Monday, 4 January 2016

FUNDAMENTALS OF INFORMATION TECHNOLOGY ( FIT )

WHAT IS COMPUTER?

 Definition: A Computer is an electronic device for storing data, processing information and displays the desired (want) output in human readable form.
Especially computer is used to type documents, send email, play games, and browse the Web. You can also use it to edit or create spreadsheets, presentations, and even videos.

DATA REPRESENTATION:

NUMBERSYSTEM:
A set of values used to represent different quantities is known as Number System". 
Some important number systems are as follows.
·         Decimal number system
·         Binary number system
·         Octal number system
·         Hexadecimal number system
Decimal number System
The Decimal Number System consists of ten digits from 0 to 9 (i.e 0 1 2 3 4 5 6 7 8 9 ). These digits can be used to represent any numeric value. The base of decimal number system is 10. It is the most widely used number system.

Example:

The value of digit 4     =          4x102    =          400
The value of digit 5     =          5x101 =          50       
The value of digit 3     =          3x100 =          3
The actual number can be found by adding the values obtained by the digits as follows:
400 + 50 + 3    =45310

Binary Number System

Digital computer represents all kinds of data and information in the binary system. Binary Number System consists of two digits 0 and 1. Its base is 2. Each digit or bit in binary number system can be 0 or 1. A combination of binary numbers may be used to represent different quantities like 1001.

Example: Convert 101112 to decimal number

101112             =          1 x 24 + 0 x 23 + 1 x 22 + 1 x 21 + 1 x 20
                        =          1 x 16 + 0 + 1 x 4 + 1 x 2 + 1 x 1
                        =          16 + 0 + 4 2 + 1
                        =          2310

Octal Number System

Octal Number System consists of eight digits from 0 to 7. The base of octal system is 8. Each digit position in this system represents a power of 8. Any digit in this system is always less than 8. Octal number system is used as a shorthand representation of long binary numbers.

Example: convert 458 to decimal number

458       =          4 x 81 + 5 x 80
            =          4 x 8 + 5 x 1
            =          32 + 5
            =          3710    

Hexadecimal number system

The Hexadecimal Number System consists of 16 digits from 0 to 9 and A to F. The alphabets A to F represent decimal numbers from 10 to 15. The base of this number system is 16. Each digit position in hexadecimal system represents a power of 16. The number 76416 is valid hexadecimal number. It is different from 76410 which is seven hundred and sixty four.

Example: Convert 3A16 to decimal number

3A16     =          3 x 161 + A x 16                                              
            =          3 x 16 + 10 x 1
            =          48 + 10
            =          5810




BINARY NUMBER CONVERSION

Binary to Octal

An easy way to convert from binary to octal is to group binary digits into sets of three, starting with the least significant (rightmost) digits.

Then, look up each group in a table:
Binary:
000
001
010
011
100
101
110
111
Octal:
0
1
2
3
4
5
6
7
Binary =
011
100
101
Octal  =
3
4
5
= 345 oct


Binary to Hexadecimal

An equally easy way to convert from binary to hexadecimal is to group binary digits into sets of four, starting with the least significant (rightmost) digits.
Binary: 11100101 = 1110 0101
Binary:
0000
0001
0010
0011
0100
0101
0110
0111
Hexadecimal:
0
1
2
3
4
5
6
7

Binary:
1000
1001
1010
1011
1100
1101
1110
1111
Hexadecimal:
8
9
A
B
C
D
E
F
Binary =
1110
0101
Hexadecimal =
E
5
= E5

Binary to Decimal

1.      Start the decimal result at 0.
2.      Remove the most significant binary digit (leftmost) and add it to the result.
3.      If all binary digits have been removed, you’re done. Stop.
4.      Otherwise, multiply the result by 2.
5.      Go to step 2.
Here is an example of converting 11100000000 binary to decimal:
Binary Digits
  Operation
  Decimal Result
  Operation
  Decimal Result
11100000000
+1
1
× 2
2
1100000000
+1
3
× 2
6
100000000
+1
7
× 2
14
00000000
+0
14
× 2
28
0000000
+0
28
× 2
56
000000
+0
56
× 2
112
00000
+0
112
× 2
224
0000
+0
224
× 2
448
000
+0
448
× 2
896
00
+0
896
× 2
1792
0
+0
1792
done.

 

DECIMAL NUMBER CONVERSION

A repeated division and remainder algorithm can convert decimal to binary, octal, or hexadecimal.
1.      Divide the decimal number by the desired target radix (2, 8, or 16).
2.      Append the remainder as the next most significant digit.
3.      Repeat until the decimal number has reached zero.

Decimal to Binary

Here is an example of using repeated division to convert 1792 decimal to binary:
Decimal Number
  Operation
  Quotient
  Remainder
  Binary Result
1792
÷ 2 =
896
0
0
896
÷ 2 =
448
0
00
448
÷ 2 =
224
0
000
224
÷ 2 =
112
0
0000
112
÷ 2 =
56
0
00000
56
÷ 2 =
28
0
000000
28
÷ 2 =
14
0
0000000
14
÷ 2 =
7
0
00000000
7
÷ 2 =
3
1
100000000
3
÷ 2 =
1
1
1100000000
1
÷ 2 =
0
1
11100000000
0
done.

Decimal to Octal

Here is an example of using repeated division to convert 1792 decimal to octal:
Decimal Number
  Operation
  Quotient
  Remainder
  Octal Result
1792
÷ 8 =
224
0
0
224
÷ 8 =
28
0
00
28
÷ 8 =
3
4
400
3
÷ 8 =
0
3
3400
0
done.

Decimal to Hexadecimal

Here is an example of using repeated division to convert 1792 decimal to hexadecimal:
Decimal Number
  Operation
  Quotient
  Remainder
  Hexadecimal Result
1792
÷ 16 =
112
0
0
112
÷ 16 =
7
0
00
7
÷ 16 =
0
7
700
0
done.
The only addition to the algorithm when converting from decimal to hexadecimal is that a table must be used to obtain the hexadecimal digit if the remainder is greater than decimal 9.
Decimal:
0
1
2
3
4
5
6
7
Hexadecimal:
0
1
2
3
4
5
6
7

Decimal:
8
9
10
11
12
13
14
15
Hexadecimal:
8
9
A
B
C
D
E
F
The addition of letters can make for funny hexadecimal values. For example, 48879 decimal converted to hex is:
Decimal Number
  Operation
  Quotient
  Remainder
  Hexadecimal Result
48879
÷ 16 =
3054
15
F
3054
÷ 16 =
190
14
EF
190
÷ 16 =
11
14
EEF
11
÷ 16 =
0
11
BEEF
0
done.

OCTAL NUMBER CONVERSION

Octal to Binary
Converting from octal to binary is as easy as converting from binary to octal. Simply look up each octal digit to obtain the equivalent group of three binary digits.
Octal:
0
1
2
3
4
5
6
7
Binary:
000
001
010
011
100
101
110
111

Octal  =
3
4
5
Binary =
011
100
101
= 011100101 binary

Octal to Hexadecimal
When converting from octal to hexadecimal, it is often easier to first convert the octal number into binary and then from binary into hexadecimal. For example, to convert 345 octal into hex:
(from the previous example)
Octal  =
3
4
5
Binary =
011
100
101
= 011100101 binary

Drop any leading zeros or pad with leading zeros to get groups of four binary digits (bits):
Binary 011100101 = 1110 0101
Then, look up the groups in a table to convert to hexadecimal digits.
Binary:
0000
0001
0010
0011
0100
0101
0110
0111
Hexadecimal:
0
1
2
3
4
5
6
7

Binary:
1000
1001
1010
1011
1100
1101
1110
1111
Hexadecimal:
8
9
A
B
C
D
E
F

Binary =
1110
0101
Hexadecimal =
E
5
= E5 hex
Therefore, through a two-step conversion process, octal 345 equals binary 011100101 equals hexadecimal E5.
Octal to Decimal
The conversion can be performed in the conventional mathematical way, by showing each digit place as an increasing power of 8.
345 octal = (3 * 82) + (4 * 81) + (5 * 80) = (3 * 64) + (4 * 8) + (5 * 1) = 229 decimal

 

HEXADECIMAL NUMBER CONVERSION

Hexadecimal to Binary

Converting from hexadecimal to binary is as easy as converting from binary to hexadecimal. Simply look up each hexadecimal digit to obtain the equivalent group of four binary digits.
Hexadecimal:
0
1
2
3
4
5
6
7
Binary:
0000
0001
0010
0011
0100
0101
0110
0111

Hexadecimal:
8
9
A
B
C
D
E
F
Binary:
1000
1001
1010
1011
1100
1101
1110
1111

Hexadecimal =
A
2
D
E
Binary =
1010
0010
1101
1110
= 1010001011011110 binary

Hexadecimal to Octal

When converting from hexadecimal to octal, it is often easier to first convert the hexadecimal number into binary and then from binary into octal. For example, to convert A2DE hex into octal:
(from the previous example)
Hexadecimal =
A
2
D
E
Binary =
1010
0010
1101
1110
= 1010001011011110 binary
Add leading zeros or remove leading zeros to group into sets of three binary digits.
Binary: 1010001011011110 = 001 010 001 011 011 110
Then, look up each group in a table:
Binary:
000
001
010
011
100
101
110
111
Octal:
0
1
2
3
4
5
6
7

Binary =
001
010
001
011
011
110
Octal =
1
2
1
3
3
6
= 121336 octal
Therefore, through a two-step conversion process, hexadecimal A2DE equals binary 1010001011011110 equals octal 121336.

Hexadecimal to Decimal

Converting hexadecimal to decimal can be performed in the conventional mathematical way, by showing each digit place as an increasing power of 16. Of course, hexadecimal letter values need to be converted to decimal values before performing the math.
Hexadecimal:
0
1
2
3
4
5
6
7
Decimal:
0
1
2
3
4
5
6
7
Hexadecimal:
8
9
A
B
C
D
E
F
Decimal:
8
9
10
11
12
13
14
15

A2DE hexadecimal:
= ((A) * 163) + (2 * 162) + ((D) * 161) + ((E) * 160)
= (10 * 163) + (2 * 162) + (13 * 161) + (14 * 160)
= (10 * 4096) + (2 * 256) + (13 * 16) + (14 * 1)
= 40960 + 512 + 208 + 14
= 41694 decimal




TYPES OF COMPUTER

Computer can be classified according to two different ways. They are                 
1.      According to the logic used by the computer.
2.      According to the size of the computer.
According to the logic used by the computer. It can be classified into 3 types. They are
1.      Analgo Computers    2. Digital Computers 3. Hybrid Computers
Analgo Computers:  The computers which accept the data in the form of voltage (v) or current signals  and convert  them to numeric values  are called Analog Computers.
These Computers can measure physical quantities like temperature, speed etc..These Computers give only approximate results.
Ex: . A speedometer which measures the speed of vehicle, and thermometer which measures the temperature of the body etc...
Digital Computers:   The computer which accepts the data in the form of binary digits (bits) representing ZERO (0) and ONE (1) are called as Digital Computers. Each one is called as a bit. Logically 0 indicates false and 1 indicates true.
            Digital Computers give more accurate and very faster results than analog computers.
            Digital Computers deal with counting rather than physical measurement. They accept the input data and instructions in the form of digits 0 to 9, alphabets ( A to Z) or special symbols like + , * ,- ,/ ,$ ,% etc….   In this there are TWO purposes of digital computers. They are
1.      General Purpose Digital Computer 2.     Special Purpose Digital Computer
General Purpose Digital Computers are designed to perform of different jobs or applications. These computers can be used in solving a business problem as well as mathematical problem with same accuracy and consistency.
Special Purpose Digital Computers are designed to meet the need of special application. They are designed, made and used for only a single job. So they execute their tasks quickly and efficiently.
Hybrid Computers:   The computers which accept the data in the form of combination of voltage or signals or binary digits are known as Hybrid Computers. So, these computers are computers which have the features of both digital and analog computers.
These computers are very useful in scientific research and to perform specific job etc….
Ex:       In a hospital ICU (Intensive Care Unit) , Analog devices may measure a patient’s heart function, temperature and other vital signs. These measurements may then be converted into numbers and supplied to the digital device which may send as immediate signal to the nurses’ station if any abnormal reading is detected.
According to the SIZE , the computers are classified as follows:
1. Super computers  2. Mainframe computers     3.Mini computers     4. Micro computers
Super computers:     Super computers are large size computers and  these computers can be processed  billions of instructions per second. These systems are multiprocessor system  and it is used to do parallel processing. These systems are very expensive and powerful and used in the complex tasks. It is typically used for following applications.
·        Weather Information
·        Medicine
·        Real-time Animation etc…..
Mainframe computers:                   Mainframe computers are large size computers and these computers can be processed hundreds of millions of instructions per second. In this computer, RAM is much more than micro computers as well as mini computers and it supports 100 users in time sharing mode. These computers are used in large organizations like…
·        Railway reservations
·        Airlines reservations
·        Banking applications etc…..
Mini computers:       Mini computers are also large size computers and these computers and it supports multiuser environment. These computers are expensive as compare to micro computers. The main memory RAM can be 1MB to 16 MB.These computers also used in large organizations like..
·        Reservation system
·        Banking and industries.
Micro computers  :   Micro computers are smallest category of digital computers in which a microprocessor performs the function of ALU and Control Unit. These computers are single user systems which mean that a single user can operate only one system at a time. These computers are also classified into types. They are
1.      Desktop computers  2. Laptop computers            3. Handheld computers
Desktop computers  ( Personal computers):             Desktop computers are also called as Personal computers or simply PC’s. Today the Desktop computers are most popular computer systems. They are usually easier to use and more affordable.
Laptop computers:                     Laptop computers are portable computers. They are light weight computers with a thin screen. They are also called as notebook computers because of their small size. It can be easily carried from one place to another place. It has battery also.
Handheld computers:    Handheld computers are also called as Personal Digital Assistants (PDA’s). These computers are pen based and battery – powered. These systems are small size and carried easily from one place to another place.












GENARATIONS OF COMPUTER
Initially, the generation term was used to distinguish between varying hardware technologies. But nowadays, generation includes both hardware and software, which together make up an entire computer system.
Following are the main five generations of computers
S.N.
Generation & Description
1
The period of first generation: 1946-1959. Vacuum tube based.
2
The period of second generation: 1959-1965. Transistor based.
3
The period of third generation: 1965-1971. Integrated Circuit based.
4
The period of fourth generation: 1971-1980. VLSI (Very Large Scale Integration) microprocessor based.
5
The period of fifth generation: 1980-onwards. ULSI ( Ultra )microprocessor based

The computers of first generation used vacuum tubes as the basic components for memory and circuitry for CPU (Central Processing Unit). In this generation mainly batch processing operating system were used. Punched cards, paper tape, and magnetic tape were used as input and output devices. The computers in this generation used machine code as programming language.
The main features of first generation are:
·         Vacuum tube technology
·         Supported machine language only
·         Very costly
·         Generated lot of heat
·         Slow input and output devices
·         Huge size
·         Need of A.C.
·         Non-portable
In this generation transistors were used that were cheaper, consumed less power, more compact in size, more reliable and faster than the first generation machines made of vacuum tubes. In this generation, magnetic cores were used as primary memory and magnetic tape and magnetic disks as secondary storage devices. In this generation assembly language and high-level programming languages like FORTRAN, COBOL were used. The computers used batch processing and multiprogramming operating system.
The main features of second generation are:
·        Use of transistors
·        Smaller size as compared to first generation computers
·        Generated less heat as compared to first generation computers
·        Faster than first generation computers
·        Still very costly
·        A.C. needed
·        Supported machine and assembly languages
The computers of third generation used integrated circuits (IC's) in place of transistors. A single IC has many transistors, resistors and capacitors along with the associated circuitry. The IC was invented by Jack Kilby. This development made computers smaller in size, reliable and efficient. In this generation remote processing, time-sharing, multi-programming operating system were used. High-level languages (FORTRAN-II TO IV, COBOL, PASCAL PL/1, BASIC, ALGOL-68 etc.) were used during this generation.
The main features of third generation are:
·         IC used
·         Smaller size
·         Generated less heat
·         Faster
·         Lesser maintenance
·         Still costly
·         A.C needed
·         Supported high-level language
The computers of fourth generation used Very Large Scale Integrated (VLSI) circuits. VLSI circuits having about 5000 transistors and other circuit elements and their associated circuits on a single chip made it possible to have microcomputers of fourth generation. Fourth generation computers became more powerful, compact, reliable, and affordable. As a result, it gave rise to personal computer (PC) revolution. In this generation time sharing, real time, networks, distributed operating system were used. All the high-level languages like C, C++, DBASE etc., were used in this generation.
The main features of fourth generation are:
·         VLSI technology used
·         Very cheap
·         Use of PC's
·         Very small size
·         No A.C. needed
·         Concept of internet was introduced
·         Computers became easily available

In the fifth generation, the VLSI technology became ULSI (Ultra Large Scale Integration) technology, resulting in the production of microprocessor chips having ten million electronic components. This generation is based on parallel processing hardware and AI (Artificial Intelligence) software. All the high-level languages like C and C++, Java, .Net etc., are used in this generation.
The main features of fifth generation are:
·        ULSI technology
·        Development of true artificial intelligence
·        Advancement in Parallel Processing
·         More user friendly interfaces with multimedia feature




BLOCK DIAGRAM OF COMPUTER

The computer system consists of three units:

1.  Input Unit
2. Central Processing Unit (CPU)
 3. Output Unit
 
Block diagram of a Computer:

Working Process of above diagram:
·        The program or data is entered through input unit like keyboard and that data is controlled by C .U.
·        The control unit sends this data to the memory unit (M.U) for temporary storage i.e. in RAM (Random Access Memory).
·        This temporary stored data is then sent to A.L.U (Arithmetic Logical Unit) for processing through C.U.
·        A.L.U processes this data and then this processed data sent it back to Memory Unit for permanent storage i.e. in hard disk, again through C.U.
·        This processed data can also be sent to output unit directly through control unit or it can also sent from permanently stored memory i.e. M.U to the output unit.
·        Finally, this output unit will give the result



1.     Input: This is the process of entering data and programs in to the computer system. You should know that computer is an electronic machine like any other machine which takes as inputs raw data and performs some processing giving out processed data. Therefore, the input unit takes data from us to the computer in an organized manner for processing.

2.     Central Processing Unit: It is the part of the computer that carries out the instructions of a computer program. It is the unit that reads and executes program instructions. Hence it is known as the Brain of the computer. The CPU consists of storage or memory unit, Arithmetic Logic Unit (ALU) and control unit.
(a). Memory Unit: It is also known as the primary storage or main memory. It stores data, program instructions, internal results and final output temporarily before it is sent to an appropriate output device. It consists of thousands of cells called ―storage locations‖. These cells activate with ―off-on‖ or binary digits (0,1) mechanism. Thus a character either a letter or numerical digit is stored as a string of (0, 1) Binary digits (BITS). These bits are used to store instructions and data by their combinations.
(b) Arithmetic and Logical Unit(ALU): It is the unit where all Arithmetic operations (addition, subtraction etc.) and logical functions such as true or false, male or female are performed. Once data are fed into the main memory from input devices, they are held and transferred as needed to ALU where processing takes place. No process occurs in primary storage. Intermediate generated results in ALU are temporarily placed in memory until needed at later time. Data may move from primary memory to ALU and back again to storage many times before the process is finalized.

(c).Control Unit : The control unit controls all the activities of the computer.

3.         Output: This is the process of producing results from the data for getting useful information. Similarly the output produced by the computer after processing must also be kept somewhere inside the computer before being given to you in human readable form. Again the output is also stored inside the computer for further processing.




PRIMARY STORAGE
Primary Storage is also called as a Main Memory and it is the part of computer system. In this, the processor and CPU directly stores data and retrieve information. This memory is accessed by CPU in random manner.
The Primary Memory or Main Memory is implemented by two types of memory technologies. They are 1.RAM (Random Access Memory)  2.ROM (Read Only Memory)
1. RAM (Random Access Memory):          Ram is made of electronic chips that means made of semiconductor material just like processors. In RAM, transistors make up the individual storage cells which can each keep an amount of data. RAM is also called as RWM (Read and Write Memory).
RAM stores the data temporarily in the computer. RAM nature is VOLATILE that means data stored in computer, it is lost when we switch of the computer or if there is a power failure.
RAM can be both means it can be physically as well as in the amount of data it can hold. RAMs are two types. They are
1. SRAM (Static RAM)                       2. DRAM (Dynamic RAM)
1. SRAM (Static RAM):         The word Static indicates that the memory retains           (keep or maintain) its contents as long as electrical power is applied to the chip. However, data is lost when the power gets down due to the volatile. SRAM need not have to be refreshed on the regular basis
2. DRAM (Dynamic RAM):  DRAM unlike SRAM, it must be continually refreshed in order for maintain the data. DRAM is used for most system memory because it is cheap and small. DRAM used less chips than SRAM for the same amount of storage space.




2. ROM (Read Only Memory):       ROM is a permanent memory and it is provided by the manufacturer at the time of fabrication. They are two reasons why read-only
·        Permanent
·        Security
Permanent:   The values or data stored in ROM are always retained even when power is off .For this reason it is called as Non-Volatile and the hard disk is also Non-Volatile for this same reason but regular RAM is not.
Security:         Actually ROM refers only to mask ROM the oldest type of solid state ROM, which is fabricated with the desired data permanently stored it and it can never modified. But modern types semiconductor ROM chips such as EPROM and flash EERPOM can be erased and re-programmed multiple times.
            ROM has different types of Rom’s.  They are
·        MROM ( Masked ROM)
·        PROM  (  Programmable ROM)
·        EPROM(  Erasable PROM)
·        EEPROM( Electrically Erasable PROM)
MROM (Masked ROM):      It is a hard-wired device that contained pre-programmed set of data or instructions.
PROM (Programmable ROM):        PROM is read only memory that can be modified only once by user. The user buys a blank PROM and enters the desired contents using PROM programmer. It cannot be erasable.
EPROM (Erasable PROM):   EPROM can be erased and re-programmed and it can be erased by exposure to strong ultraviolet light (typically for 10 minutes or longer), then re-written with a process that again requires application of higher than usual voltage.
EEPROM (Electrically Erasable PROM):     EERPOM is programmed and erased electrically. It can be erased and re-programmed about 10 thousand times. Both erasing and programming take about 4 to 10 milliseconds. In this, any location can be selectively erased and programmed and it can be erased 1 byte at a time.

CACHE MEMORY:
            Cache Memory is the process of moving the data between CPU and RAM. It is one of the most time consuming operations a CPU must performs  because  RAM is much more slow than CPU.
A partial (in complete) solution to this problem is to include a Cache Memory in the CPU.
Cache Memory is similar to RAM except that it is extremely fast compared to normal memory and it is used in a different way.


            When a program is running and the CPU needs to read piece of data or program instructions from RAM, the CPU checks first to see whether the data is in cache memory. If the data is not there, the CPU reads the data from RAM into its registers, but also loads a copy of the data into cache memory. The next time the CPU needs the data; it finds it in the cache memory and saves the time needed to load the data from RAM.
UNIT-2

INPUT DEVICES

Devices are used to provide data and instructions to the computer are called Input devices.  Some important input devices are
1. Keyboard 2.Mouse 3. Joy Stick 4.Light pen 5.Track Ball 6.Scanner 7.Microphone 8.Bar Code Reader
Keyboard
Keyboard is the most common and very popular input device which helps in inputting data to the computer. Keyboards are of two sizes 84 keys or 101/102 keys, but now keyboards with 104 keys or 108 keys are also available for Windows and Internet.
S.No
Keys
Description
1
Typing Keys
These keys include the letter keys (A-Z) and digit keys (0-9) which generally give same layout as that of typewriters.
2
Numeric Keypad
It is used to enter numeric data or cursor movement. Generally, it consists of a set of 17 keys that are laid out in the same configuration used by most adding machines and calculators.
3
Function Keys
The twelve function keys are present on the keyboard which is arranged in a row at the top of the keyboard. Each function key has unique meaning
4
Control keys
These keys provide cursor and screen control. It includes four directional arrow keys. Control keys also include Home, End, Insert, Delete, Page Up, Page Down, Control(Ctrl), Alternate(Alt), Escape(Esc).
5
Special Purpose Keys
Keyboard also contains some special purpose keys such as Enter, Shift, Caps Lock, Num Lock, Space bar, Tab, and Print Screen.

Mouse

Mouse is most popular pointing device. It is a very famous cursor-control device having a small palm size box with a round ball at its base which senses the movement of mouse and sends corresponding signals to CPU when the mouse buttons are pressed. Generally it has two buttons called left and right button and a wheel is present between the buttons.

Joystick

Joystick is also a pointing device which is used to move cursor position on a monitor screen. It is a stick having a spherical ball at its both lower and upper ends. The lower spherical ball moves in a socket. The joystick can be moved in all four directions. The function of joystick is similar to that of a mouse. It is mainly used in Computer Aided Designing (CAD) and playing computer games.
Light Pen
Light pen is a pointing device which is similar to a pen. It is used to select a displayed menu item or draw pictures on the monitor screen. It consists of a photocell and an optical system placed in a small tube. When the tip of a light pen is moved over the monitor screen and pen button is pressed, its photocell sensing element detects the screen location and sends the corresponding signal to the CPU.
Track Ball
Track ball is an input device that is mostly used in notebook or laptop computer, instead of a mouse. This is a ball which is half inserted and by moving fingers on ball, pointer can be moved. Since the whole device is not moved, a track ball requires less space than a mouse. A track ball comes in various shapes like a ball, a button and a square.
Scanner
Scanner is an input device which works more like a photocopy machine. It is used when some information is available on a paper and it is to be transferred to the hard disc of the computer for further manipulation. Scanner captures images from the source which are then converted into the digital form that can be stored on the disc. These images can be edited before they are printed.
Microphone
Microphone is an input device to input sound that is then stored in digital form. The microphone is used for various applications like adding sound to a multimedia presentation or for mixing music.

Bar Code Readers
Bar Code Reader is a device used for reading bar coded data (data in form of light and dark lines). Bar coded data is generally used in labeling goods, numbering the books etc. It may be a hand held scanner or may be embedded in a stationary scanner. Bar Code Reader scans a bar code image, converts it into an alphanumeric value which is then fed to the computer to which bar code reader is connected.
           **************************************
OUTPUT DEVICES
Any device that is capable of representing information on a computer is called an Output device. Output devices receive information from the CPU and present it to the user in the desired form.
Following are few of the important output devices which are used in a computer.
  • Monitors
  •  Plotters
  • Printers
  • Speakers
Monitors
·         Monitors, commonly called as Visual Display Unit (VDU), are the main output device of a computer. It forms images from tiny dots, called pixels that are arranged in a rectangular form. There are two kinds of viewing screen used for monitors.
  • Cathode-Ray Tube (CRT)
  • Flat- Panel Display

Cathode-Ray Tube (CRT) Monitor

The CRT display is made up of small picture elements called pixels. The smaller the pixels, the better the image clarity, or resolution. It takes more than one illuminated pixel to form whole character, such as the letter ‘e’ in the word help. Most screens are capable of displaying 80 characters of data horizontally and 25 lines vertically.

Flat-Panel Display Monitor

The flat-panel display refers to a class of video devices that have reduced volume, weight and power requirement in comparison to the CRT. You can hang them on walls or wear them on your wrists. Current uses of flat-panel displays include calculators, video games, monitors, laptop computer, graphics display.
Printers:   Printer is an output device, which is used to print information on paper.
There are two types of printers:
  • Impact Printers
  • Non-Impact Printers
Impact Printers
The impact printers print the characters by striking them on the ribbon which is then pressed on the paper.  These printers are of two types
1.       Character printers     2.  Line printers

Character Printers

Character printers are the printers which print one character at a time.  These are further divided into two types:
  • Dot Matrix Printer(DMP)
  • Daisy Wheel

Dot Matrix Printer

In the market one of the most popular printers is Dot Matrix Printer. These printers are popular because of their ease of printing and economical price. Each character printed is in form of pattern of dots and head consists of a Matrix of Pins of size (5*7, 7*9, 9*7 or 9*9) which come out to form a character that is why it is called Dot Matrix Printer.

Daisy Wheel:

Head is lying on a wheel and pins corresponding to characters are like petals of Daisy (flower name) that is why it is called Daisy Wheel Printer. These printers are generally used for word-processing in offices which require a few letters to be sent here and there with very nice quality.

Line Printers

Line printers are the printers which print one line at a time.
These are of further two types
  • Drum Printer
  • Chain Printer

Drum Printer

This printer is like a drum in shape so it is called drum printer. The surface of drum is divided into number of tracks. Total tracks are equal to size of paper i.e. for a paper width of 132 characters, drum will have 132 tracks. Drum printers are fast in speed and can print 300 to 2000 lines per minute.

Chain Printer

In this printer, chain of character sets are used so it is called Chain Printer. A standard character set may have 48, 64, or 96 characters.
Non-impact Printers
·         Non-impact printers print the characters without using ribbon. These printers print a complete page at a time so they are also called as Page Printers. It faster than impact printers.
These printers are of two types
  • Laser Printers
  • Inkjet Printers


Laser Printers

These are non-impact page printers. They use laser lights to produce the dots needed to form the characters to be printed on a page.
  • It can be very high speed
  • It can be very high quality output
·        But cannot be used to produce multiple copies of a document in a single printing.

Inkjet Printers

Inkjet printers are non-impact character printers based on a relatively new technology. They print characters by spraying small drops of ink onto paper. Inkjet printers produce high quality output with presentable features.


Plotters
Plotters are a specialist type of printer which is able to draw high quality image pieces of paper
They are used by engineers, architects and map-makers to draw plans of buildings, diagram of machines.
A plotter differs from a printer in that it draws images using a pen that can be lowered ,raised and moved across the paper to form continuous lines. The electronically controlled pen is moved around the paper by computer.
In the plotters ,there are pen-less.


Speakers:       As many users are using computers as a multimedia device for listening to music and watching movies, speakers have become an integrated part of the computer.  Mainly speakers are used for producing sound outputs. They convert the digital signals coming from computer to analog sound waves. Several sizes and wattage of speakers are available. A personal computer generally contains  210-500 watt speakers which can produce the sound for a small room only. To cover big area, amplified speakers and woofers systems are used.
*****************----------------------------------------**********************









SECONDARY STORAGE DEVICES

Secondary Storage Device is also called as External Storage devices. Secondary Storage Devices are used to store data and instructions permanently. The nature of secondary storage devices is Non-Volatile that means it remains its data and instructions even after power is shut off. There are 2 types’ secondary storage devices. They are
1. Sequential Access Storage Devices (ex… Tape Drives)
2. Direct Access Storage Devices (ex…. Disk Drives)
1. Sequential Access Storage Devices:   Sequential means step by step processing. The data stored on SASD is accessed sequentially by the computer that is to access 100th record; it has to traverse the previous 99 records. It’s like, music cassette to listen 4th song you will have to forward first three songs. Magnetic Tapes are sequential access storage devices.
Magnetic Tape:   It is sequentially accessed storage medium. Basically it is used for back up storage. The magnetic medium is a thin plastic reel (Mylar) coated with iron oxide substance that can be magnetized. Information is represented as magnetized or Non-magnetized and spots represented 1’s and 0’s .In this, read/write head cannot jump to desired point so that the tape must be read or written sequentially.
 Mainly tapes are used with mainframe and minicomputer is stored on detachable reels. In this, we can record the data in 3 places. They are
v Recoding data on magnetic tape
v Recording data on tape drive
v Recording data on tape controller
Recording data on magnetic tape:   Data is recorded on magnetic tape across width as rows of magnetic spots and spaces divided into Columns. These are called as tracks or channels which run onto the entire length of the tape.
Recording data on tape drive:   A magnetic tape drive is used for storage and retrieval of information stored on magnetic tape. The tape drive consists of read/write heads which stores data on tapes.
Recoding data on tape controller:   A tape drive is connected to and controlled by controller which interprets the commands for the working of the tape drive.
Advantages: High storage capacity, Low cost, Re–usability and portability.
Disadvantage is tape is sequential access device so it is not possible for data fast accessing
2. Direct Access Storage Devices:    It can access the data directly. The access of data in direct devices is irrespective of the location of data stored on media. The time taken to retrieve 1st and 100th record is almost same. In this data accessing is very faster than the sequential access devices. It has different types of devices.  They are
v Floppy Disk (Magnetic Disk)
v Hard Disk (Magnetic Disk)
v Compact Disk (Optical Disk)
Floppy Disk: It is made of magnetic only. And it is direct access storage. It was the primary storage data and transferring the data until the CD-ROM drive captured the market.
A floppy disk was invented in 1967 at IBM by Alan shugart. Initially the disks were 8 inch in size which later evolved into the 5.25 inch diskette. A floppy disk drive is an electromechanical device that reads and writes data on small circular coated (iron oxide) plastic. The data is written on tracks which are concentric rings of data.
Earlier, the capacity of the disk was only 360 KB. Almost all computers these days have 3.5 inch drives and having capacity of 1.44 MB covered a rigid envelope. Bigger floppies are obsolete now.
To read/write, update, store and retrieve data from the floppy disk, a special mechanism is required known as Floppy Disk Drive (FDD).
Major parts of FDD:
v Read/write heads
v Drive motor
v Stepper motor
v Mechanical frame
v Circuit board
Storage Capacity:  Floppy disk storage capacity depends on the following factors.
v Data is stored on one side or double side
v Data recording density that is number of bits stored per inch (bpi).
v Track density means tracks per inch on which data is recorded.
Hard Disk:   Hard disk drive is the main device and it is usually largest data storage device in a computer. A hard disk drive is made up of metal platters coated with a thin film of magnetic material. The nature of hard disk drive is Non-Volatile that means the data cannot delete when the power is shut off because data is permanently stored.
A hard disk is generally the fastest of the secondary storage devices, and it has the largest capacity, approximately the same as magnetic tapes. There are 2 types of hard disks .They are
v Internal hard disk
v External hard disk
Internal hard disk: These types of hard disks are used internally in computer system that means building with CPU when you purchasing the computer system.
External hard disk:  These types of hard disks are used for taking data from one computer system to another computer system and it is substitute for portable storage.
A hard disk is divided into tracks and sectors. Data on this hard disk is positioned into these tracks and sectors so they can be easily read by heads and also to help reduce fragmentation on the hard disk.
Data on a hard disk are access by 2 methods. They are
v Fixed head
v Moving head
Fixed head: Hard disk with fixed heads have a read/write head for each track on the hard disk, since there is no moving of head to access data so the data access time is faster for fixed head hard disk drive.
Moving head: A moving head hard disk is one in which one or more read-write head are attached to a movable arm which allows each head to cover many tracks of information.



Compact Disk:   It is optical disk and optical disk can store the data /write by lasers only.
The compact disk-CD was invented in 1982 by two well known companies (Philips and Sony). Initially it was an audio CD, digital audio. CD shape is round medium and it was made of molded polymer. It is a small optical disk on which data such as music, text, or graphic images is digitally encoded. CDs contain computer data in the same way as the hard disk.
A CD is a form of data storage that can transfer data up to the speed of 7800 KB/s. A standard 120 mm CD holds data up to 700 MB and 70 minutes of audio. It has different types of CDs. They are
v CD-DA      (Audio CD, Digital Audio by Philips and Sony )
v Photo CD (It is one format that holds digitized photographs and sound , developed by Kodak and Philips)
v VCD    (Video CD can hold around 70 minutes of video footage)
v CD-R   (CD-Rs are WORM Write Once Read Many) the user can write to each blank disk only once. After written once, it behaves like CD-ROM.
v CD-RW (Rewritable or erasable –CD, developed in 1995. These disks can be erased and rewritten at any time)
v DVD (Digital Versatile Disc is extends of CD. It can be used for storing data and disk capacity is 4.7 GB to 17 GB , it access rates of 600 KBps to 1.3 MBps)


UNIT-3

DIFFERENT TYPES OF PROGRAMMING LANGUAGES
            Language is the communication among human beings; different countries have different languages. Similarly in order to communicate with the computer user also needs to have language that should be understood by the computer. Basically languages are divided into two categories. They are
1. Low Level Language                                  2.High Level Language
Low Level Language:
            Low Level Computer Languages are machine codes. Computer cannot understand instructions given in high level languages or in English. It can only understand and execute instructions given in the form of machine language. There are two types of Low level languages
1. Machine Language                        2. Assembly Language
Machine Language:
            It is the lowest and most elementary level of programming language and it was the first type of programming language to be developed. Machine language is basically the only language which computer can understand. In fact, a manufacturer designs a computer to obey just one language, its machine code, which is represented inside the computer by string of binary digits o and 1.
Advantages of Machine Language:
            1. It makes fast and efficient use of the computer.
            2. It requires no translator to translate the code.
Disadvantages of Machine Language:
1.      All operation codes have to be remembered.
2.      All memory address has to be remembered.
Advantages of Assembly Language:
1.      It is easy to understand and use as compared to machine language.
2.      It is modified easily.
Disadvantages of Assembly Language:
            1. Like machine language, it is also machine dependent.
High Level Language:
            High Level Languages are basically symbolic languages that use English words and Mathematical symbols rather than mnemonic codes. Each instruction in the high level language is translated into many machine language instructions. There are different types High level languages. They are
(a) Algebraic Formula Type  (b) Business Data Processing
(c) String and List Processing (d) Visual Programming Languages
(a) Algebraic Formula Type:
            These languages are used to computational procedures for solving mathematical and statistical problems.
Ex:       BASIC (Beginners All Purpose Symbolic instruction Code) ,FORTRAN (Formula Translation)
(b)  Business Data Processing:
            These languages are used for maintaining the data processing procedures and file handling problems.
Ex:       COBOL (Common Business Oriented)
(c) String and List Processing:
            These are used for string manipulation including search patterns, inserting and deleting characters.
Ex:       OOP (Object Oriented Programming) like C++ and JAVA
(d)  Visual Programming Languages:
            These are designed for building Windows – based applications
Ex:       Visual Basic, Visual Java and Visual C
Advantages of High Level Language:
            1. User- friendly        2.They requires less time to write
*************************----------------------------------******************************
TRANSLATORS:

 Computers can understand instructions only when they are written in their own language – the machine language. Therefore, a program written in any other language should be translated into machine language. The software that ―translates‖ the instructions of different languages is known as translators.
There are two types of translators. They are compilers and Interpreters
A Compiler checks the entire user – written program (known as the source program) and if it is error free, produces a complete program in machine language (known as object program). The source program is retained for possible modifications and corrections and the object program is loaded into the computer for execution. If the source program contains errors, the compilers produce a list of errors at the end of the execution of the program. I.e. a compiler translates the whole program before execution.
An interpreter does a similar job but in a different style. The interpreter translates
 One statement at a time and if it is error – free, executes.                              
         Thus an interpreter translates or executes the first instruction before it goes to the second, while a compiler translates the whole program before execution.
The major difference between compiler and interpreter is
1.      Error correction is very much simpler in the case of interpreter as it translates the statements in stages. The compiler produces an error list of the entire program at the end.
2.      Interpreter takes more time for the execution of the program compared to compilers as it translates one statement at a time.









OPERATING SYSTEM
An Operating System is a intermediatery (mediate) between the computer user and computer system. An Operating System is a software program, it is different from word processing programs and spread sheets and all other software programs on your computer.  Mainly the purpose of Operating System is to provide a good environment in which user execute the programs in convenient and efficient manner.
Operating System is main example for system software because software that controls the system hardware that interacts with the user and application software.
FUNCTIONS OF OPERATING SYSTEM
1.      Processor management: It manages the assignment of processor to different tasks being performed by the computer system.
2.     Memory management: It manages the allocation of main memory and other storage areas to the system programmes as well as user programmes and data.
3.     Input / Output management: It manages the co-ordination and assignment of different Input and Output devices while one or more programmes are executed.
4.     File management: It allows all files to be easily changed and modified through the use of text editors or some other file manipulation routines.
5.     Establishment and enforcement of a priority system: It determines and maintains the order in which jobs are to be executed in the computer system.
6.     Interpretation of commands and instructions.
7.     Facilitates easy communication between the computer system and the computer operator.
TYPESS OF OPERATING SYSTEM?
There are Many Operating Systems those have be Developed for Performing the Operations those are requested by the user. The Operating system can perform a Single Operation and also Multiple Operations at a Time. So there are many types of Operating systems those are organized by using their Working Techniques.
1. BATCH PROCESSING:                   Here Batch means collection of instructions. The Batch Processing is same as the Serial Processing Technique. But in the Batch Processing similar types of jobs are firstly prepared and they are stored on the punched card and that card will be submit to the system for the processing. The system then all the operations on the instructions one by one and a user can’t be able to specify any input.
The main problem is that the jobs those are prepared for execution must be the same type and if a job required for any type of input then this will not be possible for the user. And so much of time will be wasted for preparing the Batch wise. Batch processing has been associated with mainframe computers. Commonly uses of batch processing are..
1.      Data processing         2.Printing       3.Images         4.Converting  5.Data base
2. MULTI-PROGRAMMING:            As we know that in the Batch Processing System there are multiple jobs executed by the system. The system first prepare a batch and after that it will execute all the jobs and those jobs are stored into the batch. But the main problem is that if a processor or job requires an input and output operation, then it is not possible and second problem is there will be wastage of the time when we are preparing the batch and  the CPU will remain idle at that time. To overcome this problem another operating system is introduces that is Multiprogramming.
Multiprogramming operating system is one that allows end-users to run more than one program at a time. The technology works by allowing the central processing unit (CPU) of a computer to switch between two or more running tasks when the CPU is idle. The main benefit of this functionality is that it can reduce wasted time in the system's operations. For example, We can open the Ms Word and type a letter and We can hear audio at the same time. We can even make calculations on Ms Excel without closing Ms Word. Thus all these programming can be executed simultaneously by the operating system.
3) MULTI TASKING:  Multitasking is logical extension of multiprogramming system that supports multiple programs to run or execute concurrently. In multitasking more than one task are executed at the same time. In this technique, the multi tasks also known as processes, share common processing resources such as CPU. In the case of a computer with single CPU, only one job can be processes at a time.
For example, when we see someone in the car, next to eating some snacks and taking his cell phone and trying to drive at the same time that person is doing multitasking.

4) TIME SHARING:    A Time Sharing system allows many users to share the computer resources simultaneously. In other words, time sharing refers to the allocation of computer resources in time slots to several programs simultaneously. For example, a mainframe computer that has many users logged on to it. Each user uses the resources of the mainframe i.e. memory, CPU etc.
The Time Sharing system provides the direct access to a large number of users where CPU time is divided among all the users on scheduled basis. The OS allocates a set of time to user. When the time is expired, it passes control to the next user on the system.
Note: Time sharing is no longer commonly used; it has been replaced by multitasking system.
5. REAL TIME:            A real-time operating system (RTOS) is a system that guarantees a certain capability within a specified time constraint. For example, an operating system might be designed to ensure that a certain object was available for a robot on an assembly line. In what is usually called a "hard" real-time operating system, if the calculation could not be performed for making the object available at the designated time, the operating system would terminate with a failure. In a "soft" real-time operating system, the assembly line would continue to function but the production output might be lower as objects failed to appear at their designated time, causing the robot to be temporarily unproductive.
 Some real-time operating systems are created for a special application and others are more general purpose. To some extent, almost any general purpose operating system such as Microsoft's Windows 2000or IBM's OS/390 can be evaluated for its real-time operating system qualities.

The Serial Processing operating systems   are those which perform all the instructions into a Sequence Manner or the instructions those are given by the user will be executed by using the FIFO manner means First In First Out. All the instructions those are entered first in the system will be executed first and the instructions those are entered later will be executed later. For running the instructions the , the Program Counter is used for executing all the instructions.
In this, the Program Counter will determines which instruction is going to executer and the which instruction will be executer after this. Mainly the punched cards are used for this as input. In this, all the jobs are firstly prepared and stored on the punched card and after that card will be entered in the system and all the instructions will be executed one by one. But the main problem is that a user doesn’t interact with the system while he is working on the system, means the user can’t be able to enter the data for execution.



DISK OPERATING SYSTEM (DOS):

It was developed as early as 1980 by Bill Gates at the age of 19. It is suited for personal computers. DOS is a single user and single task operating system

DOS commands are the instructions which are used to communicate with the computer system. You call these instructions as commands. There are two types of commands. They are
1.      Internal Commands             2. External Commands

INTERNAL COMMANDS:

Internal commands of Dos are loaded in memory automatically when you loading DOS operating system. These commands are always available for execution and executes without interpretation of any other softwares.
Directory Structure of DOS:  One thing is to be kept in mind is that a directory can have as many child (sub) directories, but the child directory can have only one parent directory.
1. CLS: this command is used to clean the screen.  Ex: c:\>cls                                                     2. DIR: this command allows the user to see all files and sub-directory in the current directory. DIR Command lists file information in five columns; (first) column gives primary name of the file (second) column gives extension of the file (third) column gives the file size - number of bytes used; (fourth) column gives the last updated date; (fifth) column gives the last updated time. Ex: c:\>dir        
Dir/p - page by page display of file name and directory names; Ex: c:\>dir/p            
Dir/w - width-wise display; Ex: c:\>dir/w            
Dir/s - displays all sub directory and files in the sub-directory of current directory.
3. Copy con: this command copies whatever typed on keyboard to the file; after typing the text press ctrl+z or F6  for saving entered text. Ex: c:\>copy con            
4. Date it displays two system date and allows the user to change it if desired ; it is displayed in the form of mm - dd - yy; Ex: c:\>date             .
5. Time it displays the system type and enables the user to change it; Ex: c:\>time            
6. md(mkdir) it creates a new directory in sub directory in the current directory;
 Ex: c:\>mkdir directory name
7. rd(rmdir) this command is used to remove a directory from the disk; it can't remove a directory which contains sub directory or files, ie, the child should be removed from the parent; similarly this command can't remove the current directory and root directory. Ex: c:\>rd directory name          
8. Type it displays the content of saved file; eg: C:\> Type> file name.
9. Ren this command changes the name of existing file or directory:
 Syntax: C:\> ren <old name> new name>
10. Delete delete a file from current directory; Syntax: C:\> del<file name>
11. Ver it displays the version of DOS currently being used in the system;
Syntax: C:> ver
12. Copy it copies the given file or files from the source directory to the largest directory; Syntax:C:\> copy<source file name> <target file name>.
13. Prompt allows the user to set a new DOS prompt instead of usual C:\> or A:\>; eg C:\> prompt pcc; Prompt$p$g - this allows you to reset default prompt; Prompt $d (current date); Prompt $t (current time);
14. cd This command is used to changing directory that means change from one directory to another directory. EX: C:\> cd directory name
Note:  If you want to go to previous directory then you press cd..

EXTERNAL COMMAND:

These commands are not loaded with DOS operating system and loaded from the disk into the memory of the computer before you want to execute them.

1. Attrib this command is used for protecting the files from accidental changes or modification. It can also be used for making a hidden file, archive files, read only files; Syntax: Attrib +R/-R/+H/-H/+A/-A <file name> +FR protects the file by making it read only, -R removes the read only protection; eg: Attrib + r <file name >

2. Scandisk/ Chkdisk this command checks the status of the disk; it shows a graphical display, information about the user file.
3. Diskcopy: This is used to copy a disk into another disk. Ex:  C:\>diskcopy d: e:
4. Diskcomp: This is used to compare the contents of two diskettes on the drives specified.
4. Tree this command graphically displays the path of each directory and sub directory in given drive; Syntax: C:\> tree<
5. More it displays one screen of data at a time and is used with another command when one screen is full; if you press any key on the next screen is displayed: Syntax C:\> type abc.doc| more.
6. Edit the command loads the MSDOS editor, where we can edit files, create new files, open existing files; Syntax: C:\> edit < file name>
7. Label a label is a name given to a disk which refers to collection of filers and directories on disk; Syntax: C:\>label A.
8. Sort this command is used for sorting data and displaying the result on the screen: Syntax:C:\>dir/sort/r (reverse order)
9. Echo this command can be used to display a message on the screen.

UNIT-4


NETWORK:

Network is two or more computers connected logically with the help of data communication devices and transmission media.
The basic purpose of network is communication between two or more machines. Each computer in a network can have its own processing capabilities and can share data files and programs.

TYPES OF NETWORKS

There are several different types of computer networks. Computer networks can be characterized by their size as well as their purpose.

The size of a network can be expressed by the geographic area they occupy and the number of computers that are part of the network. Some of the different networks based on size are:
  • Local area network, or LAN
  • Metropolitan area network, or MAN
  • Wide area network, or WAN
Local Area Network: A local area network, or LAN, consists of a computer network at a single site, typically an individual office building. A LAN is very useful for sharing resources, such as data storage and printers. LANs can be built with relatively inexpensive hardware, such as hubs, network adapters and Ethernet cables.
The smallest LAN may only use two computers, while larger LANs can accommodate thousands of computers. A LAN typically relies mostly on wired connections for increased speed and security, but wireless connections can also be part of a LAN. High speed and relatively low cost are the defining characteristics of LANs.
Metropolitan Area Network:  A metropolitan area network, or MAN, consists of a computer network across an entire city, college campus or small region. A MAN is larger than a LAN, which is typically limited to a single building or site. Depending on the configuration, this type of network can cover an area from several miles to tens of miles.
 A MAN is often used to connect several LANs together to form a bigger network. When this type of network is specifically designed for a college campus, it is sometimes referred to as a campus area network, or CAN.

Wide Area Network:   A wide area network, or WAN, occupies a very large area, such as an entire country or the entire world. A WAN can contain multiple smaller networks, such as LANs or MANs. The Internet is the best-known example of a public WAN.


TYPES OF NETWORK TOPOLOGY

Topology is referred to the way in which the end of a network is linked together.
Network Topology is description of the physical connections of a network or the description of the logical connections between computers of a network indicating which pairs of computers are able to communicate and through which way. There are different types of topologies. They are
1.      Bus Topology    2. Ring Topology    3. Star Topology      4. Mesh Topology
BUS TOPOLOGY
Bus topology is a network type in where every computer and network device is connected to single cable.

Features of Bus Topology

1.      It transmits data only in one direction.
2.      Every device is connected to a single cable

Advantages of Bus Topology

1.      It is cost effective.
2.      Cable required is least compared to other network topology.
3.      Used in small networks.
4.      It is easy to understand.
5.      Easy to expand joining two cables together.

Disadvantages of Bus Topology

1.      Cables fails then whole network fails.
2.      If network traffic is heavy or nodes are more the performance of the network decreases.
3.      Cable has a limited length.
4.      It is slower than the ring topology.

RING TOPOLOGY

It is called ring topology because it forms a ring as each computer is connected to another computer, with the last one connected to the first. Exactly two neighbors’ for each device.

Features of Ring Topology

1.      A number of repeaters are used and the transmission is unidirectional.
2.      Date is transferred in a sequential manner that is bit by bit.

Advantages of Ring Topology

1.      Transmitting network is not affected by high traffic or by adding more nodes, as only the nodes having tokens can transmit data.
2.      Cheap to install and expand

Disadvantages of Ring Topology

1.      Troubleshooting is difficult in ring topology.
2.      Adding or deleting the computers disturbs the network activity.
3.      Failure of one computer disturbs the whole network.
STAR TOPOLOGY
In this type of topology all the computers are connected to a single hub through a cable. This hub is the central node and all others nodes are connected to the central node.

Features of Star Topology

1.      Every node has its own dedicated connection to the hub.
2.      Acts as a repeater for data flow.
3.      Can be used with twisted pair, Optical Fiber or coaxial cable.

Advantages of Star Topology

1.      Fast performance with few nodes and low network traffic.
2.      Hub can be upgraded easily.
3.      Easy to troubleshoot.
4.      Easy to setup and modify.
5.      Only that node is affected which has failed rest of the nodes can work smoothly.

Disadvantages of Star Topology

1.      Cost of installation is high.
2.      Expensive to use.
3.      If the hub is affected then the whole network is stopped because all the nodes depend on the hub.
4.      Performance is based on the hub that is it depends on its capacity

MESH TOPOLOGY

It is a point-to-point connection to other nodes or devices. Traffic is carried only between two devices or nodes to which it is connected. Mesh has n (n-2)/2 physical channels to link hn devices.

Types of Mesh Topology

1.      Partial Mesh Topology: In this topology some of the systems are connected in the same fashion as mesh topology but some devices are only connected to two or three devices.
2.      Full Mesh Topology: Each and every nodes or devices are connected to each other.

Features of Mesh Topology

1.      Fully connected.
2.      Robust.
3.      Not flexible.

Advantages of Mesh Topology

1.      Each connection can carry its own data load.
2.      It is robust.
3.      Fault is diagnosed easily.
4.      Provides security and privacy.

Disadvantages of Mesh Topology

1.      Installation and configuration is difficult.
2.      Cabling cost is more.
3.      Bulk wiring is required.

BOUNDED/GUIDED TRANSMISSION MEDIA


It is the transmission media in which signals are confined to a specific path using wire or cable. The types of Bounded/ Guided are discussed below.

TWISTED PAIR CABLE:

This cable is the most commonly used and is cheaper than others. It is lightweight, cheap, can be installed easily, and they support many different types of network. Some important points :
·         Its frequency range is 0 to 3.5 kHz.
·         Typical attenuation is 0.2 dB/Km @ 1kHz.
·         Typical delay is 50 µs/km.
·         Repeater spacing is 2km.
Twisted Pair is of two types:
·         Unshielded Twisted Pair (UTP)
·         Shielded Twisted Pair (STP)

Unshielded Twisted Pair Cable:

It is the most common type of telecommunication when compared with Shielded Twisted Pair Cable which consists of two conductors usually copper, each with its own color plastic insulator. Identification is the reason behind colored plastic insulation.
UTP cables consist of 2 or 4 pairs of twisted cable. Cable with 2 pair use RJ-11 connector and 4 pair cable useRJ-45 connector.

Advantages :

·         Installation is easy
·         Cheap and high speed capacity,
·         100 meter limit
·         Higher grades of UTP are used in LAN technologies like Ethernet.

Disadvantages :

·         Bandwidth is low when compared with Coaxial Cable
·         Provides less protection from interference.

Shielded Twisted Pair Cable:

This cable has a metal foil or braided-mesh covering which encases each pair of insulated conductors. Electromagnetic noise penetration is prevented by metal casing.

Advantages :

·         Easy to install
·         Performance is adequate
·         Can be used for Analog or Digital transmission
·         Increases the signalling rate
·         Higher capacity than unshielded twisted pair

Disadvantages :

·         Difficult to manufacture
·         Heavy

 

 

 

 

COAXIAL CABLE:

Coaxial is called by this name because it contains two conductors that are parallel to each other. Copper is used in this as centre conductor which can be a solid wire or a standard one. It is surrounded by PVC installation, a sheath which is encased in an outer conductor of metal foil, barid or both.

Here the most common coaxial standards.
·         50-Ohm RG-7 or RG-11 : used with thick Ethernet.
·         50-Ohm RG-58 : used with thin Ethernet
·         75-Ohm RG-59 : used with cable television
There are two types of Coaxial cables :

BaseBand

This is a 50 ohm (Ω) coaxial cable which is used for digital transmission. It is mostly used for LAN’s. Baseband transmits a single signal at a time with very high speed.

BroadBand

This uses analog transmission on standard cable television cabling. It transmits several simultaneous signal using different frequencies. It covers large area when compared with Baseband Coaxial Cable.

Advantages :

·         Bandwidth is high
·         Used in long distance telephone lines.
·         Transmits digital signals at a very high rate of 10Mbps.
·         Data transmission without distortion.

Disadvantages :

·         Single cable failure can fail the entire network.
·         Difficult to install and expensive when compared with twisted pair.

 

FIBER OPTIC CABLE:

These are similar to coaxial cable. It uses electric signals to transmit data. At the centre is the glass core through which light propagates.
In multimode fibers, the core is 50microns, and in single mode fibers, the thickness is 8 to 10 microns.
Fiber optic cable has bandwidth more than 2 gbps (Gigabytes per Second)

Advantages :

·         Provides high quality transmission of signals at very high speed.
·         These are not affected by electromagnetic interference, so noise and distortion is very less.
·         Used for both analog and digital signals.

Disadvantages :

·         It is expensive
·         Difficult to install.
·         Maintenance is expensive and difficult.
·         Do not allow complete routing of light signals.






 

TRANSMISSION MODES IN COMPUTER NETWORKS


Transmission mode means transferring of data between two devices. It is also called communication mode. These modes direct the direction of flow of information. There are three types of transmission mode. They are :
·         Simplex Mode
·         Half duplex Mode
·         Full duplex Mode

SIMPLEX MODE

In this type of transmission mode data can be sent only through one direction i.e. communication is unidirectional. We cannot send a message back to the sender. Unidirectional communication is done in Simplex Systems.
Examples of simplex Mode is loudspeaker, television broadcasting, television and remote, keyboard and monitor etc.

HALF DUPLEX MODE

In half duplex system we can send data in both directions but it is done one at a time that is when the sender is sending the data then at that time we can’t send the sender our message. The data is sent in one direction.
Example of half duplex is a walkie- talkie in which message is sent one at a time and messages are sent in both the directions.

FULL DUPLEX MODE

In full duplex system we can send data in both directions as it is bidirectional. Data can be sent in both directions simultaneously. We can send as well as we receive the data.
Example of Full Duplex is a Telephone Network in which there is communication between two persons by a telephone line, through which both can talk and listen at the same time.
In full duplex system there can be two lines one for sending the data and the other for receiving data.

UNIT-5 
INTERNET
Internet was conceived by the Advanced Research Projects Agency (ARPA) of the U.S. government in 1969 and was first known as the ARPANet. The original aim was to create a network that would allow users of a research computer at one university to "talk to" research computers at other universities. A side benefit of ARPANet's design was that, because messages could be routed or rerouted in more than one direction, the network could continue to function even if parts of it were destroyed in the event of a military attack or other disaster.
The internet is a global connection of computers. These computers are connected via a huge network of telecommunication links. The internet allows you to access to a whole resource of data and information stored at different sites (called hosts) and locations around the world. The communication links which inter connect each host computer use a common method of transmission known as TCP/IP, which stands for Transmission Control Protocol / Internet Protocol.
Internet connection helps us to:
1.     Read information on a wide range of topics
2.     Send or receive E-mail
3.     Down load useful programs such as virus detectors, file compression, decompression utility
4.     Share your opinions and your knowledge on a variety of topics through various new groups.
5.     Chat with other people anywhere in the world
6.     View interesting video‘s listen to music or wander through a 3-D world.

Requirements for connecting to the Internet:
a)     Modem: A modem is a peripheral device that allows a computer to connect and communicate with other computers. Modem stands for Modulator Demodulator.
b)     Web Browser: A browser is a software program that is necessary in order to view web pages on the web. Ex: Internet Explorer, Netscape Navigator, Mozilla Firefox, Microsoft outlook express etc.
c)      Telephone line: A telephone line is required to transfer data from one computer to another. The computer is connected to a modem, which, in turn, connected to a telephone line.
d) Subscription with Internet service provider (ISP): ISP‘s are companies that provide access to the internet. We need subscription with any ISP to get an Internet connection. Some of the ISPs in India are VSNL, MTNL.
INTRANET

An intranet is a private network that is contained within an enterprise. It may consist of many interlinked local area networks and also use leased lines in the wide area network. Typically, an intranet includes connections through one or more gateway computers to the outside Internet. The main purpose of an intranet is to share company information and computing resources among employees. An intranet can also be used to facilitate working in groups and for teleconferences.
An intranet uses TCP/IP, HTTP, and other Internet protocols and in general looks like a private version of the Internet.
Main differences between the internet, intranet and extranet:
§  Intranet and Extranet are more secure than Internet because having Intranet or extranet network system means organization has created a firewall against outsiders. Accessing any information on Internet is not much difficult today.
§  General public is the user of Internet so it can be called as public network while business persons and organization are the users of Intranet and Extranet and can be called as private networks.
§  Internet can be access through without having user account. While user account is the first important condition in case of Intranet and Extranet.

Uniform Resource Locator: (URL):
A URL (Uniform Resource Locator, previously Universal Resource Locator). A URL is a type of URI (Uniform Resource Identifier, formerly called Universal Resource Identifier.)
Each web site has a unique address commonly referred to as a URL. A URL specifies the exact location of the web page on the internet. A typical web address or URL looks as http:// www.microsoft.com/catalog/navigation.asp
Explanation of the example URL:
http: --à  Identifies protocol necessary to retrieve the file.
www: ----à Indicates that the site is on the world wide web
Microsoft:-à Indicates the name of the web site
.com: -à  Indicates the domain type of the web site
Anotomy of a URL:

 

URL anatomy explained

Protocol:  The protocol declares how your web browser should communicate with a web server when sending or fetching a web page or document. The most common protocol is http which stands for Hypertext Transfer Protocol. Another common protocol is https which stands for Hypertext Transfer Protocol Secure. You'll see this on secure pages, like shopping sites and log in pages.
Sub domain:   A sub domain is a sub-division of the main domain name.                                                 For example,mail.doepud.com and calendar.doepud.com are sub domains of the domain name doepud.com.
Domain name:   A domain name is a unique reference that identifies a web site on the internet.         For example doepud.co.uk. A domain name always includes the top-level domain (TLD), which in Doepud's case is uk. The co part is shorthand for commercial and combined .co.uk is called a second-level domain (SLD).
Port:    The port number is rarely visible in URLs but always required. When declared in a URL it comes right after the TLD, separated by a colon. When it's not declared and in most cases where the protocol is http, port 80 is used. For https (secure) requests port 443 is used.
Path:    The path typically refers to a file or directory on the web server, e.g./directory/file.php.
Query:    A query is commonly found in the URL of dynamic pages and is represented by a question mark followed by one or more parameters. The query directly follows the domain name, path or port number.
Parameters:    Parameters are snippets of information found in the query string of a URL. With reference to the Google query above, the parameters follow the question mark and are separated by an ampersand (&) character so they can be understood individually and used to display content on that page.
Fragment:    A fragment is an internal page reference, sometimes called a named anchor. It usually appears at the end of a URL and begins with a hash (#) character followed by an identifier.


E-MAIL:
E-mail or electronic mail is a service for sending or receiving messages electronically through a computer network. The electronic mail uses various technologies that support electronic transmission of text, data and graphics.
Some of the features of E-mail are
1.      It is much faster than the normal mail. Messages can be sent within a matter of seconds to any part in the world.

2.      it can be sent to many people at the same time

3.      E-mail is cheaper than a phone call and an ordinary mail

4.      it can access information and file libraries on request

5.      E-mail user can have a mail box which is accessed through a computer terminal

6.      an E-mail message consists of two parts

a)      a header specifying the address of the sender and the address of the receiver

b)     the text of the message

7.     The mailing system allows selecting messages for reading, displaying, saving, deleting, forwarding and replying.

8.     Mailing list can be created to send the same message to a group of people

E-Mail Address: An E-Mail address consists of three parts
1.     The person‘s Login name

2.     @ sign

3.     Domain name

A domain represents organization, network, and country name
Ex: gurijalasudhakar@gmail.com in this gurijalasudhakar is the user name and his account is in the domain gmail.com. Both the names are separated by the @symbol.
Search Engine:
Search engines are utilities used to search for information on the web. A user interface is provided where you can enter the word or phrase you are searching for. The search engine looks for the keywords we have entered and returns the results of the search, providing links to relevant Web sites for us to choose from. Some commonly used search engines are MSN, Alta Vista, Google, Yahoo! search and Info seek etc.


WEBBROWSER
Web browser is a software application used to locate, retrieve and display content on the World Wide Web, including Web pages, images, video and other files. As client, the browser is the client run on a computer that contacts the Web server and requests information. The Web server sends the information back to the Web browser which displays the results on the computer or other Internet-enabled device that supports a browser. There are no of web browsers are available. They are
1.      Google Chrome                    2.Mozilla Fire Fox                  3.Internet Explorer    4.Apple Safari            5.Opera

 


No comments:

Post a Comment