Revision Notes Computer Network
Revision Notes Computer Network
DHCP is a smart network tool that automatically gives devices their unique IP addresses and
other essential settings when they connect to the network. It saves time by managing all this
on its own, so administrators don't have to set up each device individually. This helps keep
the network running smoothly and prevents conflicts between devices. DHCP also allows for
easy updates and changes across the entire network from a central server. In a nutshell,
DHCP makes it easy for devices to join and work together on a network without any manual
fuss.
10.Why is main memory not suitable for permanent program storage or backup
purposes?
Discuss the organisation and purpose of the data link layer and examples of
transmission protocols
Data Link Layer:
Purpose: Ensures reliable data transmission between directly connected devices.
Objectives: Link establishment/termination, framing, error detection/correction, flow
control, MAC control.
Examples of Transmission Protocols:
Ethernet:
Used in LANs, CSMA/CD for shared medium access.
Wi-Fi (IEEE 802.11):
Wireless LANs, variations of CSMA for wireless medium.
HDLC (High-Level Data Link Control):
WANs, synchronous, reliable transmission.
PPP (Point-to-Point Protocol):
Point-to-point connections, authentication, error detection.
SLIP (Serial Line Internet Protocol):
Serial connections, older dial-up links.
Frame Relay:
Packet-switched networks, efficient data encapsulation.
14. Describe the function of the following devices with the help of a diagram:
Switch, Router.
Switch:
Function:
Forwards data packets within a local network (LAN).
Uses MAC address table to determine where to send packets.
Enables direct communication between devices in the LAN.
Router:
Function:
Connects multiple networks and directs data packets between them.
Uses IP addresses and routing table for intelligent packet forwarding.
Enables communication between devices across different networks.
a) RS Flip-Flop:
Simple digital circuit with Reset (R) and Set (S) inputs.
Has outputs: Q and Q̅ .
Q changes to 1 when R=0 and S=1.
Q changes to 0 when R=1 and S=0.
Retains previous state for R=0 and S=0.
Invalid for R=1 and S=1.
b) JK Flip-Flop:
Advanced version of RS flip-flop with J and K inputs.
Has outputs: Q and Q̅ .
Q changes based on J, K, and clock signal.
J=0, K=1 resets Q to 0.
J=1, K=0 sets Q to 1.
J=0, K=0 retains previous state.
J=1, K=1 toggles Q (0 to 1, or 1 to 0).
c) D Flip-Flop:
Has single data input (D) and clock input.
Outputs: Q and Q̅ .
Q changes based on D and clock signal.
On rising clock edge, Q copies D value.
Retains previous state on clock 0.
Cybersecurity:
Protects computer systems, networks, and data.
Ensures confidentiality, integrity, and availability of information.
Involves authentication, authorization, and intrusion detection.
Addresses vulnerabilities and promotes security awareness.
Requires continuous monitoring and incident response.
Three Methods to Safeguard Your Computer from Viruses:
Install Antivirus Software:
Install reputable antivirus software.
Keep it updated with the latest virus definitions.
Schedule regular system scans.
Keep OS and Software Updated:
Regularly update operating system and software.
Apply security patches to address vulnerabilities.
Enable automatic updates for convenience.
Exercise Caution Online:
Be cautious when clicking links or downloading files.
Avoid unfamiliar websites and emails.
Stay away from suspicious pop-ups and ads.
Cloud computing is a paradigm in information technology that enables users to access and
use computing resources over the internet on a pay-as-you-go basis. Instead of owning
physical hardware and software, users can utilize virtualized resources hosted on remote data
centers owned and managed by cloud service providers.
Access computing resources over the internet.
On-demand self-service for users.
Broad network access from any device.
Resource pooling for efficient usage.
Rapid elasticity for quick scaling.
Pay-as-you-go billing based on usage.
Deployment models: public, private, hybrid.
Benefits: cost savings, scalability, flexibility, reliability.
With the support of ONE example each, discuss THREE models of cloud
computing
Deployment Models of Cloud Computing:
Public Cloud:
Services are provided over the internet and shared among multiple users. It is cost-effective
and offers flexibility, but data security concerns may arise as resources are shared with
others.
Private Cloud:
Resources are dedicated to a single organization and hosted within their own data centers or
through a third-party provider. It provides more control and security but may involve higher
initial costs.
Hybrid Cloud:
Combines elements of public and private clouds to achieve a balance between cost-
efficiency, scalability, and data control. Organizations can choose where to host specific
resources based on their requirements.
a) Interrupts:
Role: Pauses current process, switches to another task.
How: Hardware or software signals trigger interrupts.
Purpose: Helps operating system manage multitasking efficiently.
b) Concurrency:
Role: Enables simultaneous task execution.
How: Time-sharing on single-core or multi-core processors.
Purpose: Creates illusion of tasks running in parallel.
c) Scheduling and Timers:
Role: Manages process execution and resource allocation.
How: Scheduling algorithms and timers.
Purpose: Ensures fair and efficient multitasking.
21.All digital systems are constructed from two types of component:
combinational logic element (i.e. gates) and sequential elements (i.e. flip flops).
Describe the fundamental difference between these TWO circuit elements and
explain why both types are needed to construct a digital computer
Logic Gates:
Purpose: Perform logical operations (AND, OR, NOT) on binary inputs.
Function: Process and manipulate binary data.
Flip-Flops:
Purpose: Store binary values and maintain state until changed.
Function: Store data and maintain digital circuit states.
Why Both Are Needed:
Logic gates perform computations and control data flow.
Flip-flops store results, intermediate values, and memory states.
Together, they enable efficient data processing and storage in digital computers.
Anti-virus Software:
Purpose: Detects and removes viruses from the computer.
Function: Protects data and system integrity.
Anti-spyware:
Purpose: Detects and removes spyware.
Function: Preserves user privacy.
Access Control List (ACL):
Purpose: Controls user access to resources.
Function: Enhances system security.
Pop-up Blocker:
Purpose: Prevents unwanted pop-up windows.
Function: Improves browsing experience and reduces risks.
Peripheral Polling:
Purpose: CPU checks peripheral devices for attention or data transfer.
Explanation: CPU repeatedly queries peripherals, may cause inefficiency.
DMA (Direct Memory Access):
Purpose: Allows certain hardware devices direct access to memory.
Explanation: Devices access memory without involving CPU, faster data transfer.
I/O (Input/Output):
Purpose: Interaction between computer and external devices.
Explanation: Involves input from users and output to peripherals.
Display Driver:
Purpose: Enables OS to control graphics hardware.
Explanation: Translates OS commands to GPU for correct display.
Register Storage:
Explanation: Fast, small internal memory in CPU for temporary data and instructions.
Example: Holds operands and results during arithmetic calculations.
Permanent Disk Storage:
Virtualization:
Purpose: Create virtual representations of computing resources.
Uses: Server virtualization, desktop virtualization, application virtualization, network
virtualization, storage virtualization, testing, and development.
Cloud Computing:
Purpose: Access shared computing resources over the internet.
Uses: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a
Service (SaaS), scalability, remote collaboration, backup, and disaster recovery
Quad-Core Processor:
Explanation: CPU with four independent processing cores on a single chip.
Example: Intel Core i5-11400F.
Display Resolution:
Explanation: Number of pixels a screen can display.
Example: Full HD (1920x1080).
Hard Drive Capacity:
Explanation: Amount of data a storage drive can hold.
Example: 1TB (1,000 gigabytes).
aBandwidth:
Explanation: Maximum data transfer rate of a network.
Example: 100 Mbps (megabits per second).
Latency:
Explanation: Time delay in data transfer.
Example: Delays in online gaming.
Collision:
Explanation: Data clash in a network.
Example: Simultaneous data transmission causing packet loss.
WiFi:
Advantages:
Wireless convenience - no cables.
Mobility - use devices anywhere in coverage.
Easy setup - no extensive wiring.
Disadvantages:
Limited range - weak signal over distance.
Interference - disruptions from other devices.
Security risks - vulnerable to unauthorized access.
Broadband:
Advantages:
High-speed internet - faster than dial-up.
Always-on connection - no need to dial in.
Multiple device support - shared connectivity.
Disadvantages:
Cost - can be expensive.
Availability - limited in some areas.
Potential interruptions - service outages.