Module 3 HzJf6H7
Module 3 HzJf6H7
○ Examples:
■ Windows: A widely used OS known for its user-friendly
interface and extensive software compatibility.
■ Linux: An open-source OS known for its stability,
security, and flexibility, commonly used in servers and
embedded systems.
■ macOS: Apple's OS, known for its elegant design and
seamless integration with Apple hardware.
2. Utility Software:
○ System Maintenance Tools:
■ Utility software provides tools for maintaining and
optimizing the computer system.
■ These tools help improve system performance,
security, and reliability.
○ Examples:
■ Antivirus Software: Protects against malware, viruses,
and other security threats.
■ Disk Cleanup/Defragmentation Tools: Optimize
storage space by removing unnecessary files and
rearranging fragmented data.
■ Backup and Recovery Software: Creates copies of
important data and allows for system restoration in
case of data loss.
■ File compression utilities: Reduce file sizes.
3. Device Drivers:
3. Device Drivers:
○ Hardware Communication:
■ Device drivers are software programs that enable the
OS to communicate with specific hardware devices.
■ Each hardware device, such as a printer, graphics card,
or network adapter, requires a corresponding driver.
○ Translation Layer:
■ Drivers act as a translation layer between the OS and
the hardware, converting general OS commands into
specific instructions that the hardware can
understand.
■ If a driver is missing or outdated, the hardware device
may not function correctly.
○ Examples:
■ Printer drivers, graphics card drivers, sound card
drivers, network adapter drivers.
4. Firmware:
○ Embedded Software:
■ Firmware is software that is permanently embedded in
hardware devices. It is stored in non-volatile memory,
such as ROM or flash memory.
■ This software is usually used to provide the basic
instructions for how the hardware device should
operate.
○ Hardware Functionality Control:
■ Firmware controls the fundamental functions of
hardware devices, such as initializing the hardware
during startup and managing low-level operations.
○ Examples:
○ Examples:
■ BIOS (Basic Input/Output System) or UEFI (Unified
Extensible Firmware Interface): Firmware that
initializes the computer's hardware during startup and
loads the OS.
■ Embedded system firmware: This is used in devices
like routers, modems, and embedded controllers.
■ Firmware within hard drives, and other peripherals.
Operating Systems
● Process Management:
○ The OS is the traffic director for running programs
(processes). It enables multitasking, allowing you to run
multiple applications simultaneously.
○ It schedules which processes get CPU time, preventing any
single program from hogging resources. It also handles
process creation, termination, and communication between
them.
○ Essentially, it keeps everything running in an orderly fashion.
● Memory Management:
○ RAM is a valuable resource, and the OS manages its
○ RAM is a valuable resource, and the OS manages its
allocation to running programs. It ensures each program has
the necessary memory to function without interfering with
others.
○ It uses techniques like virtual memory to extend RAM
capacity by using hard drive space.
○ It also protects memory spaces, preventing programs from
crashing due to memory conflicts.
● File Management:
○ The OS organizes files and directories on storage devices
(hard drives, SSDs).
○ It provides a structured file system, allowing you to easily
locate and access files.
○ It controls file access permissions, ensuring that only
authorized users can read, write, or execute files.
○ It handles file operations like creating, deleting, renaming,
and moving files.
● Device Management:
○ The OS acts as an intermediary between the computer and
its hardware devices (printers, keyboards, mice, etc.).
○ It uses device drivers, which are software programs, to
enable communication between the OS and hardware.
○ It manages input/output operations, ensuring smooth data
transfer between the CPU and peripheral devices.
○ It allocates hardware resources to various running
programs.
● Security & Access Control:
○ The OS safeguards the computer system from unauthorized
access and malicious activities.
○ It provides authentication mechanisms (usernames and
○ It provides authentication mechanisms (usernames and
passwords) to verify user identities.
○ It enforces access control policies, granting different levels
of permissions to users and groups.
○ It implements security features like firewalls and encryption
to protect sensitive data.
● User Interface:
○ The OS provides a means for users to interact with the
computer.
○ It offers two primary types of user interfaces:
■ Command-Line Interface (CLI): A text-based interface
where users type commands.
■ Graphical User Interface (GUI): A visual interface with
windows, icons, and menus.
○ The user interface is what allows the user to give
instructions to the computer, and to receive information
back from the computer.
● Single-user OS:
○ This type of operating system is made for one person to use
at a time.
○ It's what you find on most home computers and laptops.
○ It focuses on making things easy for one person to do their
work or play games.
○ Examples are the regular versions of Windows and macOS.
● Multi-user OS:
○ This lets many people use the same computer at the same
time.
time.
○ It's like a big computer that many people can log into and
use for different things.
○ These are often used for big systems in businesses or
schools, where many people need to share resources.
○ Examples are different versions of Linux and UNIX.
● Real-Time OS (RTOS):
○ This type of OS is very fast and reliable, and it's used for
things where timing is super important.
○ It's used in things like medical devices or car systems, where
a delay of even a second could be dangerous.
○ It makes sure that certain tasks always happen at the exact
right time.
● Distributed OS:
○ This OS runs on many computers that are connected
together, but it makes them look like one big computer.
○ It helps to share the workload across many machines, so
things can run faster.
○ These are used in big systems like cloud computing, where a
lot of processing power is needed.
● Mobile OS:
○ This is made specifically for phones and tablets.
○ It's designed to work with touchscreens and to save battery
life.
○ It also lets you use apps from app stores.
○ Examples are Android and iOS.
● Windows:
● Windows:
○ Known for its widespread use in personal computers and its
user-friendly graphical interface.
○ Has a massive library of compatible software, including
productivity tools, games, and creative applications.
○ Continually updated with new features and security patches.
○ Dominates the desktop operating system market.
● Linux:
○ An open-source operating system, meaning its source code
is freely available and modifiable.
○ Highly versatile and customizable, used in servers,
supercomputers, embedded systems, and increasingly on
desktop computers.
○ Known for its stability, security, and strong command-line
interface.
○ A cornerstone of web servers, cloud infrastructure, and
cybersecurity tools.
● macOS:
○ Developed by Apple, designed to work seamlessly with
Apple's hardware.
○ Emphasizes a clean, intuitive user interface and strong
integration with Apple's ecosystem (iPhones, iPads, etc.).
○ Popular among creative professionals due to its support for
multimedia applications.
○ Known for a strong focus on security.
● Android & iOS:
○ Mobile operating systems that power the vast majority of
smartphones and tablets.
○ Android, developed by Google, is open-source and highly
customizable, with a wide range of device support.
customizable, with a wide range of device support.
○ iOS, developed by Apple, is closed-source and tightly
integrated with Apple's hardware, offering a consistent user
experience.
○ Both offer app stores that provide a wide range of
applications.
Computer Communications
● Client-Server Model:
● Network Definition:
○ A network is fundamentally a system that links computers
and other devices together.
○ This connection allows these devices to share resources,
such as files, printers, and internet access, and to
communicate with each other.
● Classification by Scale:
○ Networks are categorized primarily by their geographical
size and the area they cover.
○ This classification helps to determine the appropriate
technologies and infrastructure needed for each type of
technologies and infrastructure needed for each type of
network.
● Main Network Types:
○ The three primary network types, based on scale, are Local
Area Networks (LANs), Metropolitan Area Networks (MANs),
and Wide Area Networks (WANs).
● Definition:
○ A LAN is a network designed to connect devices within a
relatively small geographical area.
○ This area could be a single room, a home, an office building,
or a school campus.
● Examples:
○ Your home Wi-Fi network that connects your computers,
smartphones, and smart devices.
○ An office network that allows employees to share files and
printers.
○ A computer lab in a school where students can access
shared resources.
● Key Features:
○ High Speed: LANs offer high-speed data transfer, typically
ranging from 100 Mbps (megabits per second) to 10 Gbps
(gigabits per second) or even faster.
○ Limited Coverage: The coverage area is limited, usually
spanning a few kilometers at most.
○ Resource Sharing: LANs are commonly used for file sharing,
printer access, and internal communication within an
organization.
organization.
● Devices Used:
○ Switches: To connect devices within the LAN.
○ Routers: To connect the LAN to other networks or the
internet.
○ Network Cables: For wired connections.
○ Wi-Fi Routers: For wireless connections.
● Definition:
○ A MAN is a network that covers a larger geographical area
than a LAN, typically a city or a metropolitan region.
○ It bridges the gap between LANs and WANs.
● Examples:
○ City-wide broadband internet services provided by an ISP.
○ A network connecting multiple buildings within a university
campus.
○ Municipal Wi-Fi networks that provide internet access to
residents.
● Key Features:
○ Multiple LANs: MANs connect multiple LANs within a city or
town.
○ Medium Speed: Speed ranges from 10 Mbps to 1 Gbps,
offering a balance between LAN and WAN speeds.
○ Usage: Commonly used by universities, Internet Service
Providers (ISPs), and municipalities.
● Devices Used:
○ Fiber Optic Cables: For high-speed data transmission over
longer distances.
○ Wireless Access Points: To extend coverage in areas where
○ Wireless Access Points: To extend coverage in areas where
cabling is difficult.
○ Routers: For network traffic management.
● Definition:
○ A WAN is a network that spans a large geographical area,
such as cities, countries, or even the entire globe.
○ It connects devices and networks over long distances.
● Examples:
○ The Internet, which connects billions of devices worldwide.
○ Global enterprise networks that connect offices in different
countries.
○ Satellite networks used for communication in remote areas.
● Key Features:
○ Large Coverage: WANs cover vast geographical areas,
spanning nationwide or worldwide.
○ Lower Speed: Compared to LANs, WANs typically have
slower speeds due to the long-distance transmission and the
infrastructure involved.
○ Infrastructure: WANs use leased telecommunication lines,
satellites, and fiber optic cables to connect devices over long
distances.
● Devices Used:
○ Routers: To direct network traffic across the WAN.
○ Modems: To convert digital signals to analog signals for
transmission over telephone lines or other media.
○ Satellites: For long-distance communication.
○ Cloud Infrastructure: for the many services that are now
cloud based.
cloud based.
Example:
● Centralized Management:
○ Administrators can easily manage and update the network
from a central location.
○ This simplifies tasks like software updates, security patches,
and user account management.
○ This reduces the workload of network administration.
● Scalability:
○ Client/server networks can easily accommodate more clients
as the network grows.
○ Servers can be upgraded or expanded to handle increased
traffic and demands.
○ This allows a network to grow with a company.
● Data Security:
○ Centralized storage and security measures enhance data
protection.
○ Backups and recovery are easier to implement on a central
○ Backups and recovery are easier to implement on a central
server.
○ This makes it easier to keep sensitive information safe.
● Efficient Resource Sharing:
○ Servers can efficiently handle requests from multiple clients,
optimizing resource utilization.
○ This allows many users to access shared resources without
significant performance degradation.
○ This optimizes hardware usage.
● The Internet:
○ The internet is a vast client/server network where web
servers host websites and web applications, and users
access them through web browsers.
○ This is the largest example of this type of network.
● Corporate Networks:
○ In corporate environments, employees use their computers
(clients) to access centralized databases, shared files, and
applications hosted on company servers.
○ This allows for company wide data sharing.
● Online Gaming Servers:
○ Multiplayer online games rely on dedicated gaming servers
to manage player interactions, game data, and real-time
communication.
○ This allows for many people to play the same game
together.
Example:
● Unstructured P2P:
○ Peers connect to each other randomly, without any
organized structure.
○ Searching for files or resources involves flooding the
network with queries, which can be inefficient.
○ Resilient to peer failures, as there's no central point of
control.
○ Example: Gnutella, early file-sharing networks.
● Structured P2P:
○ Peers are organized into a specific architecture, often using
a Distributed Hash Table (DHT).
○ This structure enables efficient searching for resources, as
each peer knows where to find specific data.
○ More efficient than unstructured P2P, but can be more
complex to implement.
○ Example: DHT-based networks.
● Hybrid P2P:
○ Combines elements of P2P and client/server models.
○ A central server assists in managing connections and
facilitating communication between peers.
facilitating communication between peers.
○ Peers still exchange data directly, but the server helps with
discovery and coordination.
○ Examples: Skype, some blockchain networks.
● Security Risks:
○ The lack of centralized control can make P2P networks
vulnerable to security threats like malware and data
breaches.
breaches.
○ It is harder to ensure security protocols are followed by all
peers.
● Difficult to Manage:
○ Without central administration, it's challenging to manage
updates, monitor network activity, or enforce policies.
○ Trouble shooting network issues can be very difficult.
● Performance Issues:
○ For large-scale applications or high-demand services, P2P
networks can be slower than client/server networks.
○ Network congestion can heavily effect performance.
● Legal Issues:
○ P2P networks have been associated with illegal file sharing
and piracy, leading to legal challenges.
○ Copyright infringement is a common problem with these
types of networks.
Network Topologies
● Structure:
○ All devices in the network are connected to a single, shared
communication line, often called the "backbone" or "bus."
○ Data travels along this backbone, and all devices receive it,
but only the intended recipient processes it.
● Pros:
○ Easy Setup: Relatively simple to set up and configure,
making it cost-effective for small networks.
○ Less Cabling: Requires less cabling compared to other
topologies, reducing installation costs.
● Cons:
○ Single Point of Failure: If the backbone cable fails, the
entire network goes down, causing a complete network
outage.
entire network goes down, causing a complete network
outage.
○ Performance Degradation: As more devices are added,
network performance decreases due to increased traffic and
collisions.
● Example:
○ Early Ethernet networks, which used coaxial cables as the
backbone.
2⃣ Star Topology
● Structure:
○ All devices are connected to a central device, such as a
switch or hub.
○ All communication between devices goes through this
central point.
● Pros:
○ Fault Tolerance: If one device or cable fails, only that device
is affected; the rest of the network remains operational.
○ Easy Expansion: Easy to add or remove devices without
disrupting the network.
● Cons:
○ Central Point of Failure: If the central switch or hub fails,
the entire network becomes inoperative.
○ More Cabling: Requires more cabling compared to a bus
topology, as each device has a dedicated connection to the
central hub.
● Example:
○ Modern office Local Area Networks (LANs) and Wi-Fi
networks.
3⃣ Ring Topology
3⃣ Ring Topology
● Structure:
○ Devices are connected in a closed loop, forming a circular
ring.
○ Data travels in one direction (or both directions in dual-ring
topologies) around the ring.
● Pros:
○ Predictable Performance: Data transmission follows a
predictable path, ensuring consistent performance.
○ No Central Device: Eliminates the single point of failure
associated with a central hub or switch.
● Cons:
○ Single Point of Failure: A single cable or device failure can
disrupt the entire network.
○ Slower Transmission: Data must pass through each device
in the ring, which can lead to slower transmission speeds
compared to star topologies.
● Example:
○ Older Token Ring networks used in some legacy systems.
4⃣ Mesh Topology
● Structure:
○ Devices are interconnected with multiple redundant
connections.
○ Provides multiple paths for data transmission.
● Types:
○ Full Mesh: Every device is directly connected to every other
device in the network.
○ Partial Mesh: Some devices are connected to multiple other
○ Partial Mesh: Some devices are connected to multiple other
devices, while others have fewer connections.
● Pros:
○ High Reliability: Redundant connections provide fault
tolerance, ensuring network availability even if some
connections fail.
○ Enhanced Security: Multiple paths make it difficult for
unauthorized access or data interception.
● Cons:
○ High Cost: Requires extensive cabling and network devices,
making it expensive to implement.
○ Complex Implementation: Complex setup and
maintenance due to the large number of connections.
● Example:
○ Military and mission-critical networks, financial institutions,
and some backbone internet connections.
5⃣ Hybrid Topology
● Structure:
○ Combines two or more different topologies to create a more
flexible and efficient network.
○ Allows for customization to meet specific network
requirements.
● Pros:
○ Scalability: Can be easily scaled to accommodate growing
network needs.
○ Flexibility: Adaptable to various network environments and
requirements.
○ Optimization: Can be optimized for performance, reliability,
○ Optimization: Can be optimized for performance, reliability,
and security.
● Cons:
○ Complexity: Can be complex to design, implement, and
manage.
○ High Cost: May involve significant costs due to the
combination of different technologies.
● Example:
○ Large corporate networks that combine star, mesh, and bus
topologies to meet diverse needs.
Basics of IP Addresses
● What is an IP Address?
○ Think of an IP address as a computer's "address" on a
network. It's a unique number that lets devices find each
other and communicate.
○ It's how your computer sends and receives data over the
internet or within your home network.
○ We have two main types:
■ IPv4: The older, 32-bit version (like 192.168.1.1). It's
running out of available addresses.
■ IPv6: The newer, 128-bit version (like 2001:db8::1). It
provides a massive amount of addresses to support all
the devices connecting to the internet.
● Types of IP Addresses
○ Public IP Address:
■ This is the address your internet service provider (ISP)
gives you to connect to the wider internet.
gives you to connect to the wider internet.
■ It's like your house's street address, making you
reachable from anywhere in the world.
○ Private IP Address:
■ This is used within your local network (like your home
Wi-Fi).
■ It's how devices within your home or office
communicate with each other.
■ Common examples are 192.168.x.x or 10.x.x.x.
○ Static IP Address:
■ This is an IP address that you set manually and it stays
the same.
■ Useful for devices that need a consistent address, like
servers or printers.
○ Dynamic IP Address:
■ This is an IP address that's assigned automatically by a
network server (DHCP) and can change periodically.
■ Most home networks use dynamic IP addresses.
● What is DHCP?
○ DHCP is a network protocol that automates the process of
assigning IP addresses and other network configuration
parameters to devices on a network.
○ It eliminates the need for manual configuration, which can
be time-consuming and prone to errors.
○ DHCP allows a network to run smoothly, by automatically
assigning needed network data.
● How DHCP Works?
assigning needed network data.
● How DHCP Works?
○ 1⃣ Client Request:
■ When a device (client) joins a network, it broadcasts a
request for an IP address.
○ 2⃣ DHCP Server Assignment:
■ A DHCP server on the network receives the request
and assigns an available IP address from its pool of
addresses.
■ The server also provides other network configuration
information, such as the subnet mask, default gateway,
and DNS server addresses.
○ 3⃣ Client Usage:
■ The client uses the assigned IP address and network
configuration to communicate on the network.
○ 4⃣ IP Lease Renewal:
■ The assigned IP address is typically leased for a specific
period.
■ Before the lease expires, the client attempts to renew
the IP address with the DHCP server.
■ This allows the DHCP server to reclaim IP addresses
that are no longer in use.
● Advantages of DHCP:
○ ✅ Reduces Manual Configuration Errors:
■ Automating IP address assignment eliminates the risk
of human errors, such as assigning duplicate IP
addresses.
○ Efficiently Manages Large Networks:
■ DHCP simplifies network administration, especially in
large networks with numerous devices.
○ Ensures IP Reuse and Prevents Conflicts:
○ Ensures IP Reuse and Prevents Conflicts:
■ DHCP reuses IP addresses when devices leave the
network, preventing IP address conflicts.
● Example:
○ Your home Wi-Fi router acts as a DHCP server, automatically
assigning IP addresses to your laptops, smartphones, and
other connected devices.
● What is NAT?
○ NAT is a network technique that translates private IP
addresses used within a local network into a single public IP
address used for communication on the internet.
○ It allows multiple devices on a private network to share a
single public IP address, conserving valuable IPv4 addresses.
● Types of NAT:
○ ✔ Static NAT:
■ A one-to-one mapping between a private IP address
and a public IP address.
■ Used for devices that need to be accessible from the
internet, such as web servers.
○ ✔ Dynamic NAT:
■ A pool of public IP addresses is assigned dynamically to
internal devices as needed.
■ When a device initiates a connection to the internet,
it's assigned a public IP address from the available
pool.
○ ✔ PAT (Port Address Translation) / NAT Overloading:
■ Multiple private IP addresses share a single public IP
address by using different port numbers.
address by using different port numbers.
■ This is the most common type of NAT used in home
routers.
■ This is how many devices can use the internet at the
same time, from one public IP.
● Advantages of NAT:
○ ✅ Conserves IPv4 Addresses:
■ NAT allows multiple devices to share a single public IP
address, mitigating the scarcity of IPv4 addresses.
○ Provides Basic Security:
■ NAT hides the internal network's IP addresses from the
internet, providing a basic level of security.
○ Reduces IP Conflicts in Private Networks:
■ NAT allows for the use of private IP ranges, that can be
duplicated between many networks, without causing
internet wide IP conflicts.
● Example:
○ Your home router uses NAT to translate the private IP
addresses of your devices into your ISP-assigned public IP
address, allowing all your devices to access the internet.
Perimeter Security
● What is DNS?
○ Translates domain names (e.g., www.google.com) into IP
addresses (e.g., 142.250.182.206).
○ Works like the phonebook of the internet, allowing users to
access websites without remembering IPs.
● How DNS Works?
4. User enters a website address (e.g.,
www.example.com).
5. Browser queries the DNS server.
6. DNS resolves the domain name to an IP address.
7. The website loads using the IP address.
7. The website loads using the IP address.
● Types of DNS Servers:
○ Recursive Resolver – Finds the IP address requested by the
user.
○ Root Name Server – Directs queries to the right TLD
(Top-Level Domain) server.
○ TLD Server – Handles domains like .com, .org, .edu.
○ Authoritative Name Server – Provides the final IP address of
the domain.
● Example:
○ Google’s Public DNS: 8.8.8.8 and 8.8.4.4
● What is a VPN?
○ A VPN encrypts internet traffic and hides the user’s IP
address, enhancing security and privacy.
○ Securely connects users to private networks over the
internet.
● How VPN Works?
3. User connects to a VPN server.
4. The VPN encrypts data before sending it over the
internet.
5. The destination server sees the VPN’s IP instead of the
user’s real IP.
● Benefits of VPN:
○ Privacy Protection – Hides browsing activity from ISPs and
hackers.
○ Secure Remote Access – Allows employees to work remotely.
○ Bypasses Geo-Restrictions – Access restricted content (e.g.,
○ Bypasses Geo-Restrictions – Access restricted content (e.g.,
Netflix, blocked websites).
● Example:
○ NordVPN, ExpressVPN, Cisco AnyConnect (for businesses).
3. Routers
● What is a Router?
○ A network device that connects multiple networks and
directs data between them.
○ Uses IP addresses to determine the best path for forwarding
packets.
● Types of Routers:
○ Wired Routers – Use Ethernet cables for connections.
○ Wireless Routers (Wi-Fi) – Provide wireless internet access.
○ Core Routers – Used in large networks (e.g., ISPs, data
centers).
● Functions of a Router:
○ Assigns IP addresses to devices.
○ Implements NAT (Network Address Translation) for internet
access.
○ Uses firewall rules to enhance security.
● Example:
○ Home routers like TP-Link, Netgear, Cisco.
4. Client-Server Model