Unit 2 - Operating System and Computer Network
Unit 2 - Operating System and Computer Network
Operating System
An operating system is system software (a set of programs) that
manages all computer components and operations.
A computer cannot do anything without operating system.
Operating System must be installed on every computer.
Users interact with the computer through operating
system. Example: - MS-DOC, Windows XP, Vista, Windows 7, Linux,
UNIX etc.
WAN
Router:-
It is a device which routes the information packet between two or more
physically or logically connected networks. Router uses logical address while
bridge uses physical address.
Gateway
When the network that must be connected are using completely different
protocols form each other, a power devices called gateway is used.
Network Topology
The way of connecting one computer to another computer is known as
topology. There are six types of topology:-
Bus topology:-
A bus topology connects all devices of the network through a single common
cable having exactly two end points. This cable is called backbone of the
topology.
Advantages:-
Simple architecture.
Low installation cost.
Easy to add a new node.
Disadvantage:-
Difficultly in fault detection.
Not scalable as there is a limit of how many nodes you canconnect
with backbone cable.
If there is some problem in the shared communication cable, then all
other devices can stop functioning.
Star topology:-
All devices/ computer connect to a central device called Hub or switch. Each
device requires a single cable point to point connection between the device and
hub.
Advantages:-
Easier to install
Lesser amount of cables required because each device needs to be
connected with the hub only.
Robust, if one link fails, other links will work just fine.
Easy fault detection because the link can be easily identified.
Disadvantages:-
If hub goes down everything goes down, none of the devices can
work without hub.
Hub requires more resources and regular maintenance because it is the
central system of star topology.
Tree topology:
A tree topology combined the characteristics of Bus and Star Topology. It
consists of different group of computer attached in start topology.
The Groups are than connected to a Bus backbone cable. Tree
Topology is used for the expansion of existing network.
Advantages:-
It provides point to point wiring for individual segments.
It is supported by several hardware and software vendors.
Disadvantage:-
If the backbone line breaks down then the whole networks breaks
down.
Ring topology:
In ring topology each device is connected with the two devices on either side of
it. There are two dedicated point to point links a device has with the devices on
the either side of it. This structure forms a ring thus it is known as ring topology.
Advantages:-
Easy to install.
Managing is easier as to add or remove a device from the
topology only two links are required to be changed.
Disadvantage:-
A link failure can fail the entire network as the signal will not travel
forward due to failure.
Data traffic issues, since all the data is circulating in a ring.
Mesh topology:-
In mesh topology each device is connected to every other device on the network through
a dedicated point to point link.
When we say dedicated it means that the link only carries data for the two
connected devices only.
Advantages
No Data traffic issues as there is a dedicated link between two devices
which means the link is only available for those two devices.
Mesh topology is reliable and robust as failure of one link doesn’t affect
other links and the communication between other devices on the
network.
Mesh topology is secure because there is a point to point link thus
unauthorized access is not possible.
Fault detection is easy.
Disadvantages
It's Costly.
Installation is difficult.
Maintenance is high.
Graph topology:-
The structure of graph topology is very simple in which nodes are connected
randomly but it is not necessary that all nodes be connected to one another.
Hybrid Topology
Hybrid topology is a combination of two or more topologies mentioned above.
For example, two physical star topology based network may be interconnected
through a single bus topology.
Concept of client and server
Client – A client is a piece of computer hardware or software that accesses a
service made available by a server. For example, web browsers are client that
connect to web services and retrieves web pages for display.
48 Bit
Ec f0 fe cc ca 55
Microwave
Microwaves are Radio waves that are used to provide high speedtransmission.
Both voice and data can be transmitted through microwave.
Data is transmitted through the air from one microwave station to other
similar to radio signal.
Microwave uses line of sight transmission. It means that the signals
travel in a straight path and cannot bend.
Network Protocol:
Protocol is a specially set of Rules, used in digital communication, to ensure
systematically and safe data transferring over the network.
Everything receives and sends from the internet or work accordingly to the
protocol. All these protocols existing in OSI seven layers.
Example of protocol-
HTTP
HTTP stands for Hyper Text Transport Protocol.
It is a communication protocol used to connect to servers on the
World Wide Web.
The primary function of HTTP is to establish a connection with a web
server and transmit HTML page to the user’s browser.
It allows computer user to access the internet.
FTP
File Transfer Protocol is used to transfer file over the Internet. Audio, Video,
Graphics and data file can be uploaded and download using this Protocol.
The process of transferring a file from a remote computer to local
computer is called downloading.
The process of transferring a file from a local computer uploading
to a remote computer is called uploading.
Different software are available to use this protocol.
SMTP
Simple Mail Transfer Protocol Used to transfer mail over the internet. Most email
software use to send mail.
How mail processing happen?
Full from
MDA – Mail Delivery Agent
MUA – Mail User Agent
MSA – Mai Submission
Agent MTA - Mail
Transfer Agent
HTTP vs HTTPs
HTTP HTTPS
Stands for Hyper Text Transfer Stands for Hyper Text Transfer Protocol
Protocol which are set of rules on secure and it is advanced version of
which Internet works HTTP
It is less secure as the data travels as It is designed to prevent hackers from
Palin text form browser to server accessing critical information. It is secure
against such attacks
HTTP URLs begin with http:// HTYTPs URLs begin with https://
It is mostly used for websites If the website needs to collect the
designed for information private information such as Card
consumption like blogs number, CVV etc. then it is a more
secure protocol
HTTP website do not need SSL HTTPs require SSL certificate
certificate
HTTP website doesn’t use HTTPs website use data encryption
encryption
It is faster than HTTPs It is slower than HTTP
Network security concepts:
Data travelling on a network is vulnerable to attacks and thefts. As data goes form
one point to another point on a network it may pass through several points along
the way and, giving other users the opportunity to access, and even alter it.
Firewall
Cookies
A cookie is a small piece of data sent from a website and stored in a
user’s web browser while a user is browsing a website.
Google Chrome stores all cookies in single file called cookies. The file is
located at the following path: “C:\User\Your User Name\App
Data\Local\Google\Chrome\User Data\Default”.
Some cookies remain saved and local the nest time, user visits the same
website.
Cookies help website to store information about visitors like username,
password and other details.
Cookies are message that a web server transmits to a web browser so
that the web server can keep track of the user’s activity on a specific
web site.
Or
They are the text messages sent by a web server to a web browser so that web
server can keep track of the user’s activity on a specific web site.
Hackers
Gaining knowledge about someone’s private and sensitive information by
getting accessibility of his computer system illegally. Hackers are more
interested in gaining knowledge about computer systems and possibly using this
knowledge for playful pranks.
Crackers
Crackers are the malicious programs who break into the secure systems for
some illegal or destructive purpose.
Antivirus and their workings
A type of software that is used to detect and remove viruses is called Antivirus
Software.
Antivirus contains information about different known viruses.
Network security threats:
Denial of services
A Denial of Service (DoS) attacks are those attacks that prevents the legitimate
users from accessing or using the resources and information. These types of
attacks may eat up all the resource of the system and computer become to a
halt state.
Intrusion problems
An intrusion problem is an attempt to mischievously steal some information
from someone’s computer.
Some Intrusion Problem are:
Snooping
It refers to unauthorized access of someone else data, email, computer activity
or data communication. It may comprise monitoring of keystrokes pressed,
capturing of password and log in information and interceptions of emails and
other privateinformation.
Eavesdropping
It is the act of secretly listening/ interpreting someone else’s private
communication to information while data is on its way on the network.