SlideShare a Scribd company logo
Computer software
Part 3
DR PARDEEP PORIYA (ASST. PROFESSOR)
GOVT. COLLEGE SEC 9,
GURUGRAM
NETWORK
 A network consists of two or more computers that are linked in order to
share resources (such as printers and CDs), exchange files, or allow
electronic communications. The computers on a network may be linked
through cables, telephone lines, radio waves, satellites, or infrared light
beams.
TYPES :
 Local Area Network (LAN)
 Wide Area Network (WAN)
Local Area Network
 A Local Area Network (LAN) is a network that is confined to a relatively
small area. It is generally limited to a geographic area such as a writing
lab, school, or building.
 Computers connected to a network are broadly categorized as servers or
workstations. Servers are generally not used by humans directly, but
rather run continuously to provide "services" to the other computers (and
their human users) on the network. Services provided can include
printing and faxing, software hosting, file storage and sharing, messaging,
data storage and retrieval, complete access control (security) for the
network's resources, and many others.
Wide Area Network
 Wide Area Networks (WANs) connect networks in larger geographic
areas, such as Gurgaon (INDIA), or the world. Dedicated transoceanic
cabling or satellite uplinks may be used to connect this type of global
network.
 Using a WAN, schools in Gurgaon can communicate with places like
Tokyo in a matter of seconds, without paying enormous phone bills. Two
users a half-world apart with workstations equipped with microphones
and a webcams might teleconference in real time.
 A WAN is complicated. It uses multiplexers, bridges, and routers to
connect local and metropolitan networks to global communications
networks like the Internet. To users, however, a WAN will not appear to be
much different than a LAN.
Networking Hardware :
 Networking hardware includes all computers, peripherals, interface cards
and other equipment needed to perform data-processing and
communications within the network.
DIAGRAMME
Network Servers
 One or more network servers is a part of nearly every local area network.
These are very fast computers with a large amount of RAM and storage
space, along with a one or more fast network interface card(s). The network
operating system provides tools to share server resources and information
with network users. A sophisticated permissions-handling system is included,
so that access to sensitive information can be carefully tailored to the needs
of the users. For small networks, a singe network server may provide access
control, file sharing, printer sharing, email, database, and other services.
 The network server may be responding to requests from many network users
simultaneously. For example, it may be asked to load a word processor
program to one workstation, receive a database file from another
workstation, and store an e-mail message during the same time period. This
requires a computer that can store and quickly share large amounts of
information. When configuring such a server, budget is usually the controlling
factor.
Repeaters
 Since a signal loses strength as it passes along a cable, it is often necessary
to boost the signal with a device called a repeater. The repeater electrically
amplifies the signal it receives and rebroadcasts it. Repeaters can be separate
devices or they can be incorporated into a concentrator. They are used when
the total length of your network cable exceeds the standards set for the type
of cable being used.
 A good example of the use of repeaters would be in a local area network
using a star topology with unshielded twisted-pair cabling. The length limit
for unshielded twisted-pair cable is 100 meters. The most common
configuration is for each workstation to be connected by twisted-pair cable
to a multi-port active concentrator. The concentrator amplifies all the signals
that pass through it allowing for the total length of cable on the network to
exceed the 100 meter limit.
Bridges
 A bridge is a device that allows you to segment a large network into two
smaller, more efficient networks. If you are adding to an older wiring scheme
and want the new network to be up-to-date, a bridge can connect the two.
 A bridge monitors the information traffic on both sides of the network so that
it can pass packets of information to the correct location. Most bridges can
"listen" to the network and automatically figure out the address of each
computer on both sides of the bridge. The bridge can inspect each message
and, if necessary, broadcast it on the other side of the network.
 The bridge manages the traffic to maintain optimum performance on both
sides of the network. You might say that the bridge is like a traffic cop at a
busy intersection during rush hour. It keeps information flowing on both sides
of the network, but it does not allow unnecessary traffic through.
Routers
 Routers are the traffic directors of the global internet. All routers maintain
complex routing tables which allow them to determine appropriate paths for
packets destined for any address. Routers communicate with each other, and
forward network packets out of or into a network. Here's an example:
 You want to search for something on the internet using a search engine. You
open a browser on your workstation. The browser opens to a blank page
(not usually the default, but appropriate for this example). You type
"http://www.google.com" into the URL (Universal Resource Locator) address
line of the browser. The browser software packages up the URL you typed,
and sends it with a request for an IP address to the DNS (Domain Name
Server) that has been set in your network adapter's configuration. The
domain server returns an IP
, such as 74.125.67.103 (actual address returned by
DNS for google.com on June 7th, 2011).
Firewalls
 A firewall is a networking device that is installed at the entrance to a LAN
when connecting a networks together, particularly when connecting a
private network to a public network, such as the internet. The firewall uses
rules to filter traffic into and out of the private network, to protect the
private network users and data from malevolent hackers.
 Firewalls are either hardware or software, depending on their intended
use. A firewall used to protect a network is a hardware device that should
be installed in the network between the router and the network. Almost
all hardware firewalls will have at least two ports, labeled "Trusted" and
"Untrusted". These terms imply the true nature of the firewall's
responsibility to the private network. The public network is connected to
the untrusted network port, and the private network is connected to the
trusted port.
Thank you
 Please follow me on like and subscribe
https://www.facebook.com/drpardeepporiya/
https://www.youtube.com/channel/UCMtnSh1GsAGJBfir23BVzaA
https://www2.slideshare.net/PardeepPoriya
Computer software
Part 4
DR PARDEEP PORIYA (ASST. PROFESSOR)
GOVT. COLLEGE SEC 9,
GURUGRAM
Network Operating System
 Unlike operating systems, such as Windows, that are designed for single
users to control one computer, network operating systems (NOS)
coordinate the activities of multiple computers across a network. The
network operating system acts as a director to keep the network running
smoothly.
TYPES :
 Peer-to-Peer
 Client/Server
Peer-to-Peer
 Peer-to-peer network operating systems allow users to share resources
and files located on their computers and to access shared resources
found on other computers.
 They do not have a file server or a centralized management source
 In a peer-to-peer network, all computers are considered equal;
 they all have the same abilities to use the resources available on the
network. Peer-to-peer networks are designed primarily for small to
medium local area networks. Nearly all modern desktop operating
systems, such as Macintosh OSX, Linux, and Windows, can function as
peer-to-peer network operating systems.
DIAGRAMME :
Advantages :
 Less initial expense - No need for a dedicated server.
 Setup - An operating system (such as Windows XP) already in place may
only need to be reconfigured for peer-to-peer operations.
DISADVANTAGES :
 Decentralized - No central repository for files and applications.
 Security - Does not provide the security available on a client/server
network.
Client/Server
 Client/server network operating systems allow the network to centralize
functions and applications in one or more dedicated file servers .The file
servers become the heart of the system, providing access to resources
and providing security. Individual workstations (clients) have access to the
resources available on the file servers.
 The network operating system provides the mechanism to integrate all
the components of the network and allow multiple users to
simultaneously share the same resources irrespective of physical location.
UNIX/Linux and the Microsoft family of Windows Servers are examples of
client/server network operating systems.
Diagramme :
Advantages :
 Centralized - Resources and data security are controlled through the
server.
 Scalability - All elements can be replaced individually as needs increase.
 Flexibility - New technology can be easily integrated into system.
 Interoperability - All components (client/network/server) work together.
 Accessibility - Server can be accessed remotely and across multiple
platforms.
Disadvantages :
 Expense - Requires initial investment in dedicated server.
 Maintenance - Large networks will require a staff to ensure efficient
operation.
 Dependence - When server goes down, operations will cease across the
network.
Workstations
 Computers that humans use are broadly categorized as workstations. A
typical workstation is a computer that is configured with a network
interface card, networking software, and the appropriate cables.
 Workstations do not necessarily need large storage hard drives, because
files can be saved on the file server. Almost any computer can serve as a
network workstation.
Laptops/Mobile Devices
 Laptops and other mobile devices are becoming more and more
common. These devices typically have modest internal storage, but
enough power to serve as a workstation for users on the go.
 These machines nearly always have a wireless adapter to allow quick
network connections without cumbersome cabling. In a school
environment with good wireless coverage, a mobile device user can
move about the campus freely, and remain continuously connected to
the network.
Network Interface Cards
 The network interface card (NIC) provides the physical connection
between the network and the computer workstation. Most NICs are
internal, and they are included in the purchase of most computers.
Network interface cards are a major factor in determining the speed and
performance of a network. It is a good idea to use the fastest network
card available for the type of workstation you are using.
 The most common network interface connections are Ethernet cards and
wireless adapters.
Ethernet Cards
 Ethernet cards are usually included with a computer, although additional
ethernet cards can be purchased and installed on most computers,.
Ethernet cards can contain connections for either coaxial or twisted pair
cables (or both) .If it is designed for coaxial cable, the connection will be
BNC. If it is designed for twisted pair, it will have a RJ-45 connection.
Some Ethernet cards also contain an AUI connector.
 This can be used to attach coaxial, twisted pair, or fiber optics cable to an
Ethernet card. When this method is used there is always an external
transceiver attached to the workstation. Only the RJ-45 connector is
found on most modern ethernet cards.
Wireless Adapters
 Wireless adapters are found in most portable devices, such as laptops,
smart phones, and tablet devices. External wireless adapters can be
purchased and installed on most computers having an open USB
(Universal Serial Bus) port, or unused expansion slot.
Thank you
 Please follow me on like and subscribe
https://www.facebook.com/drpardeepporiya/
https://www.youtube.com/channel/UCMtnSh1GsAGJBfir23BVzaA
https://www2.slideshare.net/PardeepPoriya

More Related Content

What's hot

introduction-to-computer-networking
introduction-to-computer-networkingintroduction-to-computer-networking
introduction-to-computer-networking
Sithu PM
 
Introduction to computer network 4th edition
Introduction to computer network   4th editionIntroduction to computer network   4th edition
Introduction to computer network 4th edition
Ensign Handoko
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
lucita cabral
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
SindhuVelmukull
 
Computer network
Computer networkComputer network
Computer network
Neha Gupta
 
network hardware
network hardwarenetwork hardware
network hardware
tumetr1
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingKhan Rahimeen
 
Computer networking
Computer networkingComputer networking
Computer networking
Bayarmaa GBayarmaa
 
Welcome to Computer Networks
Welcome to Computer NetworksWelcome to Computer Networks
Welcome to Computer Networksfarhan516
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkVinnu Vinod Kvk
 
Introduction to computer networking
Introduction to computer networkingIntroduction to computer networking
Introduction to computer networking
Sameer Sharma
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
Jitendra Kumar Sharma
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
vasanthimuniasamy
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
Rajet Veshin
 
P2P Seminar
P2P SeminarP2P Seminar
P2P SeminarCoRehab
 
Types of network
Types of networkTypes of network
Types of network
IGZ Software house
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
Rozitarmizi Mohammad
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
Antenh Mekonen
 
Information Networks - (Covered all the Important Topics)
Information Networks - (Covered all the Important Topics) Information Networks - (Covered all the Important Topics)

What's hot (20)

introduction-to-computer-networking
introduction-to-computer-networkingintroduction-to-computer-networking
introduction-to-computer-networking
 
Introduction to computer network 4th edition
Introduction to computer network   4th editionIntroduction to computer network   4th edition
Introduction to computer network 4th edition
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
 
Computer network
Computer networkComputer network
Computer network
 
network hardware
network hardwarenetwork hardware
network hardware
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
OSI model (Tamil)
OSI model (Tamil)OSI model (Tamil)
OSI model (Tamil)
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Welcome to Computer Networks
Welcome to Computer NetworksWelcome to Computer Networks
Welcome to Computer Networks
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Introduction to computer networking
Introduction to computer networkingIntroduction to computer networking
Introduction to computer networking
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
P2P Seminar
P2P SeminarP2P Seminar
P2P Seminar
 
Types of network
Types of networkTypes of network
Types of network
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Information Networks - (Covered all the Important Topics)
Information Networks - (Covered all the Important Topics) Information Networks - (Covered all the Important Topics)
Information Networks - (Covered all the Important Topics)
 

Similar to Computer software part 3

Networks and telecommunication technologies basics
Networks and telecommunication technologies basicsNetworks and telecommunication technologies basics
Networks and telecommunication technologies basics
David Kibuki
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & Networking
Gohil Anshu
 
What is a network
What is a networkWhat is a network
What is a network
Rowan Nave
 
Computer network
Computer networkComputer network
Computer networkAnupan Jain
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Kyle
 
Computer networking
Computer networkingComputer networking
Computer networking
tdsparks3
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialreddydivakara
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networks
Sagar Gor
 
Chapter 6.0
Chapter 6.0Chapter 6.0
Chapter 6.0
Adebisi Tolulope
 
Networking concepts by Sachidananda M H
Networking concepts by Sachidananda M HNetworking concepts by Sachidananda M H
Networking concepts by Sachidananda M H
Sachidananda M H
 
Lecture-03 - Introduction To Network.pptx
Lecture-03 - Introduction To Network.pptxLecture-03 - Introduction To Network.pptx
Lecture-03 - Introduction To Network.pptx
Md. Sakhawat Hossain
 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKINGbwire sedrick
 
ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdf
HonKencyTress
 
Impact of computer networking and network devices
Impact of computer networking and network devicesImpact of computer networking and network devices
Impact of computer networking and network devices
Janaki Kaimal
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
K. A. M Lutfullah
 
Rkp internet part i
Rkp internet part iRkp internet part i
Rkp internet part i
DR. Ram Kumar Pathak
 
Seminar report-networking
Seminar report-networkingSeminar report-networking
Seminar report-networking
Jyoti Kumari
 

Similar to Computer software part 3 (20)

Hardware1
Hardware1Hardware1
Hardware1
 
Hardware1
Hardware1Hardware1
Hardware1
 
Networks and telecommunication technologies basics
Networks and telecommunication technologies basicsNetworks and telecommunication technologies basics
Networks and telecommunication technologies basics
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & Networking
 
What is a network
What is a networkWhat is a network
What is a network
 
Computer network
Computer networkComputer network
Computer network
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networks
 
Chapter 6.0
Chapter 6.0Chapter 6.0
Chapter 6.0
 
Networking concepts by Sachidananda M H
Networking concepts by Sachidananda M HNetworking concepts by Sachidananda M H
Networking concepts by Sachidananda M H
 
Lecture-03 - Introduction To Network.pptx
Lecture-03 - Introduction To Network.pptxLecture-03 - Introduction To Network.pptx
Lecture-03 - Introduction To Network.pptx
 
Kinds of networks
Kinds of networksKinds of networks
Kinds of networks
 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKING
 
ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdf
 
Impact of computer networking and network devices
Impact of computer networking and network devicesImpact of computer networking and network devices
Impact of computer networking and network devices
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Rkp internet part i
Rkp internet part iRkp internet part i
Rkp internet part i
 
Seminar report-networking
Seminar report-networkingSeminar report-networking
Seminar report-networking
 

More from Dr Pardeep Poriya

Pr for canada
Pr for canadaPr for canada
Pr for canada
Dr Pardeep Poriya
 
Introduction to webpage
Introduction to webpageIntroduction to webpage
Introduction to webpage
Dr Pardeep Poriya
 
Computer software part 2
Computer software part 2Computer software part 2
Computer software part 2
Dr Pardeep Poriya
 
Computer software part 1
Computer software part 1Computer software part 1
Computer software part 1
Dr Pardeep Poriya
 
Nature and scope tourism
Nature and scope tourismNature and scope tourism
Nature and scope tourism
Dr Pardeep Poriya
 
Culture and its features
Culture and its featuresCulture and its features
Culture and its features
Dr Pardeep Poriya
 
HRM in retail
HRM in retailHRM in retail
HRM in retail
Dr Pardeep Poriya
 
India physiographic divisions
India physiographic divisionsIndia physiographic divisions
India physiographic divisions
Dr Pardeep Poriya
 
Srinagar ppt
Srinagar pptSrinagar ppt
Srinagar ppt
Dr Pardeep Poriya
 

More from Dr Pardeep Poriya (9)

Pr for canada
Pr for canadaPr for canada
Pr for canada
 
Introduction to webpage
Introduction to webpageIntroduction to webpage
Introduction to webpage
 
Computer software part 2
Computer software part 2Computer software part 2
Computer software part 2
 
Computer software part 1
Computer software part 1Computer software part 1
Computer software part 1
 
Nature and scope tourism
Nature and scope tourismNature and scope tourism
Nature and scope tourism
 
Culture and its features
Culture and its featuresCulture and its features
Culture and its features
 
HRM in retail
HRM in retailHRM in retail
HRM in retail
 
India physiographic divisions
India physiographic divisionsIndia physiographic divisions
India physiographic divisions
 
Srinagar ppt
Srinagar pptSrinagar ppt
Srinagar ppt
 

Recently uploaded

The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 

Recently uploaded (20)

The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 

Computer software part 3

  • 1. Computer software Part 3 DR PARDEEP PORIYA (ASST. PROFESSOR) GOVT. COLLEGE SEC 9, GURUGRAM
  • 2. NETWORK  A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.
  • 3. TYPES :  Local Area Network (LAN)  Wide Area Network (WAN)
  • 4. Local Area Network  A Local Area Network (LAN) is a network that is confined to a relatively small area. It is generally limited to a geographic area such as a writing lab, school, or building.  Computers connected to a network are broadly categorized as servers or workstations. Servers are generally not used by humans directly, but rather run continuously to provide "services" to the other computers (and their human users) on the network. Services provided can include printing and faxing, software hosting, file storage and sharing, messaging, data storage and retrieval, complete access control (security) for the network's resources, and many others.
  • 5. Wide Area Network  Wide Area Networks (WANs) connect networks in larger geographic areas, such as Gurgaon (INDIA), or the world. Dedicated transoceanic cabling or satellite uplinks may be used to connect this type of global network.  Using a WAN, schools in Gurgaon can communicate with places like Tokyo in a matter of seconds, without paying enormous phone bills. Two users a half-world apart with workstations equipped with microphones and a webcams might teleconference in real time.  A WAN is complicated. It uses multiplexers, bridges, and routers to connect local and metropolitan networks to global communications networks like the Internet. To users, however, a WAN will not appear to be much different than a LAN.
  • 6. Networking Hardware :  Networking hardware includes all computers, peripherals, interface cards and other equipment needed to perform data-processing and communications within the network.
  • 8. Network Servers  One or more network servers is a part of nearly every local area network. These are very fast computers with a large amount of RAM and storage space, along with a one or more fast network interface card(s). The network operating system provides tools to share server resources and information with network users. A sophisticated permissions-handling system is included, so that access to sensitive information can be carefully tailored to the needs of the users. For small networks, a singe network server may provide access control, file sharing, printer sharing, email, database, and other services.  The network server may be responding to requests from many network users simultaneously. For example, it may be asked to load a word processor program to one workstation, receive a database file from another workstation, and store an e-mail message during the same time period. This requires a computer that can store and quickly share large amounts of information. When configuring such a server, budget is usually the controlling factor.
  • 9. Repeaters  Since a signal loses strength as it passes along a cable, it is often necessary to boost the signal with a device called a repeater. The repeater electrically amplifies the signal it receives and rebroadcasts it. Repeaters can be separate devices or they can be incorporated into a concentrator. They are used when the total length of your network cable exceeds the standards set for the type of cable being used.  A good example of the use of repeaters would be in a local area network using a star topology with unshielded twisted-pair cabling. The length limit for unshielded twisted-pair cable is 100 meters. The most common configuration is for each workstation to be connected by twisted-pair cable to a multi-port active concentrator. The concentrator amplifies all the signals that pass through it allowing for the total length of cable on the network to exceed the 100 meter limit.
  • 10. Bridges  A bridge is a device that allows you to segment a large network into two smaller, more efficient networks. If you are adding to an older wiring scheme and want the new network to be up-to-date, a bridge can connect the two.  A bridge monitors the information traffic on both sides of the network so that it can pass packets of information to the correct location. Most bridges can "listen" to the network and automatically figure out the address of each computer on both sides of the bridge. The bridge can inspect each message and, if necessary, broadcast it on the other side of the network.  The bridge manages the traffic to maintain optimum performance on both sides of the network. You might say that the bridge is like a traffic cop at a busy intersection during rush hour. It keeps information flowing on both sides of the network, but it does not allow unnecessary traffic through.
  • 11. Routers  Routers are the traffic directors of the global internet. All routers maintain complex routing tables which allow them to determine appropriate paths for packets destined for any address. Routers communicate with each other, and forward network packets out of or into a network. Here's an example:  You want to search for something on the internet using a search engine. You open a browser on your workstation. The browser opens to a blank page (not usually the default, but appropriate for this example). You type "http://www.google.com" into the URL (Universal Resource Locator) address line of the browser. The browser software packages up the URL you typed, and sends it with a request for an IP address to the DNS (Domain Name Server) that has been set in your network adapter's configuration. The domain server returns an IP , such as 74.125.67.103 (actual address returned by DNS for google.com on June 7th, 2011).
  • 12. Firewalls  A firewall is a networking device that is installed at the entrance to a LAN when connecting a networks together, particularly when connecting a private network to a public network, such as the internet. The firewall uses rules to filter traffic into and out of the private network, to protect the private network users and data from malevolent hackers.  Firewalls are either hardware or software, depending on their intended use. A firewall used to protect a network is a hardware device that should be installed in the network between the router and the network. Almost all hardware firewalls will have at least two ports, labeled "Trusted" and "Untrusted". These terms imply the true nature of the firewall's responsibility to the private network. The public network is connected to the untrusted network port, and the private network is connected to the trusted port.
  • 13. Thank you  Please follow me on like and subscribe https://www.facebook.com/drpardeepporiya/ https://www.youtube.com/channel/UCMtnSh1GsAGJBfir23BVzaA https://www2.slideshare.net/PardeepPoriya
  • 14. Computer software Part 4 DR PARDEEP PORIYA (ASST. PROFESSOR) GOVT. COLLEGE SEC 9, GURUGRAM
  • 15. Network Operating System  Unlike operating systems, such as Windows, that are designed for single users to control one computer, network operating systems (NOS) coordinate the activities of multiple computers across a network. The network operating system acts as a director to keep the network running smoothly.
  • 17. Peer-to-Peer  Peer-to-peer network operating systems allow users to share resources and files located on their computers and to access shared resources found on other computers.  They do not have a file server or a centralized management source  In a peer-to-peer network, all computers are considered equal;  they all have the same abilities to use the resources available on the network. Peer-to-peer networks are designed primarily for small to medium local area networks. Nearly all modern desktop operating systems, such as Macintosh OSX, Linux, and Windows, can function as peer-to-peer network operating systems.
  • 19. Advantages :  Less initial expense - No need for a dedicated server.  Setup - An operating system (such as Windows XP) already in place may only need to be reconfigured for peer-to-peer operations.
  • 20. DISADVANTAGES :  Decentralized - No central repository for files and applications.  Security - Does not provide the security available on a client/server network.
  • 21. Client/Server  Client/server network operating systems allow the network to centralize functions and applications in one or more dedicated file servers .The file servers become the heart of the system, providing access to resources and providing security. Individual workstations (clients) have access to the resources available on the file servers.  The network operating system provides the mechanism to integrate all the components of the network and allow multiple users to simultaneously share the same resources irrespective of physical location. UNIX/Linux and the Microsoft family of Windows Servers are examples of client/server network operating systems.
  • 23. Advantages :  Centralized - Resources and data security are controlled through the server.  Scalability - All elements can be replaced individually as needs increase.  Flexibility - New technology can be easily integrated into system.  Interoperability - All components (client/network/server) work together.  Accessibility - Server can be accessed remotely and across multiple platforms.
  • 24. Disadvantages :  Expense - Requires initial investment in dedicated server.  Maintenance - Large networks will require a staff to ensure efficient operation.  Dependence - When server goes down, operations will cease across the network.
  • 25. Workstations  Computers that humans use are broadly categorized as workstations. A typical workstation is a computer that is configured with a network interface card, networking software, and the appropriate cables.  Workstations do not necessarily need large storage hard drives, because files can be saved on the file server. Almost any computer can serve as a network workstation.
  • 26. Laptops/Mobile Devices  Laptops and other mobile devices are becoming more and more common. These devices typically have modest internal storage, but enough power to serve as a workstation for users on the go.  These machines nearly always have a wireless adapter to allow quick network connections without cumbersome cabling. In a school environment with good wireless coverage, a mobile device user can move about the campus freely, and remain continuously connected to the network.
  • 27. Network Interface Cards  The network interface card (NIC) provides the physical connection between the network and the computer workstation. Most NICs are internal, and they are included in the purchase of most computers. Network interface cards are a major factor in determining the speed and performance of a network. It is a good idea to use the fastest network card available for the type of workstation you are using.  The most common network interface connections are Ethernet cards and wireless adapters.
  • 28. Ethernet Cards  Ethernet cards are usually included with a computer, although additional ethernet cards can be purchased and installed on most computers,. Ethernet cards can contain connections for either coaxial or twisted pair cables (or both) .If it is designed for coaxial cable, the connection will be BNC. If it is designed for twisted pair, it will have a RJ-45 connection. Some Ethernet cards also contain an AUI connector.  This can be used to attach coaxial, twisted pair, or fiber optics cable to an Ethernet card. When this method is used there is always an external transceiver attached to the workstation. Only the RJ-45 connector is found on most modern ethernet cards.
  • 29. Wireless Adapters  Wireless adapters are found in most portable devices, such as laptops, smart phones, and tablet devices. External wireless adapters can be purchased and installed on most computers having an open USB (Universal Serial Bus) port, or unused expansion slot.
  • 30. Thank you  Please follow me on like and subscribe https://www.facebook.com/drpardeepporiya/ https://www.youtube.com/channel/UCMtnSh1GsAGJBfir23BVzaA https://www2.slideshare.net/PardeepPoriya