0% found this document useful (0 votes)
18 views94 pages

00 Computer Concepts All Lecture Slides - Watermark

The document outlines expected professional behaviors and etiquettes for students, emphasizing the importance of regular class attendance and learning programming basics. It provides an introduction to computers, detailing hardware and software components, their functions, and various applications. Additionally, it discusses computer memory types, operating systems, and the architecture of modern electronic computers.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views94 pages

00 Computer Concepts All Lecture Slides - Watermark

The document outlines expected professional behaviors and etiquettes for students, emphasizing the importance of regular class attendance and learning programming basics. It provides an introduction to computers, detailing hardware and software components, their functions, and various applications. Additionally, it discusses computer memory types, operating systems, and the architecture of modern electronic computers.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 94

6

Expected Etiquettes
o You shall now become a
professional person. Demonstrate
behavior of a professional.
o Make yourself your parents and
then the organization proud with
your conduct and achievements.
o You will require class attendance
REGULARLY otherwise you shall
struggle to understand this subject.
Attending classes is for your own
good.
o Graphic Era lab exams of a very high
standard. You are expected to run
the code and answer viva-voice
questions.
7

Expected Etiquettes
o Very, Very important to learn
programming basics to secure a
good life and job.
o Execute the code on a
computer/smart phone then only
your understanding shall increase.
o You need to bring to my attention
any issues regarding the course at
the earliest to the attention of your
class teacher, anything you feel
should be looked into.
o Show professional behavior to your
teachers.
8

Words of positive Advice


o Stress, Emotional problems. Feel free
to contact your faculty. They shall help
you connect to resources.
o For God’s sake stay away from Drugs
and other harmful substances.
9

*****
1

Introduction to Computers

o Introduction to Computers
o Software & Hardware
o Input / Output Devices
o Computer memory
o RAM/ROM
o Understand bit, byte, KB, MB, GB
and their relations to each other
o Generation of computers
o Operating System
o Computer Networks
2

What is a Computer ?

RAW DATA I NFORM ATI ON

COM PUTER
I NPUT OUTPUT
PROCESSI NG

• Computer is an electronic machine


that takes in raw data as input,
processes it and gives out useful
information as output.

o A computer is a machine that takes


instructions and performs operations
based on those instructions.
3

Why use Computers?

• Increases the productivity and


efficiency.
• Can crunch data at lightning speed
• Can store vast amounts of data
• Helps sort, organize, and search
through information.
• Connects to the vast world of
information thru the Internet.
• Get a better understanding of data.
• Can help in making a decision using
the vast data.
6

Some Applications of Computers


 Word Processing
 Internet
 Digital Audio or Video Composition
 Desktop Publishing
 e-Business
 Bioinformatics
 Health care
 GIS and Remote Sensing
 Meteorology
 Multimedia and Animation
 Legal System
 Retail Business
 Video Games
 Entertainment
 Sports
1

Software & Hardware


COMPUTER

HARDWARE SOFTWARE

SYSTEM APPLICATION SOFTWARE


SOFTWARE SOFTWARE UTILITIES

o Broadly the electronic circuitry is called


the Hardware and programs and data
the Software.

o The Software is instructions in form of


programs along with data manage the
computer system and control the
hardware components.

Example:
 The antivirus, chrome browser, Linux
OS that protects the computer system
is a type of Software.
2

Hardware and Software both Necessary


 The computer on its own is of no use.

 The hardware needs a software (a set


of programs & data) to instruct what
has to be done.
 A program is a set of instructions that
is arranged in a sequence to guide a
computer to find a solution for the
given problem.
 The process of writing a program is
called programming.
Computer software is written by computer
programmers using a programming
language.
Examples of computer software include:
 Browsers, Windows, Linux
 Computer Games
3

* Courtesy ASUS

*
4

Birds Eye View of PC Hardware


1 Scanner
2 CPU (Microprocessor)
3 Main memory (RAM)
4 Expansion cards
5 Power supply unit
6 Optical disc drive
7 Hard disk drive (HDD)
8 Motherboard
9 Speaker
10 Monitor
11 System software
12 Application software
13 Keyboard
14 Mouse
15 External hard disk
16 Printer

***
/* Most Humbly and Gratefully Acknowledge to all the Wonderful People making
Content Freely Available
Description : A stylized personal computer, with as many parts as possible
shown and labeled
Link :
https://commons.wikimedia.org/wiki/File:Personal_computer,_exploded_6.svg
License Type: Creative Commons Attribution 2.5 Generic license.
Author: User:HereToHelp
*/

* ASUS Motherboard used for representational purpose only. Image credits ASUS.
5

Computer Hardware represents the


physical and tangible components of a
computer, i.e. the components that can be
seen and touched.
 Examples of Hardware are the following
 Input devices − keyboard, mouse, etc.
 Output devices − printer, monitor, etc.
 Secondary storage devices − Hard disk,
CD, DVD, etc.
 Internal components − CPU,
motherboard, RAM, etc.
6

Types of Software's

• Depending on function and application


desired, Software can be divided into
three major types:
– System Software
– Application Software
– Utility Software
7

System Software Application Software

It is a collection of It is a collection of
programs that programs written for
enable the users to a specific
interact with application. Like, we
hardware have library system,
components inventory control
efficiently system, etc

It controls and It uses the services


manages the provided by the
hardware system software to
interact with
hardware
components

System software is It is machine


machine dependant independent
8

System Software Application Software

The programmer The programmer


must understand the ignores the
architecture of the architecture of the
machine and machine and
hardware details to hardware details to
write a system write an application
software software

Interacts with the Interacts with the


hardware directly hardware indirectly
through system calls
provided by system
software

Writing a system Writing application


software is a programs is relatively
complicated task very easy

Example: compiler, Example: MS-WORD,


operating system PAINT
1

Block or Functional Diagram of a


Computer

A computer is an electronic device which


basically performs five major functions
namely…
o accepts data or instructions (input) via
Input Devices
o stores data (Primary and Secondary
Memory)
o process data (via CPU)
o displays results (output) (via Output
Devices)
o controls and co-ordinates all operations
inside a computer (via Control Unit)
2
3

WorkStation / Server

** All images courtesy ASUS computers


computers. Images for representational purpose only.
4

Functional Block Diagram of a Computer

*****
8

Software Utilities

Utility software is software designed to


help to analyze, configure, optimize or
maintain a computer. It is used to support
the computer infrastructure - in contrast
to application software, which is aimed at
directly performing tasks that benefit
ordinary users.

Anti-virus utilities scan for computer


viruses and block or remove them.

Diagnostic programs determine and


report the operational status of
computer hardware and software.
Memory testers are one example

Cryptographic utilities encrypt and


decrypt streams and files.
9

Backup software makes copies of all


information stored on a disk and restores
either the entire disk (aka Disk cloning)
in an event of disk failure or selected
files that are accidentally deleted or
corrupted. Undeletion utilities are
sometimes more convenient.

Data conversion utilities transform data


from a source file to some other format,
such as from a text file to a PDF
document.
10

Operating System
 The primary goal of an operating system
is to make the computer system
convenient and efficient to use.
(Computer Usable)
 An operating system ensures that the
system resources (such as CPU, memory,
I/O devices, etc) are utilized efficiently
i.e. Resource Manager.
For example, there may be many service
requests on a web server and each user
request need to be serviced. Similarly, there
may be many programs residing in the main
memory.
Therefore, the system needs to
determine which programs are active and
which need to wait for some I/O operation.
11
12

Functions / Objectives of Operating


System
o Manages the computer hardware
o Process Management
o Memory Management
o I/O Device Management
o File System
o Protection / Security
o Network Management
o Network Services (Distributed
Computing)
o User Interface.
13

Examples of Operating System


 MS DOS System
 Windows Operating System
 UNIX
 LINUX
 Mobile Operating Systems
iOS, Android, Windows Phone ,
BlackBerry OS

** Students can find out about Open Source Software and


Commercial Software with examples.

 Freeware, Free Software, License etc

*****
1

Modern Electronic Computer


Architecture

Von Neumann Architecture


2

Von Neumann Architecture or the


Princeton Model

Proposed design architecture for an


electronic digital computer with these
components:

o Processing unit contains arithmetic


logic unit and processor registers
o Control unit that contains an instruction
register and program counter
o Main Memory that stores data and
instructions
o External mass storage. Secondary
device.
o Input and output facility

Also referred to as stored-program digital


computer keeps both program instructions
and data in read–write, random-access
memory (RAM)
3

Intro to Computer Memory

Computer’s memory is used to store


data and programs. Two Major types
o Primary or Main memory
o Secondary or Auxiliary memory

MAIN MEMORY: Instructions and


data of a program in execution.
Volatile, so retains content when
power is on. Additionally, is expensive
and limited in capacity.

SECONDARY MEMORY: Data and


programs not currently in use. Place
of permanent data storage.
4

Secondary memory
o Data and/or instructions stay
permanently. Not reliant on power.
o Cheaper and can store very large
data quantity.
o Certain device like pen drives etc
data is portable, copied from one
machine to another.
o Slower speed of access compared to
main memory.
o Memory is organized into a number
of partitions called as cells. Each cell
has an address. Just like a housing
colony.
5

Primary Memory (Main Memory)


 Contains data and instructions the
computer is currently processing.
 Very less capacity compared to
secondary memory. Example Hard
Disk 1024 GB, main memory generally
4 to 16 GB
 Made up of semiconductors.
 Very fast compared to secondary
memory but slower than Internal CPU
memory (Registers).
 Volatile, and Required for program
execution.
6

Types of RAM
Static RAM (SRAM)
 Flip Flop (latch) is used to represent 1
and 0’s
 The word static indicates memory
refresh is not required. Simpler Design.
 Faster and Used as cache memory
 Highly Reliable
 Expensive and Long life
 Finds use in digital Cameras, high end
mobile phones.

** Image courtesy of Hyundai. Used for representational purpose only.


7

Dynamic RAM (DRAM)


 Consists of a Capacitor and Transistor
Combo.
 Capacitor gradually discharges. Must be
continually refreshed in order to
maintain the data.
 Done by a refresh circuit that rewrites
the data several times per second.
 As it is cheaper, smaller, higher
capacity, forms major part of Main
memory.
 Short data lifetime
 Slower as compared to SRAM
 Used as RAM
 Smaller/Denser in size, Less expensive
 More power consumption
** Image courtesy of Samsung. Used for representational purpose only.

Samsung 16GB
8

Read Only Memory


 ROM stands for Read Only Memory.
Data stored in ROM also known as
firmware.
 Generally used in PC to store
instructions needed to Boot-up** a
computer.
 Non-volatile. Information is
programmed/stored permanently in
such memories
ROM extensively used in electronic items
like washing machine, Dishwasher,
Cameras and microwave oven among
others.

** ROM Role in Computer Booting Process


subsequent video
9

Types of ROMs and their characteristics


MROM (Masked ROM)
 Hard-wired* devices that contain pre-
programmed set of data or
instructions.
PROM (Programmable Read Only
Memory)
 PROM can be modified only once by
the user/manufacturer.
 It can be programmed only once and
is not erasable.
EPROM (Erasable and Programmable
Read Only Memory)
 EPROM can be erased by ultra-violet
light.

* Electronic circuitry that is designed to perform a specific task.


10

EEPROM (Electrically Erasable and


Programmable Read Only Memory)
 EEPROM is programmed and erased
electrically.
 Can be erased and reprogrammed about
ten thousand times.
 Selective location can be modified and
programmed.
 They can be erased one byte at a time,
rather than the entire chip.
13

Sequential Data Random Data


Access Access

To reach a specific Irrespective of the


data item all items location of the data
prior to it need to be element, time taken
traversed. to reach it is a
constant for that
media

Examples: Magnetic Main Memory (RAM)


Tape, Old Cassette
players

Devices are more Expensive and


economical and lesser capacity
generally have more
capacity

Depends upon Searching for a


application: particular employee
Example processing information
salary of each
employee
14

Sequential vs Random Access

/* Most Humbly and Gratefully Acknowledge to all the Wonderful People making Content Freely Available
Description : File:Random vs sequential access.svg
Link : https://commons.wikimedia.org/wiki/File:Random_vs_sequential_access.svg
License Type: I, the copyright holder of this work, release this work into the public domain. This applies
worldwide.
Author: Me (User:Intgr)
*/
18

Secondary Memory /Auxiliary Memory


 Known as external memory
 Slower than the Primary memory.
 Stores data/information permanently.
 Huge Capacity based on need
 Cost per unit of storage is cheaper
compared to RAM
 CPU can utilize secondary memory
only when the contents are moved to
the RAM.
 Devices are highly stable and Reliable
 Data permanent till deletion
 Modify, Delete data
Example: Hard disk, CD-ROM, DVD,
Pen Drive etc.
19

HARD DISK
o Thought of as Circular plates (called
as platters) stacked upon each other
with suitable gaps.
o Platters coated with magnetic
medium for data recording.
20

Hard Disk Drive

/* Most Humbly and Gratefully Acknowledge to all the Wonderful People making Content Freely Available
Description : Diagram of a computer hard disk drive
Link : https://commons.wikimedia.org/wiki/File:Hard_drive
https://commons.wikimedia.org/wiki/File:Hard_drive-en.svg
License Type: Creative Commons Attribution
Attribution-Share Alike 3.0 Unported license.
Author: Surachit
*/
21

Platter Structure
track (A), a geometrical sector (B),
(B) a
track sector (C) and a cluster of sectors
(D).
/*
Most Humbly and Gratefully Acknowledge to all the Wonderful People making Content Freely Available
Description: Disk structure showing a track (A), a geometrical sector (B), a track sector (C) and a
cluster of sectors (D). The term "sector" in the context of computer engineering usually refers to
(C).
Link: https://commons.wikimedia.org/wiki/File:Disk
https://commons.wikimedia.org/wiki/File:Disk-structure2.svg
Author: Heron2/MistWiz
License Terms: I, the copyright holder of this work, release this work into the public domain. This
applies worldwide.

*/
22

Hard drive geometry -


cylinder/head/sector

/* Most Humbly and Gratefully Acknowledge to all the Wonderful People making Content Freely Available
Description : hard drive geometry - cylinder/head/sector (per track) (CHS)
This is an information graphic about a common early method for giving addresses to each physical
block of data on a hard disk drive.
Link : https://commons.wikimedia.org/wiki/File:Hard_drive_geometry_
https://commons.wikimedia.org/wiki/File:Hard_drive_geometry_-_English_-_2019 _2019-05-30.svg
License Type: Creative Commons Attribution
Attribution-Share Alike 4.0 International, 3.0 Unported,orted, 2.5
Generic, 2.0 Generic and 1.0 Generic license
Author: Henry Mühlpfordt, png version from 2010: Bagok */
16

Bits, Nibble, Bytes

Bit (Binary Digit)


0 or 1 in binary system
Nibble
Group of 4 bits.
Byte
8 bits is called byte.
Word
A computer word represents
number of bits processed as
a unit. Can vary from 8 bits
to 64 bits to even more.
17

Typical Memory Units Encountered


Seq. # Name Size
1 Bit 1 bit
2 Nibble 4 bits
3 Byte 8 bits
4 Kilobyte (KB) 1024 bytes
5 Megabyte (MB) 1024 KB
6 Gigabyte (GB) 1024 MB
7 Terabyte (TB) 1024 GB
21

Cache Memory
 Challenge is CPU is extremely fast. RAM
is unable to cope up with CPU speed.
 Solution Cache memory. Placed
between CPU and RAM
 CPU looks for Instructions and Data
FIRST in Cache memory then to RAM.
 Cache memory much faster than RAM.
 Made up of expensive SRAM (Static
RAM)
 Very very small compared to RAM
 Key concept is to HOLD frequently
used data and instructions to provide
faster access to CPU.
22

Cache Memory Conceptual Diagram

* Temporal & Spatial Locality


23

Understanding Temporal and Spatial


Locality

number [5]
Location 0 1 2 3 4

Value 45 65 99 0 33

Keep adding number from location 0 to


location 4 to sum
{
sum = sum + number [ i ]
i =i+1
}
// i = 0 , 1, 2, 3, 4
15

Computer Memory Hierarchy


1

Computer Languages

 Machine Language
 Assembly Language
 High Level Language

Machine Level Language

o Program is a set of instructions


o Instructions executed by the CPU
using data to achieve an objective
o CPU fetches an instruction,
decodes or figures it out and then
executes the instruction
o Binary means ON/OFF represented
by 1s and 0s
Please do some discovery as to why binary numbers are used in
computers. Later on in the comments section, the best answer shall be
put on top by me with my comments if required.
2

Machine Level Language (cont’d)


o Instructions are written in terms of
1s and 0s only
o Differs from Computer to Computer
based on hardware architecture
o Fastest execution & Efficient Code
o Extremely difficult to write
o Can make mistakes
o For example
Stop 0000
Start 0001
Error 1111
Add 1010
https://chortle.ccsu.edu/java5/Notes/chap04/ch04_4.html
(Nice example of a machine language Code)

 Binary devices are Simple and easy to build.


 Binary signals are Unambiguous (which gives them noise immunity).

• Word Size
• Number of Registers
• Little Endian Big Endian
• Harvard vs. Von Neumann
3

Assembly Language

o Uses Mnemonics (symbols to


represent) Opcode (instructions)
o Therefore human readable,
understandable compared to machine
language
o For example
0000 STOP
0001 Start
1111 Error
1010 Add
o Start, Stop, Error, Add are all examples
of Mnemonics
o Considered low level programming
language
o Needs Software called as Assembler for
conversion
o Still used critical parts. Code runs fast.
o Highly dependent on the computer
architecture
4

High Level Language (HLL)

o Uses English like language


o Simpler to write code compared to
Assembly or machine language
o Knowledge of Hardware not required
o Needs software tools like Compiler to
transform to machine code
o Faster development and completion of
coding tasks
o The nature of HLL permits code to be
used across different machines
without major changes.
o Code written is generally portable and
hardware architecture Independent.
o Examples: FORTRAN, COBOL, C, C++,
JAVA etc
o C Compilers generate code comparable
to assembly language
5

Hardware, Machine Language,


Assembly Language and High Level
Language Relationship
6

Translators
 Assembler
 Compiler
 Interpreter
 Linker
 Loader

Need for Translators and Support Tools

o Computers understand only machine


language
o Support system software’s to take a
program in high level language and
help it execute on a given machine

Assembler

o System program that transforms code in


Assembly language to Machine language
(object code)

Assembly Language Machine Language


MOV A, B 0010 1100 0011
7

Compiler

Translates a computer program


written in a high level programming
language to an executable for a
target machine. i.e. Source Code to
Assembly or machine code.

High Level Language


A=B

Assembly Language
MOV A, B

Machine Language
0010 1100 0011

Example: GNU C Compiler


8

Interpreter

o Reads a program in high level language


and executes the instructions without
having to compile the program first.
o Takes a line of source code and executes
that line. Then proceeds to do the same
with the subsequent line.

Examples: Python, PERL, BASIC


languages
9

Compiler vs Interpreter Major Differences


Compiler Interpreter
Translates the entire Converts one line of
program into the source program
machine code and and then executes
then allows linking that line. Proceeds to
and loading for the next statement in
execution. this manner.
Compiled program Comparatively slower.
runs faster
Produces complete Halts at the first error.
error/warning list

Compile once run Source code required


many times each time.

Ex: C, C++ JAVA, Python etc


10

Linker

o Referred alternatively as binder, link


editor
o Let us say we write some code that uses
SQRT code already available.
o Linker joins or patches your code with
the externally available code, libraries.
o Combines the output of a compiler or
assembler to a single executable file.
11

Loader

o Executable program from the


secondary memory needs to be loaded
into the RAM (main memory) for the
CPU to execute the code.
o Verifies memory permissions
permissions,, memory
availability etc
o Hands over to the CPU the starting
address for execution.
12

*****
1

Generation of computers

Background
o We live in an information age or the
age of Computers

o Younger generation bought up in this


age needs to develop an
understanding and appreciation of
computer technology evolution over
a period of past 70-80 years

o Broadly classified into five


generations of development based
on technology improvement, faster
processing ability, and smaller size,
more reliable, efficient, cheaper and
capable of doing more things.

o Over a period of time they have


moved from Corporations to homes
to all around.
2

First Generation – Vacuum Tubes


(1940 to 1956)
o Vacuum Tubes Based Circuits

o Magnetic Drums For Memory

o Enormous Size Filled Many Rooms

o Consumed lot of electricity, Generated a


lot of heat, and as a result excess of
heat suffered Regular Breakdowns.

o Machine language (Direct


Communication with Computers)

o Handled only one task at a time


o Input was based on punched cards and
paper tape

o ENIAC (Electronic Numerical Integrator


and Computer machines)
3

o UNIVAC (Universal Automatic


Computer) the first every commercial
computer purchased in 1951 by the US
Census Bureau

Link: https://commons.wikimedia.org/wiki/File:Used_Punchcard_(5151286161).jpg
License : This file is licensed under the Creative Commons Attribution 2.0 Generic license.
Author : Pete Birkinshaw from Manchester, UK
Description : This card was used to load software into a mainframe computer. Each byte (the letter 'A', for
example) is entered by punching out a column of holes.

Link: https://commons.wikimedia.org/wiki/File:PaperTapes-5and8Hole.jpg
License : I, the copyright holder of this work, release this work into the public domain. This applies
worldwide.
Author : TedColes
Description : Five hole and eight hole perforated paper tape as used in telegraph and computer applications
4

English: ENIAC (Electronic Numerical Integrator And Computer) in Philadelphia,


Pennsylvania. Glen Beck (background) and Betty Snyder (foreground) program the
ENIAC in building 328 at the Ballistic Research Laboratory (BRL).
https://commons.wikimedia.org/wiki/File:Eniac.jpg

UNIVAC 1
https://www.thocp.net/hardware/univac.htm
5

Second Generation – Transistors


(1956 – 1963)
o Vacuum tubes replaced by transistors

o Very Significant Development.


Smaller, Faster, Cheaper, Less Power
consumption

o Punched card for input and printouts.

o Development of Assembly Language


using Mnemonics

o Languages like ALGOL, FORTRAN,


COBOL were being developed (HLL)

o Instructions and Data were being


stored in Main Memories called
magnetic Cores (1955 – 1975)
6

Link: https://commons.wikimedia.org/wiki/File:KL_CoreMemory.jpg
License : This file is licensed under the Creative Commons Attribution-Share Alike 3.0 Unported license.
Author : Konstantin Lanzet
Description : Core Memory Module

IBM 1401
https://commons.wikimedia.org/wiki/File:BRL61-IBM_1401.jpg
7

Third Generation – Integrated


Circuits (1964 – 1971)
o Dawn of the Silicon based Chips

o Transistors fabricated and densely


packed on these chips

o Huge gains in speed, reliability

o Advent of Keyboards and Monitors


along with OS for managing Hardware

o End of Punched Cards and Paper Tapes

o With modern OS, multiple applications


could be executed simultaneously

o Cheaper, more compact machines led


to usage in more organizations, like
banks and other financial institutions.
8

Link: https://commons.wikimedia.org/wiki/File:IBM_System360_Model_30.jpg
License : This file is licensed under the Creative Commons Attribution 2.0 Generic license.
Author : Dave Ross
Description : An entry-level IBM System/360 system, on display at the Computer History Museum.
9

Fourth Generation –
Microprocessors (1972 – 1989)
o Revolutionary Intel 4004 Processor

o Housed CPU, RAM, I/O and CU on single


chip

o Transformed Size from a ROOM to a


PALM

o Landmark 1981 IBM PC for Personal


use. 1984 Apple McIntosh

o Microprocessors and ICs got into all


aspects of life. VLSI

o Faster, Affordable, mass market, wider


adoption from business to homes

o Powerful machines helped spawn the


growth of the Internet

o GUI, Laptops, Palmtops etc


10

PDP-11
Link: https://commons.wikimedia.org/wiki/File:Pdp-11-40.jpg
License : This file is licensed under the Creative Commons Attribution-Share Alike 3.0 Unported
license.
Author : Stefan_Kögl
Description : PDP11/40 as exhibited in Vienna Technical Museum
11

Fifth Generation – Artificial


Intelligence, Parallel Computing,
Networking (1990 till date)
o Ultra Large Scale Integrated
Technologies (ULSI)

o High Capacity Hard disks, Main


memories

o Serious attempts to use Computers to


do tasks human do using AI

o Massively Parallel Computers


Cloud Computing

o Data Centers, Internet in all domains


and aspects of life

o Truly the dawn of the Information age


using Computers

o Challenging applications like Natural


Language Processing (NLP) being
addressed
12

IBM Blue Gene P supercomputer


Link: https://commons.wikimedia.org/wiki/File:IBM_Blue_Gene_P_supercomputer.jpg
License : This file is licensed under the Creative Commons Attribution-Share Alike 2.0 Generic license.
Author : Argonne National Laboratory's Flickr page
Description : The IBM Blue Gene/P supercomputer installation at the Argonne Leadership Angela Yang Computing
Facility located in the Argonne National Laboratory, in Lemont, Illinois, USA.

*****
1

Overview of Computer Networks

o What is a Computer Network?

o Need for a Computer Network

o LAN, WAN

o Common Networking Hardware at


home or labs (Self Discovery).

Million miles high overview of computer


networks
2

What is a Computer Network?


o An interconnection of nodes via means
of digital technology for resource
sharing and provision of services

o Connectivity may be established by


the means of Physical cables, Optical
wires or Wireless technologies.

o They communicate by the means of


established rules called as Protocols

o Nodes may be Computers, Printers,


Scanners, Servers etc

o Example of Resource sharing may be


a high speed printer
3

o Resources are services (information


information or
Physical devices) provided by the
Network Nodes.

o Devices are identified by names and


addresses for unique identification

o Unique identification is required for


locating and communicating to the right
node.

Descr:: An anchor chart (large poster for classroom display) which is based on the key Network theory content
from OCR's GCSE in Computer Science J276. Teaches: Network hardware devices, packet switching, VPNs,
Client Server Networks, Network Topologies, LAN vs WANS and Wifi vs Wired networks
License:: This file is licensed under the Creative Commons Attribution
Attribution-Share
Share Alike 4.0 International license.
Author: Mrlaulearning
Link: https://commons.wikimedia.org/wiki/File:Computer_Networks_anchor_chart.svg
7

Common Networking Hardware

o A Network interface card (network


interface controller) connects a
computer to a computer network,
usually a LAN.

o Modern computers support an internal


NIC embedded on the motherboard

Link: https://commons.wikimedia.org/wiki/File:Ethernet_NIC_100Mbit_PCI.jpg
Description: 100MBit Ethernet NIC PCI card
Author: afrank99
License: This file is licensed under the Creative Commons Attribution-Share Alike 2.0 Generic license.
8

Conceptual Diagram of a Com


mputer
Network

Link: https://en.wikipedia.org/wiki/File:Sample
https://en.wikipedia.org/wiki/File:Sample-network-diagram.png
Descr: Depicts a sample, hypothetical network diagram.
Author: SilverStartalk
License: This work is licensed under the Creative Commons Attribution
Attribution-ShareAlike
ShareAlike 3.0 License
9

Network Switch
o Connects other devices together.
o Manage the flow of data across a
network by transmitting only to the
devices addressed.

https://commons.wikimedia.org/wiki/File:Netgear_Gigabit_Switch_5-port.jpg
Author Simon A. Eugster
License: This file is licensed under the Creative Commons Attribution-Share Alike 3.0 Unported license.
Description: A 5-port gigabit ethernet switch by Netgear. The LED above the red plug indicates an existing link (i.e. it is
connected to some other device), the yellow cable is unconnected.
10

Router
o At home provides Wi-Fi connectivity
and is connected to a modem.
Broadcasts information from the
internet to other devices, like
computers, phones, and tablets.
o In the networking scheme of things it
forwards data packets from one router
to another router through the networks
based on the address of the
destination.

Link: https://commons.wikimedia.org/wiki/File:Netgear-Nighthawk-AC1900-WiFi-Router.jpg
Description: A Netgear Nighthawk WiFi router, model AC1900. This is a wireless router first released in 2013
with a list price of $249. It is a dual band router with a 1GHz dual core
Author Evan-Amos
License: I, the copyright holder of this work, release this work into the public domain. This applies
worldwide.
11

Firewall
o A network security system that
monitors, controls to and from traffic
from the network based on rules of
security established. Acts as barrier
between a trusted network and an un-
trusted network, like the Internet.

English: Firewall separating zones of trust


Author Luis F. Gonzalez
I, the copyright holder of this work, release this work into the public domain. This applies worldwide.
https://commons.wikimedia.org/wiki/File:Firewall_(networking).png
12

Modem
o Stands for "modulator-demodulator" –
is a hardware device. Transforms Analog
signals coming from networks like
Telephone, Cables etc to Digital Signals
and vice versa.

https://commons.wikimedia.org/wiki/File:BSNL-ADSL_Modem.JPG
Description: Picture of BSNL ADSL Modem
Author: Lijorijo at Malayalam Wikipedia
License: This file is licensed under the Creative Commons Attribution 2.5 Generic license.
13

Proxy Server
o A server application that acts as an intermediary for requests
from clients seeking resources from servers that provides
those resources. A proxy server thus functions on behalf of the
client when requesting service, potentially masking the true
origin of the request to the resource server.

o Instead of connecting didirectly


rectly to a server that can fulfill a
requested resource, the client directs the request to the proxy
server, which evaluates the request and performs the required
network transactions. With benefits such as load balancing,
privacy, or security
security*
* Information Courtesy Wikipedia

https://commons.wikimedia.org/wiki/File:CPT
https://commons.wikimedia.org/wiki/File:CPT-Proxy.svg
Author Milesjpool,
Description: Diagram of a blocked web request, and a successful request via a proxy
License: This file is licensed under
nder the Creative Commons Attribution
Attribution-Share
Share Alike 4.0 International license.

*****
4

Why do we need a Computer Network?


o Share the resources (Physical and
Software) and in communication.

o Users can exchange information through


file sharing.

o Some applications can be submitted to


high-powered machines. Following a
client-server model

o Communicate via email, blogs, chats,


and social media.

o Voice calls using Internet Protocol (IP)

o Education during Covid-19

o Sharing of Hardware devices such as


printers, scanners, secondary memory
i.e. Storage, processor etc
5

Types of Computer Networks


Local Area Networks (LAN)
o Generally a network owned and
operated by a single entity
o Restricted are small office,, lab,
building, school or our university
campus

Link : https://commons.wikimedia.org/wiki/File:Ethernet_LAN.svg
Author : T.seppelt, derivate work from File:Ethernet.png,
Description : ethernet network
License : This file is licensed under the Creative Commons Attribution
Attribution-Share
Share Alike 4.0
International license.
6

Wide Area Networks (WAN)


o Across Wide Geographical Area
o Composed on multiple LAN’s
interconnected
o Best example the Internet

Link : https://commons.wikimedia.org/wiki/File:Lanwan.gif
License: This file is licensed under the Creative Commons Attribution-Share Alike 4.0
International license.
Author: Audit3
Description: Wide Area Network
1

Computer Booting Process in


Simple Words

Background
o A computer requires an Operating system
to become usable
o The Operating system to work must be
loaded into the main memory
o Booting involves getting the hardware
activated and….
o Broadly to load and hand over charge of
the Computer to the Operating System
o Very General and broad overview of the
Booting Process is provided. Technical
accuracy has been adjusted for conceptual
clarity.

/* Acknowledgement of the Image Source next slide…

Link : https://commons.wikimedia.org/wiki/File:Power_On_-_texture.jpg

Description: The power button of an ASUS laptop with surrounding concentric pattern.

Attribution : (required by the license) © User:Colin / Wikimedia Commons / CC BY-SA 4.0

Changes: Image Cropped

*/
2

Step 0
o Switch on the Main Power Supply to
the Computer
o Switch on the PC/Laptop Power Button

o Power is supplied to all components on


the motherboard and other hardware
to allow them to work.
o It is possible that the power supply
may have some problems leading to
incorrect voltage levels, this leads to a
power failure message and the starting
is aborted.
Information: On a Computer Motherboard
there is a special ROM called as the ROM
BIOS (Basic Input Output System). This
ROM called as BIOS is an EPROM (to allow
future upgrades) comes pre-installed with
the Computer
3

Step 1
o CPU (Pre-Configured) goes to a
specific location in the RAM and
executes a Jump to the ROM BIOS
address
o The CPU first loads data from a ROM,
which executes a Power on Self Test
(POST). In this phase a diagnosis is
run to see if all the major hardware
components are working normally.
o Checks keyboard connection, video
cards, speakers, main memory; etc
Data is written and read back from
main memory to see if RAM is
functioning properly.
o For example informs through beeps
any known problems. Generally one
beep to say all is well or two beeps to
indicate some issue.
4

Step 2
o Only on successfully completing the
POST process, Bootstrap loader
executes.
o Its job is to locate and load the
Operating system into the Computer
Boot Strapping: Pick up one self or in
simple words self improvement by one’s
own efforts
1

Course Outcomes

Guaranteed PATH to being a


multimillionaire and a career in a
top notch company
2

o First step into the Wonderful world


of programming

o Master Programming Logic


Algorithms and then flowcharts (
MOST IMPORTANT )

o Sound skills in computer


programming

o Be able to write code on your own

o Follow the lecture sequence

o Religiously follow the sessions and


complete suggested assignments
3

/* Images Acknowledgement and Credits from Wikimedia Commons */

Author: Videoplasty.com
Trophy Flat Icon.svg from Wikimedia Commons
License: Creative Commons Attribution-ShareAlike 4.0
Credit line example: "Trophy Flat Icon.svg from Wikimedia Commons by Videoplasty.com, CC-BY-
SA 4.0"

Descr: Success road sign.


License: This file is licensed under the Creative Commons Attribution-Share Alike 2.0 Generic license.
Author: Keith Ramsey (RambergMediaImages)
Link: https://commons.wikimedia.org/wiki/File:Success_sign.jpg

*****

You might also like