SlideShare a Scribd company logo
1 of 58
About the Presentations
• The presentations cover the objectives found in
the opening of each chapter.
• All chapter objectives are listed in the beginning of
each presentation.
• You may customize the presentations to fit your
class needs.
• Some figures from the chapters are included. A
complete set of images from the book can be found
on the Instructor Resources disc.
Guide to Networking Essentials,
6th
Edition
Chapter 1: Introduction to Computer
Networks
Copyright © 2012 Cengage Learning. All rights reserved. 3
Objectives
3
• Describe basic computer components and
operations
• Explain the fundamentals of network
communication
• Define common networking terms
• Compare different network models
• Identify the functions of various network server
types
• Describe specialized networks
Copyright © 2012 Cengage Learning. All rights reserved. 4
An Overview of Computer Concepts
• Most of the devices you encounter when working
with a network involve a computer
• Most obvious devices are workstations and
network servers
– These run operating systems such as Windows, Linux, UNIX,
and Mac OS
• Also includes routers and switches
– These are specialized computers used to move data from
computer to computer and network to network
– You will learn more about them in later chapters
Copyright © 2012 Cengage Learning. All rights reserved. 5
Basic Functions of a Computer
• Computer’s functions can be broken down into
three basic tasks:
– Input: A user running a word-processing program types the
letter “A” on the keyboard, which results in sending a code
representing the letter “A” to the computer
– Processing: The computer’s central processing unit (CPU)
determines what letter was typed by looking up the keyboard
code in a table.
– Output: The CPU sends instructions to the graphics cards to
display the letter “A”, which is then sent to the computer
monitor.
Copyright © 2012 Cengage Learning. All rights reserved. 6
Input Components
• Common user-controlled devices such as
keyboards, mice, microphones, Web cameras, and
scanners
• External interfaces, such as serial, FireWire, and
USB ports can also be used to get input from
peripheral devices
• Storage devices such as hard disks and CDs/DVDs
Copyright © 2012 Cengage Learning. All rights reserved. 7
Processing Components
• A computer’s main processing component is the CPU
– Executes instructions from computer programs such as word
processors and from the computer’s operating system
– Current CPUs are composed of two or more processors called
cores
• A graphics processing unit (GPU) takes a high-level
graphics instruction and performs the calculation
needed for the instruction to be displayed on the
monitor
• Other devices, such as network interface cards and
disk controller cards, might also include onboard
processors
Copyright © 2012 Cengage Learning. All rights reserved. 8
Output Components
• Most obvious are monitors and printers
• Also includes storage devices, network cards,
and speakers
• External interfaces
– For example, a disk drive connected to a USB port allows
reading files from the disk (input) and writing files to the disk
(output).
Copyright © 2012 Cengage Learning. All rights reserved. 9
Storage Components
• The more storage a computer has, the better
• Most storage components are both input and
output devices
• Most people think of storage as disk drives,
CD/DVD drives, and USB flash drives
• However, there are two main categories of storage
– Short-term storage
– Long-term storage
Copyright © 2012 Cengage Learning. All rights reserved. 10
RAM: Short-Term Storage
• Random Access Memory (RAM) – when power to
the computer is turned off, RAM’s contents are
gone
• The amount of RAM in a computer is crucial to the
computer’s capability to operate efficiently
• RAM is also referred to as working storage
• If there’s not enough RAM to run a program, the
computer will use the disk drive to supplement
Copyright © 2012 Cengage Learning. All rights reserved. 11
Long-Term Storage
• Maintains its data even when there’s no power
• Examples:
– Hard disks
– CDs/DVDs
– USB flash drives
• Used to store document and multimedia files
• Amount of storage a computer needs depends on
the type and quantity of files to be stored
Copyright © 2012 Cengage Learning. All rights reserved. 12
Data is Stored in Bits
• Data on a computer is stored as binary digits (“bits”
for short)
• A bit holds a 1 or 0 value
• A pulse of 5 volts of electricity can represent a 1 bit
and a pulse of 0 volts can represent a 0 bit
• With fiber-optic cable, a 1 bit is represented by the
presence of light and a 0 bit by the absence of light
• A “byte” is a collection of 8 bits
Copyright © 2012 Cengage Learning. All rights reserved. 13
Personal Computer Hardware
• Four major PC components:
– Motherboard
– Hard drive
– RAM
– BIOS/CMOS
Motherboard
Copyright © 2012 Cengage Learning. All rights reserved. 14
Copyright © 2012 Cengage Learning. All rights reserved. 15
Computer Bus Fundamentals
• Bus: a collection of wires carrying data from one
place to another on the computer
• All data that goes into or comes out of a computer
goes through the motherboard
• There are buses between:
– CPU and RAM
– CPU and disk drives
– CPU and expansion slots
Copyright © 2012 Cengage Learning. All rights reserved. 16
Hard Drive Fundamentals
• Hard drive: primary long-term storage component
on your computer
• Consists of magnetic disks called platters that store
data in the form of magnetic pulses
• Stores the OS your computer loads when it boots
• Stores the documents you use as well as the
applications that open those documents
Copyright © 2012 Cengage Learning. All rights reserved. 17
RAM Fundamentals
• RAM is the main short-term storage component on
your computer
• RAM has no moving parts so accessing data in
RAM is much faster than accessing data on a hard
drive
• In general, the more RAM your system has, the
faster it will run
Copyright © 2012 Cengage Learning. All rights reserved. 18
BIOS/CMOS Fundamentals
• BIOS: basic input/output system
– Set of instructions located in a chip on the motherboard
– Those instructions tell the CPU to perform certain tasks when
power is first applied to the computer
– One of those instructions is to perform a power-on self test
(POST)
• When a computer boots, the BIOS program offers
a chance to run the Setup program in order to
configure hardware components
– This configuration is stored in a type of memory called
complementary metal oxide semiconductor (CMOS)
Copyright © 2012 Cengage Learning. All rights reserved. 19
Computer Boot Procedure
1. Power is applied to the motherboard.
2. The CPU starts.
3. The CPU carries out the BIOS startup routines,
including the POST.
4. Boot devices, as specified in the BIOS
configuration, are searched for an OS.
5. The OS is loaded into RAM.
6. OS services are started.
Copyright © 2012 Cengage Learning. All rights reserved. 20
How the Operating System and
Hardware Work Together
• A computer’s OS provides many critical services:
– a user interface
– memory management
– a file system
– multitasking
– the interface to a computer’s hardware devices
• Without an OS, each application would have to
provide the above services
Copyright © 2012 Cengage Learning. All rights reserved. 21
User Interface
• Enables people to interact with computers
• Graphical user interfaces (GUIs) allow users to
point and click to run applications and access
services
• Without a user interface, a computer could process
only information that has been programmed into
memory
Copyright © 2012 Cengage Learning. All rights reserved. 22
Memory Management
• When the OS loads an application, memory must
be allocated for the application to run in
• When the application exits, the memory it was
using must be marked as available
• This memory management is performed by the OS
Copyright © 2012 Cengage Learning. All rights reserved. 23
File System
• File system is used to organize space on storage
devices
• Objectives of contemporary file systems:
– Provide a convenient interface for users and applications to
open and save files
– Provide an efficient method to organize space on a drive
– Provide a hierarchical filing method to store files
– Provide an indexing system for fast retrieval of files
– Provide secure access to files by authorized users
Copyright © 2012 Cengage Learning. All rights reserved. 24
Multitasking
• Multitasking is an OS’s capability to run more than
one application or process at the same time
• The OS is designed to look for applications that
have work to do and then schedule CPU time so
that the work gets done
Copyright © 2012 Cengage Learning. All rights reserved. 25
Interface to Hardware Devices
• When an application needs to communicate with
computer hardware, it calls on the OS, which then
calls on a device driver
• A device driver is software that provides the
interface between the OS and computer hardware
• Every device performing an input or output function
requires a device driver
Copyright © 2012 Cengage Learning. All rights reserved. 26
Fundamentals of Network
Communication
• A computer network consists of two or more
computers connected by some kind of transmission
medium, such as a cable or air waves.
• In order to access the Internet, a computer has to
be able to connect to a network
• The next few slides will cover what is required to
turn a standalone computer into a networked
computer
Copyright © 2012 Cengage Learning. All rights reserved. 27
Network Components
• Hardware components
– Network interface card—A NIC is an add-on card that's
plugged into a motherboard expansion slot and provides
a connection between the computer and the network.
– Network medium—A cable that plugs into the NIC and
makes the connection between a computer and the rest
of the network. Network media can also be the air waves,
as in wireless networks.
– Interconnecting—Interconnecting devices allow two or
more computers to communicate on the network without
having to be connected directly to one another.
A typical network
Copyright © 2012 Cengage Learning. All rights reserved. 28
Copyright © 2012 Cengage Learning. All rights reserved. 29
Network Components
• Software Components
– Network clients and servers—Network client software
requests information that's stored on another network computer
or device. Network server software allows a computer to
share its resources by fielding resource requests generated by
network clients.
– Protocols—Network protocols define the rules and formats a
computer must use when sending information across the
network. Think of it as a language that all devices on a network
understand.
– NIC drivers—NIC drivers receive data from protocols and then
forward this data to the physical NIC, which transmits data onto
the medium.
Copyright © 2012 Cengage Learning. All rights reserved. 30
Layers of the Network Communication
Process
• Each step required for a client to access network
resources is referred to as a “layer”
• Each layer has a task and all layers work together
• Simulation 1 – Layers of the network communication
process
Layers of the Network Communication
Process
Step Description Layer
1 An application tries to access a network
resource.
User application
2
Client software detects the attempt to access
the network and passes the message on to the
network protocol.
Network software
3
The protocol packages the message in a format
suitable for the network and sends it to the
NIC driver.
Network protocol
4 The NIC driver sends the data in the request to
the NIC card, which converts it into the
necessary signals to be transmitted across the
network medium.
Network interface
of the network communication process
Copyright © 2012 Cengage Learning. All rights reserved. 31
Copyright © 2012 Cengage Learning. All rights reserved. 32
How Two Computers Communicate
• TCP/IP is the most common protocol (language)
used on networks
• TCP/IP uses 2 addresses to identify devices on a
network
– Logical address (called IP address)
– Physical address (called MAC address)
• Just as a mail carrier needs an address to deliver
mail, TCP/IP needs an address in order to deliver
data to the correct device on a network
• Think of the Logical address as a zip code and the
Physical address as a street address
Communication Between Two
Computers
1. A user at Comp A types ping 10.1.1.2 at
a command prompt
2. The network software creates a ping
message
3. The network protocol packages the
message by adding IP address of
sending and destination computers and
acquires the destination computer’s MAC
address
4. The network interface software adds
MAC addresses of sending and
destination computers and sends the
message
5. Comp B receives message, verifies that
the addresses are correct and then
sends a reply to Comp A using Steps 2 –
4
Copyright © 2012 Cengage Learning. All rights reserved. 33
• Simulation 2 – Communication between two computers
Network Terms Explained
• Every profession has its own language and
acronyms
• Need to know the language of networks to be able
to study them
Copyright © 2012 Cengage Learning. All rights reserved. 34
Copyright © 2012 Cengage Learning. All rights reserved. 35
LANs, Internetworks, WANs, and
MANs
• Local area network (LAN) – small network, limited
to a single collection of machines and connected
by one or more interconnecting devices in a small
geographic area
Copyright © 2012 Cengage Learning. All rights reserved. 36
LANs, Internetworks, WANs, and
MANs
• An internetwork is a networked
collection of LANs tied
together by devices such as
routers
• Reasons for creation:
– Two or more groups of users and
their computers need to be logically
separated but still need to
communicate
– Number of computers in a single
LAN has grown and is no longer
efficient
– The distance between two groups of
computers exceeds the capabilities
of most LAN devices
Copyright © 2012 Cengage Learning. All rights reserved. 37
LANs, Internetworks, WANs, and
MANs
• Wide area networks
(WANs) use the services
of third-party
communication providers
to carry network traffic
from one location to
another
• Metropolitan area
networks (MANs) use
WAN technologies to
interconnect LANs in a
specific geographic
region, such as a county
or city
Copyright © 2012 Cengage Learning. All rights reserved. 38
Packets and Frames
• Computers transfer information across networks in shorts bursts of
about 1500 bytes of data
• Data is transferred in this way for a number of reasons:
– The pause between bursts might be necessary to allow other
computers to transfer data during pauses
– The pause allows the receiving computer to process received data,
such as writing it to disk
– The pause allows the receiving computer to receive data from other
computers at the same time
– The pause gives the sending computer an opportunity to receive data
from other computers and to perform other processing tasks
– If an error occurs during transmission of a large file, only the chunks of
data involved in the error have to be sent again, not the entire file
Copyright © 2012 Cengage Learning. All rights reserved. 39
Packets
• Chunks of data sent across the network are usually
called packets or frames, with packets being the
more well-known term
• Packet is a chunk of data with source and
destination IP address added to it
• Using the U.S. mail analogy, you can look at a
packet as an envelope that has had the zip code
added to the address but not the street address
Copyright © 2012 Cengage Learning. All rights reserved. 40
Frames
• A frame is a packet with the source and destination
MAC addresses added to it
• The packet is “framed” by the MAC addresses on one
end and an error-checking code on the other
• A frame is like a letter that has been addressed and
stamped and is ready to go
• The process of adding IP addresses and MAC
addresses to chunks of data is called encapsulation
• Information added to the front of the data is called a
header and information added to the end is called a
trailer
Copyright © 2012 Cengage Learning. All rights reserved. 41
Clients and Servers
• A client can be a workstation running a client OS
or it can also refer to the network software on a
computer that requests network resources from a
server
• The word “client” is usually used in these three
contexts:
– Client operating system: The OS installed on a computer
– Client computer: Primary role is to run user applications and
access network resources
– Client software: The software that requests network resources
from server software running on another computer
Copyright © 2012 Cengage Learning. All rights reserved. 42
Clients and Servers
• A computer becomes a server when software is
installed on it that provides a network service to
client computers
• The term “server” is also used in three contexts:
– Server operating system: When the OS installed on a computer
is designed mainly to share network resources and provide
other network services
– Server computer: When a computer’s primary role in the
network is to give client computers access to network
resources and services
– Server software: Responds to requests for network resources
from client software running on another computer
Copyright © 2012 Cengage Learning. All rights reserved. 43
Network Models
• A network model defines how and where
resources are shared and how access to these
resources is regulated
• Fall into two major types
– Peer-to-peer network: Most computers function as clients or
servers (no centralized control over who has access to network
resources)
– Server-based network: Certain computers take on specialized
roles and function mainly as servers, and ordinary users’
machines tend to function mainly as clients
Copyright © 2012 Cengage Learning. All rights reserved. 44
Peer-to-Peer/Workgroup Model
• Computers on a peer-to-peer network can take
both a client and a server role
• Any user can share resources on his/her computer
with any other user’s computer
• Every user must act as the administrator of his/her
computer
– Can give everyone else unlimited access to their resources or
grant restricted access to other users
– Usernames and passwords (credentials) are used to control
that access
Copyright © 2012 Cengage Learning. All rights reserved. 45
Peer-to-Peer/Workgroup Model
• Problems with Peer-to-peer networks:
– Must remember multiple sets of credentials to access
resources spread out over several computers
– Desktop PCs and the OSs installed on them aren’t made to
provide network services as efficiently as dedicated network
servers
– Data organization: If every machine can be a server, how can
users keep track of what information is stored on which
machine?
• Peer-to-peer networks are well suited for small
organizations that have small networks and small
operating budgets
Copyright © 2012 Cengage Learning. All rights reserved. 46
Server/Domain-Based Model
• Server-based networks provide centralized control
over network resources
• Users log on to the network with a single set of
credentials maintained by one or more servers
running a server OS
• In most cases, servers are dedicated to running
network services and should not be used to run
user applications
Copyright © 2012 Cengage Learning. All rights reserved. 47
Server/Domain-Based Model
• A domain is a collection of users and computers
whose accounts are managed by Windows servers
called domain controllers
• Users and computers in a domain are subject to
network access and security policies defined by a
network administrator
– The software that manages this security is referred to as a
directory service
– On Windows servers, the directory service software is Active
Directory
Copyright © 2012 Cengage Learning. All rights reserved. 48
Server/Domain-Based Model (cont.)
• Other network services usually found on network
servers:
– Naming services: Translate computer names to their address
– E-mail services: Manage incoming and outgoing email
– Application services: Grant client computers access to complex
applications that run on the server
– Communication services: Give remote users access to a network
– Web services: Provide comprehensive Web-based application
services
Copyright © 2012 Cengage Learning. All rights reserved. 49
Server/Domain-Based Model (cont.)
• Server-based networks are easier to expand than
peer-to-peer
– Peer-to-peer should be limited to 10 or fewer users, but
server-based networks can handle up to thousands of users
• Multiple servers can be configured to work
together, which can be used to run a more efficient
network or can provide fault tolerance
• Peer-to-peer and server-based networks both have
advantages so using a combination of the two
models isn’t uncommon
Copyright © 2012 Cengage Learning. All rights reserved. 50
Strengths and Weaknesses of the Two
Network Models
peer versus server-based networks
Copyright © 2012 Cengage Learning. All rights reserved. 51
Network Servers
• A server is at the heart of any network that is too
large for a peer-to-peer configuration
• A single server can be configured to fill a single role
or several roles at once
• Most common server roles found on networks:
– Domain controller/directory servers
– File and print servers
– Application servers
– Communication servers
– E-mail/fax servers
– Web servers
Copyright © 2012 Cengage Learning. All rights reserved. 52
Network Servers (cont.)
• Domain Controller/Directory Servers
– Directory services make it possible for users to locate, store,
and secure information about a network and its resources.
– Windows servers permit combining computers, users, groups,
and resources into domains. The server handling the
computers and users in a domain is called a domain controller.
• File and Print Servers
– Provide secure centralized file storage and sharing and access
to networked printers.
– Any Windows or Linux computer can act as a file and print
server, however the Server version of Windows provides
advanced sharing features.
Copyright © 2012 Cengage Learning. All rights reserved. 53
Network Servers (cont.)
• Application Servers
– Supply the server side of client/server applications to network
clients
– Differ from basic file and print servers by providing processing
services as well as handling requests for file or print services
• Communication Servers
– Provide a mechanism for users to access a network’s
resources remotely
– Enable users who are traveling or working at home to dial in to
the network via a modem or their existing Internet connection
• E-mail/Fax Servers
Network Servers (cont.)
• Web Servers
– Windows Server includes a complete Web server called Internet
Information Services (IIS) as well as File Transfer Protocol (FTP)
– Apache Web Server is available as a part of most Linux distributions
and remains the most widely used Web server in the world
• Other Network Services
– Most networks require additional support services to function
efficiently. The most common are Domain Name System (DNS) and
Dynamic Host Configuration Protocol (DHCP)
– DNS allows users to access both local and Internet servers by name
rather than by address
– DHCP provides automatic addressing for network clients so that
network administrators do not have to assign addresses manually
– You will learn more about these services in Chapter 5
Copyright © 2012 Cengage Learning. All rights reserved. 54
Specialized Networks
• Storage area network (SAN) – uses high-speed
networking technologies to provide servers with
fast access to large amounts of disk storage
• Wireless personal area network (WPAN) – short-
range networking technology designed to connect
personal devices to exchange information
– These devices include cell phones, pagers, personal digital
assistants (PDAs), global positioning system (GPS) devices,
MP3 players, and even watches
Copyright © 2012 Cengage Learning. All rights reserved. 55
SAN
Copyright © 2012 Cengage Learning. All rights reserved. 56
Chapter Summary
• All computers perform three basic tasks: input, processing, and
output
• Storage is a major part of a computer’s configuration
• Personal computer hardware consists of four major components:
motherboard, hard drive, RAM, and BIOS/CMOS
• The operating system and device drivers control access to
computer hardware and provide a user interface, memory
management and multitasking
• The components needed to make a stand-alone computer a
networked computer include a NIC, network medium, and usually a
device to interconnect with other computers
• The layers of the network communication process can be
summarized as user application, network software, network
protocol, and network interface
Copyright © 2012 Cengage Learning. All rights reserved. 57
Chapter Summary
• The four terms used to describe networks of different scope are LAN,
Internetwork, WAN, and MAN
• Packets and frames are the units of data handled by different network
components. Packets have the source and destination IP address added
and are processed by the network protocol. Frames have the MAC
addresses and an error code added and are processed by the network
interface.
• A client is the computer or network software that requests network data
and a server is the computer or network software that makes the network
data available to requesting clients
• A peer-to-peer network model has no centralized authority over resources
while a server-based network usually uses a directory service to provide
centralized resource management
• Network servers can perform a number of specialized roles
• Specialized networks can include storage area networks (SANs) and
wireless personal area networks (WPANs)
Copyright © 2012 Cengage Learning. All rights reserved. 58

More Related Content

What's hot

Net essentials6e ch4
Net essentials6e ch4Net essentials6e ch4
Net essentials6e ch4APSU
 
Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1WedgeB
 
Net essentials6e ch12
Net essentials6e ch12Net essentials6e ch12
Net essentials6e ch12APSU
 
Net essentials6e ch7
Net essentials6e ch7Net essentials6e ch7
Net essentials6e ch7APSU
 
Net essentials6e ch3
Net essentials6e ch3Net essentials6e ch3
Net essentials6e ch3APSU
 
08. networking-part-2
08. networking-part-208. networking-part-2
08. networking-part-2Muhammad Ahad
 
01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructureMuhammad Ahad
 
01. 02. introduction (13 slides)
01.   02. introduction (13 slides)01.   02. introduction (13 slides)
01. 02. introduction (13 slides)Muhammad Ahad
 
networking hypherlink Group 2 presentation
networking hypherlink Group 2 presentationnetworking hypherlink Group 2 presentation
networking hypherlink Group 2 presentationHerson Franz Ugale
 
05. performance-concepts-26-slides
05. performance-concepts-26-slides05. performance-concepts-26-slides
05. performance-concepts-26-slidesMuhammad Ahad
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemVaughan Olufemi ACIB, AICEN, ANIM
 
07. datacenters
07. datacenters07. datacenters
07. datacentersMuhammad Ahad
 
08. networking
08. networking08. networking
08. networkingMuhammad Ahad
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communicationsKhan Yousafzai
 
11. operating-systems-part-1
11. operating-systems-part-111. operating-systems-part-1
11. operating-systems-part-1Muhammad Ahad
 
10. compute-part-2
10. compute-part-210. compute-part-2
10. compute-part-2Muhammad Ahad
 

What's hot (20)

Net essentials6e ch4
Net essentials6e ch4Net essentials6e ch4
Net essentials6e ch4
 
Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1
 
Net essentials6e ch12
Net essentials6e ch12Net essentials6e ch12
Net essentials6e ch12
 
Net essentials6e ch7
Net essentials6e ch7Net essentials6e ch7
Net essentials6e ch7
 
Net essentials6e ch3
Net essentials6e ch3Net essentials6e ch3
Net essentials6e ch3
 
9781111306366 ppt ch8
9781111306366 ppt ch89781111306366 ppt ch8
9781111306366 ppt ch8
 
08. networking-part-2
08. networking-part-208. networking-part-2
08. networking-part-2
 
01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure
 
01. 02. introduction (13 slides)
01.   02. introduction (13 slides)01.   02. introduction (13 slides)
01. 02. introduction (13 slides)
 
Case mis ch06
Case mis ch06Case mis ch06
Case mis ch06
 
networking hypherlink Group 2 presentation
networking hypherlink Group 2 presentationnetworking hypherlink Group 2 presentation
networking hypherlink Group 2 presentation
 
05. performance-concepts-26-slides
05. performance-concepts-26-slides05. performance-concepts-26-slides
05. performance-concepts-26-slides
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking System
 
07. datacenters
07. datacenters07. datacenters
07. datacenters
 
08. networking
08. networking08. networking
08. networking
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communications
 
11. operating-systems-part-1
11. operating-systems-part-111. operating-systems-part-1
11. operating-systems-part-1
 
10. compute-part-2
10. compute-part-210. compute-part-2
10. compute-part-2
 
Isd&d networks
Isd&d networksIsd&d networks
Isd&d networks
 
Chapter09
Chapter09Chapter09
Chapter09
 

Similar to Net essentials6e ch1

Operating Systems FYBSC IT UNIT I- Introduction to Operating Systems
Operating Systems FYBSC IT UNIT I- Introduction to Operating SystemsOperating Systems FYBSC IT UNIT I- Introduction to Operating Systems
Operating Systems FYBSC IT UNIT I- Introduction to Operating SystemsArti Parab Academics
 
Gl2010 m1 com-presentation
Gl2010 m1 com-presentationGl2010 m1 com-presentation
Gl2010 m1 com-presentationTracie King
 
Computer_Basics_computer_basics.pptx
Computer_Basics_computer_basics.pptxComputer_Basics_computer_basics.pptx
Computer_Basics_computer_basics.pptxJiaJunWang17
 
Introduction to computer system
Introduction to computer systemIntroduction to computer system
Introduction to computer systemSweta Kumari Barnwal
 
Computer-Basics for B.ed Second Year.pptx
Computer-Basics  for B.ed Second Year.pptxComputer-Basics  for B.ed Second Year.pptx
Computer-Basics for B.ed Second Year.pptxkplkumar981
 
Unit 1 computing fundamental 2013
Unit 1 computing fundamental 2013Unit 1 computing fundamental 2013
Unit 1 computing fundamental 2013Yousuf Al Khanbashi
 
Embedded systems introduction
Embedded systems introductionEmbedded systems introduction
Embedded systems introductionmohamed drahem
 
Unit-1 Part1.ppt
Unit-1 Part1.pptUnit-1 Part1.ppt
Unit-1 Part1.pptSandeep kumar
 
Chapter 02 system unit csc & tts
Chapter 02 system unit csc & ttsChapter 02 system unit csc & tts
Chapter 02 system unit csc & ttsHisyam Rosly
 
Care for Network and Computer Hardware L-2 (3).pptx
Care for Network and Computer Hardware     L-2 (3).pptxCare for Network and Computer Hardware     L-2 (3).pptx
Care for Network and Computer Hardware L-2 (3).pptxaytenewbelay1
 
MODULE 2.pptx
MODULE 2.pptxMODULE 2.pptx
MODULE 2.pptxkndnewguade
 
Computer architecture pptx
Computer architecture pptxComputer architecture pptx
Computer architecture pptxMDSHABBIR12
 
C programming for problem solving
C programming for problem solving  C programming for problem solving
C programming for problem solving Anuradha Moti T
 
Uc14 chap05
Uc14 chap05Uc14 chap05
Uc14 chap05ayahye
 
04 connector and components
04 connector and components04 connector and components
04 connector and componentsAshik Iqbal
 

Similar to Net essentials6e ch1 (20)

Operating Systems FYBSC IT UNIT I- Introduction to Operating Systems
Operating Systems FYBSC IT UNIT I- Introduction to Operating SystemsOperating Systems FYBSC IT UNIT I- Introduction to Operating Systems
Operating Systems FYBSC IT UNIT I- Introduction to Operating Systems
 
Gl2010 m1 com-presentation
Gl2010 m1 com-presentationGl2010 m1 com-presentation
Gl2010 m1 com-presentation
 
Computer_Basics_computer_basics.pptx
Computer_Basics_computer_basics.pptxComputer_Basics_computer_basics.pptx
Computer_Basics_computer_basics.pptx
 
Introduction to computer system
Introduction to computer systemIntroduction to computer system
Introduction to computer system
 
Computer-Basics for B.ed Second Year.pptx
Computer-Basics  for B.ed Second Year.pptxComputer-Basics  for B.ed Second Year.pptx
Computer-Basics for B.ed Second Year.pptx
 
Ch 2
Ch 2Ch 2
Ch 2
 
Unit 1 computing fundamental 2013
Unit 1 computing fundamental 2013Unit 1 computing fundamental 2013
Unit 1 computing fundamental 2013
 
Embedded systems introduction
Embedded systems introductionEmbedded systems introduction
Embedded systems introduction
 
OS-01.ppt
OS-01.pptOS-01.ppt
OS-01.ppt
 
Unit-1 Part1.ppt
Unit-1 Part1.pptUnit-1 Part1.ppt
Unit-1 Part1.ppt
 
Chapter 02 system unit csc & tts
Chapter 02 system unit csc & ttsChapter 02 system unit csc & tts
Chapter 02 system unit csc & tts
 
Care for Network and Computer Hardware L-2 (3).pptx
Care for Network and Computer Hardware     L-2 (3).pptxCare for Network and Computer Hardware     L-2 (3).pptx
Care for Network and Computer Hardware L-2 (3).pptx
 
MODULE 2.pptx
MODULE 2.pptxMODULE 2.pptx
MODULE 2.pptx
 
Computer architecture pptx
Computer architecture pptxComputer architecture pptx
Computer architecture pptx
 
C programming for problem solving
C programming for problem solving  C programming for problem solving
C programming for problem solving
 
Computer basics
Computer basicsComputer basics
Computer basics
 
Uc14 chap05
Uc14 chap05Uc14 chap05
Uc14 chap05
 
Uc14 chap05
Uc14 chap05Uc14 chap05
Uc14 chap05
 
IS100 Week 2
IS100 Week 2IS100 Week 2
IS100 Week 2
 
04 connector and components
04 connector and components04 connector and components
04 connector and components
 

More from APSU

Module 2 patient transfers
Module 2 patient transfersModule 2 patient transfers
Module 2 patient transfersAPSU
 
Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9APSU
 
Chapter 9.access to judicial review
Chapter 9.access to judicial reviewChapter 9.access to judicial review
Chapter 9.access to judicial reviewAPSU
 
Chapter 8.administrative agency hearings
Chapter 8.administrative agency hearingsChapter 8.administrative agency hearings
Chapter 8.administrative agency hearingsAPSU
 
Chapter 7.informal proceedings
Chapter 7.informal proceedingsChapter 7.informal proceedings
Chapter 7.informal proceedingsAPSU
 
Chapter 6.investigations and information planning
Chapter 6.investigations and information planningChapter 6.investigations and information planning
Chapter 6.investigations and information planningAPSU
 
Chapter 5.agency rules and regulations(1)
Chapter 5.agency rules and regulations(1)Chapter 5.agency rules and regulations(1)
Chapter 5.agency rules and regulations(1)APSU
 
Chapter 4 pp
Chapter 4 ppChapter 4 pp
Chapter 4 ppAPSU
 
Chapter 3.agency discretion
Chapter 3.agency discretionChapter 3.agency discretion
Chapter 3.agency discretionAPSU
 
Chapter2.development of administrative law
Chapter2.development of administrative lawChapter2.development of administrative law
Chapter2.development of administrative lawAPSU
 
Chapter1.admin law&adminagency
Chapter1.admin law&adminagencyChapter1.admin law&adminagency
Chapter1.admin law&adminagencyAPSU
 
Chapter1
Chapter1Chapter1
Chapter1APSU
 
Logi pp 1
Logi pp 1Logi pp 1
Logi pp 1APSU
 
Unit 1
Unit 1Unit 1
Unit 1APSU
 
Time management
Time managementTime management
Time managementAPSU
 
Research
ResearchResearch
ResearchAPSU
 
21st century learner
21st century learner21st century learner
21st century learnerAPSU
 
21st century learner
21st century learner21st century learner
21st century learnerAPSU
 

More from APSU (18)

Module 2 patient transfers
Module 2 patient transfersModule 2 patient transfers
Module 2 patient transfers
 
Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
 
Chapter 9.access to judicial review
Chapter 9.access to judicial reviewChapter 9.access to judicial review
Chapter 9.access to judicial review
 
Chapter 8.administrative agency hearings
Chapter 8.administrative agency hearingsChapter 8.administrative agency hearings
Chapter 8.administrative agency hearings
 
Chapter 7.informal proceedings
Chapter 7.informal proceedingsChapter 7.informal proceedings
Chapter 7.informal proceedings
 
Chapter 6.investigations and information planning
Chapter 6.investigations and information planningChapter 6.investigations and information planning
Chapter 6.investigations and information planning
 
Chapter 5.agency rules and regulations(1)
Chapter 5.agency rules and regulations(1)Chapter 5.agency rules and regulations(1)
Chapter 5.agency rules and regulations(1)
 
Chapter 4 pp
Chapter 4 ppChapter 4 pp
Chapter 4 pp
 
Chapter 3.agency discretion
Chapter 3.agency discretionChapter 3.agency discretion
Chapter 3.agency discretion
 
Chapter2.development of administrative law
Chapter2.development of administrative lawChapter2.development of administrative law
Chapter2.development of administrative law
 
Chapter1.admin law&adminagency
Chapter1.admin law&adminagencyChapter1.admin law&adminagency
Chapter1.admin law&adminagency
 
Chapter1
Chapter1Chapter1
Chapter1
 
Logi pp 1
Logi pp 1Logi pp 1
Logi pp 1
 
Unit 1
Unit 1Unit 1
Unit 1
 
Time management
Time managementTime management
Time management
 
Research
ResearchResearch
Research
 
21st century learner
21st century learner21st century learner
21st century learner
 
21st century learner
21st century learner21st century learner
21st century learner
 

Recently uploaded

Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 

Recently uploaded (20)

Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 

Net essentials6e ch1

  • 1. About the Presentations • The presentations cover the objectives found in the opening of each chapter. • All chapter objectives are listed in the beginning of each presentation. • You may customize the presentations to fit your class needs. • Some figures from the chapters are included. A complete set of images from the book can be found on the Instructor Resources disc.
  • 2. Guide to Networking Essentials, 6th Edition Chapter 1: Introduction to Computer Networks
  • 3. Copyright © 2012 Cengage Learning. All rights reserved. 3 Objectives 3 • Describe basic computer components and operations • Explain the fundamentals of network communication • Define common networking terms • Compare different network models • Identify the functions of various network server types • Describe specialized networks
  • 4. Copyright © 2012 Cengage Learning. All rights reserved. 4 An Overview of Computer Concepts • Most of the devices you encounter when working with a network involve a computer • Most obvious devices are workstations and network servers – These run operating systems such as Windows, Linux, UNIX, and Mac OS • Also includes routers and switches – These are specialized computers used to move data from computer to computer and network to network – You will learn more about them in later chapters
  • 5. Copyright © 2012 Cengage Learning. All rights reserved. 5 Basic Functions of a Computer • Computer’s functions can be broken down into three basic tasks: – Input: A user running a word-processing program types the letter “A” on the keyboard, which results in sending a code representing the letter “A” to the computer – Processing: The computer’s central processing unit (CPU) determines what letter was typed by looking up the keyboard code in a table. – Output: The CPU sends instructions to the graphics cards to display the letter “A”, which is then sent to the computer monitor.
  • 6. Copyright © 2012 Cengage Learning. All rights reserved. 6 Input Components • Common user-controlled devices such as keyboards, mice, microphones, Web cameras, and scanners • External interfaces, such as serial, FireWire, and USB ports can also be used to get input from peripheral devices • Storage devices such as hard disks and CDs/DVDs
  • 7. Copyright © 2012 Cengage Learning. All rights reserved. 7 Processing Components • A computer’s main processing component is the CPU – Executes instructions from computer programs such as word processors and from the computer’s operating system – Current CPUs are composed of two or more processors called cores • A graphics processing unit (GPU) takes a high-level graphics instruction and performs the calculation needed for the instruction to be displayed on the monitor • Other devices, such as network interface cards and disk controller cards, might also include onboard processors
  • 8. Copyright © 2012 Cengage Learning. All rights reserved. 8 Output Components • Most obvious are monitors and printers • Also includes storage devices, network cards, and speakers • External interfaces – For example, a disk drive connected to a USB port allows reading files from the disk (input) and writing files to the disk (output).
  • 9. Copyright © 2012 Cengage Learning. All rights reserved. 9 Storage Components • The more storage a computer has, the better • Most storage components are both input and output devices • Most people think of storage as disk drives, CD/DVD drives, and USB flash drives • However, there are two main categories of storage – Short-term storage – Long-term storage
  • 10. Copyright © 2012 Cengage Learning. All rights reserved. 10 RAM: Short-Term Storage • Random Access Memory (RAM) – when power to the computer is turned off, RAM’s contents are gone • The amount of RAM in a computer is crucial to the computer’s capability to operate efficiently • RAM is also referred to as working storage • If there’s not enough RAM to run a program, the computer will use the disk drive to supplement
  • 11. Copyright © 2012 Cengage Learning. All rights reserved. 11 Long-Term Storage • Maintains its data even when there’s no power • Examples: – Hard disks – CDs/DVDs – USB flash drives • Used to store document and multimedia files • Amount of storage a computer needs depends on the type and quantity of files to be stored
  • 12. Copyright © 2012 Cengage Learning. All rights reserved. 12 Data is Stored in Bits • Data on a computer is stored as binary digits (“bits” for short) • A bit holds a 1 or 0 value • A pulse of 5 volts of electricity can represent a 1 bit and a pulse of 0 volts can represent a 0 bit • With fiber-optic cable, a 1 bit is represented by the presence of light and a 0 bit by the absence of light • A “byte” is a collection of 8 bits
  • 13. Copyright © 2012 Cengage Learning. All rights reserved. 13 Personal Computer Hardware • Four major PC components: – Motherboard – Hard drive – RAM – BIOS/CMOS
  • 14. Motherboard Copyright © 2012 Cengage Learning. All rights reserved. 14
  • 15. Copyright © 2012 Cengage Learning. All rights reserved. 15 Computer Bus Fundamentals • Bus: a collection of wires carrying data from one place to another on the computer • All data that goes into or comes out of a computer goes through the motherboard • There are buses between: – CPU and RAM – CPU and disk drives – CPU and expansion slots
  • 16. Copyright © 2012 Cengage Learning. All rights reserved. 16 Hard Drive Fundamentals • Hard drive: primary long-term storage component on your computer • Consists of magnetic disks called platters that store data in the form of magnetic pulses • Stores the OS your computer loads when it boots • Stores the documents you use as well as the applications that open those documents
  • 17. Copyright © 2012 Cengage Learning. All rights reserved. 17 RAM Fundamentals • RAM is the main short-term storage component on your computer • RAM has no moving parts so accessing data in RAM is much faster than accessing data on a hard drive • In general, the more RAM your system has, the faster it will run
  • 18. Copyright © 2012 Cengage Learning. All rights reserved. 18 BIOS/CMOS Fundamentals • BIOS: basic input/output system – Set of instructions located in a chip on the motherboard – Those instructions tell the CPU to perform certain tasks when power is first applied to the computer – One of those instructions is to perform a power-on self test (POST) • When a computer boots, the BIOS program offers a chance to run the Setup program in order to configure hardware components – This configuration is stored in a type of memory called complementary metal oxide semiconductor (CMOS)
  • 19. Copyright © 2012 Cengage Learning. All rights reserved. 19 Computer Boot Procedure 1. Power is applied to the motherboard. 2. The CPU starts. 3. The CPU carries out the BIOS startup routines, including the POST. 4. Boot devices, as specified in the BIOS configuration, are searched for an OS. 5. The OS is loaded into RAM. 6. OS services are started.
  • 20. Copyright © 2012 Cengage Learning. All rights reserved. 20 How the Operating System and Hardware Work Together • A computer’s OS provides many critical services: – a user interface – memory management – a file system – multitasking – the interface to a computer’s hardware devices • Without an OS, each application would have to provide the above services
  • 21. Copyright © 2012 Cengage Learning. All rights reserved. 21 User Interface • Enables people to interact with computers • Graphical user interfaces (GUIs) allow users to point and click to run applications and access services • Without a user interface, a computer could process only information that has been programmed into memory
  • 22. Copyright © 2012 Cengage Learning. All rights reserved. 22 Memory Management • When the OS loads an application, memory must be allocated for the application to run in • When the application exits, the memory it was using must be marked as available • This memory management is performed by the OS
  • 23. Copyright © 2012 Cengage Learning. All rights reserved. 23 File System • File system is used to organize space on storage devices • Objectives of contemporary file systems: – Provide a convenient interface for users and applications to open and save files – Provide an efficient method to organize space on a drive – Provide a hierarchical filing method to store files – Provide an indexing system for fast retrieval of files – Provide secure access to files by authorized users
  • 24. Copyright © 2012 Cengage Learning. All rights reserved. 24 Multitasking • Multitasking is an OS’s capability to run more than one application or process at the same time • The OS is designed to look for applications that have work to do and then schedule CPU time so that the work gets done
  • 25. Copyright © 2012 Cengage Learning. All rights reserved. 25 Interface to Hardware Devices • When an application needs to communicate with computer hardware, it calls on the OS, which then calls on a device driver • A device driver is software that provides the interface between the OS and computer hardware • Every device performing an input or output function requires a device driver
  • 26. Copyright © 2012 Cengage Learning. All rights reserved. 26 Fundamentals of Network Communication • A computer network consists of two or more computers connected by some kind of transmission medium, such as a cable or air waves. • In order to access the Internet, a computer has to be able to connect to a network • The next few slides will cover what is required to turn a standalone computer into a networked computer
  • 27. Copyright © 2012 Cengage Learning. All rights reserved. 27 Network Components • Hardware components – Network interface card—A NIC is an add-on card that's plugged into a motherboard expansion slot and provides a connection between the computer and the network. – Network medium—A cable that plugs into the NIC and makes the connection between a computer and the rest of the network. Network media can also be the air waves, as in wireless networks. – Interconnecting—Interconnecting devices allow two or more computers to communicate on the network without having to be connected directly to one another.
  • 28. A typical network Copyright © 2012 Cengage Learning. All rights reserved. 28
  • 29. Copyright © 2012 Cengage Learning. All rights reserved. 29 Network Components • Software Components – Network clients and servers—Network client software requests information that's stored on another network computer or device. Network server software allows a computer to share its resources by fielding resource requests generated by network clients. – Protocols—Network protocols define the rules and formats a computer must use when sending information across the network. Think of it as a language that all devices on a network understand. – NIC drivers—NIC drivers receive data from protocols and then forward this data to the physical NIC, which transmits data onto the medium.
  • 30. Copyright © 2012 Cengage Learning. All rights reserved. 30 Layers of the Network Communication Process • Each step required for a client to access network resources is referred to as a “layer” • Each layer has a task and all layers work together • Simulation 1 – Layers of the network communication process
  • 31. Layers of the Network Communication Process Step Description Layer 1 An application tries to access a network resource. User application 2 Client software detects the attempt to access the network and passes the message on to the network protocol. Network software 3 The protocol packages the message in a format suitable for the network and sends it to the NIC driver. Network protocol 4 The NIC driver sends the data in the request to the NIC card, which converts it into the necessary signals to be transmitted across the network medium. Network interface of the network communication process Copyright © 2012 Cengage Learning. All rights reserved. 31
  • 32. Copyright © 2012 Cengage Learning. All rights reserved. 32 How Two Computers Communicate • TCP/IP is the most common protocol (language) used on networks • TCP/IP uses 2 addresses to identify devices on a network – Logical address (called IP address) – Physical address (called MAC address) • Just as a mail carrier needs an address to deliver mail, TCP/IP needs an address in order to deliver data to the correct device on a network • Think of the Logical address as a zip code and the Physical address as a street address
  • 33. Communication Between Two Computers 1. A user at Comp A types ping 10.1.1.2 at a command prompt 2. The network software creates a ping message 3. The network protocol packages the message by adding IP address of sending and destination computers and acquires the destination computer’s MAC address 4. The network interface software adds MAC addresses of sending and destination computers and sends the message 5. Comp B receives message, verifies that the addresses are correct and then sends a reply to Comp A using Steps 2 – 4 Copyright © 2012 Cengage Learning. All rights reserved. 33 • Simulation 2 – Communication between two computers
  • 34. Network Terms Explained • Every profession has its own language and acronyms • Need to know the language of networks to be able to study them Copyright © 2012 Cengage Learning. All rights reserved. 34
  • 35. Copyright © 2012 Cengage Learning. All rights reserved. 35 LANs, Internetworks, WANs, and MANs • Local area network (LAN) – small network, limited to a single collection of machines and connected by one or more interconnecting devices in a small geographic area
  • 36. Copyright © 2012 Cengage Learning. All rights reserved. 36 LANs, Internetworks, WANs, and MANs • An internetwork is a networked collection of LANs tied together by devices such as routers • Reasons for creation: – Two or more groups of users and their computers need to be logically separated but still need to communicate – Number of computers in a single LAN has grown and is no longer efficient – The distance between two groups of computers exceeds the capabilities of most LAN devices
  • 37. Copyright © 2012 Cengage Learning. All rights reserved. 37 LANs, Internetworks, WANs, and MANs • Wide area networks (WANs) use the services of third-party communication providers to carry network traffic from one location to another • Metropolitan area networks (MANs) use WAN technologies to interconnect LANs in a specific geographic region, such as a county or city
  • 38. Copyright © 2012 Cengage Learning. All rights reserved. 38 Packets and Frames • Computers transfer information across networks in shorts bursts of about 1500 bytes of data • Data is transferred in this way for a number of reasons: – The pause between bursts might be necessary to allow other computers to transfer data during pauses – The pause allows the receiving computer to process received data, such as writing it to disk – The pause allows the receiving computer to receive data from other computers at the same time – The pause gives the sending computer an opportunity to receive data from other computers and to perform other processing tasks – If an error occurs during transmission of a large file, only the chunks of data involved in the error have to be sent again, not the entire file
  • 39. Copyright © 2012 Cengage Learning. All rights reserved. 39 Packets • Chunks of data sent across the network are usually called packets or frames, with packets being the more well-known term • Packet is a chunk of data with source and destination IP address added to it • Using the U.S. mail analogy, you can look at a packet as an envelope that has had the zip code added to the address but not the street address
  • 40. Copyright © 2012 Cengage Learning. All rights reserved. 40 Frames • A frame is a packet with the source and destination MAC addresses added to it • The packet is “framed” by the MAC addresses on one end and an error-checking code on the other • A frame is like a letter that has been addressed and stamped and is ready to go • The process of adding IP addresses and MAC addresses to chunks of data is called encapsulation • Information added to the front of the data is called a header and information added to the end is called a trailer
  • 41. Copyright © 2012 Cengage Learning. All rights reserved. 41 Clients and Servers • A client can be a workstation running a client OS or it can also refer to the network software on a computer that requests network resources from a server • The word “client” is usually used in these three contexts: – Client operating system: The OS installed on a computer – Client computer: Primary role is to run user applications and access network resources – Client software: The software that requests network resources from server software running on another computer
  • 42. Copyright © 2012 Cengage Learning. All rights reserved. 42 Clients and Servers • A computer becomes a server when software is installed on it that provides a network service to client computers • The term “server” is also used in three contexts: – Server operating system: When the OS installed on a computer is designed mainly to share network resources and provide other network services – Server computer: When a computer’s primary role in the network is to give client computers access to network resources and services – Server software: Responds to requests for network resources from client software running on another computer
  • 43. Copyright © 2012 Cengage Learning. All rights reserved. 43 Network Models • A network model defines how and where resources are shared and how access to these resources is regulated • Fall into two major types – Peer-to-peer network: Most computers function as clients or servers (no centralized control over who has access to network resources) – Server-based network: Certain computers take on specialized roles and function mainly as servers, and ordinary users’ machines tend to function mainly as clients
  • 44. Copyright © 2012 Cengage Learning. All rights reserved. 44 Peer-to-Peer/Workgroup Model • Computers on a peer-to-peer network can take both a client and a server role • Any user can share resources on his/her computer with any other user’s computer • Every user must act as the administrator of his/her computer – Can give everyone else unlimited access to their resources or grant restricted access to other users – Usernames and passwords (credentials) are used to control that access
  • 45. Copyright © 2012 Cengage Learning. All rights reserved. 45 Peer-to-Peer/Workgroup Model • Problems with Peer-to-peer networks: – Must remember multiple sets of credentials to access resources spread out over several computers – Desktop PCs and the OSs installed on them aren’t made to provide network services as efficiently as dedicated network servers – Data organization: If every machine can be a server, how can users keep track of what information is stored on which machine? • Peer-to-peer networks are well suited for small organizations that have small networks and small operating budgets
  • 46. Copyright © 2012 Cengage Learning. All rights reserved. 46 Server/Domain-Based Model • Server-based networks provide centralized control over network resources • Users log on to the network with a single set of credentials maintained by one or more servers running a server OS • In most cases, servers are dedicated to running network services and should not be used to run user applications
  • 47. Copyright © 2012 Cengage Learning. All rights reserved. 47 Server/Domain-Based Model • A domain is a collection of users and computers whose accounts are managed by Windows servers called domain controllers • Users and computers in a domain are subject to network access and security policies defined by a network administrator – The software that manages this security is referred to as a directory service – On Windows servers, the directory service software is Active Directory
  • 48. Copyright © 2012 Cengage Learning. All rights reserved. 48 Server/Domain-Based Model (cont.) • Other network services usually found on network servers: – Naming services: Translate computer names to their address – E-mail services: Manage incoming and outgoing email – Application services: Grant client computers access to complex applications that run on the server – Communication services: Give remote users access to a network – Web services: Provide comprehensive Web-based application services
  • 49. Copyright © 2012 Cengage Learning. All rights reserved. 49 Server/Domain-Based Model (cont.) • Server-based networks are easier to expand than peer-to-peer – Peer-to-peer should be limited to 10 or fewer users, but server-based networks can handle up to thousands of users • Multiple servers can be configured to work together, which can be used to run a more efficient network or can provide fault tolerance • Peer-to-peer and server-based networks both have advantages so using a combination of the two models isn’t uncommon
  • 50. Copyright © 2012 Cengage Learning. All rights reserved. 50 Strengths and Weaknesses of the Two Network Models peer versus server-based networks
  • 51. Copyright © 2012 Cengage Learning. All rights reserved. 51 Network Servers • A server is at the heart of any network that is too large for a peer-to-peer configuration • A single server can be configured to fill a single role or several roles at once • Most common server roles found on networks: – Domain controller/directory servers – File and print servers – Application servers – Communication servers – E-mail/fax servers – Web servers
  • 52. Copyright © 2012 Cengage Learning. All rights reserved. 52 Network Servers (cont.) • Domain Controller/Directory Servers – Directory services make it possible for users to locate, store, and secure information about a network and its resources. – Windows servers permit combining computers, users, groups, and resources into domains. The server handling the computers and users in a domain is called a domain controller. • File and Print Servers – Provide secure centralized file storage and sharing and access to networked printers. – Any Windows or Linux computer can act as a file and print server, however the Server version of Windows provides advanced sharing features.
  • 53. Copyright © 2012 Cengage Learning. All rights reserved. 53 Network Servers (cont.) • Application Servers – Supply the server side of client/server applications to network clients – Differ from basic file and print servers by providing processing services as well as handling requests for file or print services • Communication Servers – Provide a mechanism for users to access a network’s resources remotely – Enable users who are traveling or working at home to dial in to the network via a modem or their existing Internet connection • E-mail/Fax Servers
  • 54. Network Servers (cont.) • Web Servers – Windows Server includes a complete Web server called Internet Information Services (IIS) as well as File Transfer Protocol (FTP) – Apache Web Server is available as a part of most Linux distributions and remains the most widely used Web server in the world • Other Network Services – Most networks require additional support services to function efficiently. The most common are Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) – DNS allows users to access both local and Internet servers by name rather than by address – DHCP provides automatic addressing for network clients so that network administrators do not have to assign addresses manually – You will learn more about these services in Chapter 5 Copyright © 2012 Cengage Learning. All rights reserved. 54
  • 55. Specialized Networks • Storage area network (SAN) – uses high-speed networking technologies to provide servers with fast access to large amounts of disk storage • Wireless personal area network (WPAN) – short- range networking technology designed to connect personal devices to exchange information – These devices include cell phones, pagers, personal digital assistants (PDAs), global positioning system (GPS) devices, MP3 players, and even watches Copyright © 2012 Cengage Learning. All rights reserved. 55
  • 56. SAN Copyright © 2012 Cengage Learning. All rights reserved. 56
  • 57. Chapter Summary • All computers perform three basic tasks: input, processing, and output • Storage is a major part of a computer’s configuration • Personal computer hardware consists of four major components: motherboard, hard drive, RAM, and BIOS/CMOS • The operating system and device drivers control access to computer hardware and provide a user interface, memory management and multitasking • The components needed to make a stand-alone computer a networked computer include a NIC, network medium, and usually a device to interconnect with other computers • The layers of the network communication process can be summarized as user application, network software, network protocol, and network interface Copyright © 2012 Cengage Learning. All rights reserved. 57
  • 58. Chapter Summary • The four terms used to describe networks of different scope are LAN, Internetwork, WAN, and MAN • Packets and frames are the units of data handled by different network components. Packets have the source and destination IP address added and are processed by the network protocol. Frames have the MAC addresses and an error code added and are processed by the network interface. • A client is the computer or network software that requests network data and a server is the computer or network software that makes the network data available to requesting clients • A peer-to-peer network model has no centralized authority over resources while a server-based network usually uses a directory service to provide centralized resource management • Network servers can perform a number of specialized roles • Specialized networks can include storage area networks (SANs) and wireless personal area networks (WPANs) Copyright © 2012 Cengage Learning. All rights reserved. 58