The document is the first chapter of a textbook on computer fundamentals. It introduces computers by defining them as electronic devices that can perform high-speed calculations and process data. It describes the characteristics of computers and how they have evolved over several generations from early mechanical calculators and vacuum tube-based machines to today's integrated circuit-based devices. The chapter also outlines the key hardware and software technologies of each generation of computers.
The document provides an overview of software programming and development. It defines key concepts like software, hardware, programming languages, compilers, interpreters, and algorithms. It discusses low-level languages like machine code and assembly, and high-level languages like C/C++, Java, and .NET. It also explains the planning process for computer programs using algorithms, flowcharts, and pseudocode and the differences between compilers and interpreters. The document aims to introduce foundational topics in software engineering.
Class 1: Introduction - What is an Operating System?David Evans
The document provides an overview of operating systems and what constitutes an operating system. It discusses how operating systems manage computer hardware resources, provide common services for application programs, and act as an intermediary between the user and hardware. The document notes that operating systems vary in how they accomplish these tasks based on the type of computer, whether it's a mainframe, PC, or mobile device. It also discusses how operating systems abstract away the messy hardware interfaces to provide cleaner interfaces for application programs.
This document summarizes key concepts about computer networks:
1. It defines local area networks (LANs) and wide area networks (WANs), noting that LANs connect computers that are physically close while WANs connect computers distributed beyond metropolitan areas.
2. It explains that networks allow computers to share files, resources, and programs. Servers contain shared resources and clients access those resources. Networks can be configured in a dedicated server model or peer-to-peer.
3. Essential networking hardware includes network interface cards, cables, hubs/switches, and software for connections and resource sharing. Wireless networks also connect devices without cables.
Notes of c programming 1st unit BCA I SEMMansi Tyagi
This document discusses the basics of the C programming language. It covers the structure of a basic C program, which must include a main function with declaration and executable parts. C tokens like keywords, identifiers, constants, operators and strings are also introduced. The document then discusses C program development steps like understanding the problem, planning input/output, designing an algorithm, coding, testing and debugging. It provides a high-level overview of the C language and programming in C.
Operating System- Services,types.Batch files and DOS historySURBHI SAROHA
The document discusses operating systems and provides definitions and examples of different types of operating systems, including batch, time-sharing, distributed, network, and real-time operating systems. It also covers file systems, DOS commands, batch files, and the history of DOS. The key points covered include definitions of an operating system and its main functions, examples of popular operating systems like Linux and Windows, and characteristics of different types of operating systems.
A computer network connects multiple computers and devices to allow communication and sharing of resources. There are different types of networks including local area networks (LANs) within a single building, metropolitan area networks (MANs) within a city, and wide area networks (WANs) across large distances like countries. Common network topologies include bus, ring, star, tree and mesh configurations. Computer networks enable file sharing, printer sharing, collaboration, remote access, data protection, and centralized administration.
Internal parts of a computer and their functionsEmily-scamell
The document describes the main internal components of a computer and their functions, including the CPU that controls processing, the screen that allows viewing of processing, and the power supply that provides electricity to components. It also mentions the motherboard that connects components, RAM for main memory, expansion cards for enhancing functions, and storage devices like hard drives and optical drives for reading data from disks.
The document is the first chapter of a textbook on computer fundamentals. It introduces computers by defining them as electronic devices that can perform high-speed calculations and process data. It describes the characteristics of computers and how they have evolved over several generations from early mechanical calculators and vacuum tube-based machines to today's integrated circuit-based devices. The chapter also outlines the key hardware and software technologies of each generation of computers.
The document provides an overview of software programming and development. It defines key concepts like software, hardware, programming languages, compilers, interpreters, and algorithms. It discusses low-level languages like machine code and assembly, and high-level languages like C/C++, Java, and .NET. It also explains the planning process for computer programs using algorithms, flowcharts, and pseudocode and the differences between compilers and interpreters. The document aims to introduce foundational topics in software engineering.
Class 1: Introduction - What is an Operating System?David Evans
The document provides an overview of operating systems and what constitutes an operating system. It discusses how operating systems manage computer hardware resources, provide common services for application programs, and act as an intermediary between the user and hardware. The document notes that operating systems vary in how they accomplish these tasks based on the type of computer, whether it's a mainframe, PC, or mobile device. It also discusses how operating systems abstract away the messy hardware interfaces to provide cleaner interfaces for application programs.
This document summarizes key concepts about computer networks:
1. It defines local area networks (LANs) and wide area networks (WANs), noting that LANs connect computers that are physically close while WANs connect computers distributed beyond metropolitan areas.
2. It explains that networks allow computers to share files, resources, and programs. Servers contain shared resources and clients access those resources. Networks can be configured in a dedicated server model or peer-to-peer.
3. Essential networking hardware includes network interface cards, cables, hubs/switches, and software for connections and resource sharing. Wireless networks also connect devices without cables.
Notes of c programming 1st unit BCA I SEMMansi Tyagi
This document discusses the basics of the C programming language. It covers the structure of a basic C program, which must include a main function with declaration and executable parts. C tokens like keywords, identifiers, constants, operators and strings are also introduced. The document then discusses C program development steps like understanding the problem, planning input/output, designing an algorithm, coding, testing and debugging. It provides a high-level overview of the C language and programming in C.
Operating System- Services,types.Batch files and DOS historySURBHI SAROHA
The document discusses operating systems and provides definitions and examples of different types of operating systems, including batch, time-sharing, distributed, network, and real-time operating systems. It also covers file systems, DOS commands, batch files, and the history of DOS. The key points covered include definitions of an operating system and its main functions, examples of popular operating systems like Linux and Windows, and characteristics of different types of operating systems.
A computer network connects multiple computers and devices to allow communication and sharing of resources. There are different types of networks including local area networks (LANs) within a single building, metropolitan area networks (MANs) within a city, and wide area networks (WANs) across large distances like countries. Common network topologies include bus, ring, star, tree and mesh configurations. Computer networks enable file sharing, printer sharing, collaboration, remote access, data protection, and centralized administration.
Internal parts of a computer and their functionsEmily-scamell
The document describes the main internal components of a computer and their functions, including the CPU that controls processing, the screen that allows viewing of processing, and the power supply that provides electricity to components. It also mentions the motherboard that connects components, RAM for main memory, expansion cards for enhancing functions, and storage devices like hard drives and optical drives for reading data from disks.
The document contains 16 sections that describe database management system experiments to be performed. Each section includes instructions to create and manipulate tables, perform queries, and implement concepts like triggers, functions, stored procedures, cursors, and embedded SQL. Students will connect to databases and design systems for payroll, banking, and a library using Visual Basic. Their work will be evaluated based on aim and description, queries, results, output, and records.
This document discusses the basic organization and functions of a computer system. It explains that a computer system consists of an input unit, output unit, storage unit, arithmetic logic unit, and control unit. The control unit and arithmetic logic unit together form the central processing unit (CPU), which acts as the brain of the computer. The document outlines the basic operations of inputting, storing, processing, outputting, and controlling that all computer systems perform. It also distinguishes between primary and secondary storage.
tybsc it sem 5 Linux administration notes of unit 1,2,3,4,5,6 version 3WE-IT TUTORIALS
Introduction: Introduction to UNIX, Linux, GNU and Linux distributions Duties of the System Administrator, The Linux System Administrator, Installing and Configuring Servers, Installing and Configuring Application Software,
Creating and Maintaining User Accounts, Backing Up and Restoring Files, Monitoring and Tuning Performance, Configuring a Secure System, Using Tools
to Monitor Security Booting and shutting down: Boot loaders-GRUB, LILO, Bootstrapping, Init
process, rc scripts, Enabling and disabling services.
The File System: Understanding the File System Structure, Working with Linux- Supported File Systems, Memory and Virtual
System Configuration Files: System wide Shell Configuration Scripts, System Environmental Settings, Network Configuration Files, Managing the init Scripts,
Configuration Tool, Editing Your Network Configuration
TCP/IP Networking: Understanding Network Classes, Setting Up a Network nterface Card (NIC), Understanding Subnetting, Working with Gateways and Routers, Configuring Dynamic Host Configuration Protocol, Configuring the Network Using the Network
The Network File System: NFS Overview, Planning an NFS Installation, Configuring an NFS Server, Configuring an NFS Client, Using Automount Services, Examining NFS Security
Connecting to Microsoft Networks: Installing Samba, Configuring the Samba Server, Creating Samba Users 3, Starting the Samba Server, Connecting to a Samba
Client, Connecting from a Windows PC to the Samba Server Additional Network Services: Configuring a Time Server, Providing a Caching Proxy Server
Internet Services: Secure Services, SSH, scp, sftp Less Secure Services (Telnet ,FTP, sync,rsh ,rlogin,finger,talk and ntalk, Linux Machine as a Server, Configuring
the xinetd Server, Comparing xinetd and Standalone, Configuring Linux Firewall Packages, Domain Name System: Understanding DNS, Understanding Types of Domain Servers, Examining Server Configuration Files, Configuring a Caching DNS Server, Configuring a Secondary Master DNS Server, Configuring a Primary
Master Server, Checking Configuration
Configuring Mail Services: Tracing the Email Delivery Process, Mail User Agent (MUA), Introducing SMTP, Configuring Sendmail, Using the Postfix Mail Server,
Serving Email with POP3 and IMAP, Maintaining Email Security Configuring FTP Services: Introducing vsftpd, Configuring vsftpd, Advanced FTP Server Configuration, Using SFTP
Configuring a Web Server: Introducing Apache, Configuring Apache, Implementing SSI, Enabling CGI, Enabling PHP, Creating a Secure Server with SSL System Administration: Administering Users and Groups Installing and Upgrading Software Packages
The document discusses flowcharts, which are graphical representations of algorithms and programming logic. It provides examples of common flowchart symbols like terminals, inputs/outputs, processes, decisions, and connectors. It also outlines the typical steps for programming practices and techniques, which include defining requirements, creating a flowchart, dry running the flowchart to check for errors, writing source code, debugging, and documentation. Finally, it provides examples of flowcharts for simple programs like printing a message, calculating the sum of two numbers, and checking if a number is even or odd.
The document discusses different types of arrays in C programming language. It defines an array as a fixed-size sequential collection of elements of the same data type. It describes one-dimensional, two-dimensional and multidimensional arrays. For one-dimensional arrays, it provides examples of declaration, initialization at compile-time and run-time. For two-dimensional arrays, it explains the memory layout and initialization syntax. It also lists some applications of arrays.
Computer software can be categorized as either system software or application software. System software includes operating systems, utilities, and device drivers that control hardware and allow application software to function. Application software includes programs for specific tasks like word processing, spreadsheets, and databases. There are different types of application software such as proprietary, in-house, off-the-shelf, and customized packages, as well as different forms like packaged software, custom software, web applications, and open source software. System software programs operate at a low level to control the computer hardware and enhance processing capabilities.
The document discusses operating systems, including their functions, components, and types. It provides details on single-user single-tasking operating systems, single-user multi-tasking operating systems, and multi-user multi-tasking operating systems. Examples of commonly used operating systems like Windows and MacOS are described. Key aspects of operating systems that are covered include process management, memory management, I/O device management, and providing a user interface.
The document provides an introduction to computers and information technology. It discusses key concepts like data, information, hardware components of a computer including input, output and storage devices, software types, computer classifications based on size and capabilities, and how data is processed and stored in binary format. The document is part of an ICT skills course introducing students to foundational computer concepts.
Operating System - Types Of Operating System Unit-1abhinav baba
In This Slide There is Operating System And it's types ( Types of operating system)
Batch Operating System
Network Operating System
Time Sharing Operating System
Real Time Operating System
Distributed Operating System
Presentation about Operating System.
including file management.process management,multitasking,different kind of operating system,some popular operating system
The document provides an overview of operating systems and some of their key concepts. It discusses why operating systems are needed, defining them as programs that act as intermediaries between users and computer hardware. It describes the four main components of a computer system - hardware, operating system, application programs, and users. Finally, it outlines some of the main functions and goals of operating systems, such as executing user programs efficiently and making the computer system convenient to use.
This document contains a C programming language project submitted by a student. It includes an introduction to C programming, advantages and disadvantages, examples of simple programs to calculate sums, interests, and temperature conversions. It also provides the source code and output for these example programs. The project covers basic concepts like variables, input/output, decision statements, loops, and functions through these illustrative examples.
Peripheral devices connect to computers and are controlled by them. They can be either input devices, like keyboards and mice, which allow data to enter the computer, or output devices, like monitors and printers, which allow the computer to present information. Common input devices include keyboards, mice, cameras, and microphones. Common output devices are monitors, printers, and speakers.
The document provides an introduction to computer hardware and software components. It discusses the major components of a computer system including the central processing unit, memory, storage devices, input/output ports, buses, and communication devices. It provides examples of random access memory, read-only memory, and cache memory. It also distinguishes between system software and application software.
A function is a group of statements that together perform a task. Every C program has at least one function, which is main(), and all the most trivial programs can define additional functions. You can divide up your code into separate functions.
Advanced computer network lab manual (practicals in Cisco Packet tracer)VrundaBhavsar
Book include how we can execute practical in cisco packet tracer.There are around 18 experiment covered .It contains topology also information about basic elements hub router.how we established
connection using HTTP and FTP protocols Also transferring Gmail and VOIP (Voice over IP) experiment. DHCP experiment included. How we create subnetmask.
The document discusses input and output devices. It describes various commonly used input devices like keyboards, mice, scanners, and microphones. It also covers output devices and their role in providing processed data to users. Input devices allow data entry into computers while output devices supply results of processing to humans. Examples of both categories of devices and their functions are provided over several slides.
This document provides an introduction to different types of software:
1) System software like operating systems and compilers provide an interface between users and computer hardware. Examples include Windows 10 and Android.
2) Application software runs on platforms created by system software and are designed for specific tasks like spreadsheets, word processors, and Microsoft Office programs.
3) Utility software helps maintain computers, ensuring correct and efficient operation, through programs like antivirus software, firewalls, and disk fragmenters. Antivirus software protects against viruses that can harm computers.
The operating system is system software that monitors, controls, and maintains the overall functions of the computer. It performs key functions such as process management, resource management, file management, communication management, security management, and memory management. Process management involves starting and stopping processes from boot up to shutdown. Resource management installs drivers and coordinates peripherals. File management handles file naming, organization, location, and attributes. Communication management facilitates interaction between users, applications, and hardware both internally and between networked computers. Security management provides virus protection, passwords, firewalls, and access controls.
This document provides an overview of the evolution of computers from the abacus to modern day computers. It discusses early calculating devices like the abacus, Pascal's adding machine, and Babbage's analytical engine. It then covers the development of programmable, electronic computers starting with ENIAC in the 1940s. The document also describes different generations of computers based on the underlying technology and classifications of computers based on size, speed, and purpose. Finally, it discusses the basic components of a computer system including input, output, memory, arithmetic logic unit, and control unit.
The document discusses computer languages and programming. It describes three categories of programming languages: machine languages, assembly languages, and high-level languages. It also discusses common programming language tools like assemblers, compilers, linkers, and interpreters. Popular programming languages like FORTRAN, COBOL, BASIC, Pascal, C, C++, C#, Java, RPG, LISP and SNOBOL are also mentioned. The key characteristics and uses of machine languages, assembly languages, high-level languages, compilers, linkers and interpreters are summarized.
The document discusses multimedia and its components. It defines multimedia as the use of more than one media such as text, graphics, animation, audio, and video to present information. A multimedia computer system requires components like large storage, memory, and display to integrate different media types. Common multimedia applications include presentations, education, games, and virtual reality. The document outlines the key technologies used for each media type and features important for multimedia computers.
The document contains 16 sections that describe database management system experiments to be performed. Each section includes instructions to create and manipulate tables, perform queries, and implement concepts like triggers, functions, stored procedures, cursors, and embedded SQL. Students will connect to databases and design systems for payroll, banking, and a library using Visual Basic. Their work will be evaluated based on aim and description, queries, results, output, and records.
This document discusses the basic organization and functions of a computer system. It explains that a computer system consists of an input unit, output unit, storage unit, arithmetic logic unit, and control unit. The control unit and arithmetic logic unit together form the central processing unit (CPU), which acts as the brain of the computer. The document outlines the basic operations of inputting, storing, processing, outputting, and controlling that all computer systems perform. It also distinguishes between primary and secondary storage.
tybsc it sem 5 Linux administration notes of unit 1,2,3,4,5,6 version 3WE-IT TUTORIALS
Introduction: Introduction to UNIX, Linux, GNU and Linux distributions Duties of the System Administrator, The Linux System Administrator, Installing and Configuring Servers, Installing and Configuring Application Software,
Creating and Maintaining User Accounts, Backing Up and Restoring Files, Monitoring and Tuning Performance, Configuring a Secure System, Using Tools
to Monitor Security Booting and shutting down: Boot loaders-GRUB, LILO, Bootstrapping, Init
process, rc scripts, Enabling and disabling services.
The File System: Understanding the File System Structure, Working with Linux- Supported File Systems, Memory and Virtual
System Configuration Files: System wide Shell Configuration Scripts, System Environmental Settings, Network Configuration Files, Managing the init Scripts,
Configuration Tool, Editing Your Network Configuration
TCP/IP Networking: Understanding Network Classes, Setting Up a Network nterface Card (NIC), Understanding Subnetting, Working with Gateways and Routers, Configuring Dynamic Host Configuration Protocol, Configuring the Network Using the Network
The Network File System: NFS Overview, Planning an NFS Installation, Configuring an NFS Server, Configuring an NFS Client, Using Automount Services, Examining NFS Security
Connecting to Microsoft Networks: Installing Samba, Configuring the Samba Server, Creating Samba Users 3, Starting the Samba Server, Connecting to a Samba
Client, Connecting from a Windows PC to the Samba Server Additional Network Services: Configuring a Time Server, Providing a Caching Proxy Server
Internet Services: Secure Services, SSH, scp, sftp Less Secure Services (Telnet ,FTP, sync,rsh ,rlogin,finger,talk and ntalk, Linux Machine as a Server, Configuring
the xinetd Server, Comparing xinetd and Standalone, Configuring Linux Firewall Packages, Domain Name System: Understanding DNS, Understanding Types of Domain Servers, Examining Server Configuration Files, Configuring a Caching DNS Server, Configuring a Secondary Master DNS Server, Configuring a Primary
Master Server, Checking Configuration
Configuring Mail Services: Tracing the Email Delivery Process, Mail User Agent (MUA), Introducing SMTP, Configuring Sendmail, Using the Postfix Mail Server,
Serving Email with POP3 and IMAP, Maintaining Email Security Configuring FTP Services: Introducing vsftpd, Configuring vsftpd, Advanced FTP Server Configuration, Using SFTP
Configuring a Web Server: Introducing Apache, Configuring Apache, Implementing SSI, Enabling CGI, Enabling PHP, Creating a Secure Server with SSL System Administration: Administering Users and Groups Installing and Upgrading Software Packages
The document discusses flowcharts, which are graphical representations of algorithms and programming logic. It provides examples of common flowchart symbols like terminals, inputs/outputs, processes, decisions, and connectors. It also outlines the typical steps for programming practices and techniques, which include defining requirements, creating a flowchart, dry running the flowchart to check for errors, writing source code, debugging, and documentation. Finally, it provides examples of flowcharts for simple programs like printing a message, calculating the sum of two numbers, and checking if a number is even or odd.
The document discusses different types of arrays in C programming language. It defines an array as a fixed-size sequential collection of elements of the same data type. It describes one-dimensional, two-dimensional and multidimensional arrays. For one-dimensional arrays, it provides examples of declaration, initialization at compile-time and run-time. For two-dimensional arrays, it explains the memory layout and initialization syntax. It also lists some applications of arrays.
Computer software can be categorized as either system software or application software. System software includes operating systems, utilities, and device drivers that control hardware and allow application software to function. Application software includes programs for specific tasks like word processing, spreadsheets, and databases. There are different types of application software such as proprietary, in-house, off-the-shelf, and customized packages, as well as different forms like packaged software, custom software, web applications, and open source software. System software programs operate at a low level to control the computer hardware and enhance processing capabilities.
The document discusses operating systems, including their functions, components, and types. It provides details on single-user single-tasking operating systems, single-user multi-tasking operating systems, and multi-user multi-tasking operating systems. Examples of commonly used operating systems like Windows and MacOS are described. Key aspects of operating systems that are covered include process management, memory management, I/O device management, and providing a user interface.
The document provides an introduction to computers and information technology. It discusses key concepts like data, information, hardware components of a computer including input, output and storage devices, software types, computer classifications based on size and capabilities, and how data is processed and stored in binary format. The document is part of an ICT skills course introducing students to foundational computer concepts.
Operating System - Types Of Operating System Unit-1abhinav baba
In This Slide There is Operating System And it's types ( Types of operating system)
Batch Operating System
Network Operating System
Time Sharing Operating System
Real Time Operating System
Distributed Operating System
Presentation about Operating System.
including file management.process management,multitasking,different kind of operating system,some popular operating system
The document provides an overview of operating systems and some of their key concepts. It discusses why operating systems are needed, defining them as programs that act as intermediaries between users and computer hardware. It describes the four main components of a computer system - hardware, operating system, application programs, and users. Finally, it outlines some of the main functions and goals of operating systems, such as executing user programs efficiently and making the computer system convenient to use.
This document contains a C programming language project submitted by a student. It includes an introduction to C programming, advantages and disadvantages, examples of simple programs to calculate sums, interests, and temperature conversions. It also provides the source code and output for these example programs. The project covers basic concepts like variables, input/output, decision statements, loops, and functions through these illustrative examples.
Peripheral devices connect to computers and are controlled by them. They can be either input devices, like keyboards and mice, which allow data to enter the computer, or output devices, like monitors and printers, which allow the computer to present information. Common input devices include keyboards, mice, cameras, and microphones. Common output devices are monitors, printers, and speakers.
The document provides an introduction to computer hardware and software components. It discusses the major components of a computer system including the central processing unit, memory, storage devices, input/output ports, buses, and communication devices. It provides examples of random access memory, read-only memory, and cache memory. It also distinguishes between system software and application software.
A function is a group of statements that together perform a task. Every C program has at least one function, which is main(), and all the most trivial programs can define additional functions. You can divide up your code into separate functions.
Advanced computer network lab manual (practicals in Cisco Packet tracer)VrundaBhavsar
Book include how we can execute practical in cisco packet tracer.There are around 18 experiment covered .It contains topology also information about basic elements hub router.how we established
connection using HTTP and FTP protocols Also transferring Gmail and VOIP (Voice over IP) experiment. DHCP experiment included. How we create subnetmask.
The document discusses input and output devices. It describes various commonly used input devices like keyboards, mice, scanners, and microphones. It also covers output devices and their role in providing processed data to users. Input devices allow data entry into computers while output devices supply results of processing to humans. Examples of both categories of devices and their functions are provided over several slides.
This document provides an introduction to different types of software:
1) System software like operating systems and compilers provide an interface between users and computer hardware. Examples include Windows 10 and Android.
2) Application software runs on platforms created by system software and are designed for specific tasks like spreadsheets, word processors, and Microsoft Office programs.
3) Utility software helps maintain computers, ensuring correct and efficient operation, through programs like antivirus software, firewalls, and disk fragmenters. Antivirus software protects against viruses that can harm computers.
The operating system is system software that monitors, controls, and maintains the overall functions of the computer. It performs key functions such as process management, resource management, file management, communication management, security management, and memory management. Process management involves starting and stopping processes from boot up to shutdown. Resource management installs drivers and coordinates peripherals. File management handles file naming, organization, location, and attributes. Communication management facilitates interaction between users, applications, and hardware both internally and between networked computers. Security management provides virus protection, passwords, firewalls, and access controls.
This document provides an overview of the evolution of computers from the abacus to modern day computers. It discusses early calculating devices like the abacus, Pascal's adding machine, and Babbage's analytical engine. It then covers the development of programmable, electronic computers starting with ENIAC in the 1940s. The document also describes different generations of computers based on the underlying technology and classifications of computers based on size, speed, and purpose. Finally, it discusses the basic components of a computer system including input, output, memory, arithmetic logic unit, and control unit.
The document discusses computer languages and programming. It describes three categories of programming languages: machine languages, assembly languages, and high-level languages. It also discusses common programming language tools like assemblers, compilers, linkers, and interpreters. Popular programming languages like FORTRAN, COBOL, BASIC, Pascal, C, C++, C#, Java, RPG, LISP and SNOBOL are also mentioned. The key characteristics and uses of machine languages, assembly languages, high-level languages, compilers, linkers and interpreters are summarized.
The document discusses multimedia and its components. It defines multimedia as the use of more than one media such as text, graphics, animation, audio, and video to present information. A multimedia computer system requires components like large storage, memory, and display to integrate different media types. Common multimedia applications include presentations, education, games, and virtual reality. The document outlines the key technologies used for each media type and features important for multimedia computers.
The document discusses different types of computer software. It defines software and describes the relationship between software and hardware. There are two major types of software: system software, which controls computer operations, and application software, which performs specific tasks. The document outlines how software is developed and acquired, including buying pre-written software, customizing software, and downloading public domain software. It also discusses firmware, middleware, and the steps involved in software development.
The document discusses planning computer programs through algorithms, flowcharts, and pseudocode. It provides examples of algorithms to calculate the number of students who passed with first division and to calculate total bonus amounts for employees. It also describes how algorithms can be represented as programs, flowcharts, or pseudocode. Flowcharts use standardized symbols connected by arrows to show the sequence of instructions, and examples of decision symbols are shown. Finally, an example problem is provided to draw a flowchart to calculate and print a student's percentage marks based on input data.
This document discusses different computer codes used to represent data internally in computers. It describes Binary Coded Decimal (BCD), Extended Binary Coded Decimal Interchange Code (EBCDIC), and American Standard Code for Information Interchange (ASCII). BCD uses 6 bits per character and can represent 64 characters. EBCDIC uses 8 bits and can represent 256 characters. It describes how numbers are represented in zoned and packed decimal format in EBCDIC. ASCII also uses 7 or 8 bits per character and can represent 128 or 256 characters respectively. Examples are provided to demonstrate how data is encoded in these different computer codes.
The document discusses computer arithmetic and binary numbers. It begins by explaining why computers use the binary number system instead of decimal. The key reasons are that electronic components can only represent two states, binary is simpler for circuit design, and arithmetic is possible with binary. The document then covers the basic arithmetic operations of addition, subtraction, multiplication, and division in binary. It provides rules for each operation and examples to illustrate how to perform the calculations in binary. Finally, it discusses complementary subtraction and the additive method for multiplication and division.
This document discusses the basic organization and functions of a computer system. It describes the five basic operations of inputting, storing, processing, outputting, and controlling. It explains the roles of the main components including the input and output units, storage units, arithmetic logic unit, control unit, and central processing unit. Primary and secondary storage are also defined. The document presents the computer as a system made up of interconnected parts that work together to perform programmed instructions.
This document provides an overview of operating systems and some key concepts:
- An operating system manages computer resources and provides an interface between users and hardware. Its main functions include process management, memory management, file management, and security.
- Multiprogramming allows interleaved execution of multiple processes by using memory partitions and context switching between processes. Process states include ready, running, blocked, and completed.
- Memory management involves allocating and deallocating memory to processes as needed. Early systems used fixed-sized memory partitions while more advanced systems use variable partitions that dynamically change in size and location.
The document discusses Boolean algebra and logic circuits. It covers Boolean algebra, Boolean functions, logic gates, and logic circuits. Boolean algebra uses binary numbers and logic operators like AND, OR, and NOT. Boolean functions can be represented as algebraic expressions or truth tables. Minimizing Boolean functions reduces the number of literals and terms to simplify logic circuits. The document also provides examples of theorems and proofs in Boolean algebra.
How to build a news website use CMS wordpressbaran19901990
This tutorial wil show you, how to build a news website use CMS Wordpress step by step. From basic to advantage. I think that this tutorial is amazing and very basic for newbie.
The document provides an overview of Hadoop, describing it as an open-source software framework for distributed storage and processing of large datasets across clusters of computers. It discusses key Hadoop components like HDFS for storage, MapReduce for distributed processing, and YARN for resource management. The document also gives examples of how organizations are using Hadoop at large scale for applications like search indexing and data analytics.
Implementing subprograms requires saving execution context, allocating activation records, and maintaining dynamic or static chains. Activation records contain parameters, local variables, return addresses, and dynamic/static links. Nested subprograms are supported through static chains that connect activation records. Dynamic scoping searches the dynamic chain for non-local variables, while shallow access uses a central variable table. Blocks are implemented as parameterless subprograms to allocate separate activation records for block variables.
HBase is a distributed, column-oriented database that runs on top of Hadoop and HDFS, providing Bigtable-like capabilities for massive tables of structured and unstructured data. It is modeled after Google's Bigtable and provides a distributed, scalable, versioned storage system with strong consistency for random read/write access to billions of rows and millions of columns. HBase is well-suited for handling large datasets and providing real-time read/write access across clusters of commodity servers.
This document discusses subprograms (also called subroutines) in programming languages. It covers:
- The basic definitions and characteristics of subprograms, including headers, parameters, and local variables.
- Different parameter passing methods like pass-by-value, pass-by-reference, and their implementation in common languages.
- Additional features of subprograms including overloading, generics, and functions passing subprograms as parameters.
This document discusses various data types in programming languages including primitive, string, array, record, union, and pointer types. It provides details on how each type is defined and implemented in different languages. Primitive types include integers, floats, decimals, booleans, characters. Strings can have static or dynamic lengths. Arrays can be static, dynamic and allow various index types and initialization. Records group heterogeneous data under field names. Unions allow storing different types in a variable. Pointers provide indirect addressing but require careful use to avoid dangling references.
1) The document discusses water passing through a pressure-reducing valve and separating tank, including its state and amount that leaves as vapor.
2) It also discusses heat transfer calculations for air heated in an exchanger and flow rate measurement using a venturi meter.
3) Heat transfer principles and equations are reviewed for various processes, including perfect gas behavior, convection coefficients, radiation from a human body, and insensible evaporation heat loss.
The document provides an overview of computer fundamentals and the evolution of computers through different generations. It discusses how computers evolved from early mechanical calculators and machines to the present day systems. The key characteristics of computers like speed, accuracy, versatility are explained. The major milestones in computer development are highlighted along with the representative systems, technologies and applications of each generation from first to fifth generation computers.
The document provides an introduction to data communication and networking. It discusses key topics including:
- The definition of data and data communication systems. They require delivery, accuracy and timeliness of data.
- The 5 components of data communication: message, sender, receiver, medium and protocol which establishes rules.
- Different types of computer networks including local area networks, metropolitan area networks, wide area networks and wireless networks. It provides examples of each.
- Network hardware topologies including broadcast links, point-to-point links, and the differences between active and passive topologies.
- Uses of computer networks for business applications, home networking, and mobile users.
computer networks module 1 . fundamentals of networking and data communicationNishaJaiswal34
this pdf gives you information regarding fundamentals of networks and data communication . here various network topologies are disscused such as star topolgy, bus topology, tree topology etc. various network architecture are discussed such as client server architecture. it explains different models such as TCP/IP model. It explains the different layers of these models such as Application Layer:
The top layer in the TCP/IP model.
It deals with high-level protocols used for communication between applications, such as HTTP for web browsing, SMTP for email, FTP for file transfer, etc.
This layer is where user processes and applications interact with the network. Data is formatted, encrypted, and prepared for transmission here.Transport Layer:
The second layer in the TCP/IP model.
Responsible for end-to-end communication and ensures that data is delivered reliably and error-free.
Two main protocols operate at this layer: TCP and UDP.
TCP (Transmission Control Protocol): Provides reliable, connection-oriented communication with features such as error checking, sequencing, and flow control. Suitable for applications that require data integrity, such as web browsing, email, file transfer, etc.
UDP (User Datagram Protocol): Provides connectionless communication without reliability guarantees. Suitable for applications where speed and efficiency are more critical than data integrity, such as streaming media, online gaming, VoIP, etc.
Internet Layer:
The third layer in the TCP/IP model.
Responsible for addressing, routing, and packaging data for transmission over the network.
Uses Internet Protocol (IP) for logical addressing of devices (IPv4 and IPv6).
This layer enables packets to be routed across multiple networks to reach their destination.
Link Layer (also known as Network Access Layer):
The bottom layer in the TCP/IP model.
Deals with the physical transmission of data over the network medium.
It encompasses protocols and hardware components (e.g., Ethernet, Wi-Fi, PPP) that define how data is framed, addressed, transmitted, and received within a local network.
This layer is responsible for establishing and maintaining direct communication between devices on the same local network segment.
The TCP/IP model is widely used as the basis for the design and implementation of the Internet and many other networks. It provides a flexible and scalable framework for building complex network architectures and enables interoperability among different network devices and technologies. it also explains ethernet standards.Ethernet is a family of networking technologies commonly used in local area networks (LANs) to connect devices within a limited geographical area such as an office, campus, or home. Over the years, several Ethernet standards have been developed, each specifying different aspects of network communication including data rates, media types, and physical characteristics. Here are some of the key Ethernet standards:
Ethernet (IEEE 802.3):
thankyou
An ethernet based_approach_for_tm_data_analysis_v2Priyasloka Arya
Testing and performance evaluation of flight vehicles largely depends on the data gathered through telemetry. Tele-metered data describes the internal story of device under test. As the tele-metered data is transmitted to ground receiving stations through radio frequency and Inter Range Instrumentation Group (IRIG) standard data format are well known, anybody who is tuned to transmitted frequency, can receive data and minimal information about the format can reveal the total information of device under test. To deal with this situation, current trend is to encrypt the mission critical information on board before transmitting. In this paper, the authors have discussed the advantage of Local Area Network (LAN) based Telemetry base band system which provides scalability, modularity, and flexibility to the user for the analysis of encrypted data.
This document provides an overview of computer fundamentals and data communication concepts including:
1) The basic elements of a communication system including the medium, sender, receiver, and message.
2) Types of transmission modes and data transmission speeds.
3) Common data transmission media such as twisted-pair wire, coaxial cable, microwave systems, satellites, and optical fibers.
4) Network topologies including star, ring, bus, and hybrid networks.
5) Communication protocols and the OSI model for standardizing network communication.
Integrated Services Digital Network (ISDN) is a set of communication protocols that provides digital transmission of voice, video, and data over telephone lines or normal telephone cables. ISDN was developed in the 1970s and provides end-to-end digital connectivity over digital media. ISDN services include bearer services to transfer information between networks, teleservices to allow networks to process content, and supplementary services that provide additional functionality.
This document discusses multimedia and its components. Multimedia refers to using multiple media like text, graphics, animation, audio, and video to present information. A multimedia computer system can integrate different media types and requires components like fast CPUs, large storage, and I/O devices. Common media include text, graphics, animation, audio, and video. Graphics can be images or drawings. Animation involves displaying sequences of images. Audio must be converted between analog and digital forms. Video also involves analog to digital conversion. Multimedia is used in applications like presentations, e-books, games, and interactive TV.
This document outlines the basic design of a Tier 3 ISP network. It defines key ISP terminology like tiers and points of presence. The project goal is described as providing internet access to 3 departments on campus through a wired or wireless network. The core architecture includes a backbone with a core router connecting to distribution routers that provide access to the departments. The document also covers addressing, routing protocols and how the network would be set up and tested.
This document provides an overview of key concepts in computer networking and data communication. It defines what a computer network is as two or more computers connected by transmission media that allows users to communicate and share applications and data. The document outlines different types of networks including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It also discusses common network typologies like star, ring, and bus topologies as well as client-server and peer-to-peer network models.
This document provides an overview of key concepts in computer networking and data communication. It defines what a computer network is as two or more computers connected by transmission media that allow users to communicate and share applications and data. The document outlines different types of networks including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It also discusses common network typologies like star, ring, and bus topologies as well as client-server and peer-to-peer network models.
The document discusses various input/output ports and devices used to connect peripheral devices to computers. It begins by listing the chapter objectives which are to introduce ports, identify different port types, configure IRQ settings, and troubleshoot port issues. It then explains what ports are and shows symbols for common port types like serial, parallel, USB, PS/2, and infrared. The document provides details on specific ports like serial, parallel, PS/2, USB, IEEE 1394, and infrared; describes interrupt request lines; and offers tips for troubleshooting port and IRQ issues.
Introducation to computer [www.studysharebd.com]Rafiq Azad
The document discusses the history and evolution of computers from the first generation to the present fifth generation. It describes key characteristics of each generation including the hardware technologies used such as vacuum tubes, transistors, and integrated circuits. The document also outlines important software developments like assembly languages, high-level programming languages, timesharing operating systems, and networking.
This document provides an introduction to data communication and networking. It discusses analog and digital data, data communication, data flow including simplex, half-duplex and full-duplex, and modems. It also covers local area networks, metropolitan area networks, wide area networks, network topologies including linear bus, star, tree and others. Finally, it discusses the OSI model and considerations for data communication networks including performance, consistency, reliability and recovery.
The document discusses components of computer communications and networking. It describes the devices needed for successful communications including sending devices, receiving devices, and communications channels. It also summarizes different types of networks like client/server, peer-to-peer, and P2P networks. Standards for network communications are discussed as well as common communications devices and ways to set up home networks.
Chapter 9 discusses computer communications and networks. It describes the key components needed for successful communications, including sending and receiving devices, and communications channels. Various network types are defined, such as client/server, peer-to-peer, and P2P networks. Common communications technologies, devices, media, and software are also explained, along with different methods for setting up wired and wireless home and business networks.
This document discusses the security issues with current TCP/IP network architectures and proposes an alternative called UETS (Universal Ethernet Transport System). The key points are:
- TCP/IP networks were designed decades ago without security in mind and now support many insecure devices and applications. This has led to complex add-on security measures over time.
- UETS proposes using circuit switching at the Ethernet layer instead of TCP/IP to provide secure communications without changes to applications or devices. It would eliminate issues like spoofing and intercepting traffic.
- UETS claims to radically improve security while maintaining compatibility with existing IP networks and applications, but removing complexity. The document argues it is time for a change in approach to better handle
ISDN (Integrated Services Digital Network) is a set of communication protocols that allows digital transmission of voice, video, and data over existing telephone lines. It was developed to digitize and integrate telephone networks to allow transmission of different data types. ISDN provides bearer, tele, and supplementary services through basic rate interface (BRI) with 2 B channels of 64 kbps each and 1 D channel of 16 kbps, or primary rate interface (PRI) with 23 B channels of 64 kbps and 1 D channel of 64 kbps. While ISDN provided faster speeds than analog networks, it has been surpassed by newer technologies like DSL and cable that provide even higher speeds at lower costs.
IRJET - Hand Gesture Recognition and Voice Conversion System using IoTIRJET Journal
This document describes a system that uses hand gesture recognition and voice conversion to help deaf people communicate. The system uses a camera and microcontroller (Raspberry Pi) to recognize hand gestures based on a stored database of gestures and their corresponding voice messages. When a gesture is detected, the microcontroller matches it to the database and outputs the corresponding voice message through a speaker. The system also allows controlling home appliances and communicating remotely through IoT by sending messages to others via email or webpages. It is intended to help deaf people communicate more easily through translating their hand gestures into audible speech in real-time.
This document discusses multimedia and multimedia computer systems. It defines multimedia as using more than one type of media (text, graphics, audio, video, etc.) to present information. A multimedia computer system is able to integrate different media types and requires components like large storage, memory, and I/O devices to handle multimedia files. Common media types are described along with their uses and associated hardware. Examples of multimedia applications and a media center computer are also outlined.
The basic concept for the data structure.
It covers these topics
System Life Cycle
Algorithm Specification
Data Abstraction
Performance Analysis
Space Complexity
Time Complexity
Asymptotic Notation
Text Book: Fundamentals of Data Structures in C++
E. Horowitz, et al.
This document contains exercises related to inverse functions and their properties. It includes 53 multi-part exercises involving determining if functions are inverses, composing functions, finding inverse functions, and evaluating derivatives of inverse functions. The exercises involve algebraic manipulation and graphical analysis of functions and their inverses.
Solution Manual : Chapter - 06 Application of the Definite Integral in Geomet...Hareem Aslam
This document contains exercises involving calculating areas and volumes using definite integrals. There are 23 exercises finding the area under curves or between curves over given intervals using integrals, and 13 exercises finding volumes of solids of revolution using integrals. The integrals require setting up antiderivatives and evaluating between limits.
1. The document presents an exercise set involving the integration and differentiation of various functions. It contains problems involving the calculation of areas under curves, derivatives, integrals, and finding functions given their derivatives or known points.
2. The exercise set contains over 40 problems involving concepts like derivatives, integrals, areas under curves, finding functions from known derivatives or points, and applying integration techniques to solve problems across different domains.
3. The problems progress from simpler integrals and derivatives to more complex problems integrating and differentiating composite functions, trigonometric functions, and applying integration to find functions and solve applied problems.
Solution Manual : Chapter - 02 Limits and ContinuityHareem Aslam
This document contains solutions to exercise sets on limits and continuity from a textbook. Exercise Set 2.1 contains solutions to 23 problems evaluating limits of functions as the input values approach certain numbers. Exercise Set 2.2 contains solutions to 38 similar problems evaluating limits. Exercise Set 2.3 contains solutions to 23 additional limit evaluation problems. The document provides the step-by-step workings and conclusions for each problem.
This document contains exercises involving functions and graphs. There are multiple choice and free response questions testing understanding of properties of functions including domain, range, intercepts, maxima/minima, and graphing functions. Solutions are provided for checking work.
The document discusses personality development and defines personality as a blend of temperament, emotion, principles, and behavior that starts developing in childhood. It notes that personality can be molded by life experiences and improved over time. Important features of personality include cleanliness, honesty, unselfishness, courtesy, respect, kindness, confidence, and open-mindedness. One's personality is impacted by relationships with family, friends, and colleagues. Body language can provide clues about personality traits like confidence, shyness, and comfort levels. Grooming, avoiding gossip, self-acceptance, public speaking practice, and self-love can help develop a good personality.
The document discusses different types of computers based on their mode of use. It describes notebook computers, personal computers, workstations, mainframe systems, supercomputers, clients and servers, and handheld computers. For each type, it provides details on their typical uses, characteristics, operating systems, vendors, and how they differ from each other.
The document discusses the Internet and its basic services. It describes how the Internet evolved from ARPANET and initially connected research organizations. It grew rapidly in the late 1980s and now interconnects over 30,000 networks worldwide. The Internet provides services like email, file transfer, telnet, and usenet news. It also discusses the World Wide Web, how web pages use HTML, and how browsers allow users to access and navigate web pages through URLs. Common uses of the Internet mentioned include online communication, software sharing, product promotion, and e-commerce.
The document discusses business data processing and database systems. It describes how data is converted into useful information through data processing. It then explains the data storage hierarchy from bits to databases. Different methods for organizing data are covered, including file-oriented and database-oriented approaches. Key concepts in database systems like models, languages and components are also summarized.
This document discusses different types of application software packages. It covers word processing packages, which are used to create, edit, and format documents. Spreadsheet packages allow for numerical analysis and are useful for accounting, budgets, and grading. Graphics packages enable the creation of drawings, pictures, and other visual content. Personal assistance packages help individuals manage schedules, contacts, and finances. The document provides examples and definitions of features for each type of package.
The document discusses operating systems and their key functions. It covers topics like process management, memory management, file management, and security. Process management involves scheduling processes to minimize idle processor time. Memory management involves tracking used and unused memory and allocating it to processes. Multiprogramming allows interleaved execution of multiple processes by dividing memory into partitions. Time-sharing systems allow interactive use by many users simultaneously through quick process switching.
The document discusses key aspects of system implementation and operation including testing and debugging programs, documenting the system, transitioning to the new system, and ongoing system evaluation and maintenance. Specifically, it covers debugging syntax versus logic errors, different types of testing, methods for changeover to a new system, factors considered in system evaluation, and importance of ongoing system maintenance.
This document discusses computer languages and provides an overview of the different categories of computer languages:
- Machine languages are directly understood by computers but are difficult for humans to read and program in.
- Assembly languages use mnemonic codes to provide a level of abstraction over machine language.
- High-level languages allow programming at a higher level of abstraction and are machine independent.
It also describes common language tools like assemblers, compilers, and interpreters used to translate between low and high-level languages. Popular programming languages in different categories are also listed.
The document discusses planning computer programs through algorithms, flowcharts, and pseudocode. It provides examples of algorithms for calculating exam results and employee bonuses. It also shows flowcharts representing the algorithm examples and basic flowchart symbols used like processing, decision, input/output, and flow line connectors. Planning helps ensure a program's instructions are appropriate, in the correct sequence, and will terminate with the desired results.
The document discusses different types of computer software. It defines software and differentiates it from hardware. There are two main types of software: system software and application software. System software makes the computer system more efficient and provides support for application software, while application software is designed to perform specific tasks. The document also outlines how software is developed, acquired, and the roles of firmware and middleware.
The document discusses input and output devices used in computer systems. It describes how input devices such as keyboards, mice, and scanners are used to enter data into a computer, while output devices like monitors display processed data to users. The document outlines various common input devices including keyboards, pointing devices, scanners, and speech recognition tools. It also provides examples of these devices and how they function.
The document discusses secondary storage devices and focuses on magnetic tape. It defines secondary storage and its advantages over primary storage. It classifies common secondary storage devices as sequential or direct access. The document then describes the basic components, storage organization, capacity, transfer rate, and operation of magnetic tapes. Magnetic tape is presented as a sequential access storage device that stores data in the form of magnetic spots on a tape ribbon.
The document discusses the processor, memory, and their basic architecture in a computer system. It covers the internal structure of the processor including the central processing unit (CPU) and its two components - the control unit and arithmetic logic unit. It describes the main memory, different types of processors like RISC, CISC, EPIC and multi-core, and characteristics of the memory like volatile nature, random access, and organization. Types of registers and factors affecting processor speed are also summarized.
The document discusses different number systems including binary, decimal, octal and hexadecimal. It provides examples of how to represent numbers in these systems and convert between them. The key methods covered are using place values to convert between bases and a division-remainder approach to change from decimal to another base. The goal is to understand how computers use binary numbering and how to work with different bases.
This presentation was provided by Racquel Jemison, Ph.D., Christina MacLaughlin, Ph.D., and Paulomi Majumder. Ph.D., all of the American Chemical Society, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
This presentation was provided by Rebecca Benner, Ph.D., of the American Society of Anesthesiologists, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
The chapter Lifelines of National Economy in Class 10 Geography focuses on the various modes of transportation and communication that play a vital role in the economic development of a country. These lifelines are crucial for the movement of goods, services, and people, thereby connecting different regions and promoting economic activities.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Chapter 17 dccn
1. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 1/57Chapter 17: Data Communications and Computer NetworksRef. Page
2. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 2/57Chapter 17: Data Communications and Computer NetworksRef. Page
In this chapter you will learn about:
§ Basic elements of a communication system
§ Techniques, channels, and devices used to transmit
data between distant locations
§ Types of computer networks
§ Communication protocols and their use in computer
networks
§ Internetworking tools and their use in building large
computer networks
§ Characteristics and advantages of distributed data
processing
Learning ObjectivesLearning Objectives
320
3. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 3/57Chapter 17: Data Communications and Computer NetworksRef. Page
Sender
(source)
Receiver
(sink)
Medium
Creates and sends
a message
Receives the
message
Carries the message
Basic Elements of a Communication
System
Basic Elements of a Communication
System
321
4. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 4/57Chapter 17: Data Communications and Computer NetworksRef. Page
Data Transmission ModesData Transmission Modes
(c) Full-duplex
Sender Receiver
(a) Simplex
Sender
(or Receiver)
Receiver
(or Sender)
OR
Sender
(and Receiver)
Receiver
(and Sender)
AND
(b) Half-duplex
321
5. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 5/57Chapter 17: Data Communications and Computer NetworksRef. Page
§ Bandwidth: Range of frequencies available for data
transmission. It refers to data transmission rate. Higher
the bandwidth, the more data it can transmit
§ Baud: Unit of measurement of data transfer rate.
Measured in bits per second (bps)
Data Transmission SpeedData Transmission Speed
322
6. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 6/57Chapter 17: Data Communications and Computer NetworksRef. Page
§ Narrowband: Sub-voice grade channels in range from
45 to 300 baud. Mainly used for telegraph lines and
low-speed terminals
§ Voiceband: Voice grade channels with speed up to
9600 baud. Mainly used for ordinary telephone voice
communication and slow I/O devices
§ Broadband: High speed channels with speed up to 1
million baud or more. Mainly used for high-speed
computer-to-computer communication or for
simultaneous transmission of data
Data Transmission Speed CategoryData Transmission Speed Category
322
7. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 7/57Chapter 17: Data Communications and Computer NetworksRef. Page
The most commonly used ones are:
§ Twisted-pair wire (UTP cable)
§ Coaxial cable
§ Microwave system
§ Communications satellite
§ Optical fibers
Data Transmission MediaData Transmission Media
323
8. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 8/57Chapter 17: Data Communications and Computer NetworksRef. Page
Unshielded Twisted-Pair (UTP)
Cable
Unshielded Twisted-Pair (UTP)
Cable
323
9. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 9/57Chapter 17: Data Communications and Computer NetworksRef. Page
Coaxial CableCoaxial Cable
Outer PVC shield
Copper mesh
PVC insulation
Central copper wire
323
10. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 10/57Chapter 17: Data Communications and Computer NetworksRef. Page
Microwave Communication SystemMicrowave Communication System
Transmitting
station
Receiving
station
In between
repeaters
Transmitting antennas Receiving
antennas
Line of sight Line of sight Line of sight
324
11. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 11/57Chapter 17: Data Communications and Computer NetworksRef. Page
Satellite Communication SystemSatellite Communication System
Satellite in space
Transmitting
station on earth
6 GHz 4 GHz
Uplink Downlink
Receiving
station on earth
325
12. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 12/57Chapter 17: Data Communications and Computer NetworksRef. Page
Optical Fiber Communication SystemOptical Fiber Communication System
Electrical
signal
Optical fiber
Amplifier
Electrical
signalLight to
electrical wave
converter
Electrical to
light wave
converter
Light waves
Sender Receiver
326
13. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 13/57Chapter 17: Data Communications and Computer NetworksRef. Page
Digital and Analog Data TransmissionDigital and Analog Data Transmission
§ Analog signal: Transmitted power varies over a
continuous range. Example: sound, light, and radio
waves
§ Digital signal: Sequence of voltage pulses represented
in binary form
§ Computer generated data signal is digital, whereas
telephone lines carry analog signals
(Continued on next slide)
327
14. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 14/57Chapter 17: Data Communications and Computer NetworksRef. Page
§ When digital data is to be sent over an analog facility,
digital signals must be converted to analog form
§ Conversion of digital signal to analog form is known as
modulation
§ Conversion of analog signal to digital form is known as
demodulation
§ Digital transmission of data is preferred over analog
transmission of data due to lower cost, higher
transmission speeds, and lower error rate
(Continued from previous slide)
Digital and Analog Data TransmissionDigital and Analog Data Transmission
329
15. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 15/57Chapter 17: Data Communications and Computer NetworksRef. Page
Analog and Digital SignalsAnalog and Digital Signals
v
t
0 0
1 1
0 0
1 1
(b) Digital signal
+v
-v
0 1/f 2/f
t
(a) Analog signal
Voltage
328
16. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 16/57Chapter 17: Data Communications and Computer NetworksRef. Page
Modulation TechniquesModulation Techniques
§ Amplitude Modulation (AM): Two binary values (0 and
1) of digital data are represented by two different
amplitudes of the carrier signal, keeping frequency and
phase constant
§ Frequency Modulation (FM): Two binary values of
digital data are represented by two different frequencies,
while amplitude and phase are kept constant
§ Phase Modulation (PM): Two binary values of digital
data are represented by shift in phase of carrier signal
328
17. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 17/57Chapter 17: Data Communications and Computer NetworksRef. Page
ModemsModems
§ Modem is short for MOdulator/DEModulator
§ Special device used for conversion of digital data to
analog form (modulation) and vice-versa (demodulation)
§ Essential piece of hardware where two digital devices
(say two computers) want to communicate over an
analog transmission channel (say a telephone line)
328
18. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 18/57Chapter 17: Data Communications and Computer NetworksRef. Page
Use of Modems in Data CommunicationsUse of Modems in Data Communications
Sender
Computer
Receiver
Computer
1 1
0 0
0 0
0 1
1 1
0 0
0 0
0 1
Digital signalsDigital signals
Analog signals on
telephone line
Demodulator
Modulator
Modulator
Demodulator
modem at
sender
computer end
modem at
receiver
computer end
329
19. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 19/57Chapter 17: Data Communications and Computer NetworksRef. Page
Factors for Modem SelectionFactors for Modem Selection
§ Transmission speed
§ Internal versus external
§ Facsimile facility
329
20. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 20/57Chapter 17: Data Communications and Computer NetworksRef. Page
Data Transmission ServicesData Transmission Services
§ Data transmission service providers are popularly
known as common carriers
§ Various types of services offered by common carriers
are:
§ Dial-up line: Operates in a manner similar to a
telephone line
§ Leased line: Special conditioned telephone line
that directly and permanently connects two
computers
§ Integrated Services Digital Network (ISDN):
Telephone system that provides digital (not analog)
telephone and data services
(Continued on next slide)
330
21. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 21/57Chapter 17: Data Communications and Computer NetworksRef. Page
§ Value Added Network (VAN): Provides value-added
data transmission service. Value added over and
above the standard services of common carriers may
include e-mail, data encryption/decryption, access to
commercial databases, and code conversion for
communication between computers
(Continued from previous slide)
Data Transmission ServicesData Transmission Services
331
22. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 22/57Chapter 17: Data Communications and Computer NetworksRef. Page
MultiplexingMultiplexing
§ Method of dividing physical channel into many logical
channels so that a number of independent signals may
be simultaneously transmitted
§ Electronic device that performs multiplexing is known
as a multiplexer
§ Multiplexing enables a single transmission medium to
concurrently transmit data between several
transmitters and receivers
331
23. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 23/57Chapter 17: Data Communications and Computer NetworksRef. Page
Two Basic Methods of MultiplexingTwo Basic Methods of Multiplexing
§ Frequency-Division Multiplexing (FDM): Available
bandwidth of a physical medium is divided into several
smaller, disjoint logical bandwidths. Each component
bandwidth is used as a separate communication line
§ Time-Division Multiplexing (TDM): Total time
available in a channel is divided among several users,
and each user of the channel is allotted a time slice
during which he/she may transmit a message
332
25. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 25/57Chapter 17: Data Communications and Computer NetworksRef. Page
…
A3 A2 A1
B3 B2 B1
C3 C2 C1
Signal
A
Signal
B
Signal
C
C3 C2 C1
B3 B2 B1
A3 A2 A1
Channel
C2 B2 A2 C1 B1 A1
Time sliced
signals
Reassembled
signals
Sending
end
Receiving
end
Demulti-
plexer
Time-Division MultiplexingTime-Division Multiplexing
333
26. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 26/57Chapter 17: Data Communications and Computer NetworksRef. Page
Asynchronous and Synchronous
Transmission
Asynchronous and Synchronous
Transmission
§ Two modes of data transmission on a communication
line are asynchronous and synchronous
§ Asynchronous transmission
§ Sender can send data at any convenient time and
the receiver will accept it
§ Data is transmitted character by character at
irregular intervals
§ Well suited to many keyboard type terminals
(Continued on next slide)
333
27. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 27/57Chapter 17: Data Communications and Computer NetworksRef. Page
§ Synchronous transmission
§ Sender and receiver must synchronize with each
other to get ready for data transmission before it
takes place
§ Entire blocks of characters are framed and
transmitted together
§ Well suited to remote communication between a
computer and such devices as buffered terminals
and printers
(Continued from previous slide)
Asynchronous and Synchronous
Transmission
Asynchronous and Synchronous
Transmission
333
28. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 28/57Chapter 17: Data Communications and Computer NetworksRef. Page
Irregular time intervals
between two characters
Each character framed by
start and stop bits
Character Character Character
(a) Asynchronous transmission
Char Char Char Char Char Char
Indefinite time interval
between two blocks of data
A block of characters may
consist of hundreds of
characters
Trailer containing end of block
indication
Header containing synchronizing
and other information
(b) Synchronous transmission
Data TransmissionData Transmission
334
29. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 29/57Chapter 17: Data Communications and Computer NetworksRef. Page
Switching TechniquesSwitching Techniques
§ Data is often transmitted from source to destination
through a network of intermediate nodes
§ Switching techniques deal with the methods of
establishing communication links between the sender
and receiver in a communication network
§ Three commonly used switching techniques are:
§ Circuit switching: Dedicated physical path is
established between sending and receiving stations
through nodes of the network for the duration of
communication
(Continued on next slide)
334
30. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 30/57Chapter 17: Data Communications and Computer NetworksRef. Page
§ Message switching: Sender appends receiver’s
destination address to the message and it is
transmitted from source to destination either by
store-and-forward method or broadcast method
§ Packet switching: Message is split up into fixed size
packets and each packet is transmitted independently
from source to destination node. Either store-and-
forward or broadcast method is used for transmitting
the packets. All the packets of a message are re-
assembled into original message at the destination
node
(Continued from previous slide)
Switching TechniquesSwitching Techniques
336
31. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 31/57Chapter 17: Data Communications and Computer NetworksRef. Page
Source
node Destination
node
Dotted line
indicates
establishment of
physical path
Switching
nodes
Circuit Switching MethodCircuit Switching Method
335
32. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 32/57Chapter 17: Data Communications and Computer NetworksRef. Page
Store-and-Forward Method of
Message Switching
Store-and-Forward Method of
Message Switching
C
D
A
B
C
1
3
2
4
5
Either path 1-2-3-4 or 1-5-4 may be used to
transmit a message from A to B.
336
33. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 33/57Chapter 17: Data Communications and Computer NetworksRef. Page
1 2 3
Message
Broadcast Channel
Nodes n
Broadcast Method of Message
Switching
Broadcast Method of Message
Switching
337
34. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 34/57Chapter 17: Data Communications and Computer NetworksRef. Page
Routing TechniquesRouting Techniques
§ In a WAN, when multiple paths exist between the source
and destination nodes of a packet, any one of the paths
may be used to transfer the packet
§ Selection of path to be used for transmitting a packet is
determined by the routing technique used
§ Two popularly used routing algorithms are:
§ Source routing: Source node selects the entire path
before sending the packet
§ Hop-by-hop routing: Each node along the path
decides only the next node for the path
338
35. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 35/57Chapter 17: Data Communications and Computer NetworksRef. Page
Network TopologiesNetwork Topologies
§ Term network topology refers to the way in which
the nodes of a network are linked together
§ Although number network topologies are possible,
four major ones are:
§ Star network
§ Ring network
§ Completely connected network
§ Multi-access bus network
338
36. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 36/57Chapter 17: Data Communications and Computer NetworksRef. Page
Host
Node
Star NetworkStar Network
339
37. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 37/57Chapter 17: Data Communications and Computer NetworksRef. Page
Ring NetworkRing Network
339
38. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 38/57Chapter 17: Data Communications and Computer NetworksRef. Page
Completely Connected NetworkCompletely Connected Network
340
39. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 39/57Chapter 17: Data Communications and Computer NetworksRef. Page
Computers (nodes)
Single communication line shared by all nodes
Multi-Access Bus NetworkMulti-Access Bus Network
341
40. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 40/57Chapter 17: Data Communications and Computer NetworksRef. Page
Ring
Star
Completely
connected
Hybrid NetworkHybrid Network
341
41. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 41/57Chapter 17: Data Communications and Computer NetworksRef. Page
Network TypesNetwork Types
§ Networks are broadly classified into two types: Local
Area Network (LAN) and Wide Area Network (WAN)
§ Local Area Network (LAN) as compared to WAN:
§ Limited to a small geographic coverage
§ Has much higher data transmission rate
§ Experiences fewer data transmission errors
§ Has lower data communication cost
§ Typically owned by a single organization
§ Networks that share some of the characteristics of both
LANs and WANs are referred to as Metropolitan Area
Network (MAN)
342
42. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 42/57Chapter 17: Data Communications and Computer NetworksRef. Page
Communication ProtocolsCommunication Protocols
§ Protocol is a set of formal operating rules, procedures,
or conventions that govern a given process
§ Communication protocol describes rules that govern
transmission of data over communication networks
§ Roles of communication protocol:
§ Data sequencing
§ Data routing
§ Data formatting
§ Flow control
§ Error control
(Continued on next slide)
343
43. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 43/57Chapter 17: Data Communications and Computer NetworksRef. Page
Communication ProtocolsCommunication Protocols
§ Precedence and order of transmission
§ Connection establishment and termination
§ Data security
§ Log information.
§ Communication protocols are normally split up into a
series of modules logically composed of a succession of
layers.
§ Terms protocol suite, protocol family, or protocol stack
are used to refer to the collection of protocols (of all
layers) of a network system
(Continued from previous slide)
343
44. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 44/57Chapter 17: Data Communications and Computer NetworksRef. Page
Network Interface Card (NIC)Network Interface Card (NIC)
§ Hardware device that allows a computer to be
connected to a network, both functionally and
physically
§ Printed circuit board installed on to one of the
expansion slots of computer
§ Provides a port on the back to which network cable is
attached
344
45. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 45/57Chapter 17: Data Communications and Computer NetworksRef. Page
The OSI ModelThe OSI Model
§ The Open System Interconnection (OSI) model is
framework for defining standards for linking
heterogeneous computers in a packet switched
network
§ Standardized OSI protocol makes it possible for any
two heterogeneous computer systems, located
anywhere in the world, to easily communicate with
each other
§ Separate set of protocols is defined for each layer in its
seven-layer architecture. Each layer has an
independent function
344
46. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 46/57Chapter 17: Data Communications and Computer NetworksRef. Page
Network
Node 1
Layer 7
(application)
Layer 6
(presentation)
Layer 5
(session)
Layer 4
(transport)
Layer 3
(network)
Layer 2
(data link)
Layer 1
(physical)
Application protocol
Presentation protocol
Session protocol
Transport protocol
Network protocol
Data-link protocol
Physical protocol
Layer 7
(application)
Layer 6
(presentation)
Layer 5
(session)
Layer 4
(transport)
Layer 3
(network)
Layer 2
(data link)
Layer 1
(physical)
Process A Process B
Node 2
Interface
Interface
Interface
Interface
Interface
Interface Interface
Interface
Interface
Interface
Interface
Interface
Layers, Interfaces, and Protocols
in the OSI Model
Layers, Interfaces, and Protocols
in the OSI Model
346
47. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 47/57Chapter 17: Data Communications and Computer NetworksRef. Page
An example illustrating transfer of message M from sending node to the
receiving node in the OSI model: Hn, header added by layer n:Tn, trailer
added by layer n.
An example illustrating transfer of message M from sending node to the
receiving node in the OSI model: Hn, header added by layer n:Tn, trailer
added by layer n.
H6 H
7
H7 M
M
H5 H6 H7 M
Sending node
H4 H5 H6 H7 M1 H4 H5 H6 H7 M2
H2 H3 H4 H5 H6 H7 M1 T2 H2 H3 H4 H5 H6 H7 M2 T2
H3 H4 H5 H6 H7 M2H7H3 H4 H5 H6 M1
Process A
H6 H7
H7 M
M
H5 H6 H7 M
Receiving node
H4 H5 H6 H7 M1 H4 H5 H6 H7 M2
H2 H3 H4 H5 H6 H7 M1 T2 H2 H3 H4 H5 H6 H7 M2 T2
H3 H4 H5 H6 H7 M2H3 H4 H5 H6H7 M1
Process B
348
48. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 48/57Chapter 17: Data Communications and Computer NetworksRef. Page
InternetworkingInternetworking
§ Interconnecting two or more networks to form a single
network is called internetworking, and the resulting
network is called an internetwork
§ Goal of internetworking is to hide details of different
physical networks, so that resulting internetwork
functions as a single coordinated unit
§ Tools such as bridges, routers, brouters, and gateways
are used for internetworking
§ The Internet is the best example of an internetwork
348
49. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 49/57Chapter 17: Data Communications and Computer NetworksRef. Page
BridgesBridges
§ Operate at bottom two layers of the OSI model
§ Connect networks that use the same communication
protocols above data-link layer but may use different
protocols at physical and data-link layers
349
50. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 50/57Chapter 17: Data Communications and Computer NetworksRef. Page
RoutersRouters
§ Operates at network layer of the OSI model
§ Used to interconnect those networks that use the same
high-level protocols above network layer
§ Smarter than bridges as they not only copy data from
one network segment to another, but also choose the
best route for the data by using routing table
349
51. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 51/57Chapter 17: Data Communications and Computer NetworksRef. Page
GatewaysGateways
§ Operates at the top three layers of the OSI model
(session, presentation and application)
§ Used for interconnecting dissimilar networks that use
different communication protocols
§ Since gateways interconnect dissimilar networks,
protocol conversion is the major job performed by
them
349
52. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 52/57Chapter 17: Data Communications and Computer NetworksRef. Page
Wireless Computing SystemsWireless Computing Systems
§ Wireless computing system uses wireless communication
technologies for interconnecting computer systems
§ Enhances functionality of computing equipment by freeing
communication from location constraints of wired
computing systems
§ Wireless computing systems are of two types:
§ Fixed wireless systems: Support little or no
mobility of the computing equipment associated with
the wireless network
§ Mobile wireless systems: Support mobility of the
computing equipment to access resources associated
with the wireless network
349
53. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 53/57Chapter 17: Data Communications and Computer NetworksRef. Page
§ 2G and 3G
§ Wireless LAN
§ WiMAX
§ Wireless Local Loop (WLL)
§ Radio-router
§ Multihop Wireless Network
§ Wireless Application Protocol (WAP)
Wireless TechnologiesWireless Technologies
351
54. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 54/57Chapter 17: Data Communications and Computer NetworksRef. Page
Distributed Computing SystemsDistributed Computing Systems
§ Configuration where many independent computer
systems are connected, and messages, processing task,
programs, data, and other resources are transmitted
between cooperating computer systems
§ Such an arrangement enables sharing of many
hardware and software resources as well as information
among several users who may be sitting far away from
each other
352
55. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 55/57Chapter 17: Data Communications and Computer NetworksRef. Page
Main Advantages of Distributed
Computing Systems
Main Advantages of Distributed
Computing Systems
§ Inherently distributed applications
§ Information sharing among distributed users
§ Resource sharing
§ Shorter response times and higher throughput
§ Higher reliability
§ Extensibility and incremental growth
§ Better flexibility in meeting users’ needs
353
56. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 56/57Chapter 17: Data Communications and Computer NetworksRef. Page
§ Amplifier
§ Amplitude Modulation (AM)
§ Application layer
§ ARPANET
§ Asynchronous transmission
§ Bandwidth
§ Baud
§ Bridge
§ Broadband
§ Broadcast
§ C-band transmission
§ Circuit switching
§ Coaxial cable
§ Common Carriers
§ Communication protocol
§ Communications satellite
§ Completely connected network
§ Computer network
§ Concentrators
§ Data-link layer
§ Demodulation
§ Dial-up line
§ Distributed Computing System
§ Ethernet
§ Fax modem
§ File Transfer Protocol (FTP)
§ Font-End Processors (FEP)
§ Frequency Modulation (FM)
§ Frequency-Division Multiplexing (FDM)
§ Full duplex
§ Gateway
§ Half duplex
§ Hop-by-hop routing
§ Hybrid network
§ Internet Protocol (IP)
§ Internetworking
§ ISDN (Integrated Services Digital Network)
§ Ku-band transmission
§ Leased line
§ Local Area Network (LAN)
§ Message switching
Keywords/PhrasesKeywords/Phrases
(Continued on next slide)
354
57. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 57/57Chapter 17: Data Communications and Computer NetworksRef. Page
§ Metropolitan Area Network (MAN)
§ Microwave system
§ Mobile computing
§ Modem
§ Modulation
§ Multi-access Bus network
§ Multiplexer
§ Narrowband
§ Network Interface Card (NIC)
§ Network layer
§ Network topology
§ Nomadic computing
§ Optical fibers
§ OSI Model
§ Packet switching
§ Phase Modulation (PM)
§ Physical layer
§ POTS (Plain Old Telephone Service)
§ Presentation layer
§ Protocol family
§ Protocol stack
§ Protocol suite
§ Repeater
§ Ring network
§ Router
§ Session layer
§ Simplex
§ Source routing
§ Star network
§ Store-and-forward
§ Synchronous transmission
§ Time-Division Multiplexing (TDM)
§ Transport Control Protocol (TCP)
§ Transport layer
§ Twisted-pair
§ Unshielded twisted-pair (UTP)
§ User Datagram Protocol (UDP)
§ Value Added Network (VAN)
§ Voiceband
§ VSAT (Very Small Aperture Terminals)
§ Wide Area Network (WAN)
§ Wireless network
(Continued from previous slide)
Keywords/PhrasesKeywords/Phrases
354