tools
      • 5 virus checking tools
  • 174. 7 – Computer Software 7.3.1 Disk Partitioning Tools
    • Disk partitioning tools are used to divide one physical device into more than one logical device.
    • Some operating systems require a disk to be partitioned before installation can take place, other systems provide the user with the facility to partition a disk for the purpose of convenience e.g user data.
    • The disk partitioning tools provided with many operating systems can be regarded as a little primitive and unfriendly, but are usually sufficient for all but the most exotic of requirements.
  • 175. 7 – Computer Software 7.3.2 Disk Formatting Programs
    • Disk formatting programs are used to prepare the surface of writeable media for use.
    • The process often involves laying down ’markers’ for future use.
    • Formatting a disk usually deletes any existing data on that disk, so caution should be exercised.
    • File compression utilities
    • File compression utilities are used to reduce the amount of space that a file takes up on disk. It will take a small amount of time to decompress a file, and also some time to compress a file before storage.
  • 176. 7 – Computer Software 7.3.3 Disk Defragmentation Tools
    • Disk defragmentation tools are used to combat the problem of file fragmentation.
      • Ideally,all of a file should be located in the same area of a disk, as this speeds up file accesses.
      • Files are often broken up, with the various portions of the file dispersed across the disk.
      • This usually happens when a number of small files are deleted from a disk, and the file system chooses to fill in the gaps left by the deleted files when the next file is saved.
      • A defragmentation utility reorganises the way the files are laid out on the disk so that the components of a file are near to each other.
      • Some operating systems are more prone to fragmentation than others, so not all systems will ship with a utility of this type.
  • 177. 7 – Computer Software 7.3.5 Anti-Virus Software
    • Used to prevent the spread of viruses.
      • Payload of a virus is the damage caused.
      • Can reside in operating system and start up on boot-up making the machine run slowly and do strange things.
      • May overwrite part of the O/S – machine useless.
    • Anti-Virus software operates in different ways including
      • 1. monitoring the size of files (if a program suddenly changes size this may indicate that a virus has attached to it);
      • 2. monitoring the system for ’suspicious’ activities, such as trying to modify important files;
      • 3. checking to see if a characteristic series of program instructions known as a signature appears in a file. The appearance of a recognised signature is an indication that a known virus is infecting a system.
  • 178. 7 – Computer Software 7.4 Graphic Applications
    • Many applications use computers to generate images.
      • The images can be an end in themselves, for example using a painting or a drawing package to generate a diagram or picture.
      • These packages can vary in sophistication, from simple 2 dimensional object rendition, or elementary paintings to professional design work used by graphic illustrators.
      • E.g. Computer Aided Design – suite of programs used to design kitchens, buildings etc. Also can cost up total job, produce bill of materials etc.
      • E.g. Animations and simulations. Games etc rely on animations produced in drawing packages and imported into authoring environment. Also with “live action” used in TV and film industry.
  • 179. 7 – Computer Software 7.4.1 JPEG
    • JPEG (Joint Photographic Experts Group) is a group of experts that develop and maintain standards for compression algorithms for computer image files.
    • Any graphic image file created or converted using a JPEG standard is given this name.
    • A JPEG file is created by choosing one of the set of compression algorithms available.
    • For example, similar colours and minor changes in colour, need not be coded separately.
    • JPEG processing makes image files small by removing detail. This is called a lossy compression. This will reduce the number of colours used to store the image and avoid unnecessary repetition of bit patterns.
    • The highest quality results in the largest file size so a trade off has to be made between image quality and file size.
    • JPEG is one of the image file formats supported on the WWW suffixed by ".jpg".
  • 180. 7 – Computer Software 7.4.2 GIF
    • The web also supports GIF (Graphics Interchange Format) images.
    • These images are based on a compression algorithm that creates a codebook or dictionary of particular bit patterns. These in turn, are then substituted resulting in a smaller file.
    • When decoding, the algorithm uncompresses the file to generate the original image.
    • Significantly, GIFs preserve all the precise shapes in an image i.e. result in lossless compression.
    • Restricted to 256 colours
  • 181. 7 – Computer Software 7.4.3 TIFF
    • TIFF (Tag Image File Format) is a common format for encoding bitmap images e.g. scanner images, and can be any resolution.
    • TIFF files can be in any of several classes, including gray scale, colour palette, or RGB full colour, and can include files with JPEG and GIF formats.
    • A TIFF file can be identified as a file with a ".tiff" or ".tif" suffix.
  • 182. 7 – Computer Software 7.5.1 Multimedia Software
    • Multimedia
      • combination of text, graphic artwork, sound, animation and video data types delivered to the user by computer or other electronic means.
      • If the end user can control what is displayed, then it is called interactive multimedia .
      • When data elements are linked to form a structure through which the user can navigate then it is called hypermedia . The World Wide web, e.g, is a hypermedia environment.
  • 183. 7 – Computer Software 7.4.1 Multimedia Software - 2
    • Applications of multimedia
      • Examples include the development of a World Wide web site, training and education programmes where information is presented for learning, or CD-ROM based encyclopaedias and games.
      • Multimedia in the home includes anything from cookery to interior design. Although currently CD-ROM based, in future most multimedia software will reach the home via television sets with an in-built mechanism for user interaction.
      • A pay-for play mechanism will allow you to download applications and entertainment packages as you require them.
      • In public services, such as transport, museums, libraries and shopping centres, multimedia information kiosks designed to provide information and assistance at thet ouch of a button will become more prevalent.
  • 184. 7 – Computer Software 7.5.1.1 Common Features
    • The software that allows you to put the different data elements together, build interactivity and navigation is called authorware.
    • Authorware packages support the following basic authoring operations .
      • ability to import media types;
      • editing, particularly text and static images;
      • organising navigation;
      • programming - visually using icons and objects;
      • scripting language;
      • playback;
      • delivery by building a run-time version of the project that does not need the full authoring software to execute.
    • Examples of authoring software include: Macromedia Director, Apple’s Hypercard and Windows Toolbox.
  • 185. 7 – Computer Software 7.5.1.3 Interactive Presentations
    • Images
      • Simple graphs & charts from spreadsheet as well as colour images.
    • Video
      • Great deal of storage space & memory needed.
      • If computer not powerful enough or bandwidth too low the video appears jerky.
    • Sound
      • Similar problems as with video so MP3 standard introduced.
    • Animations
      • From animated GIF files to full blown animated films. Great skill needed by animators.
  • 186. 7 – Computer Software 7.5.2 Web Software
    • The World Wide Web
      • is a mass of global resources accessed anywhere in the world.
      • Uses a Uniform Resource Locator (URL) and a browser.
      • Websites can be built with many different tools but all contain pages in HTML
      • HTML is interpreted by a browser .
      • Hyperlinks are viewed by the browser as demands to fetch and display a new page.
      • World Wide Web Consortium (WC3) founded in 1994
        • Develop common protocols that promote evolution of WWW
        • To ensure WWW interoperability
  • 187. 7 – Computer Software 7.5.3 Network Software
    • All Stations should have the same O/S to use the network system and to share messages on the network system.
    • Data Integrity – When an error is detected the Network O/S has to inform the network and the packet of data has to be re-transmitted.
    • Multi-User Access – A user ID controls what the user has access to on the network.
    • File Attributes – A user usually has read/write (r/w) access to their own files, read-only access to shared files.
    • Encryption of Data – Typical networks hide data from the user, but a print server prints documents from many workstations and a fileserver often serves the whole network.
  • 188. 8 – Supporting Software 8.1 Introduction
    • This unit on Supporting Software considers the factors affecting the deployment of software on a system.
    • These include compatibility issues between the software and the intended hardware and operating system.
    • Once up and running, the issue of protecting software and systems from viruses is then considered.
  • 189. 8 – Supporting Software 8.2 Application Software
    • Application software supports user tasks.
      • Reports, database, spreadsheet, artwork, web pages etc.
      • GPPS of same genre often very similar.
      • Need to match the correct package to the intended tasks.
      • GPPS offer less functionality than specialised packages e.g. art facilities in Word nothing like in Photoshop.
      • You should be familiar with
        • General class of functions that different types of app packages support
        • Data standards that facilitate the exchange of data between packages.
  • 190. 8 – Supporting Software 8.2.1 Application Requirements
      • When buying software applications it is important to ensure that they will not conflict with your operating system or your hardware. If there are problems then your software will not run properly if at all! Each application software package includes details of the minimum system specification required to run the application. This will include:
        • operating system;
        • minimum RAM;
        • minimum processor speed;
        • minimum hard disk space;
        • peripherals required.
  • 191. 8 – Supporting Software 8.2.2 Software Compatibility
    • Whether you are installing or upgrading software, checking your hardware and software and O/S for compatibility is essential.
    • The main factors to consider are:
      • Memory requirements;
      • Storage requirements;
      • Operating System.
    • It is important that checks are made to make sure you have the needed software, hardware, and operating system to run the application before installing.
  • 192. 8 – Supporting Software 8.2.3 – 8.2.5 Compatibility Requirements
    • Memory requirements
      • Software specifies minimum RAM to run, but may need more for enhanced performance..
    • Storage Requirements
      • Not only need enough disk space to install the s/w but take account of space needed for large data files (video, sound etc.)
    • Operating System
      • S/W usually upwards compatible for a while (W98 s/w may well work on XP) but not guaranteed.
        • Device drivers needed may not be available any more.
        • Large steps up not usually supported e.g. W95 on XP
  • 193. 8 – Supporting Software 8.3 Viruses
    • A virus is program code that causes some undesirable and unexpected event to happen in a computer.
    • Viruses are usually disguised as something innocent and are designed so that they automatically spread within or between computer systems.
    • Viruses can enter a system as an attachment to an e-mail, download from the web, or from on a disk or CD.
    • Some viruses take effect as soon as their code is executed.
    • Others can wait until circumstances cause their code to be executed by the computer.
    • Viruses can be quite harmful and erase data or close down a system.
  • 194. 8 – Supporting Software 8.3.1 Virus Types
    • File Virus
      • Attached to .exe or .com files or complete program or script attached to e.g. e-mail
      • Resident in computer ready to cause havoc
    • Boot Sector Virus
      • These infect executable code found in boot sector on disks or the master boot record on hard disks.
      • To infiltrate the boot sector, the virus is read while the system is running and then activated the next time the operating system is loaded.
    • Macro Code Virus
      • Macro viruses are fairly common viruses, but tend to do the least damage. Macro viruses infect applications and typically cause a sequence of actions within the application e.g. inserting unwanted words or phrases in a document.
  • 195. 8 – Supporting Software 8.3.1 Virus Code Actions
    • Viruses use a combination of actions
      • Replication
        • Virus attaches itself to any type of file and replicates very quickly. Can replicate many times before activation
      • Camouflage
        • Takes on characteristics that detection software looks for. Good anti-virus s/w aware of this and makes more checks (check sum etc.).
      • Watching
        • Lies in wait and ambushes when codintion is met e.g. correct date.
      • Delivery
        • Used to be floppy disks, now e-mail. Virus waits for trigger to drop its payload.
  • 196. 8 – Supporting Software 8.3.3 Other Infections
    • A worm is a self-replicating virus that does not alter any files but takes up residence in the computer’s active memory and duplicates itself. They only become noticeable once their replication consumes the memory to the extent that the system slows down or is unable to carry out particular tasks. Worms tend to use the parts of the computer’s operating system that is not seen by the user until it is too late.
    • A Trojan horse is a program where harmful code is contained inside another code which can appear to be harmless. Once the apparently harmless code is in the computer, it releases the malicious code to do its damage.
  • 197. 8 – Supporting Software 8.4 Anti-Virus Techniques
    • Checksum
      • A checksum of key files is recorded. At run time checksum run again – if discrepancy then file could be infected.
    • Virus Signatures
      • Signature is unique pattern of bits within a virus. Once it is known anti-virus s/w uses it to identify and remove virus.
    • Heuristic detection
      • Approaches problem through past knowledge. Works on probability of file being infected e.g. finds file that checks for date.
    • Memory Resident Monitoring
      • Anti-virus s/w stays in memory at start-up and actively monitors the system. Delays in loading and execution of programs.
  • 198. 8 – Supporting Software 8.5 Virus Information Library
    • Using a virus information library
      • Literally thousands of viruses have been detected and catalogued using a Virus Information Library (VIL). One such VIL can be found at:
      • http://vil.nai.com/vil/
      • Using this or another source, find the details of at least one of each type of virus:
    • file
    • boot
    • macro
    • worm
    • trojan
    For each one, make a note of the following: 1. name: 2. type: 3. symptoms: 4. date discovered (find a recent one): 5. medium for infection (e.g. email, website): 6. cure (if any):