Annamalai University: Directorate of Distance Education
Annamalai University: Directorate of Distance Education
270E110
I–V
ANNAMALAI UNIVERSITY
DIRECTORATE OF DISTANCE EDUCATION
INTRODUCTION TO COMPUTERS
UNITS : I - V
Copyright Reserved
(For Private Circulation Only)
2
i
INTRODUCTION TO COMPUTERS
Table of Contents
Unit-I Page no
1.0 Introduction 1
1.1 Objective 1
1.2 Content 1
1.2.1 Overview of Computers 1
1.2.2 How Computer Works 13
1.2.3 How To Start the Computer 14
1.2.4 Central Processing Unit and the System Unit 20
1.3 Revision Points 28
1.4 Intext Question 28
1.5 Summary 28
1.6 Terminal Exercise 29
1.7 Supplementary Materials 29
1.8 Assignment 29
1.9 Reference Books 29
1.10 Learning Activities 29
1.11 Keywords 30
Unit-II
2.0 Introduction 31
2.1 Objective 31
2.2 Content 31
2.2.1 Peripheral Devices 31
2.2.2 Mouse and Keyboard Basics 32
2.2.3 Other Input Devices 33
2.2.4 Output Devices 34
2.3 Revision Points 37
2.4 Intext Questions 37
2.5 Summary 37
2.6 Terminal Exercises 38
2.7 Supplementary Materials 38
2.8 Assignment 38
2.9 Reference Books 38
2.10 Learning Activities 38
2.11 Keywords 39
ii
Unit-III
3.0 Introduction 40
3.1 Objective 40
3.2 Content 40
3.2.1 Types Of Memory 40
3.2.2 Storage Devices 42
3.2.3 Other storage Devices 44
3.3 Revision Points 45
3.4 Intext Questions 45
3.5 Summary 46
3.6 Terminal Exercises 46
3.7 Supplementary Materials 46
3.8 Assignments 46
3.9 Reference Books 47
3.10 Learning Activities 47
3.11 Keywords 47
Unit-IV
4.0 Introduction 48
4.1 Objective 48
4.2 Content 48
4.2.1 Operating System 48
4.2.2 Single-User Operating Systems 48
4.2.3 Multi-User Operating Systems 49
4.2.4 Network Operating System 49
4.2.5 Windows Applications 56
4.2.6 Working with Internet Explorer 61
4.3 Revision Points 64
4.4 Intext Questions 64
4.5 Summary 65
4.6 Terminal Exercises 65
4.7 Supplementary Materials 65
4.8 Assignments 66
4.9 Reference Books 66
4.10 Learning Activities 66
4.11 Keywords 66
Unit-V
5.0 Introduction 67
5.1 Objective 67
5.2 Content 67
5.2.1 The Uses of Computer Network 67
iii
UNIT - I
1.0) Introduction
1.1) Objective
At the end of this unit student should have knowledge about the following:
Overview of Computers
How Computers Work
Starting the Computer
The Central Processing Unit & the System Unit
1.2) Content
In layman’s language the computer is the fast calculating device that can perform
arithmetic operations. Although the computer was originally invented mainly for doing
high speed and accurate calculations, it is not just a calculating device. The computer can
perform any kind of manipulations involving arithmetic and logical operations on data. It
gets the data through an input device processes it according to the instructions given and
gives the information as output. We can define a computer as follows:
The computers were mainly introduced to increase the speed and accuracy of
information manipulation and calculation and to take over low-level tasks that are boring
and degrading. A computer is an efficient machine, its application that sometimes goes
awry. The degree of efficiency that a computer can bring is momentous. The arrangement
of the units of a computer is referred to as organization of a computer (i.e.) the
arrangement of its peripherals.
Generation Of Computers
Computers are classified into the following six types based on their historical
advancement and electronic components used.
Examples:
Examples:
IBM PC, developed in 1981 was the first industry standard personal computer, having
Intel 8088 memory chip
386, developed in 1985, had Intel 80386 memory chip
486, developed in 1989, had Intel 80486 memory chip
Pentium developed in 1995, has Pentium (80586) memory chip
Types of Computers
There are a lot of terms used to describe computers. Most of these words imply
the size, expected use or capability of the computer. While the term computer can apply
to virtually any device that has a microprocessor in it, most people think of a computer as
a device that receives input from the user through a mouse or keyboard, processes it in
some fashion and displays the result on a screen.
PC - The personal computer (PC) defines a computer designed for general use by
a single person. While a Mac is a PC, most people relate the term with systems that run
the Windows operating system. PCs were first known as ‘Microcomputers’ because they
were complete computers but built on a smaller scale than the huge systems in use by
most businesses.
Desktop - A PC that is not designed for portability. The expectations with desktop
systems are that you will set the computer up in a permanent location. Most desktops
offer more power, storage and versatility for less cost than their portability.
Laptop - Also called notebooks, laptops are portable computers that integrate the
display, keyboard, a pointing device or trackball, processor, memory and hard drive all in
a power operated or battery-operated package slightly larger than an average hardcover
book.
Palmtop - More commonly known as Personal Digital Assistants (PDAs), z.
These computers usually do not have keyboards but rely on touch screen technology for
user input. Palmtops are typically smaller than a paperback novel, very lightweight with a
reasonable battery life. A slightly larger and heavier version of the palmtop is the
handheld computer.
Embedded - computers are found in all sorts of commonly used devices like cars,
televisions, and VCRs. These computers are embedded in other appliances to provide
them with "intelligence".
The Microcomputer
The basic components of a microcomputer are:
Input devices allow us to enter information into the computer. They include
keyboards, mouse, scanners, and microphones.
PowerPC
RISC based computer architecture is developed jointly by IBM, Apple Computer,
and Motorola Corporation. The name is derived from IBM's name for the architecture,
Performance Optimization With Enhanced RISC.
The first computers based on the PowerPC architecture were the Power Macs,
which appeared in 1994. Since then, other manufacturers, including IBM, have built PCs
based on the PowerPC.
There are already a number of different operating systems that run on PowerPC-
based computers, including the Macintosh operating system (System 7.5 and higher),
Windows NT, and OS/2.
SPARC
Short for Scalable Processor Architecture, a RISC technology developed by Sun
Microsystems. The term SPARC itself is a trademark of SPARC International, an
independent organization that licenses the term to Sun for its use. Sun's workstations
based on the SPARC include the SPARC station, SPARC server, Ultra1, Ultra2 and
SPARC cluster (which are servers and machine models from Sun Microsystems)
There are many types of computer languages, which can be categorized into
following four types.
example, machine Language and Assembly Language are two important low-level
languages. Machine Languages is the oldest and most difficult of all the languages. It is
also known as First Generation language. In machine language, all the instructions are
given to computer in binary digits, and hence are directly understood by the computer.
On the other hand, assembly language is easier than machine language, and is known as
second Generation Language. In assembly language instructions are given using
mnemonic operation codes (such as ADD, MUL etc) instead of binary digits. Low-level
languages are mainly used for development of systems software.
These languages were widely used for applications development but most of them
are now outdated due to popularization of 4th GLs. The uses of the different 3 GLs are
summarized
9
Language Uses
BASIC (Beginners All purpose Symbolic Used for all purposes (Commercial,
Instruction Code) Scientific, Educational, etc) by beginners
Language Uses
Dbase Used for development of mainly single user Dos based
database applications.
We have discussed that the object oriented programming is the latest approach in
programming. The languages, which are based on object oriented programming (OOP)
approach are called Object Oriented Languages. They may be classified into fifth
generation languages. Object oriented languages are especially useful for development of
GUI (Graphical User Interface) applications. These languages also offer a unique feature
of Revisable code. Some of the popular object oriented languages are Small Talk, C++,
Object COBOL, Object Pascal, Simulate, Eiffel, Java and Visual J++. Now a days for
development of window based applications the uses of different object oriented
languages are summarized
11
Language Uses
Small talk Used for development of mainly graphical applications.
Basic Concepts
Term Meaning
Input Data and instructions given to computer
Digital Digital describes electronic technology that generates, stores, and
processes data in terms of two states i.e. positive and non positive
Data A set of basic facts and entities which by themselves have no meaning
Processes Instance of a program running in a computer for manipulation of data
Main Concepts
In order to solve a problem using a computer, it is necessary to find and write an
algorithm for it.
12
Language Translators
Assemblers
Assemblers translate the assembly language code (source program) into machine
language code (object program). After assembling, a linker program is used to convert
the object program into an executable program. The Microsoft assembler program
(MASM) and Borland Turbo assembler program (TASM) are two popular assemblers.
Assemblers are used mainly in the development of system software.
Interpreters
Instructions of a high-level language are coded in many statements. At the time of
their execution, they are converted statement by statement into machine code, by using
system software called interpreters. For example, programs written in BASIC language
are executed by using BASICA or GWBASIC interpreters. Programs written in some
fourth generation languages, like DBASE III plus are also executed using dBASE
interpreter.
13
Compilers
As contrast to interpreters, compilers provide faster execution speed. Compilers do
not translate and execute the instructions at the same time. They translate the entire
program (source code) into machine code (object code). Using linker, the object code is
converted into executable code. Compilers are widely used in translating codes of high-
level languages (e.g. COBOL, FORTRAN, PASCAL, Turbo / Microsoft C etc) and
fourth generation languages (Dbase IV, FoxPro etc). As compared to interpreter or
assemblers, Compilers are preferred in development of application software.
1.2.2 How Computer Works
Organization of Computers
The Organization of Computers mainly constitute:
Processor system
Central Processing Unit (CPU)
Main Memory
Input / output system
Input/output devices
Secondary storage
Stored Program Design
The Central Processing Unit performs the actual processing of data. The data it
processes is obtained, via the system bus, from the main memory. Results from the CPU
are then sent back to main memory via the system bus.
I/O (input/output), pronounced "eye-oh," describes any operation, program, or
device that transfers data to or from a computer. Typical I/O devices are printers, hard
disks, keyboards, and mouse. In fact, some devices are basically input-only devices
(keyboards and mouse); others are primarily output-only devices (printers); and others
provide both input and output of data (hard disks, diskettes, writable CD-ROMs).
A universal serial bus port is the gateway to your computer. It's used to connect all kinds
of external devices, such as external hard drives, printers, mice, scanners and more. In
2003, USB 2.0 connectors were introduced on computers. These transfer data at 480
Mbps. Older USB devices work with USB 2.0 ports, but at 12 Mbps. USB 2.0 devices
also work with older USB ports, again at the lower speed. USB 2.0 is useful for adding
external hard drives like this Maxtor drive
IBM developed a PS/2 port, sometimes called a mouse port. It is used to connect a
computer mouse or keyboard. Most computers come with two PS/2 ports.
15
A modem port connects an internal modem to a telephone line. A modem (for those who
are new to the computer world) is used to connect a computer to the Internet by making a
data call to an Internet service.
For faster Internet connections and for networking, an Ethernet or network port is used.
The port is used to connect network cabling to a computer. Cable plugged into this port
can lead either to a network hub (a junction box that can wire lots of network cables
together), directly to a cable modem or DSL modem (both used for high speed Internet)
or to an Internet gateway which shares a fast Internet connection between computers.
File Name
The file name is the first part of the file, and is sometimes referred to as just the
"name." This name can be up to 255 characters in Windows 95, 98, or 2000, as opposed
to 8 characters in Windows 3.x and DOS.
The computer user sets this name. It should be descriptive of what the particular
file or document consists. For example, if the document is a Birthday Card for Kumar's
9th birthday, set the file name equal to "Kumar’s 9th Birthday Card". The second part of
the file is the extension.
Document
A document is a file that contains information that the user (you) can view or
hear. It is most often a word processed letter, a picture, a sound byte, or something
similar. Documents are usually created and edited using programs such as Microsoft
Word, or Adobe Photoshop.
16
Extension
The extension is the second part of the name of the file. It is often three characters
long, but can be longer. The extension tells the computer which program, or application,
to associate the file with.
For example, if a document is created in Microsoft Word, the computer
automatically assigns that file the extension "doc". That code tells the computer that it is
an MS Word document, and should be opened using Word.
On viewing Windows Explorer, the screen is seen as broken into two halves. One
side contains the folders, or directory tree. The other side shows the files and folders
inside the folder selected. This will be explained in more detail later. The view above is
of the left half. It shows a few of the drives on the computer. The disk drive is usually
labeled the "A drive" (A:). The hard drive is usually labeled the "C drive" (C:). CD Rom
drives can be any number of other letters such as D, E, F, G, H, etc. "C Drive" here is
labeled "Jerel" above, the labels can be changed to anything that user want it.
Notice how both the A: and the C: are located under "My Computer". That makes
sense it, because both of the drives are in the computer.
Recall the diagram on the last page...
Just as the two drives are in "My Computer", the C: drive has folders in it as well.
The folders "~mssetup.t", "Acrobat3", "All Documents", etc. are all contained within C:.
This is where the analogy of a filing cabinet fits in. The Cabinet(My Computer), consist
of Drawers (C: and A:). Inside the drawers are folders (Acrobat3, All Documents), and
inside the folders may be sub-folders or the papers themselves (files).
Notice the plus (+) signs by certain folders in the diagram above. Those indicate
the folder has other sub-folders contained within. Click on the plus sign, and the tree will
expand further.
18
When the plus sign to the left of the "Acrobat3" folder is clicked, it shows a sub-
folder named "Reader". "Reader" also has its own sub-folders, as the plus sign to the left
of it shows. Windows Explorer shows the sub-folders of "Acrobat3" and the files within
on the right side. Readme.txt is the only file contained in the "Acrobat3" folder.
Managing Files and Directories
Nearly everyone gets into difficulty sometime in managing files and directories.
Here are the two principles you need to know to securely store and find your files:
Principle #1: Put personal files and program files in separate directories.
There are two main classes of file on a computer --
One class is program files. Program files are files that can be recovered from a
CD or set of disks or download from the Web. This class of files isn't very important to
back up, because if Windows crashes severely or users upgrade to a new operating
system, they will have to re-install all the programs completely. Also, users don't own
program files, and haven't invested hours of effort in them. There are plenty of ways to
get another copy of a program.
The other class of files is personal data files. Users create these files. They may
represent weeks of work, they are unique, and if users lose them they are gone forever.
And, if an average computer user, may have one backup or no backups of these files.
Because these classes of files are treated differently, one being immediately
replaceable, the other representing much personal effort, they should not be mixed
together. Here is an example to effectively manage files and directories:
Create two main directories: code & data, code for programs, data for data:
Create subdirectories under these main directories for each program and task:
Find all the files and move them into these two categories. This means always
putting new data files into a subdirectory of the data directory, and it also means
installing new programs under the program directory. With the single exception of the
Windows system directory, nearly all files and folders can be placed into one of these two
main categories. This principle may require users to adopt new habits. For example, on
pressing "Save," users should know where the file is being saved? They should know –
and must make a conscious decision to place files of a particular kind in a particular
place.
19
When a new program is acquired, the program should not be installed in the
system's root directory. This principle has several important benefits. One, when user
backs up the files, all the files worth backing up are under the data directory -- this saves
time locating files for backing up. Two, subdirectories can be created instead of putting
all the files in a gigantic pile, the computer will find files more easily and run faster.
Three, user will always know what folder (directory) a particular kind of file is in.
Microsoft Windows has a folder called "Program Files," and newer programs
automatically install themselves under this directory. Windows has also a folder called
"My Documents" that is the equivalent of the "data" directory in this example. But there
is one problem with this arrangement -- the folder name has spaces in it, which makes it
difficult for Web-aware software to work with it.
To put the files on the Web, avoid spaces in the names of the files or directories,
and avoid using uppercase characters. Use all uppercase or use all lowercase, but don't
mix uppercase and lowercase. Lowercase is generally preferred.
The reason for this is Windows doesn't care about the case of file names, and also
doesn't care if there are spaces in directory and file names, but many Web server
computers care about both. Many of the Web server computers are running UNIX, and
under UNIX, a file name like "this is my page.html" is simply not acceptable. To make
this file acceptable to UNIX, the file name should be read as "this_is_my_page.html."
If there is a file named BIGtree.GIF, and a tag is created that refers to it -- <IMG
SRC="bigtree.gif"> -- the tag will work perfectly under Windows, but UNIX cares about
the case of file names, so when this page is uploaded onto the Web, user won't see the
graphic any more. Directories thus should be arranged in a logical way.
same name as the magnum opus. Users should not only back up regularly, but should also
review the contents of the files regularly to be sure they are what they appear to be.
As drives get larger, the probability that one will successfully write and then read
all those diskettes becomes smaller and smaller. Get a tape drive or a removable-media
hard drive as a backup device.
1.2.4 Central Processing Unit and the System Unit
The CPU resides inside a box known as the system unit, along with various
support devices and tools for storing information. The CPU has two main components,
namely: Control Unit and Arithmetic Logical Unit
The Control Unit
The Control Unit controls the fetching of instructions from the main memory and
the subsequent execution of these instructions. Among other tasks carried out are the
control of input and output devices and the passing of data to the Arithmetic/Logical Unit
for computation.
Some functions of control unit are:
The control unit directs the entire computer system to carry out stored
program instructions. The control unit uses the instruction contained in the
Instruction Register to decide which circuits need to be activated.
The control unit co-ordinates the activities of the other two units as well as
Fetch the
Instruction
Execute Decode
the the
Instruction Instruction
2. The control unit decides what the instruction means and directs the necessary
data to be moved from the memory to the arithmetic logic unit.
3. The Arithmetic Logical Unit performs the actual operation on the data.
The first two instructions together are called the instruction time. The last two
instructions together are called the execution time. The combination of these two is called
a machine cycle.
least one clock cycle. An Address, or a number that stands for a location in the computer
memory identifies the location in memory for each instruction and each piece of data.
The CPU finds the instructions and data by this Address. Each type of CPU is designed to
understand a specific group of instruction called the instruction set.
Communication between units
Communication between the units is achieved through conductor parallel lines,
called buses. A system board’s bus is an electronic pathway between various computer
components. Buses are etched onto the printed circuit board and connected to pins on the
sides of the chips.
There are two types of buses: system bus and local bus.
The system bus of a microcomputer connects all components of the computer
system. It consists of from 50 to 100 parallel wires. Each line is assigned a certain
function. According to the function assigned the line is called control bus, address bus or
data bus.
Control bus carries control signals. For example, when a user clicks on a Print
button to print a document, the CPU sends a control signal to the printer. When the
printer is ready to print, it sends a responding control signal for the CPU to pass data to
the printer.
Address bus carries the address of the required location, for example, port
number when the CPU sends a signal to the peripheral device, or memory address when
the CPU writes data to RAM.
Data bus carries data from one component to another, e.g. from keyboard to
RAM. The greater the width of the data bus (in bits), faster the performance of the
computer. The width of the bus must be matched to the CPU. But some CPUs have wide
main bus inside the chip and another narrow one for connecting to the bus on the
motherboard (e.g. 386SX). These CPUs are cheaper at the expense of performance. The
width of the bus is most important in relation to the expansion slots.
There are several bus technologies that have been developed over years.
Local buses were introduced for the CPUs from 80386 onwards. Any bus that runs a
direct path between a peripheral device and the processor is called a local bus. Local bus
was developed to handle high-speed video accelerator cards, but other types of cards such
24
as networking cards or disk controllers can use it too. Cards installed on a local bus can
communicate with the processor at the CPU's full speed. Some devices can't use a local
bus because they are slow and therefore require a slower bus (e.g. modem).
Two most popular local bus technologies are VESA and PCI.
Digital Computer: is a finite, discrete device that stores and manipulates a Boolean state
map.
Digital computers are also called discrete processors because they compute over discrete
sets of numbers. Because the size of a digital computer memory is finite, digital
computers are sometimes called finite discrete processors.
Digital computers are comprised of hardware (equipment) and software
Computer hardware consists of the following electronic or electro-mechanical devices:
Memory -- a collection of registers and storage devices that store the computer's state
map.
Central Processing Unit (CPU) -- the "brains" of the computer, which does the work of
changing the state map stored in memory.
Input/Output (I/O) Processor -- manages and performs the work associated with reading
(or writing) information that is added to (subtracted or copied from) portions of the
computer's state map.
Peripherals -- include (a) input devices such as a keyboard, mouse or scanner, (b) output
devices such as display device (e.g., the monitor), printers and plotters and (c) devices
that store ancillary software and data
The following schematic illustration fig1.8 depicts a typical arrangement of hardware in a
personal computer or basic workstation with a sequential processor.
Such an arrangement is frequently called a von Neumann architecture (VNA), so
named for John Von Neumann, who helped develop this method of connecting computer
components. The VNA comprises over 95 percent of computer processors currently in
use.
25
A computer is usually running on an operating system for all its internal activities
including I/O of all types. Computers can be set up, using the operating system to start
applications immediately after the switch-on instead of giving the user an option of
choosing the application. An operating system is a program that acts as an intermediary
between a user of a computer and the computer hardware. The primary goal of the
operating system is to make the computer system convenient to use.
The operating system can be classified into two categories: single tasking
and multi-tasking. A single tasking system, for example a microcomputer, allows only
one task to run at a time whereas a multi-tasking OS is one that is capable of running
several tasks simultaneously. Many OS’s (single and multi-tasking) are designed to
service a network of computers.
Some internal commands that are commonly included in an OS are:
DIR - To list all the directories and files in the current directory
CLS – To clear the screen
REN – To rename a file
COPY – To copy a file from one path to another
26
Compilation Management: This include tasks that constitute portions of the software
development process, such as,
Editing programs developed by system users
Program translation into low-level machine code
Linking user programs with various libraries to achieve versatility.
File Organization:
In DOS, the disk can be divided into separate directories or hierarchies. Each disk
has a main root and a number of subdirectories. Each subdirectory can have a number of
subdirectories under them and thus a hierarchy can be created.
Application Software -- programs that users run to accomplish various home, business,
and scientific tasks such as word processing (e.g., Word Perfect or Microsoft Word),
spreadsheets (e.g., Quattro or Excel), drawing or sketching (e.g., AutoCAD or Corel-
Draw), and graphics (e.g., Adobe Photoshop).
27
Operating System – Operating System is the platform on which the entire applications
reside. It interfaces application software with libraries and (in very few cases) microcode
in a convenient manner that is transparent to (i.e., unseen by) the user.
Fig 1.9 Organization of computer software for compilation and applications software
execution.
The personal computer (PC) defines a computer designed for general use by a single
person
palmtops are tightly integrated computers that often use flash memory instead of a hard
drive for storage
The CPU has two main components, namely: Control Unit and Arithmetic Logical Unit
1.5) Summary
Compilers do not translate and execute the instructions at the same time. They
translate the entire program (source code) into machine code (object code).
The Central Processing Unit performs the actual processing of data. The data it
processes is obtained, via the system bus, from the main memory. Results from
the CPU are then sent back to main memory via the system bus.
The CPU resides inside a box known as the system unit, along with various
support devices and tools for storing information. The CPU has two main
components, namely: Control Unit and Arithmetic Logical Unit
1.11) Keywords
ENIAC - Electronic Numerical Integrator and Calculator
EDSAC - Electronic Delay Storage Automatic Calculator
EDVAC - Electronic Discrete Variable Automatic Computer
IC – Integrated Circuits.
ROM – Read Only Memory
RAM – Random Access Memory or Read/write memory
VLSI – Very Large Scale Integration.
ULSI – Ultra Large Scale Integration
SPARC - Scalable Processor Architecture
RISC – Reduced Instruction Set Computer
CISC – Complex Instruction Set Computer
BASIC - Beginners All purpose Symbolic Instruction Code
COBOL - COmmon Business Oriented Language
FORTRAN - FORmula TRANslator
CPU – Central Processing Unit
DOS – Disk Operating System
UI – User Interface
31
Unit II
2.0) Introduction
Peripheral devices are devices connected to the computer but external in relation
to the processing unit. If a peripheral device is disconnected, the computer will still be
able to work; only functions performed by this peripheral device will not be available.
For example, if you disconnect a keyboard, you would not be able to type in information
but you will be able work with the graphical user interface by clicking the mouse. If you
remove the hard disk, you will have to start up your computer using floppy disk and you
will have to save your data on floppy disks only but the computer will still be working.
2.1)Objective
At the end of this unit student should have knowledge about the following topics:
Peripheral Devices
Mouse & Keyboard Basics
Other Input Devices
Discussing
Output Devices
Printers
2.2) Content
Peripheral devices can reside inside the computer case or outside. For example, a mouse,
a keyboard, a monitor is always outside the case and they are connected to the computer
via ports, which are situated on the back of the case. Disk drives are positioned inside the
case and they are connected to the motherboard via disk controller cards, which are
inserted in the expansion slots on the motherboard.
Hardware Devices
Output Devices
Processor
Memory
Storage Devices
Input Devices
Input devices are used to input data, information and instructions into the RAM.
We may classify these devices into the following two broad categories.
(i) Basic Input Devices
(ii) Special Input Devices
The Structure and function of the common input devices of these two categories
are discussed in detail.
a) Keyboard
Keyboard is the main input device of a computer. It contains 3 types of keys-
alphanumeric keys, special keys and function keys. Alphanumeric keys are used to type
all alphabets, numbers and special symbols. Special keys such as <Shift>, <Ctrl>, <Alt>,
etc are used for special functions. Function keys such as <F1>, <F2>, <F3> etc. used to
give special commands depending upon the software used.
b) Mouse
Mouse is another important input device. It is a pointing device used to move
cursor, draw sketches/diagrams, selecting a text/object/menu item etc. on monitor screen
while working on windows. Mouse is a small, palm size box containing 3 buttons and a
33
ball underneath which senses the movement of the mouse and sends corresponding
signals to CPU on pressing the buttons.
a) Trackball
A trackball works like a mouse, as the roller is on the top with selection buttons
on the side. It is also a pointing device used to move the cursor and works like a mouse.
For moving the cursor in a particular direction, the user spins the ball in that direction. It
is sometimes considered better than mouse because it requires little movement and less
desktop space.
b) Light Pen
Light Pen (similar to a pen) is a pointing device, which is used to select a
displayed menu item or draw pictures on the monitor screen. It consists of a photocell and
an optical system placed in a small tube. When its tip is moved over the monitor screen
and pen button is pressed, its photocell-sensing element detects the screen location and
sends the corresponding signal to the CPU.
c) Joystick
Joystick is also a pointing device, which is used to move cursor position on a
monitor screen. Joystick is a stick having a spherical ball both at its lower and upper
ends. The joystick can be moved in all four directions. The function of joystick is similar
to that of a mouse. It is mainly used in Computer Aided Design (CAD) and computer
games.
d) Scanner
Scanner is widely used on DTP applications. It is used for digitizing images such
as photographs, forms, documents etc. into computer memory. Some scanners can also
read text by converting them to digital code. The scanners are very useful for converting
34
the typed pages into word processing files. Graphic scanners convert a printed image into
video image without converting into digital code.
f) Voice-Input Devices
Voice-Input devices are the latest input devices that can recognize the human
voice. They are very useful but are not popular due to storage of limited vocabularies and
variations in the way of pronouncing words by different persons
Visual Display Unit (VDU) commonly called monitor is the main output device
of a computer. It consists of a Cathode Ray Tube (CRT), which displays characters as an
output. It forms images from tiny dots called pixels that are arranged in a rectangular
form. The sharpness of the image (screen resolution) depends upon the number of pixels.
Some common types of monitors are CGA (Color Graphics Adapter), VGA (Video
Graphics Adapter), MDA (Monochrome Display Adapter).
b) Printer
Printer is the most important output device, which is used to print information on
paper. Printers are essential for getting output of any computer-based application
35
Types of Printers
There are many types of printers that are classified on various criteria as below
These printers print one character at a time. These printers are again of two types -
Daisy Wheel and Dot Matrix Printers.
These printers print the characters by a mechanism that uses a plastic or metal hub
with spokes called daisy wheel. The characters are embossed on the radiating spokes and
printed by striking these spokes against the ribbon and paper.
These Printers Print one line at a time. Their printing speed is much more than
character printers. They are again of two types - Drum Printer and chain Printers
Drum Printers
These printers print the line by a rotating drum having a lief of characters for
each print position. The hammers strike each character of the drum simultaneously so that
entire line is printed for one full rotation of the drum. These printers are also called Band
Printers
Chain Printers
These printers print the line by a rotating chain having ring characters for each
print position. Their printing mechanism is similar to drum printers. The printouts
obtained from these printers, have uneven character spacing but even line height
b) Non-Impact Printers
The printers that print the character without striking against the ribbon and onto
the paper are called non-impact printers. These printers print a complete page at a time
and therefore also called Page Printers.
Page Printers are of three types –
a) Laser Printers
b) Inkjet Printers and
c) Thermal Printers
a) Laser Printers
These printers look and work like photocopiers. They are based on laser
technology, which is the latest development on high speed and high quality printing. In
these printers, a laser beam is used to write the image on a paper. First, the image is
formed by electrically changing thousands of dots on a paper by laser beam. Then, the
37
paper is sprayed with a laser having the opposite charge and is passed over a heated roller
to make the image permanent.
b) Ink Jet Printer
These printers print the characters by spraying the paper with electrically charged
ink. These printers give better quality than character printers but not better than laser
printers. They are cheaper than laser printers, hence used widely in many offices. They
also offer an option of using color cartridges for multi color printing.
c) Thermal Printers
These printers print the characters by melting a wax-based ink off a ribbon on to a
special heat sensitive paper. They give letter quality printing but are relatively expensive
in maintenance than other printers.
2.5) Summary
Peripheral devices are devices connected to the computer but external in relation
to the processing unit. If a peripheral device is disconnected, the computer will
still be able to work; only functions performed by this peripheral device will not
be available.
38
2.8) Assignment
1.Discuss about the various input devices.
2.11) Keywords
Unit III
3.0) Introduction
Memory unit is that component of a computer system, which is used to store the
data, instructions and information before, during and after processing by ALU. It is
actually a work area (physically a collection of integrated circuits) within the computer,
where the CPU stores the data and instructions. It is also known as a
Main/Primary/Internal Memory.
3.1) Objective
At the end of this unit student should have knowledge about the following topics
Types of Memory
Data Storage
Floppy Disks
Hard Disks
Other Storage Devices
3.2) Content
Types of ROM
There are many types of ROM available for microcomputers like Mask ROM, PROM,
EPROM, EEPROM and EAPROM.
i.Mask ROM: Mask ROM is the basic ROM chip. In this type of ROM,
the information is stored at the time of its manufacturing.
Types of RAM:
There are two types of RAM used in PCs - Dynamic and Static RAM.
42
In this device, the medium used to record the data is called as floppy disk. It is a flexible
circular disk of diameter 3.5 inches made of plastic coated with a magnetic material. This
is housed in a square plastic jacket. Each floppy disk can store approximately on million
characters. Data recorded on a floppy disk is read and stored in a computer's memory by
a device called a floppy disk is read and stored in a computer's memory by a device
called a floppy disk drive (FDD). A floppy disk is inserted in a slot of the FDD. The disk
is rotated normally at 300 revolutions per minute. A reading head is positioned touching a
track. A voltage is induced in a coil wound on the head when a magnetized spot moves
below the head. The polarity of the induced voltage when a 0 is read. The voltage sensed
43
by the head coil is amplified, converted to an appropriate signal and stored in computer's
memory.
Floppy Disks come with various capacities as mentioned below.
Compact Disk (CD) is the latest storage device, used to store data, information
and software, which can only be read and not changed or erased. It is an optical read only
memory made up of a resin. Therefore it is actually called Compact Disk Read Only
Memory (CD-ROM).CD-ROM (Compact Disk Read Only Memory) used a laser beam
to record and read data along spiral tracks on a 51/4 disk. A disk can store around 650 MB
of information. CD-ROMs are normally used to store massive text data. (Such as
encyclopedias) which is permanently recorded and read many times. Recently CD writers
have come in the market. Using a CD writer, lot of information can be written on CD-
ROM and stored for future reference.
written again. Magnetic tape is a sequential access storage device; hence it is not possible
to read the data randomly or directly. Therefore, magnetic tapes are suitable only for
storing data for backups and batch-made applications and not for on-line applications.
b) Video Disk
Video Disk is used to store text, video and audio data. It is widely used for
training applications as if can be played like a phonograph record.
DVD ROM and DVD RAM disks are optical disks having a storage capacity of
47 GB and 5.2 GB respectively. These disks are becoming the next generation's new
standard for higher capacity removable media. They are ideal for storage of huge amount
of information required for multimedia applications.
Compact Disk (CD) is the latest storage device, used to store data, information and
software, which can only be read and not changed or erased
DVD ROM and DVD RAM disks are optical disks having a storage capacity of 47 GB
and 5.2 GB respectively
3.5) Summary
Memory unit is that component of a computer system, which is used to store the
data, instructions and information before, during and after processing by ALU.
Read Only Memory is an essential component of the memory unit. The computer
has no intelligence or memory and requires instructions, which are given by man.
Whenever the computer is switched on, it searches for the required instructions.
The memory, which has these essential instructions, is known as Read Only
Memory (ROM).
RAM is temporary and is erased when the computer is switched off. RAM is a
read/write type of memory and thus can be read and written by the
user/programmer.
Complementary Metal Oxide Semiconductor (CMOS) Memory is used to store
the system configuration, date, time and other important data.
There are many storage devices, which are used with microcomputers. Some of
the common storage devices are floppy disk, compact disk, hard disk etc.,
3.8) Assignments
1.Discuss about the secondary storage devices.
47
3.11) Keywords
SRAM – Static RAM
DRAM – Dynamic RAM
CMOS – Complementary Metal Oxide SemiConductor
PROM – Programmable Read Only Memory
EPROM – Erasable Programmable Read Only Memory
EAPROM – Erasable Alterable PROM
48
UNIT IV
4.0) Introduction
4.1) Objective
At the end of this unit student should have knowledge about the following topics:
Operating Systems
Single user system
Multi user system
Network operating system
Working with Applications
Windows Accessories
Working with Internet Explorer
Shutting Down Windows Siblings
4.2) Content
1. Command Interpreter
2. Memory Manager
3. Process Manager
4. Peripherals Manager
Computer Disk Operating System) are the two important single user operating systems.
Both systems are almost identical and are simply called DOS. OS/2 and Windows NT are
other popular single-user multi-tasking operating systems for microcomputers.
Multitasking is the ability to execute more than one task at the same time, a task
being a program. The terms multitasking and multiprocessing are often used
interchangeably, although multiprocessing sometimes implies that more than one CPU is
involved. In multitasking, only one CPU is involved, but it switches from one program to
another so quickly that it gives the appearance of executing all of the programs at the
same time.
There are two basic types of multitasking: pre-emptive and co-operative. In pre-
emptive multitasking, the operating system allocates CPU time slices to each program. In
co-operative multitasking, each program can control the CPU for as long as it needs it. If
a program is not using the CPU, however, it can allow another program to use it
temporarily. OS/2, Windows 95, Windows NT, and UNIX use pre-emptive multitasking,
whereas Microsoft Windows 3.x and the MultiFinder (for Macintosh computers) use co-
operative multitasking.
Windows is the most popular system software that provides graphical user
interface. Windows provides an interface, which is similar to Macintosh user interface. In
such interface, each active application is displayed in windows on the screen. The
application window can be opened, hidden, closed, moved, resized, minimized or
maximized. The user can run several applications simultaneously, each in its own
window. Windows allow the user to share data among different applications. Windows
provides an interactive environment, where the user is engaged in continuous dialog with
the computer. In windows, although both keyboard and mouse are used as input device,
the mouse is the primary tool for selecting and running window applications.
The different versions of windows are Windows 1.x, Windows 2-x, Windows 3.0,
Windows 3.1, Windows 3.11, and Windows for Workgroups 3.11, Windows 95,
Windows 98 and Windows NT. Windows 1.x, 2.x and 3.0 were the earlier attempts from
Microsoft Inc. for creating graphical user interface but were not very successful.
Windows 3.1 and higher versions provide powerful and multi featured GUI capabilities.
Windows NT may appear the same as Windows 3.1, but it is based on entirely a different
concept.
run several programs at one. Windows 3.11 is the successor of Win 3.1 with a trivial
difference.
b) Windows 95
iv. Plug and Play: Windows 95 automatic does the hardware configuration
process, by knowing the kind of printers, mouse and other peripherals. This
feature is known as 'Plug and Play'.
v. OLE (Object Linking and Embedding): OLE is the key technology for
Windows 95. It is the Microsoft's standard for creating compound
documents (compound document is a document made from different
programs) in windows.
53
c) Windows NT
iii. Reliability: Reliability is the ability to handle error conditions, including the
ability of the operating system to protect itself and its users from defective or
54
LINUX is quote possibly the most important free software achievement since the
original space war, or more recently, emacs. It has developed into an OS for business
education and personal productivity. Linux is no longer meant only for UNIX wizards
who sit for hours in front of a glowing console. Linux is a Unix operating system clone
that runs on a variety of platforms especially personal computers with Intel 80386 or
better processor. It supports a wide range of software, from Tex, to the X window system,
to the GNU C/C++ compiler, to TCP/IP. It is a versatile bona fide implementation of
Unix, freely distributed under the terms of GNU General Public License.
What makes Linux so different is that it is a free implementation of Unix. It was
and still is developed cooperatively by a group of volunteers, primarily on the Internet
who exchange code, report bugs and fix problems in an open-ended environment.
55
Functionality
Like a calculator you keep in a desk drawer, the Windows Calculator is small but saves
you time by performing all the calculations common to a standard calculator. The
Windows Calculator, however, has added advantages: You can keep this calculator
onscreen alongside other applications, and you can copy numbers between the Calculator
and other applications.
To use the Calculator with the mouse, just click the appropriate numbers and sign keys,
like you would press buttons on a desk calculator. Numbers appear in the display window
as you select them, and the results appear after the calculations are performed.
To enter numbers from the keyboard, use either the numbers across the top of the
keyboard or those on the numeric keypad (you must first press the NumLock key if the
NumLock feature is not enabled). To calculate, press the keys on the keyboard that
matches the Calculator keys. Table 14.2 shows the Calculator keys for the keyboard.
57
/ Divide /
* Multiply *
- Subtract -
+ Add +
% Percent %
C Clear Esc
= Equals = or Enter
Using HyperTerminal
Makes the focal point of your activities the connections you create (documents),
which allows you to dial or configure a connection without loading
HyperTerminal first.
Fully integrates with TAPI and the centralized modem configuration, which
provides Windows 98 applications, a single interface to your modem for dialing,
answering, configuration, and more.
HyperTerminal is a communications tool with many uses. The following list describes
many tasks you can perform with HyperTerminal:
59
Connect to an Internet service provider using a shell account and even access the
World Wide Web using Lynx.
Phone Dialer is a handy accessory built into Windows 98 that remembers up to eight
phone numbers and that you can use as a speed dialer. Although this may seem a bit
redundant if you already have a speed dialer built into your existing phone, this one is
very easy to program and change, and it can do the more intricate dialing needed to
navigate voice-mail systems and make credit card calls. It can even keep a log of your
outgoing and incoming calls. To access the Phone Dialer, open the Start menu and choose
Programs, Accessories, Phone Dialer
When you first start Phone Dialer, it doesn't have any speed dial entries set. Your first
task is to add names and phone numbers to the eight blank dial memories. Choose any
60
blank entry and enter the name and number you would like to save .You can choose a
button by clicking it or by pressing Alt+ the number that appears next to the button.
The Phone Dialer comes with a log in which it keeps a record of your outgoing and
incoming calls. Each time you connect a phone call, an entry is placed in this text file.
You can cut, copy, and delete from this log using the Edit menu commands, and you can
redial an entry in your Log by double-clicking it or by selecting Log, Dial.
Playing Games
Windows 98 includes four games for your diversionary pleasure: FreeCell, Hearts,
Minesweeper, and the classic Solitaire. To start a game, open the Start Menu and choose
61
Programs, Accessories, Games. Then select the game you want to play from the Games
submenu.
If you don't see any games, they weren't installed when you installed Windows.
See "Adding Windows Accessories" to find out how to add the games using your
Windows 98 installation CD-ROM or disks.
After you open a game, use the Help topics to learn about the objective and rules
of the games and to get some tips on strategy. If you are connected to a network, check
out Hearts, which you can play with other players who are connected to your network.
Graphical Browsers
Graphical browsers display pictures, play sounds and show animations. They are
multimedia presentation tools. Multimedia features place high demands on data
transmission and storage hardware. It takes a lot of transmission time as well as disk
space to utilize video and high fidelity sound. Internet Explorer is also a Graphical
Browser.
Click on File/Open at the top left of the screen. A pop-up window will appear
with a text entry window. Within that window, type the URL of the file you wish
to retrieve. Press the Enter key.
Note: The color blue is generally the default color for text that contains a link, and purple
is the default color for text representing a link that has been visited in the recent past.
Nowadays, Web page creators are coloring their links in all sorts of ways. The best way
to figure out which text represents a link is to position your mouse over the words and see
if the pointer shape changes from an arrow to a hand. The hand represents a link.
Click on the small Back left arrow on the navigation bar near the top left corner of your
screen. Each time you click on this arrow, you will return to the next previous site that
you visited. If you hold your mouse over the Back arrow, the title of the upcoming page
will briefly appear.
To move forward:
To move farther ahead; click on the small black triangle to the right of the Forward arrow
in the menu bar at the top of the screen. This presents a list of several sites you have
63
visited. Click on any of the choices to return to the desired site. This is the equivalent of
clicking on the Forward arrow several times.
Stop: The circle containing the X will stop a page while it is in the process of loading.
This is useful if a page is not successfully or speedily retrieving.
Refresh: the Square containing the two curved arrows re-retrieves the page you are
currently viewing. This is useful if the page does not load successfully or completely.
Home: The home icon takes you back to the page that was on the screen when you first
started IE 6. You can customize your selection. See below under "Customizing Internet
Explorer."
Search: The search button opens up a function that uses one or more Web search tools.
You can choose the search tool(s) you want as your default.
Favorites: Favorites are Web sites you have visited that you would like to store for easy
access. You can add, delete and organize your Favorites To add the current Web page as
a favorite, click on Favorites and then Add. To choose the folder where you want to store
this listing, click on Create in and choose the folder you want. At this point, you also
have the option to create a new folder.
To delete a Favorite, simply right click on the item and choose Delete. Or, you
can choose Organize Favorites select the desired item, and click on the Delete button.
History: The history function allows you to view and select Web pages you have recently
visited. You can sort your items by clicking on the black triangle to the right of the word
64
View. You can sort by size, date, the number of times visited, and the order you have
visited today.
Mail: You can read email from this window. Choose the email software you wish to use
by going back to the Menu Bar and choosing Tools/Internet Options/Programs.
Print: Allows you to print the current page. This option will be explained in more detail
below under Printing
Edit: You may edit the current page in the HTML editor of your choice. Choose the
editor by going back to the Menu Bar and choosing Tools/Internet Options/Programs.
Multi-User Operating Systems refers to a computer system that supports two or more
simultaneous users
LINUX is quote possibly the most important free software achievement since the original
space war, or more recently, emacs.
4.5) Summary
2.What is Multithreading?
4.8) Assignments
1.Discuss about the Operating System and its functions.
4.11) Keywords
NOS – Network Operating System
OLE – Object Linking and Embedding
LAN – Local Area Network
NTFS – NT File System
TCP/IP – Transmission Control Protocol/Internet Protocol
RTOS –Real Time Operating System
URL – Uniform Resource Locator
67
Unit V
5.0) Introduction
5.1) Objective
At the end of this unit student should have knowledge about the following topics:
Network Basics
LAN
MAN
WAN
5.2) Content
5.2.1 The Uses of Computer Network
1. Resource Sharing:
Resource sharing is the primary goal, which makes all programs, data and
equipment available to everyone on the network regardless of the physical location of
the resource and the users. A network of computers can provide a powerful
communication medium among widely separated people.
2. High Reliability:
High reliability can be achieved by having alternative sources of supply. Since all
information can be replicated on more than one machine, if one of them is
unavailable due to a failure, the other copies could be used. The presence of multiple
CPUs means that if one goes down, the others may be able to take over its work,
although at reduced performance. The ability to continue to work even during a
hardware failure is of great importance.
68
3. Economical:
Another goal is saving money. Small computers have a much better price and
performance ratio than large ones. A network of small powerful personal computers
can achieve almost the same performance as that of larger mainframes.
4. Communication Medium:
3. Communication Medium:
MAN
A group of LANs with high-speed, seamless interconnection within a
'metropolitan' area. The latter is not necessarily a city; it normally means any area, which
is spread out but in some sense a single entity: for instance, two company buildings on
Opposite sides of the road or on a large site
70
WAN
WANs are networks that span the distance between buildings, cities and even
countries. WANs are LANs connected together using wide area network services from
telecommunications carriers and typically use technologies such as standard phone lines
(called POTS (Plain Old Telephone Service) or PSTN (Public Switched Telephone
Network)), ISDN (Integrated Services Digital Network), Frame Relay, ATM
(Asynchronous Transfer Mode) or other high speed services
1. Modern organizations today are widely dispersed, with offices located in diverse
parts of a country and the world. Many of the computers and terminals at the sites
need to exchange information and data. A network provides the means to
exchange data and to make programs and data available to all the people of the
enterprise.
2. The networking of computers permits the sharing of resources. Such load sharing
permits a better, more even utilization of resources.
3. Networking also supports the critical function of backup.
4. The use of networking allows a very flexible working environment. Employees
can work at home by using terminals tied through networks to the computer at the
office.
In any network there exists a collection of machines intended for running user or
application programs. These machines are called host or end system. The hosts are
connected by the communication subnet. The job of the subnet is to carry messages from
host to host. The subnet consists of two distinct components: transmission lines and
switching elements. Transmission lines move bits between machines. The switching
elements are specialized computers used to connect two or more transmission lines.
71
When data arrive on an incoming line, the switching element will choose one of them and
place it on the output line, called IMPs (Interface Message Processors).
1. Point-to-Point Channel:
When a message called packet is sent from one IMP to another, the packet is received
at every intermediate IMP, stored there until the required output line is free and then
forwarded towards the destination. Here the network contains numerous cables or leased
telephone lines each connecting a pair of IMPs. This principle is also called store-and
forward or packet-switched subnet. Almost all wide area networks use this kind of
subnets. When point-to-point subnet is used, the design of IMP interconnection topology
is important. The following figure shows the several topologies available.
Fig 5.2 Some possible topologies for a Point-to-point Subnet (a) Star (b) Ring (c) Tree
(d) Complete (e) Intersecting Rings (f) Irregular
Local area networks have a symmetric topology, whereas wide area network have
irregular topologies.
72
2. Broadcast Channel:
Most local area networks and a small number of wide area networks are of this type.
In a local area network, the IMP is reduced to a single chip embedded inside the host, so
there is always one host per IMP, whereas in a wide area network there may be many
hosts per IMP. Broadcast systems have a single communication channel that is shared by
all the machines on the network. Packets sent by any machine are received by all the
others. An address field within the packet specifies for whom it is intended. Upon
receiving a packet, a machine checks the address field. If the packet is intended for some
other machine, it is just ignored.
Broadcast systems generally also allow the possibility of addressing a packet to all
destinations by using a special code in the address field. When a packet with this code is
transmitted, it is received and processed by every machine on the network. Some
broadcast systems also support transmission to a subset of the machines, known as
multicasting.
In a bus or cable network, at any instant one machine is master and is allowed to
transmit. All other machines should not send the messages. An arbitration mechanism is
needed to resolve conflicts when two or more machines want to transmit simultaneously.
This mechanism may be centralized or decentralized.
A second possibility is a satellite or ground radio system. Each IMP has an antenna
through which they can send and receive. All IMPs can hear the output from the satellite,
73
and in some cases they can also hear the upwards transmissions of their fellow IMPs to
the satellite as well.
A third broadcast system is ring in which each bit propagates around on its own, not
waiting for the rest of the packet to which it belongs. Typically, each bit circumnavigates
the entire ring in the time it takes to transmit a few bits, often even before the complete
packet has been transmitted.
Broadcast subnets can be further divided into static and dynamic, depending on how
the channel is allocated. A typical static allocation would be to divide uptime into
discrete intervals, and run a round robin, allowing each Mac machine to broadcast only
when its time slot comes up. Static allocation wastes channel capacity when a machine
has nothing to say during its allocated slot.
The network designer has three major goals when establishing the topology of a network:
2. Route the traffic across the least-cost path within the network between the sending
and receiving host (although the least-cost route may not be chosen if other
factors, such as reliability, are more important).
3. Give the end user the best possible response time and throughput.
Hierarchical Topology
The Hierarchical topology is also called a tree topology or a tree network. It is one of
the common networks found today.
The host at the highest order of the hierarchy is in control of the network. The
host at the root initiates traffic flows among and between the hosts. A distributed aspect
can be implemented by providing methods for the sub-ordinate hosts to directly control
the hosts below them in the hierarchy. This reduces the workload of the central host at the
root.
Advantage:
2. Since sub-ordinate hosts can be added easily to the network, complex networks
can be evolved.
Disadvantage:
1. As the host at root controls all traffic between and among the host, it presents
reliability problems.
2. If the upper-most machine fails, the network capabilities are lost completely, if the
others are not backed up.
Advantage:
Disadvantage:
1. Only one-communication channel exists to service all the devices on the network.
2. The entire network is lost, in the event of communication channel failure.
76
Star Topology
Advantage:
Disadvantage:
The system crucially depends on the central node. If the host computer fails, the
entire network fails.
77
Ring Topology
The Ring topology is so named because of the circular aspect of the data flow. In
most instances, data flows in one direction only, with one single station receiving the
signal and relaying it to the next station on the ring. The logic to implement a ring
network is relatively simple. Each component is tasked with a straightforward job of
accepting the data, sending it to the host, attached to it, or sending it out on the ring to the
next intermediate component.
Advantage:
The ring network works well where there is no central-site computer system. It is a truly
distributed data processing system.
It is more reliable because communication is not dependent on a single host computer. If
one line between any two computers breaks down, or if one of the computers breaks
down, alternate routing is possible.
Disadvantage:
called a point-to-point link with all other computers of the network. The control is
distributed with each computer deciding its communication priorities.
1. This type of network is very reliable, as any line breakdown will affect only
communication between the connected computers.
2. Each node of the network need not have individual routing capability.
3. Communication is very fast between any two nodes.
Disadvantage:
1. It is the most expensive system from the point of view of line costs.
Mesh Topology
The Mesh topology has been used in the last few years. Its attraction is its
relative immunity to bottleneck and failure problems. Due to the multiplicity of paths
from the DTEs and DSEs (Data Switching Equipment), traffic can be routed around
failed components or busy nodes. Even though this approach is an expensive
undertaking, some users prefer the reliability of the mesh network to that of the others,
especially for networks with only a few nodes that need to be connected.
3. The function of each layer should be chosen with an eye towards defining
internationally standardized protocols.
4. The layer boundaries should be chosen to minimize the information across the
interfaces.
5. The number of layers should be large enough that the distinct functions need not
be thrown together in the same layer and small enough that the architecture does
not become unwieldy.
(typically a few hundred bytes), transmit the frames sequentially, and process the
acknowledgement frames sent back by the receiver. Frame boundary identification is
taken care of by this layer. In case of information frame loss, this layer retransmits the
same frame in a controlled manner. It handles flow control and uses the channel
bandwidth efficiently (piggy backing).
Another service provided is the token management. This service prevents both
the sides from performing the same operation at the same time. Session layer provides
tokens. Only the side holding the token can perform the critical operation.
Yet another service is Synchronization. This service attempts to solve problems that
might arise during long duration file transfer between machines on the network.
The sending process has some data it wants to send to the receiving process. It
gives the data to the application layer, which attaches an application header to the front of
presentation layer. The presentation layer, not aware of what data has been received,
transforms it in various ways, adds a header to the front of it and gives the result to the
session layer. This process is repeated till the data reaches the physical layer, where the
actual transmission of data to receiving machine takes places. On the receiving machine,
as the data moves up the layers, the various headers are removed before the message
arrives at the receiving process.
84
Local Area Network is a local computer network for communication between computers
Broadcast subnets can be further divided into static and dynamic, depending on how the
channel is allocated
5.5) Summary
WANs are networks that span the distance between buildings, cities and even
countries.
In any network there exists a collection of machines intended for running user or
application programs. These machines are called host or end system
A network is a logical extension of a data communication system. The term
‘Topology’, in the context of a communications network, refers to the way in
which the end points or stations of a network are linked together.
1. What is LAN?
2. When and where is WAN used?
3. MAN is ___________.
1.Sanjay Saxena, "A first course in computers", Vikas Publishing House, New Delhi,
1998.
2.Andrew S TanenBaum, "Computer Networks", PHI Third Edition, 1997
5.8) Assignment
5.11) Keywords
WAN – Wide Area Network
MAN – Metropolitan Area Network
POTS – Plain Old Telephone Service
PSTN – Public Switched Telephony Network
ISDN – Integrated Services Digital Network
ATM – Asynchronous Transfer Mode
DTE – Digital Transmission Equipment
DSE – Data Switching Equipment
ISO – International Standard Organization
OSI – Open System Interconnection
***
270E110
ANNAMALAI UNIVERSITY PRESS : 2019 – 20