SS3 Term 2
SS3 Term 2
A computer network is defined as the inter–connection of two or more computer systems with data
communication devices to enable share of resources. It consist of the following,
Communication software (Net-work operating system),
Computer system (node),
Network interface cards(connector)
Network cable (medium).
Networking reduces duplication of computer resources, thus enabling the scarce resources to be
shared among the computer systems. Some of the resources shared are.
Files
Applications
Software products
Printers
Disk spaces
Modem
Faxes
CD-Rom drives
E-mail facilities etc.
Computer network can be categorized into two.
Wired network
Wireless network.
Wired network:- This is a network that involves the use of network cables to establish a physical
link among the nodes or computer resources. The components includes,
Network interface card (NIC)
Network operating system (NOS)
Network cable
Bayonet-locking connector (BCN).
Wireless network:- This is a network that makes use of radio waves to transmit data or information
from one node to another. The components includes,
Network interface card (NIC)
Network operating system (NOS)
Network Antenna (Arias)
Special modem (Radio Modem).
CLIENT-SERVER NETWORK
This is a server-based network that is essentially used for sharing data such as accounts/order processing
systems and other resources. It provides a better security as all resources of the computer are centrally
located on the server. It is a type of network in which certain computer called clients, request servers,
respond to these request.
In a client/server network, there is usually a dedicated central system called server on which the
files of every user connected to the network are stored. A server is a computer that responds to clients
request. Examples are print server, application server, fax server etc.
A client is a computer that can access information stored on a server.
PC 1 PC 2 PC 3
PC 4 PC 5
Bus Topology
2
Advantages of bus topology
Installation is simple and cheap when compared to other topologies
Connections are simple and it is easy to use.
Less cabling.
Disadvantages of bus topology
Used only in comparatively small networks.
The network deteriorates as more computers are added beyond a certain limit.
Fault identification is difficult.
A simple fault in the cable stops all transmission.
Star topology:-This topology has a central server (host) to which all work stations are connected. If the
central server fails the network collapses. Communication within the network is via the server.
PC
Hub
PC PC
Server
PC
Star topology
3
Ring topology:-This topology consists of interconnected workstations in a continuous ring form.
messages are passed from one workstation to another until the destination is reached. If a workstation
breaks down the network ceases to function.
PC
PC PC
PC
Ring topology
Tree topology:- This is a topology in which only one route exists between any two nodes on the
network. The pattern of connection resembles a tree in which all branches spring from one root. It is a
hybrid topology it is similar to star topology but the nodes are connected to the secondary hub which is
connected to the central hub. In this topology groups of star-configured network are connected to linear
bus backbone.
PC
PC PC
PC PC
PC PC
Tree topology
4
Mesh topology:-This topology uses separate cables to connect each devices to every other one on the network,
thus providing a distinct and straight communication line among the various PCs. This topology is fault-tolerant
and easy to troubleshoot.
PC
PC
PC
PC PC
Mesh topology
Characteristics of LAN
Confined to small area (range 5-10km).
High speed.
Most inexpensive equipment
Low error rates.
5
Operates at speeds ranging from 10Mbps to 100Mbps. Nowadays 1000Mbps
are available.
Bus or ring topology.
Characteristic of WAN
Distance up to thousands of kilometres
Typical data rate between 9.6k to Mbps
High error rates
Generally has point-to-point link with topology mesh and star.
May be managed by organization independent of users.
BENEFITS OF NETWORKING
The following are some of the benefits of networking,
File sharing
Resource sharing
Speed
Security
Centralized software management
Internet access sharing
Communication
Reliability
Remote database access
Effective customer service
File sharing:- Computer network allows file sharing and remote access. With authorization two or more
people can share and access file on another computer from their own workstation.
Resource sharing:- This is a way of using resource which is attached to other terminal in the network,
eg printer and disk can be shared on the network without providing a printer at each and every terminal
on the network.
Speed:-Network provides a very fast method of sharing and transferring file, in the absent of which files
are shared by copying them to flash or floppy disk and carrying the disk to be loaded on another
computer physically.
Security:- Individual users of the network are allowed to set up self security to protect their data and
information on the network from an unauthorized access.
Centralized software management:-it allows all the software to be loaded on one computer (the file
server). This eliminates waste of time and energy on installing, updating and tracking files on individual
computer on the network.
Internet access sharing:- Small computer network allow multiple users to share a single internet
connection. Special hardware devices allow the bandwidth of the connection to be easily allocated in
various individual as they need it, and permit an organization to purchase one high-speed connection
instead of many slow ones.
Communication:- Networking in addition offers an effective mode of communication between
individual terminal. Message can be transmitted from one user to another.
6
TYPES OF MALICIOUS CODES
The following are the types of malicious codes
Viruses
Worm
Trojan Horses
Back doors/Trap Doors
Logic Bombs
Bacteria/Rabbit
Computer virus
A true virus is a sequence of code that is inserted into other executable code, so that when the regular
program is run, the viral code is also executed. Viruses modify other programs on a computer, inserting
copies of themselves.
Types of viruses
The following are types of computer viruses,
Resident viruses
Overwrite viruses
Boot sector viruses
Macro viruses
Directory viruses
Polymorphic viruses
Executable file virus
Fat virus
Multipartite viruses.
Resident viruses:-this type of virus resides in the RAM memory. It dwells permanently in the memory
where it can overcome and interrupt all the operations executed by the system by corrupting files and
programs that are opened, closed copied renamed etc.
Examples are: Randex, CMJ Meve and Mrklunky.
Overwrite viruses:- Virus of this kind is characterized by the fact that it deletes the information
contained in the files that it infects, rendering them partially or totally useless. One way of cleaning
infected file(s) is to delete the file(s). examples are Way, Trj.Reboot, Trivial.88.D.
Boot sector viruses:-They infect the boot sector of a floppy or hard disk. This where the information
for booting are stored once its is infected it is therefore not possible for the system to boot from the disk.
Examples: Polyboot.B AntiEXE.
Macro viruses:-these viruses infect files that are created using certain applications or programms that
contain macros. They come attached with documents with macro (built in program). When the
document is opened the viruses are activated. Examples: Relax, Melissa.A, Bablas, 097M/Y2k.
Directory viruses:-these type of viruses change the paths that indicate the location of a file. When a file
is infected the virus changes the extension of the file that is .EXE or .COM. When run any of the
original file you are unknowingly running the virus program because the virus has already moved the
original file. Once a file is infected , it impossible to locate it.
Polymorphic viruses:- these viruses encrypt or encode themselves in a different way every time they
infected a system. This makes it impossible for anti-viruse to find them using string or signature
searches because they are different in each encryption and also enables them to create a large number of
copies of themselves.
Examples: Elkern, Marburg, Satan Bug, and Tuareg.
7
Executable file virus:-this type of virus infects programs or executable files (files with an .EXE or
.COM extension). Once any of the infected programs is run directly or indirectly the virus is equally
activated producing the intended damaging effect.
FAT virus:-the file allocation table or FAT is the part of a disk used to connect information and is vital
part of the normal functioning of the computer. This type of virus attack can be especially dangerous, by
preventing access to certain section of the disk where important files are stored. Damage caused can
result in information losses from individual files or even entire directories.
Multipartite viruses: These types of viruses combine boot sector with file infector viruses effects.
Trojan Horses
This is a code that appears to be innocent and useful but it is also contains a hidden and
unintended function that present a security risk. It does not replicate but it can steal password,
delete data, format hard disk or cause other problems.
Logic Bombs
Logic bombs are programmed threats that lie dormant in commonly used software for an
extended period of time until they are triggered when some pre-conditions are met like a
particular day, time etc. logic bombs come embedded with some programs.
Bacteria/Rabbit
These codes do not damage files. Their purpose is to deny access to the resources by consuming
all processor capability/memory/disk space by self replication.
Sources of viruses
Depending on what kind of virus it is, each virus spreads and infect computer systems differently. The
following are the common ways of getting your system infected by virus.
Infection through downloading or opening attachments in e-mail messages.
Downloading and running a program from unreliable and suspicious looking
websites.
Installing a program and opening an infected document on your computer can run
the virus.
8
Viruses can be transmitted from one computer to another through infected
diskettes or flash drive,
Infection through internet downloading e.g pirated software download, computer
games, visiting promo sites. Etc.
Viruses can infect your computer by using virus infected CD-ROM orDVD on
your computer system.
9
MAINTENANCE OF COMPUTER SYSTEM
Cleaning your computer and your computer components and peripherals helps keep the components and
computer in good working condition and helps keep the computers from spreading viruses.
Cloth
Water or rubbing alcohol
Portable vacuum
Cotton swabs
Foam swabs
Cloth:- A cloth is the best tool used when rubbing down a component, paper towels can also be use
for most hardware. Cloth is recommended only when cleaning components such as outside the case, a
dive, mouse etc. cloth should not be used to clean any circuitry such as the RAM or the motherboard.
Water or rubbing alcohol:-These are the best solvents for moistening cloth for cleaning the computer
system other solvents may be bad for the plastics used for building the system.
Portable vacuum:- This is used to suck out dust, dirt, hair, cigarette particles, and other particles out of
the computer system. It is one of the best methods in cleaning the computer system.
Cotton swabs:-Cotton swabs moistened with rubbing alcohol or water are excellent tools for wiping
hard to reach areas in the keyboard, mouse, and other locations.
Foam swabs:- we can also use foam swab to clean the computer system.
You can use a vacuum to suck up dirt, dust, or hair around the computer on the outside
case. However, do not use a vacuum for the inside of your computer as it generates a lot
of static electricity that can damage the internal components of your computer. If you
need to use a vacuum to clean the inside of your computer, use a portable battery
powered vacuum designed to do this job or try using compressed air.
Be cautious when using any cleaning solvents; some solvents can damage the casing of
the computer system. In this case always use water or a highly diluted solvent.
When cleaning be careful not to accidentally adjust any knobs or controls
Never eat or drink around the computer.
Limit smoking around the computer.
Procedure
To clean the CD-ROM drive use a CD-ROM cleaner such as Radio Shack and we can use cloth
dampened with water to clean the tray that ejects from the drive. Be sure that the tray is completely dry
before putting the tray back into the drive.
SOFTWARE MAINTENANCE
Software maintenance makes our system to function correctly and efficiently. This is possible by
adequately equipping our system with updated antivirus tools, spyware removal application, back-up
software and a registry cleaner.
Corrective maintenance:-This involves developing and deploying solutions to problems (bugs) that
arise during use of a software program. This type of maintenance is necessary when system users
noticed performance problems in the use of software. Problems such as error messages coming on the
screen or the program freezing or cracking implies corrective maintenance is necessary.
Perfective maintenance:- This is the type of maintenance that is used to improve software development
in other to accommodate changes. No software contains zero error therefore programmers are always
engaging in perfective software maintenance in other to improve the functionality of the software.
Adaptive maintenance:-This is the type of maintenance in which technological changes is taken into
consideration, since technological development is dynamic. For example a change in a processor’s
speed, will affect how the software performs on a single computer. This type of maintenance require
adaptation to present state of technological development.
Preventive maintenance:-This is the way of preventing problems with software programs before they
occur. Computer programmers use to test the software and find out that no compatibility issues will
arise during the use of the software.
11
SOFTWARE MAINTENANCE ACTIVITIES
The following are some of the Software maintenance activities
Schedule upgrades
Patches and updates
Disk defragmentation
Anti-Virus and Firewall protection
Deleting cookies
Repairs .
Schedule upgrades:-all software must be kept updated in order to keep its support in force and also to
take advantage of the most recent changes. Updating and upgrading provide additional capabilities that
might not have been present in earlier version of the software.
Patches and updates:-software companies routinely release patches and updates to address security
problems and other vulnerabilities found in their programs. System administrator and network
technicians need to regularly download and apply these updates to keep their computers and their
network protected from hackers, viruses and network intrusions.
Disk defragmentation:-This is a method by which the computer places files in logical and sequential
order on the hard drive, enabling the system to use less time and energy searching around for pieces of
data that a user requests.
Anti-Virus and Firewall protection:-anti-virus is used for protecting computers on the internet from
harmful viruses. While Firewalls stop unwanted spy wear and individuals from seeing what is on
another person’s computer.
Deleting Cookies:- Cookies are very tiny files that are put on the computer whenever a website is
visited. There are 2 types of Cookies- temporary and permanent. The temporary (session) cookies are
temporarily stored in the browsers memory and are deleted whenever you close the internet Browser.
Permanent (persistent) cookies will permanently be stored on the hard drive unless it is deleted
manually.
Repairs:- in some cases a system file needed for the proper operation of a program will get overwritten
or become corrupt. When this happen the repair function which is accessible through the control panel is
used to replace any damage files.
12
locations on the hard drive. When you run Defrag from system tools it will pull all the fragmented files
into one location, making it easier and quicker for the computer to find the full file.
Updating:- Keeping the system up-to-date fixes bugs and security holes as well as provides the latest
versions of software that run better. Most Software programs allow automatic updating which ensures
regular updating.
Backup:-This is a way of protecting a total loss of files. This can be done by using an external hard
drive and backup software; this software should be run at least once in a week or set up the program that
can run the backup automatically.
Physical maintenance:- regular physical cleaning for computer system is very important for better
performance. This will prevent dust and debris which can create heat that normally affect the computer
system motherboard performance.
Internet security:- One of the most important aspect of computer maintenance is preventing and getting
rid of viruses and other malware on the internet. It is necessary run a fully updated antivirus program
when using the internet, and also needed to perform full system scans with the updated antivirus
program at least once a week. Since viruses can sometime get past antivirus programs, it is good idea to
run a firewall to block potential threats.
Registry cleaning:-The registry is a huge database of all Windows-related functions and a significant
Windows component. The registry can be cleaned of duplicate and irrelevant information which
prevents optimal computer functionality.
13
CAREER OPTIONS IN DATA PROCESSING
The following are the career options in data processing,
Web developer
Computer support specialist
Network administrator
Network engineers
Hardware engineers
Software programmers
System analyst
Database administrator
Computer technicians
Computer educator.
The definition also extends to those involved in the internet industry, sell, lease, repair computer
hardware or those that sell, market and write software programs.
Web developer:- this is a programmer who specializes in, or is specifically engaged in, the
development of world wide web applications, or distributed network applications that are run
over HTTP from a web server to a web browser.
Primary functions
Program, test and debug all web applications.
Design, develop, test and deploy web applications.
Code pages, files, test debug and deploy.
Develop appropriate code structures to solve specific tasks.
Coordinate with other designers and programmers to develop web projects.
Collaborate with staff and teams to develop, format and deploy content.
Assist and support in the upkeep and maintenance of web site.
Research and propose software programs that are compatible to the future technologies.
Initiate periodic testing and implement contingency plans in case of system failure.
Prepare and coordinate intranet web updates and intranet website changes.
Fix bugs, troubleshoot and resolve problems.
Assume ownership of code throughout development, staging, testing and production.
Computer support specialist:- provide technical assistance to computer system users. Answer
questions or resolve computer problems for client in person, via telephone or from remote
locations. Provide assistance concerning the use of computer hardware and software, including
printing, installation, word processing, electronic mail, and operating system.
Functions
Install and perform minor repairs to hardware, software, and peripheral equipment, following
design or installation specification.
Oversee the daily performance of computer systems.
Set up equipment for employee use, performing or ensuring proper installation of cable,
operating systems, and appropriate software.
Maintain record of daily data communication transactions, problems and remedial action
taken, and installation activities.
Read technical manuals, confer with users, and conduct computer diagnostic to investigate
and resolve problems and to provide technical assistance and support.
Network administrator:- These set of professionals administer networks, that is they take care
of the tasks of installing, configuring, expanding, protecting, upgrading, tuning and repairing the
network. They take care of the network hardware, such as cables, hubs, switches, routers, servers
and client as well as network software.
14
Functions
Establishes network specification by conferring with users, analyzing workflow, access,
information, and security requirements, designing router administration, including interface
configuration and routing protocols.
Establishes network by evaluating network performance issues including availability,
utilization, throughput, and latency, planning and executing the selection, installation,
configuration, and testing of equipment, defining network policies and procedures,
establishing connection and firewalls.
Maintains network performance by monitoring and analysis, performance tuning,
troubleshooting network problems, escalating problems to vendor.
Secures network by developing network access, monitoring control, and evaluation
maintaining document.
Prepares users by designing and conducting training programs, providing references and
support.
Upgrade network by conferring with vendors, developing testing, evaluating, and installing
enhancement.
(And more)
Software programmer:- A person who write a set of instructions to be taken by the computer is
called computer programmer.
Functions
Plans, write, tests, and maintains all programs and packages in the installation
Codes, debugs, test, and documents routine application programs.
Trains subordinates in programming and program coding.
Assists users with procedural or minor technical problems
Assists in maintaining program libraries, users manuals or technical documents.
15
Must be able to communicate well:- good communication skill is very important to any
profession in which computer professionals are not an exemption.
Multitask:-it is expected of a computer professional to be able to perform several tasks relating
computer projects, he must therefore be able to prioritize projects, switch from one project to
another without losing focus, and ensure that each of the project is completed successively.
16