Computer_application_module1
Computer_application_module1
Department of Management
Computer Application module
Chapter one
Introduction to computer
1.1 What is computer?
A computer is an electronic machine, operating under the control of instructions stored in its own memory that can accept
data, manipulate the data according to specified rules, produce results, and store the results for future use. Computers
process data to create information.
Data is a collection of raw or unprocessed facts, figures, and symbols.
Information is data that is organized, meaningful, and useful. To process data into information, a computer uses
hardware and software. Hardware is the electric, electronic, and mechanical equipment that makes up a computer.
Software is the series of instructions that tells the hardware how to perform tasks.
1.2 Generations of computer
The history of computer development is often referred to the different generations of computing devices. Each generation
of computer is characterized by a major technological development that fundamentally changed the way computers
operate, resulting in increasingly smaller, cheaper, and more powerful, and more efficient and reliable devices. Therefore
computers passes so many generations to
1. First Generation (1940-1956) Vacuum Tubes :
The first computers used vacuum tubes for circuitry and magnetic drums for memory, and were often enormous,
taking up entire rooms. They were very expensive to operate and in addition to using a great deal of electricity,
generated a lot of heat, which was often the cause of malfunctions. The UNIVAC and ENIAC computers are
examples of first-generation computing devices.
2. Second Generation (1956-1963) Transistors:
Transistors replaced vacuum tubes and ushered in the second generation of computers. The transistor was far
superior to the vacuum tube, allowing computers to become smaller, faster, cheaper, more energy-efficient and
more reliable than their first-generation predecessors.
3. Third Generation (1964-1971) Integrated Circuits:
The development of the integrated circuit was the hallmark of the third generation of computers. Transistors
were miniaturized and placed on silicon chips, called semiconductors, which drastically increased the speed and
efficiency of computers.
4. Fourth Generation (1971-Present) Microprocessors:
The microprocessor brought the fourth generation of computers, as thousands of integrated circuits were built
onto a single silicon chip. What in the first generation filled an entire room could now fit in the palm of the hand.
5. Fifth Generation (Present and Beyond) Artificial Intelligence :
Fifth generation computing devices, based on artificial intelligence , are still in development, though there are
some applications, such as voice recognition , that are being used today. The use of parallel processing and
superconductors is helping to make artificial intelligence a reality.
1.3 Characteristics of computer
The characteristics of computers that have made them so powerful and universally useful are speed, accuracy, diligence,
versatility and storage capacity. Let us discuss them briefly.
6. Speed: - Computers work at an incredible speed. A powerful computer is capable of performing about 3-4
million simple instructions per second. Their speed is measured by the amount of time it took to perform or carry
out a basic operation. Computer speed measured in terms of microsecond (10-6 one millionths), nanosecond (10-9
one billionths), and Pico second (10-12 one trillionths).
7. Accuracy: - Nowadays computers are being used for surgical purposes, which need almost a hundred percent
accuracy. From this we can understand that computers are accurate and consistent. Unless there is an error in the
input data or unreliable program the computer processes with a very high accuracy.
8. Diligence: - Unlike human beings, computers are highly consistent. They do not suffer from human traits of
boredom and tiredness resulting in lack of concentration. Computers, therefore, are better than human beings in
performing voluminous and repetitive jobs.
9. Versatility: - Computers are versatile machines and are capable of performing any task as long as it can be
broken down into a series of logical steps. The presence of computers can be seen in almost every sphere –
Railway/Air reservation, Banks, Hotels, Weather forecasting and many more.
10. Automatic: -Once necessary information and program is fed, the computer performs processing without human
intervention.
11. Storage capacity: -Today’s computers can store large volumes of data. A piece of information once recorded (or
stored) in the computer, can never be forgotten and can be retrieved almost instantaneously. And the time it took
to retrieve or process single information is not more than a micro or nanoseconds.
In general a computer has a capacity to store a very large amount of information in organized manner so that
accessing information is very fast.
1.4 Types of Computers
Computers can be classified into different categories based on different characteristics.
Based on type of data they process
Based on the type of data they process computers can be classified as:
Analog
Analog computers operate by measuring physical properties. They deal with continuous variables; they don’t compute
directly with numbers, rather, they operate by measuring physical magnitude such as pressure, temperature, voltage,
current etc.
Examples: Thermometer, Voltmeter, Speedometer
Digital
Digital computers deal with discrete variables; they operate by counting rather than measuring. They operate directly up
on numbers (or digits) that represent numbers, letters, or other special symbols.
Examples: Abacus, Desk & pocket calculators, general purpose computers
Hybrid
Hybrid computers inherit the best features of both analog and digital computers. Usually the Input is continuous data
(analog). Since Digital Processing is more accurate, processing takes place digitally. The processed information – the
output – could be either digital or analog, depending on the user preference or the type of application.
Examples: digital camera, health monitoring machines in some hospitals,
Super computer
The term supercomputer has been coined to describe a category of extremely powerful computer designed for high-speed
processing. A supercomputer is generally characterized as being the fastest, most powerful, and most expensive computer.
Generally, Supercomputers are:
The largest and the most efficient computers
Very expensive
very fast and
Supports hundreds of users at different locations
Mainframe computer
Mainframe computers are large, powerful computers that are physically larger than micros and minis and usually have
processors with faster instruction processing speeds. For example, they may be able to process from 10 to 200 million
instructions per second (MIPS). Mainframe computers also support multiple users and are expensive.
Mini computer
Minicomputers are midrange computers that are larger and more powerful than most microcomputers but are smaller and
less powerful than mainframe computer systems. Minicomputers are being used for a large number of business and
scientific applications. They are popularly used in scientific laboratories, research centers, universities and colleges,
engineering firms, industrial process monitoring and control, etc.
Micro computers
The smallest computers ever produced in the history of computers are microcomputers. Since they are designed to be used
by a single user, they have the least capacity as compared to the other types of computers. They are also the least
expensive of all types. There two different types of microcomputers are desktop computers and portable computers
(laptops, notebook computers and palmtops)
Classification by purpose of application
Computers can be applied or used for different purposes. Based upon their application, they are classified as special
purpose or general purpose computers.
Special purpose computers
They are designed to solve a single type of problem, that is their components and their functions are uniquely adapted
to a specific situation involving specific application.
Example:
The public telephone box
Traffic control system
Ticket machines (used in grocery, super market etc.)
Pocket-calculators etc.
Counters
Most analog computers are special purpose computers.
i) Input devices
ii) Central Processing Unit (CPU)
iii) Output Devices
iv) Storage Devices
i) Input Devices
Input devices are used to enter information into computer. They convert the data we give them into the form that can
be manipulated in the computer (electronic format).
Some examples of input devices are Keyboard, mouse, scanner, Bar Code Reader, mice
ii) Central Processing Unit
CPU executes instructions and performs the computer's processing activities. It is also known as processor or
microprocessor. It functions the same purpose as the human brain for human being. It is called the brain of the computer.
One of the basic features of a computer that affects its entire performance is the CPU speed. CPU speed is measured in
Hertz (Hz). Hertz is the number of cycles per second. 1Hz=1cycle per second. Larger units are KHz (Kilo Hertz), MHz
(Mega Hertz), GHz (Giga Hertz), etc.
1 KHz = 1000 Hz
1 MHz = 1000 KHz
1 GHz = 1000MHZ
Current CPUs are as fast as 2-3GHz (2-3 billion cycles per second)
CPU has three sub-components:
Control Unit (CU)
Arithmetic Logic Unit (ALU)
Memory
Control Unit
As human brain controls the body, control unit controls the computer hardware. Control Unit does not execute
instruction by itself, i.e. does not carry out instruction processing, but it directs other processing elements to
execute instructions.
Arithmetic Logic Unit (ALU)
The purpose of ALU is to execute instruction. It performs two operations:
Arithmetic operation
Logic Operation
Arithmetic operation: this includes mathematical operations like addition, subtraction, multiplication, division,
etc. If you give your computer the instruction 2+3, this will be included in arithmetic operation and it is executed
by Arithmetic Unit.
Logical Operation: this is concerned with the comparison of data and it is called logical operation. It includes
operators like less than, greater than, equal to, less or equal to, greater or equal to, different from, etc. e.g. if
mark>80, grade is 'A'.
Prepared by: Eyachew T.
Network College
Department of Management
Computer Application module
(Operating system is system software that controls and coordinates the use of hardware among the different application
software and users. OS intermediates between the user of computer and the computer hardware. The users give a
command and the OS translates the command into a form that the machine can understand and execute.)
Examples of operating systems—MS-DOS, Windows family of OS, Linux
Objectives of OS
OS has two main objectives:-
(1) To make the computer system convenient and easy to use, for the user, and
(2) To use the computer hardware in an efficient way, by handling the details of the operations of the hardware .And
others:-
To allocate resources to processes (Manage resources).
Provide a pleasant and effective user interface.
Functions of OS
Main functions of the operating system are as follows:
Process management, memory management, file management, device management, protection and security, user
interface
Device Management— The device management tasks handled by OS are—(1) open, close and write device drivers, and
(2) communicate, control and monitor the device driver.
User Interface or Command Interpreter— Operating system provides an interface between the computer user and the
computer hardware. The user interface is a set of commands or a graphical user interface via which the user interacts
with the applications and the hardware.
Process Management— The process management activities handled by the OS are—(1) control access to shared
resources like file, memory, I/O and CPU, (2) control execution of applications, (3) create, execute and delete a process
(system process or user process), (4) cancel or resume a process (5) schedule a process.
Memory Management — the activities of memory management handled by OS are—(1) allocate memory, (2) free
memory, (3) re-allocate memory to a program when a used block is freed, and (4) keep track of memory usage.
File Management— The file management tasks include—(1) create and delete both files and directories, (2) provide
access to files, (3) allocate space for files, (4) keep back-up of files, and (5) secure files.
Protection and Security— OS protects the resources of system. User authentication, file attributes like read, write,
encryption, and back-up of data are used by OS to provide basic protection.
Utilities software is programs that make computing easier. They perform specific tasks related to managing computer
resources or files. There are different utility programs:
i) Troubleshooting programs: enable us to recognize and correct computer problems before they become serious.
ii) Anti-virus programs: they protect your computer against viruses or other malicious programs that damage
computer. E.g MacAfee, Sophos, Norton, etc.
iii) File compression programs: are used to reduce the size of files or data so that it takes less storage space or
network band. E.g WinZip, WinRAR, etc.
iv) Uninstall programs: this software enable us to safely and completely remove unneeded programs/software
from your computer.
v) Backup software: with the help of this software, we can make copies of files to be used in case of the original
data is lost/damaged. This copy is called back up.
vi) Screen savers: helps to prevent your work from being seen by others if you leave your computer idle for some
time.
Language translators are used to convert the programming instruction written by users into binary code that the
computer can understand. They are written for specific programming languages and computer system.
Application Software
Application software performs useful work for the user. These useful works could be:
Word processing-document creation
Spreadsheet-electronic calculation
Data base system
Email/communicating-email sending and reading
Users use this software to perform different activities like calculation, video editing, word processing, presentation, etc.
CHAPTER 3
Data Representation
Every computer stores numbers, letters, & other special characters in a coded form. But a computer stores those
data’s in a binary number system. There are two main code forms that every number, letter and special character
is represented in a computer system. Before discussing those codes let have a look at binary number system.
Why Binary?
Why do we go for binary numbers instead of decimal numbers?’ The reasons are as follows:
1. The 1st reason is that the electronic & electrical components, by their very nature, operate in a binary mode.
Information is handled in the computer by electronic/electrical components such as transistors, semiconductors,
wires, etc all of which can only indicate 2 states or conditions – on(1) or off(0).
Transistors are either conducting (1) or non-conducting (0); a voltage is present (1) or absent (0) in wire. The
binary number system, which has only two digits (0&1), is most suitable for expressing the two possible states
2. The second reason is that the computer circuits only have to handle two binary digits rather than ten decimal
digits. This greatly simplifies the internal circuit design of computers, resulting in less expensive & more reliable
circuits.
3. Finally, the binary system is used because everything that can be done in decimal number system ( addition,
subtraction, division & multiplication) can also be done in binary number system.
Units of Data Representation
When data is stored, processed, or communicated within the computer system, it is “packed” in units. Arranged from
the smallest to the largest, the units are called bits, bytes, & words.
Bits
A bit is a single binary digit. A bit may have a value of 0 or 1. In a computer, aswitch or transistor that is off
represents a 0, and a switch or transistor that is on represents a 1.A bit is represented by the numbers 1, & 0, which
correspond to the states on & off, true & false, or yes & no.
Bytes
Most computers work with groups of 8 bits, which is called a byte. To make it easier to read, the 8 binary digits in a
byte are divided into two groups of four, called nibbles, when they are written.
One byte may hold binary numbers ranging in value from 0000 0000 (base 2) to1111 1111 (base 2), or from 0 (base
10) to 255 (base 10). Counting 0 as a value,one byte can contain 256 values. For many computer variables, the
maximum value is 255 because the computer wants to store the value in a single byte, oryou are limited to 256
choices.
Words
- Bytes are combined into groups of 1 to 8 bytes called words.
- Words refer to the number of bits that a computer process at once.
- Typically word lengths are 8 bits, 16 bits, 32 bits & 64 bits.
A decimal integer is converted to any other base, by using the division operation.
Step 4 - Record the remainder from Step 3 as the next digit (to the left) of the new base number.
Repeat Steps 3 and 4, getting remainders from right to left, until the quotient becomes zero in Step 3.
The last remainder thus obtained will be the most significant digit (MSD) of the new base number.
Example
Decimal Number: 2910
Calculating Binary Equivalent:
Step Operation Result Remainder
Step 1 29 / 2 14 1
Step 2 14 / 2 7 0
Step 3 7/2 3 1
Step 4 3/2 1 1
Step 5 1/2 0 1
As mentioned in Steps 2 and 4, the remainders have to be arranged in the reverse order so that the first remainder becomes
the least significant digit (LSD) and the last remainder becomes the most significant digit (MSD).
Decimal Number: 2910 = Binary Number: 111012.
Other base system to Decimal System
Steps
Steps 1 - Determine the column (positional) value of each digit (this depends on the position of the digit and the
base of the number system).
Step 2 - Multiply the obtained column values (in Step 1) by the digits in the corresponding columns.
Step 3 - Sum the products calculated in Step 2. The total is the equivalent value in decimal.
Example
Binary Number: 111012
Calculating Decimal Equivalent:
Step Binary Number Decimal Number
Step 1 111012 ((1 x 2 ) + (1 x 2 ) + (1 x 22) + (0 x 21) + (1 x 20))10
4 3
Octal = 3 4 5
Binary = 011 100 101 = 011100101 binary
Steps 1 - Convert each hexadecimal digit to a 4-digit binary number (the hexadecimal digits may be treated as
decimal for this conversion).
Step 2 - Combine all the resulting binary groups (of 4 digits each) into a single binary number.
Example
Hexadecimal Number: 1516
Calculating Binary Equivalent:
Step Hexadecimal Number Binary Number
Step 1 1516 110 510
Step 2 1516 00012 01012
Step 3 1516 000101012
Hexadecimal Number: 1516 = Binary Number: 101012
Converting from hexadecimal to binary is as easy as converting from binary to hexadecimal. Simply look up each
hexadecimal digit to obtain the equivalent group of four binary digits.
Hexadecimal: 0 1 2 3 4 5 6 7
Binary: 0000 0001 0010 0011 0100 0101 0110 0111
Hexadecimal: 8 9 A B C D E F
Binary: 1000 1001 1010 1011 1100 1101 1110 1111
Hexadecimal = A 2 D E
Binary = 1010 0010 1101 1110 = 1010001011011110 binary
Octal to Hexadecimal
When converting from octal to hexadecimal, it is often easier to first convert the octal number into binary and then from
binary into hexadecimal. For example, to convert 345 octal into hex:
(From the previous example)
Octal = 3 4 5
Binary = 011 100 101 = 011100101 binary
Drop any leading zeros or pad with leading zeros to get groups of four binary digits (bits):
Binary 011100101 = 1110 0101
Then, look up the groups in a table to convert to hexadecimal digits.
Binary: 0000 0001 0010 0011 0100 0101 0110 0111
Hexadecimal: 0 1 2 3 4 5 6 7
Binary: 1000 1001 1010 1011 1100 1101 1110 1111
Hexadecimal: 8 9 A B C D E F
A2DE hexadecimal:
= ((A) * 163) + (2 * 162) + ((D) * 161) + ((E) * 160)
= (10 * 163) + (2 * 162) + (13 * 161) + (14 * 160)
= (10 * 4096) + (2 * 256) + (13 * 16) + (14 * 1)
= 40960 + 512 + 208 + 14
= 41694 decimal
Decimal to Hexadecimal
Here is an example of using repeated division to convert 1792 decimal to hexadecimal:
Decimal Number Operation Quotient Remainder Hexadecimal Result
1792 ÷ 16 = 112 0 0
112 ÷ 16 = 7 0 00
7 ÷ 16 = 0 7 700
0 Done.
The only addition to the algorithm when converting from decimal to hexadecimal is that a table must be used to obtain the
hexadecimal digit if the remainder is greater than decimal 9.
Decimal: 01234567
Hexadecimal: 0 1 2 3 4 5 6 7
Decimal: 8 9 10 11 12 13 14 15
Hexadecimal: 8 9 A B C D E F
Example:
Understanding Kilobytes, Megabytes, and Gigabytes
A kilobyte is often referred to as 1,000 bytes, but this is not totally accurate. Incomputer terms, a kilobyte is 1,024
bytes. K is used as shorthand for 210, whichequals 1,024.
A megabyteis not exactly 1,000,000 bytes, but 220 bytes, or 1,024 KB, or1,048,576 bytes. A 200 MB drive can
store 204,800 KB or 209,715,200 bytes.
A gigabyteis not 1 billion bytes, but 230 bytes or 1,073,741,824 bytes. 3 GB is the same as3,221,225,472 bytes.
For Example
210 is 1024 1000(or 1KB)
o 1KB (Kilo bytes)-1024 bytes-can store 1,000 characters.
o 1MB = 220 bytes 106 bytes- can store 1 Million characters
o 1GB = 230 bytes 109 bytes – can store 1 Billion characters.
o 1TB= 240 bytes 1012bytes- can store 1 Trillion characters.
Coding Methods
When characters are used in the computer, they must be converted into computer code(binary string, i.e., sequence of
0’s & 1’s). There are several codes for converting character data into binary string of which ASCII (American
Standard Code for Information Interchange) &EBCDIC (Extended Binary Coded Decimal Interchange Code) are the
most popular codes.
ASCII
- Is a coding scheme that assigns numeric values to letters, numbers, & other characters?
- ASCII is of two types – ASCII -7(standard) &ASCII-8(extended)
ASCII-7 is 7-bit code that allows 128(27) different characters.
ASCII-8 is 8-bit code that allows 256(28) different characters.
- The extended ASCII codes, 128 through 256, are assigned to variable sets of characters by computer
manufacturers & software developers.
- Thus, whereas the standard ASCII character set is universal among microcomputer hardware & software.
Example
Character ASCII Equivalent
A 0100 0001
B 01000010
Z 0101 1010
a 0110 0001
? 0011 1111
0 0011 0000
Cancel 0001 1000
Escape 0001 1011
EBCDIC
It is analogous to ASCII coding scheme and it is the standard character code for large computers
Prepared by: Eyachew T.
Network College
Department of Management
Computer Application module
Is not widely used with microcomputers, but well known & internationally recognized, primarily as an IBM code for
the corporation’s mainframes. EBCDIC is an 8-bit code without parity. The first 4 bits are known as zone bits and the
remaining 4 bits represent digit values.
Example:
The EBCDIC code of 4 and 9 is 11110100 and 11111001 respectively
Data Transmission in computer
Data can be transmitted in one of two ways:
Parallel - numerous bits (usually in multiples of eight) are transmitted simultaneously because there are
numerous data lines connecting components.
Multi-lane Street.
This data line is called a bus.
Serial - only one bit is transmitted at a time because there is only one data line connecting components.
Single Lane Street.
Internally, the components inside of computers (and most computer-type devices) communicate via parallel
transmission.
Externally, computers (and most computer-type devices) communicate via serial transmission with networks.
Chapter - 5
Data Communication and Computer Network
5.1 Data communication Basics
Definition: Data communication is a process of sharing ideas, information and messages with others in particular time
and space. Communication includes writing, talking and non verbal communication like facial expressions, visual
communications, electronic communications, etc.
People communicate one with others using communication systems. All communication systems, no matter how large or
small, are created from the same building blocks. An interconnected collection of Hardware Devices & Software, along
with a Communications Channel that enables data to be transmitted from one location to another
The basic components are:
Computers (input & output devices)
A communication channel (media)
A communication Equipment ( intermediate device)
Data transmission specifications (network rules & procedures)
Like in any other system, a computer system also has its own data communication. That is through the interconnection of
computers called Network. Therefore, Network is a group of computers that are connected each other for the sake of
Data/Information sharing, Hardware sharing or some other resource sharing.
Process of Communications
Communication is a process of exchange of ideas, facts opinions and manner by which the receiver of the massage shares
meaning and understanding with another. It is organizational process, because a group of people and group activities are
involved without this process, organizational activities do not progress.
According to David K. Berlo, the whole process of communication involves six different steps as:
Ideation Encoding Transmission Receiving Decoding Acting.
The entire process of communication consists of eight important elements as follows:
Message: A piece of information, spoken on written to be passed from one person to another. It is the subject
matter of communication. It may involve any fact, idea, opinion, figure, attitude or course of action including
information. It exists in the mind of the communicator.
Transmitter: Transmitter is sender of message or communicate or speaker, a person who transmit the message. In
the case of mechanical device used for communication, Para transmitter is an operator that transmit message. The
person who conveys the message is known as the communicator or sender.
Encoding: The process of conversion of the subject matter into symbols is called encoding. The message or
subject matter of any communication is always abstract and intangible transmission of the message requires the
use of certain symbols. Encoding process translates ideas, word, facts, feelings, opinions into symbols, signs
actions, pictures and audio-visuals, etc.
Communication Channel: Communication channel means the medium or through message passes. The words,
symbols, or signs selected should be transmitted to the receiver through certain channel or medium. The media
may be written media or oral media. Further there are various forms of written media like letters, reports, manual,
circulars, notes, questionnaires etc. The forms of oral media includes face-to face conversation, Dictaphone,
telephone, teleconferencing, television, documentary films, CD-ROMs, etc. represent audio-visual channels.
Receiver: Receiver is the person to whom the message is meant for by the sender. A person, who receives the
message is called receiver. Responding or acting to the message done by the receiver only.
Decoding: Decoding is the process of translation of an encoder message into ordinary understandable language.
Receiver converts the symbols, word or sign received from the sender to get the meaning of the message.
Acting: According to the understanding of the message, the receive acts or implements the message.
Feedback: Feedback is though the last element an important one in the communication process. The sending back
of the knowledge about the message to the transmitter is known as feedback. It ensures that the received the
message and understood in the same sense as the sender meant
5.2 What is a Computer Network?
A computer network is a group of computers and associated peripheral devices connected by a communication channel;
capable of sharing files and other resources among several users. A network can range from a small network connecting a
small number of users in an office or department, to a Local Area Network connecting many users over permanently
installed cables and dial-up lines, to a Metropolitan Area Network or Wide Area Network connecting users on several net-
works spread over a wide geographic area.
If a computer is not connected to other computers that computer is standalone computer.
Example the following computer is a standalone (workstation computer) that cannot share information with other
computers.
Benefit of a Computer
Network
Linking computers into
networks provides
benefits in the following
areas:
Hardware
sharing like
printer
Software sharing
File sharing e.g.:
- Assignment is
found on server.
Central disk
storage –
dedicated file
server
Administrative support
E-mail services
Internet access
In all these usages computer networks increase the efficiency of work and decrease the cost of it. look the following
diagram (Network topology)
Sharing
Programs/Software
Application (software)
sharing occurs when
several users at different
locations run application
programs that are
installed centrally in one
location (application
server). Software
(application) that is
installed centrally can
be managed and
upgraded centrally.
Such systems are mostly
common in financial
system where the main
application is stored
centrally and users in
different sections of the
finance department are
able to run the system
from the network.
In short sharing programs on a network
Saves disk space
Reduces maintenance
Reduce licensing cost
MAN
Metropolitan
area network
(MAN) covers a
much larger area
than a LAN and
is a public or a
private network
used to connect
various
locations,
including the sub
urban. Campus networks are the example of a MAN
Basic features:
It covers large geographical areas than LAN such as cities, districts, Regions etc
It is an interconnection of several LANs e.g.: if your organization has several branches in different cities.
It uses expensive cables (media) – fiber optic.
E.g.: Commercial Bank of Ethiopia from Addis Ababa to other branches in different cities (Adama and Hawasa
branches)
WAN
A WAN is a
computer
network that
spans a relatively
large
geographical
area. Typically, a
WAN consists
millions or more local area networks (LANS) which can communicate to each other and access internet ( global
networks)
Computers connected to a wide area network are often connected through public networks, such as the telephone system.
They can also be connected through leased lines or satellites. The largest WAN in existence is the internet.
Basic features:
The idea of connecting computers within a target Geographical area like between
Countries & b/n Continents
Uses fiber optic cables, microwaves,& satellite (wireless Technology), Telephone line, modem etc.
E.g. Global Area network (GAN) Internet
E-mail services and chatting
Example: Wide area network architecture- global internetworking
Types of
Network
Nodes
Relationships
Based on how the computers in a network are configured and how they access information, networks are classified into
three types: peer-to-peer, client-server, and hybrid.
1. Peer –peer network
2. Server – based network
3. Hybrid network
The type of network you choose to implement will depend on factors such as:
Size of the organization
Level of security required
Type of business
Level of administrative support available
Amount of network traffic
Needs of the network users
Network budget
Peer-to-Peer Networks
In a peer-to-peer network, there are no dedicated servers, and there is no hierarchy among the computers. All the
computers are equal and therefore are known as peers. Each computer functions as both a client and a server, and there is
no administrator responsible for the entire network. The user at each computer determines what data on that computer is
shared on the network.
Basic features:
There is no dedicate sever
All PCs are peers (equal) -No hierarchy
They all work both as a client & as a server.
There is no admin & no central storage
There is no need of Additional Software
Users at each PC determine their own security and acts as an administrator
10 or fewer PCs are connected in this network
The following Figure shows a peer-to-peer network in which each computer functions as both a client and a server.
Advantages of peer to
peer network
Less expensive
since it uses visible
& cheap cable
system (UTP)
easy to install
users act as their own Admin, plan their own security
Peer-to-peer networks are appropriate or good choices for environments where:
Another way to understand this relationship (client/server) is to visualize an information interchange that can best be
described as request- response. That is, a client requests information, and server responds to such a request by
providing the requested information (or by denying the request). This relationship is called the client/server
relationship.
As a network grows, a peer-to-peer network will probably no longer be able to meet the increased demand on shared
resources. To accommodate the increased demand and provide additional functionality, most networks have
dedicated servers.A dedicated server functions as a server only, not as a client. The configuration of these servers is
optimized to process requests from network clients.
Client-server networks (see Figure below) have become standard models for networking
Server-based network
Basic features:
A combination of the two above
It has both advantages
Network Media
Data signal must enter and leave a computer at a point to allow networked communication to occur. The data signal
travels through transmission media.
Transmission media is a medium or a material through which data can be transmitted over the long distances. The speed
or rate at which data is transmitted over a communication channel is denoted by a parameter called bandwidth.
Transmission media having higher bandwidths are used now -a -days for better performance.
Transmission media is categorized as:
Bounded (guided) transmission media
Unbounded (unguided) transmission media
Networking
Equipments and
Instruments
Network Interface
Card
Network interface card
(NICs,) also known as
network adapters
provide the interface
between cables, and
computers. The cards
are installed in an
expansion slot in each
computer and server on
the network. After the NIC has been installed, the network cable is attached to the card’s port to make the actual physical
connection between the computer and the rest of the network. (See figure below which is the sample of NIC)
Sample
NIC
You cannot make networks larger just by adding new computers and more cable. Each network topology or architecture
has limits. You can, however, install components to increase the size of the network within its existing environment.
Components that enable you to expand the network include:
Modem
Repeaters and Hubs
Bridges
Switches
Routers
Modem
A modem is a device that makes it possible for computers to communicate over a telephone line.
Computers cannot simply be connected to each other over a telephone line, because computers communicate by sending
digital electronic pulses (electronic signals), and a telephone line can send only analog waves (sound).
As shown in Figure below, the modem at the sending end converts the computer's digital signals into analog waves and
transmits the analog waves onto the telephone line. A modem at the receiving end converts the incoming analog signals
back into digital signals for the receiving computer
Modems convert digital signals to analog waves, and convert analog waves to digital signals
Repeaters
Repeaters receive signals and retransmit them at their original strength and definition. This increases the practical length
of a cable. (If a cable is very long, the signal weakens and become unrecognizable.)Installing a repeater between cable
segments enables to travel farther. Figure below shows how repeaters regenerate weak signals.
Hubs
Hubs are connectivity devices that connect computers in a star topology. Hubs contain multiple ports for connecting to
network components. If you use a hub, a break in the network does not affect the entire network; only the segment and the
computer attached to that segment fail. A single data packet sent through a hub goes to all connected computers. Figure
below shows method of hub communication.
Bridges
A bridge is a device that passes data packets
between multiple network segments that use
the same communications protocol. If a
packet is destined for a computer within the sender's own network segment, the bridge retains the packet within that
segment. If the packet is destined for another segment, it passes the packet to that segment. Figure below shows a bridge
connecting two network segments.
Switches
Switches are similar to bridges but offer a more direct network connection between the source and destination
computers. When a switch receives a data packet, it forwards the data packet to the appropriate port of the destination
computer only, based on information in each packet's header. The following figure illustrates a switched network.
Switched network
Router
A router is a device that acts like a bridge or switch but provides more functionality. In moving data between different
network segments, routers examine a packet header to determine the best path for the packet to travel to the specific
end device. A router knows the path to all of the segments on the network by accessing information stored in the routing
table. Routers enable all users in a network to share a single connection to the Internet or a WAN.
The following Figure shows a router connecting two network segments.
Gateways
Gateways enable
communication
between different
network
architectures. A
gateway takes the data from one network and repackages it, so that each network can understand the other network's data
A gateway is like an interpreter.
Network Topologies
A network topology is the arrangement of computers, cables, and other components on a network. It is a map of the
physical network. The most common types of standard physical topologies are Bus, Star, Ring, Mesh and Hybrid.
Bus Topology
In a bus topology, all of the computers in a network are attached to a continuous cable, or segment, that connects them in
a straight line (See Figure below). In this straight-line topology, a packet is transmitted to all network adapters on that
segment.
An increase in the number of computers results in an increase in noise and a corresponding decrease in network
efficiency.
Bus topology
Star Topology
In a star topology, cable segments from each computer on the network are connected to a central component, or hub (See
Figure below). A hub is a device that connects several computers together to form star topology. In a star topology,
signals are transmitted from the computer, through the hub, to all computers on the network. On a larger scale,
multiple LANs can be connected to each other in a star topology.
An advantage of the star topology is that if one computer on the star topology fails, only the failed computer is unable
to send or receive data. The remainder of the network functions normally.
The disadvantage of using this topology is that because each computer is connected to a hub, if the hub fails, the entire
network fails.
Star topology
Ring Topology
In a ring topology, computers are connected on a single circle of cable (See Figure below).. The signals travel around the
loop in one direction and pass through each computer, which acts as a repeater to boost the signal and send it to the
next computer.
The advantage of a ring topology is that each computer acts as a repeater, regenerating the signal and sending it on to
the next computer, thereby preserving signal strength.
Mesh topology
Hybrid Topologies
In a hybrid topology, two or more topologies are combined to form a complete network design. Networks are rarely
designed using only one type of topology. For example, you may want to combine a star with a bus topology to benefit
from the advantages of each.
Two types of hybrid topologies are commonly in use: star-bus topology and star-ring topology.
Star-Bus
In a star-bus topology, several star topology networks are linked to a bus connection. After a star configuration is full,
you can add a second star and use a bus connection to connect the two star topologies.
In a star-bus topology, if a single computer fails, it will not affect the rest of the network. However, if the central
component, or hub, that attaches all computers in a star fails, all computers attached to that component fail and are
unable to communicate.
Star-Ring
In the star-ring topology, the computers are connected to a central component (hub) as in a star network. These
components, however, are wired to form a ring network.
Like the star-bus topology, if a single computer fails, it will not affect the rest of the network. See the following diagram
Hybrid topologies
Network Protocols
Like network needs hardware, it also needs software. Because each task in network is governed by a set of rules called
protocols. If the sender and receiver in NW should communicate, they must speak the same language called protocols (the
language).
E.g.: HTTP:-is hypertext transfer protocol which helps to communicate two computers application.
TCP/IP:- Transport control protocol (internet protocol)
- The main protocol that helps for internet transmission.
- Without TCP/ IP, there is NO internet access.
Extranet
Sometimes it may also be necessary for two or more institutions to share their data/information, or other resources. In
this case the involved organizations agree on terms and rules and give access of their Intranet (network) resources for each
other for specified reasons or business transactions. Such networks are called Extranets. Extranets are therefore the
interconnectionof Intranets, based on an agreement between organizations for the purpose of sharing resources.
Internet
The requirement to share resources is sometimes global. People need to exchange mail, to discuss about issues, to read
news, to advertise, to sell and buy, to exchange information etc. The network of networks that connects hundreds of
thousands of networks, and millions of computers around the world is called the internet
The Internet is a network of networks that is extended all around the world. It is not owned by anyone or any institution,
but controlled and managed by the internet service provider (ISP), in our case Ethiopian Telecom.
The Internet is a term used to describe thousands of computers connected with each other spanning over the world. It is
the largest network in existence. It is a network of networks acting as one. It is a worldwide communication to
businesses, homes, schools and governments.
Internet is also acts as cyber space (a virtual place that you can do a lot of things like visiting places, chatting with
friends, buying and selling products, advertise products, reading researches, etc).
With internet:
You can communicate with friends or colleagues.
You can communicate with one person at a time or thousands.
You can send & receive files or information over a greater distance.
The most important and popular uses of Internet are:
1. Browsing information from world wide web (WWW)
2. Electronic mail (E-mail)
3. File Transfer Protocol (FTP)
4. Telnet to any Internet Host-remote login
5. USE NET and So on.
World Wide Web (WWW)
The World Wide Web is a collection of host machines, which deliver documents, graphics and multi-media to users via
the internet. The common protocol that is used on the WWW is http, which stands for hypertext transport protocol.
The WWW allows users to ling documents together using clickable links. A browser is used to view the content that
server computers provide.
WWW is:
A set of protocol and software that allows the global computer network called the Internet to display
multimedia documents.
The information on WWW is spread over computers all over the world.
WWW is sometimes called web.
A system based on HTTP protocol for providing, organizing and accessing a wide variety of resources
(text, photographs, animation, films, music, video etc) that are available in a way of Internet.
E- Mail
Send and receive messages all over the world: You can send and receive electronic mail to or from anyone who also has
access to the Internet, anywhere in the world in just seconds.
Participate in discussion groups (USE NET): Thousands of special interest communities, or newsgroups, provide
access to Internet-based discussions on topics.
Find and access information: You can access information from Ethiopian Historical tips to New Zealand weather
forecasts and the latest women's health research from South Africa. Millions of documents are available from libraries,
museums, governments, educational institutions.
Retrieve files: On the Internet, you can access files that contain software programs, graphic images, music and others
CHAPTER – 6
Threat is a source of probable trouble or attack to a system that could cause losses. One of the threats in computer system
is Virus.
Computer Viruses
Computer viruses are software programs that are able to reproduce themselves. It is the intellectual creation of a human
computer programmer. If a program is not able to replicate, then it is not a virus. Most computer viruses are damaging.
Computer virus is a program that is intentionally done to harm users’ program without permission.
Not all viruses are destructive, some viruses carry messages of goodwill without harming programs or data.
Dangers of computer viruses
a. Change: computer viruses can change actual data or text causing different sense
b. Slackness: many viruses cause slow computing operation because of the load that their reproductive activity
imposes.
c. Theft: viruses can steal data, and stolen data can be used to re-steal other more data
d. Scramble (mix): virus can scramble data and files
There are three major types of viruses.
1. Boot sector viruses
2. File infectors
3. Macro viruses
4. System infectors
Boot sector viruses
Boot sector viruses attach themselves to the system code and hides behind the boot sector of hard disk
File infectors/program infectors
These viruses attach themselves to executable files or programs. Therefore, file infectors affect system performance.
These viruses are the most widely spread viruses as executable files or programs run
Macro viruses
The latest virus threat comes from macro viruses. Macro viruses are hosted in user documents.
The result of a macro virus infection can be just as destructive. Macro viruses represent a larger threat as they attack
data files rather than executables. Although executable files can be easily replaced by reinstalling the affected software,
documents are irreplaceable unless they have been backed up onto other media.
System infectors
Attach themselves to the specific system files. E.g. command.com, etc
Potential Paths for Virus
Viruses are transmitted through various media such as:
- Storage devices. E.g. Hard disk, floppy disk, flash disk, CD-ROM
- Internet connection- e-mail attachments, sharing infected files
- Direct cabling between PCs (network). etc
Rules for safe computing
These simple rules will protect /secure/ your system from computer virus infection
1. Never load unknown disks into system unless the disks are virus free
2. Do not use infected software (executable files) unless they are free of virus infection
3. Backup your data regularly to protect the data loss from any cause
4. Prevent unauthorized access
5. Lock your computer when not in use
6. Install antivirus program on to your computer and update regularly/configure to update itself automatically if
there is internet connection
Safety of the computer system
Computers require uniform and uninterrupted power supply, no noise interference and suitable environmental conditions
for reliable operation.
When the utility power fails, the UPS employs backup batteries to minute’s level of conditioned power either by
continuing normal operation for a few minutes or to protect from shutdown
Environmental factors
Temperature: integrated circuits and other devices in the computer systems are sensitive to temperature. During normal
operation, the computer generates heat, which is tolerable to the circuitry.
Measures:
Reset the system if intermittent failure occurs;
Keep the cooling ventilator cleans
Keep the system disk in cool and dry place
If possible install air conditioner in the room
Dust: The static electrical charge that builds up in the computer systems and the monitor attracts dust. Dust is a major
contributor for integrated circuits failure in the system. Electro mechanical devices such as printers and disk drives have
a number of moving parts that get dirty causing overheating and early failures
Measures:
Clean computer systems and its peripherals periodically
Use dust covers
Keep computer room windows closed
No smoking near the system
Do not touch the surface of disk drives and other internal components
Clean the inside portion as well as the area with a vacuum cleaner
Blow the dust in the screen with a pressurized anti-static spray
Use soft brush to clean the screen and clean the cabinets with mild soap and then dry them with a piece of soft
cloth.