SlideShare ist ein Scribd-Unternehmen logo
1 von 129
UNIT – 7
INFORMATION TECHNOLOGY
Vinod
libtejavino@gmail.com
libtejavino@gmail.com
INTRODUCTION TO INFORMATION
TECHNOLOGY
•The term computer has been borrowed from compute that
means- to calculate.
•Where as, initially computers were used to perform
arithmetic calculations at fast speed, Now they are
used in every field.
•Computer is an electronic device, which takes input from
the user, performs calculations and gives out the
result.
•It is also said that computer is a electronic data processor,
because it can receive, store, process and retrieve any
kind of data.
libtejavino@gmail.com
DEFINITION OF COMPUTER
HIGH SPEED
ELECTRONIC
DEVICE
TAKING AN
INPUT
PROCESS
GIVING
OUTPUT
libtejavino@gmail.com
CHARACTERISTICS OF A COMPUTER
Speed
Accuracy
Diligence
Versatility
Stores
Data
Dumb
It has no
emotions
libtejavino@gmail.com
APPLICATION OF COMPUTERS
In applications like Word-processor, Calculations, Games And In
Domestic Applications
For preparing mark sheets and to correct examination papers
In Banking Transactions through out the world
In monitoring millions of phone calls and in keeping lines of
COMMUNICATION
Using computerized technology in Telephone Exchanges
In Railway/Airway Reservations for journey to places thousands of
kilometers away
In Monitoring Life Support Systems in medical equipments and in
diagnosing and curing diseases
libtejavino@gmail.com
STRUCTURE OF COMPUTER
•Controls the operation
of the computer and
performs its data
processing functions.
Often simply referred to
as processor
Central
Processing Unit
(CPU):
•Stores data
Main Memory:
•Moves data between
the computer and its
external environment
I/O Unit:
• Some mechanism that
provides for
communication among
CPU, main memory,
and I/O unit
System
Interconnection:
libtejavino@gmail.com
HISTORY & DEVELOPMENT OF COMPUTERS
•In olden days we calculate using
our fingers. Even today we learn
calculation using our fingers.
•In this process of learning, different
methods are invented to do the same
faster and accurately.
•Let us have a look on some early
computing machines
libtejavino@gmail.com
EARLY COMPUTING MACHINES AND
INVENTORS
Abacus
Slide Rule
Pascaline
Arithmetical
Replica
Arithometer
Differential
Engine
Punched
Cards
Electronic
computers
Mark-
I
libtejavino@gmail.com
GENERATIONS OF COMPUTERS
First
Generation
1940-1956 Vacuum Tubes
Second
Generation
1956-1963 Transistors
Third
Generation
1964-1971
Integrated
Circuits (IC)
Fourth
Generation
1971 -Present Microprocessors
Fifth
Generation
Present and
Beyond
Artificial
Intelligence
(AI)
libtejavino@gmail.com
ANATOMY OF A COMPUTER
Source: NIOS Computer Science
libtejavino@gmail.com
CENTRAL PROCESSING UNIT
 The CPU (Central Processing Unit) is the brain
of the system. It executes all the program code
from the operating system and the applications
you run, and does most of the calculating and
processing of data
libtejavino@gmail.com
MAIN MEMORY
• The Main Memory (MM) consists of magnetic or electronic
components, which store the information needed by the
computer.
• Random Access Memory or RAM is the memory that the
computer uses to temporarily store the information as it is
being processed. One of the first home computers used 64
KB, Now we having 2 to 4 GB RAM
• Most of the Main Memory is erasable and may be changed
at will, some memory is used to store constants and often-
used utility programs and is not erasable by the CPU, and
such memory is called Read Only Memory (ROM). eg.
Operating Systems
libtejavino@gmail.com
INPUT/OUTPUT DEVICES
The I/O devices are the computer's link with
the outside world.
The Input Unit consists of one or more
devices. There are a number of devices that
perform the function of input devices.
The Output Unit converts the binary data into
a form that users can understand
libtejavino@gmail.com
Source: infovisual.co
libtejavino@gmail.com
PROGRAMMING LANGUAGE
 Programming languages are used in computer
programming to implement algorithms.
 Most programming languages consist of instructions
for computers.
 A programming language is a formal language, which
comprises a set of instructions that produce various
kinds of output.
libtejavino@gmail.com
TYPES OF LANGUAGE
libtejavino@gmail.com
TOP COMPUTER LANGUAGES
libtejavino@gmail.com
INFORMATION REPRESENTATION AND STORAGE
 Digital computer represents all information
using the binary numeral system. Text,
numbers, pictures, audio, and nearly any other
form of information can be converted into a
string of bits, or binary digits, each of which has
a value of 1 or 0
 A bit refers to a digit in the binary numeral
system (base 2). For example, the number
100101 1 is 7 bits long
libtejavino@gmail.com
BINARY DIGIT
 Binary digits are almost always used as the basic
unit of information storage and communication in
digital computing and digital information theory.
 Claude E. Shannon first used the word bit in a
1948 paper. He attributed its origin to John W.
Tukey, who had written a Bell Labs memo in 9
January 1947 in which he contracted "binary digit"
to simply "bit“.
 Vannevar Bush had written in 1936 of "bits of
information" that could be stored on the punch cards
used in the mechanical computers of that time.
libtejavino@gmail.com
UNIT:
The bit, as a unit of information, is the
amount of information carried by a
choice between two equally likely
outcomes.
The name bit is mostly used when
discussing data capacity,
emphasising the storage of data as in
dividual binary digits.
A byte is a collection of bits, originally
variable in size but now almost always
eight bits
libtejavino@gmail.com
Credit: www.ccgscomputerscience.co.uk
libtejavino@gmail.com
BINARY SYSTEM
 The Binary System of numeration is the simplest
of all positional number systems. The base - or
the radix - of the binary system is 2, which means
that only two digits – 0 and 1 - may appear in a
binary representation of any number.
 Computer memory comprises small elements
that may only be in two states - off/on - that are
associated with digits 0 and 1. Such an element
is said to represent one bit - binary digit.
 Binary numbers are written with only two
symbols - 0 and 1. For example, a = 1101.
libtejavino@gmail.com
QUICK RECAP
 The first electronic computer - ENIAC that stood
for Electronic Numerical Integrator And
Calculator - was built in 1946 at the University
of Pennsylvania, but the invention of the binary
system dates almost 3 centuries back.
 Gottfried Wilhclm Leibniz (1646-1716), the co-
inventor of Calculus, published his invention in
1701 in the paper ‘Essay d'une nouvelle
science des nombres’ that was submitted to the
Paris Academy.
libtejavino@gmail.com
NUMBER SYSTEMS IN COMPUTER
libtejavino@gmail.com
AMERICAN STANDARD CODE FOR
INFORMATION INTERCHANGE (ASCII)
 ASCII is a character encoding standard for
electronic communication.
 ASCII is the traditional name for the encoding
system; the Internet Assigned Numbers
Authority (IANA) prefers the updated name
us-ascii, which clarifies that this system was
developed in the US and based on the typographical
symbols predominantly in use there.
 ASCII is one of the IEEE* milestones.
* Institute of Electrical and Electronics Engineers
libtejavino@gmail.com
INDIAN SCRIPT CODE FOR
INFORMATION INTERCHANGE (ISCII)
 ISCII is a coding scheme for representing
various writing systems of India. It encodes the
main Indic scripts and a Roman transliteration.
 The supported scripts are: Assamese, Bengali
(Bangla), Devanagari, Gujarati, Gurmukhi,
Kannada, Malayalam, Oriya, Tamil, and Telugu.
 ISCII has not been widely used outside certain
government institutions and has now been
rendered largely obsolete by Unicode.
libtejavino@gmail.com
UNICODE
 Unicode is a computing industry standard for
the consistent encoding, representation, and
handling of text expressed in most of the
world's writing systems.
 The standard is maintained by the Unicode
Consortium, and as of May 2019 the most
recent version, Unicode 12.1
Contains a repertoire of
37,994 characters covering 150
modern and historic scripts, as
well as multiple symbol sets
and emoji.
libtejavino@gmail.com
COMMUNICATION
Communication is a process of sharing
ideas, information, and messages with
others at a particular time and place.
Communication is a vital part of personal
life and is also important in business,
education, and any other situation where
people encounter each other.
Communication between two people is an
outgrowth of methods developed over
centuries of expression
libtejavino@gmail.com
WHAT IS COMMUNICATION AND WHY
• Communication is the transfer of data or information from
one device to another device via some form of transmission
medium.
• Based on the communication medium we can estimate the
time it is going to take to transfer data/information.
• Different types of medium are available for communication;
some of them are Twisted-Pair cable, Coaxial cable, Fiber-
Optic cable etc.
• Currently the trend is on Wireless Technology for
communication, like Cellular phones, walkic-talks, pagers etc.
wireless communication internally uses Radio waves or
Microwaves or Infrared etc.
libtejavino@gmail.com
ROLE OF COMMUNICATION SYSTEMS
Communication through distance
(transmission) or in time (storage)
Adapt the information to the physical
channel (analog/digital and other conversion)
Hide unwanted properties of the physical
channel from the users (e.g. error control)
Reliable, secure, and efficient
Flexible & Simple implementation
Deliver information from sources to destinations
through physical channels
libtejavino@gmail.com
CHARACTERISTICS COMMUNICATION
 The communicating devices must be a part of a
communication system made up of a combination of
hardware and software.
 The effectiveness of the communications systems
depends on the following characteristics.
Delivery
AccuracyTimeliness
libtejavino@gmail.com
COMPONENTS OF COMMUNICATION
Sender Ideas Encoding Channel Receiver Decoding Feedback
libtejavino@gmail.com
COMMUNICATION SYSTEMS
The development of
computer networks
was started when
computers became
faster, more-
powerful and
smaller.
In the 1960’s the
Advanced
Research Projects
Agency (ARPA) of
the U.S.
Department of
Defence
Along with
researchers
working on
military projects at
research centres
and universities
across the country,
developed a
network called the
ARPANET
libtejavino@gmail.com
TELECOMMUNICATION NETWORKS
•Modern telecommunication started with telegraph
network followed by the telephone network.
•Since the connections are established by switching in a
telephone network and the network is open to public, it is
called Public Switched Telephone Network (PSTN).
•When digital computers came about, a new class of
networks, known as data networks were developed to
support computer interconnections.
•The data network has today evolved as Internet.
libtejavino@gmail.com
INTEGRATED SERVICES DIGITAL NETWORK
(ISDN)
 With the maturing of digital technology, a further
advanced telecommunication network called
Integrated Services Digital Network (ISDN)
 ISDN is capable of supporting all types of services
like telephony, facsimile, data transfer and video
transmission.
 We have three major classes of telecommunication
networks in operation:
Telephone
Network
(Landline and
Mobile)
Data Network
(Internet)
Integrated
Services Digital
Network
(ISDN).
libtejavino@gmail.com
TELEPHONE NETWORKS
 Technique or procedure that has evolved in the
last 120 years from a number of giant
corporations is capable of working with each
other.
 With the evolution of mobile communications
predominantly for voice communication, the
telephone network may be viewed in two
different classes
Landline
Networks
Mobile
Networks
libtejavino@gmail.com
LANDLINE NETWORKS
 Landline telephony was born in March 1876 when
Alexander Graham Bell demonstrated long
distance voice communication over a pair of wires.
 In 1877, Operator manned Switching Systems were
set up with the subscribers connected to the operator
switchboard giving birth to the concept of telephone
networks.
 Automatic Switching Systems were invented and
put into operation by early 1890s.
 A powerful application of touch-tone dialling is the
data in voice answer (DIVA) system.
 This system of digit dialling and voice response is also
popularly known as Interactive Voice Response
System (IVRS).
Pulse Dialling
Dual Tone Multi-Frequency
libtejavino@gmail.com
MOBILE NETWORKS
 Mobile communication per se was first introduced in 1946
in USA to support Defence.
 Early systems used a central radio station with a large
antenna mounted at a high point, like a hill, which
radiated high power to cover the entire target area within
which mobility was supported.
 Personal Mobile System (PMS) is based on cellular
communication principle in which a distributed network of
smaller radio stations, called base stations (BS)
 The first generation cellular system went into operation
in 1983 in the United States and was known as advanced
mobile phone system (AMPS).
 European standards are known as Global System for
Mobile (GSM) communications standards. India adopted
GSM standards in 1992. Digital cellular systems like GSM
are called second-generation systems
libtejavino@gmail.com
MOBILE NETWORKS
Credits: PHD Media & iCharts.Net
libtejavino@gmail.com
NEED OF INTERNET
• The main reason
is that each
computer
network is
designed with a
specific purpose.
• Eg. LAN is used
to connect
computers in a
smaller area,
and it provides
fast
communication.
• A Computer can
communicate
with the
computers
attached to the
same network,
because they are
inter-
compatible.
• As more and
more
organisations
had multiple
computer
networks, this
became a major
issue. As a
result, the
concept of
internetworking
(internet) came
into being.
• This means that
there should be
a network of
all physically
separate
networks.
libtejavino@gmail.com
NEED OF PROTOCOLS / STANDARDS
 All Communication need to follow a protocol.
 Protocol is nothing but a convention or standard.
 Eg. Green Signal/Flag and Train
 If the speaker speaks too fast, the listener will
say go-slow to understand. Just like that,
 In Computer World if the receiving computer is
not fast enough, and cannot hold any more data,
it requests the sender to wait or control the
transfer by slowdown.
libtejavino@gmail.com
TCP/IP LAYERS AND PROTOCOLS
 To provide the set of rules and standardization
among the different computer networks.
•International
Standards
Organization
(ISO)
•In 1984
Created a
Model
•Open System
Interconnection
(OSI)
libtejavino@gmail.com
OPEN SYSTEM INTERCONNECTION (OSI)
libtejavino@gmail.com
OPEN SYSTEM INTERCONNECTION (OSI), TCP/IP MODEL AND PROTOCOL
SUITE
libtejavino@gmail.com
INTERFACE LAYER OR (PHYSICAL + DATA LINK
LAYER)
 The physical layer deals with the hardware level
like, transmission media, connections and the voltage
for digital signals.
 The data link layer deals with media access and
control strategies, frame format etc.
INTERNET LAYER OR NETWORK LAYER
 The Internet layer is an important layer in the
protocol suite.
 At this layer, TCP/IP supports Internetworking
Protocol (IP). IP is a host-to-host protocol.
 Ensuring maximum efficiency, TCP/IP supports four
other protocols: ARP, RARP, ICMP and IGMP in this
layer.
libtejavino@gmail.com
PROTOCOL (CONT)
Address Resolution Protocol (ARP)
•On a LAN, each machine is identified with a unique physical address
imprinted on the network interface card. ARP is used to find the
physical address of a machine when its IP address is known.
Reverse Address Resolution Protocol (RARP)
•It is used to find the IP address of a machine when its physical address
is known. It is used when a diskless computer is booted or a computer
is connected to the network for the first time.
Internet Control Message Protocol (ICMP)
•IP is unreliable are best effort delivery. In case of failures ICMP is used
to send notifications to the sender about packet problems. It sends
error and query messages.
Internet Group Message Protocol (IGMP)
•It is used for multicasting, which is transmission of a single message to
a group of Recipients.
libtejavino@gmail.com
TRANSPORT LAYER
 TCP/IP supports two protocols: TCP, UDP, IP is
host-to-host protocol, which can deliver the
packet from one physical device to another
physical device.
•It is simpler of the two protocols. It does not
provide reliability. It is, therefore faster, and
using for applications in which delay is
intolerable (in case of audio and video).
User
Datagram
Protocol (UDP)
•TCP is reliable, connection-oriented protocol.
By connection oriented, we mean that a
connection must be established between both
ends before either can transmit data. It ensures
that communication is error-free and in
sequence.
Transmission
Control
Protocol (TCP)
libtejavino@gmail.com
APPLICATION LAYER
It allows the
user to run
various
applications
on Internet.
These
applications
are File
Transfer
Protocol
(FTP), remote
login
(TELNET),
email
(SMTP),
WWW
(HTTP).
The session
layer of OSI
model is
almost
dropped in
TCP/IP.
Whenever we
work on the
Internet we
use most of
these
protocols.
For example
when use are
surfing or
browsing the
Internet
websites
actually you
are using
WWW.
libtejavino@gmail.com
ANALOG AND DIGITAL COMMUNICATION
 Communication from a source to a destination,
that is, from one computer to another or from one
device to another, involves the transfer of
information from the sender to the receiver.
 The transfer of data from one machine to another
machine such that, the sender and the receiver both
interpret the data correctly is known as Data
Communication.
 Broadly the data communication can be divided into
two types Analog and Digital. As you may know that
signals carry the data for communication.
 Classification of Analog and Digital is based on the
signals which are used for data transfer.
libtejavino@gmail.com
ANALOG SIGNAL
 We mostly use analog signals in our day-to-day life.
 Whatever we are talking meaning voice signals,
Radio and TV broadcasting signals, Electricity
signals, Sunlight or other lights signals, all are
nothing but examples of Analog signal.
 Analog Signals get weaker with the distance
therefore, in long distance communication like
telephones, radio and TV communication we use a
device named “Amplifiers”.
 Amplifiers amplify noise along with the
original signal.
libtejavino@gmail.com
DIGITAL DATA TRANSMISSION
 Computers are digital machines because at their
most basic level they can distinguish between
just two values, 0 and 1, or off and on, or high
and low voltage as depicted in below pic.
 All data that a computer processes must be
encoded digitally, as a series of zeroes and ones.
 A hardware device called Repeater is used to
regenerate the digital signal. The repeater
measures the signal values at regular intervals to
recognise the 0’s and 1’s in the signal and
regenerates them.
libtejavino@gmail.com
DATA COMMUNICATION MODES
 Data can be transmitted from Source to Destination
in a number of ways. The different modes of data
transmission are outlined as follows:
Asynchronous
SynchronousIsochronous
Simplex
Half
Duplex
Full
Duplex
libtejavino@gmail.com
ASYNCHRONOUS COMMUNICATION
 Controlling the timing of operations by the use of
pulses sent when the previous operation is
completed rather than at regular intervals.
 Each frame begins with a start bit that enables
the receiving device to adjust to the timing of the
transmitted signal.
libtejavino@gmail.com
SYNCHRONOUS COMMUNICATION
 Instead of sending single character or few bit we
can send a group or block of data at once, and
this methods is called synchronous
communication.
libtejavino@gmail.com
ISOCHRONOUS COMMUNICATION
 This is another alternative mechanism for data
transmission, which combines the approaches
of asynchronous and synchronous
communications.
libtejavino@gmail.com
SIMPLEX COMMUNICATION
 This is one of the simplest techniques for data
communication, in which we have one
permanent sender and permanent receiver.
 In Simplex transmission, at any point of time one
of the communicating devices can only send
data, whereas the other can only receive it.
 Can you think about some example?
libtejavino@gmail.com
HALF DUPLEX COMMUNICATION
 As we know data communication is more about
exchanging and sharing data, which may not be
fulfilled by the simplex communication.
 Direction of the data one at a time like
A to B or B to A
libtejavino@gmail.com
FULL DUPLEX COMMUNICATION
 The Transmission of data in two directions
simultaneously.
libtejavino@gmail.com
COMMUNICATION CHANNELS
 One of the most common ways to transport data
from one computer to another is to write them
onto magnetic tape or floppy disks, physically
transport the tape or disks to the destination
machine, and read them back in again.
 Cable is the medium through which information
usually moves from one network device to
another.
 There are several types of cable, which are
commonly used with LANs.
libtejavino@gmail.com
TWISTED PAIR CABLE
 Twisted pair cable comes in two varieties:
unshielded twisted pair and shielded twisted
pair.
 Unshielded twisted pair (UTP) is the most
popular and is generally the best option for small
networks UTP cables contain four twisted-pairs
(Orange, Green, Blue & Brown) enclosed in a
common sheath.
libtejavino@gmail.com
COAXIAL CABLE
 Another common transmission medium is the
coaxial cable. It has better shielding than twisted
pairs, so it can span longer distances at higher
speeds.
 A coaxial cable consists of a stiff copper wire as
the core, surrounded by an insulating material.
The insulator is encased by a cylindrical
conductor, often, as a closely woven braided
mesh. The outer conductor is covered with a
protective plastic sheath.
libtejavino@gmail.com
OPTICAL FIBER
 Fiber Optic cabling consists of a center glass core
surrounded by several layers of protective materials.
 It transmits light rather than electronic signals
eliminating the problem of electrical interference.
 Fiber optic cable has the ability to transmit signals
over much longer distances than coaxial and twisted
pair.
 It also has the capability to carry information at
vastly greater speeds.
This capacity broadens
communication possibilities
to include services such as
video conferencing and
interactive services
libtejavino@gmail.com
COMMUNICATION DEVICES
• A Communications device is a hand-held or wearable
device which is enables Communication.
• There are several communication devices used in data
communication. In the sender and receiver computers,
we should have Network Interface Card and Modem
before connected to the Internet connection.
• There are many other devices being used at different
levels and in different types of networks.
libtejavino@gmail.com
NETWORK INTERFACE CARD (NIC)
 It connects the computer to the cabling, which in
turn links all of the computers on the network
together as shown in figure
libtejavino@gmail.com
REPEATER
 It is an electronic device that receives a signal
and retransmits it at a higher level or higher
power, or onto the other side of an obstruction so
that the signal can cover longer distances
without degradation
libtejavino@gmail.com
HUB
 A hub is a device used to connect a PC to the
network.
 The function of a hub is to direct information
around the network, facilitating communication
between all connected devices, means A hub
contains multiple ports. When a packet arrives at
one port, it is copied to all the ports of the hub.
 Hubs can improve performance, especially for
bursty traffic and large file transfers.
 However, total bandwidth remains fixed; as
network traffic grows, performance suffers and it
does not reduce collisions
libtejavino@gmail.com
SWITCH
 A switch is a data-link layer network device that
forwards frames using MAC (Media Access Control )
addresses in the header of frames.
 It is used to improve network performance by
segmenting the network and creating separate
collision domains. It can also reduce competition for
bandwidth.
 During new installations switches should be used
instead of hubs as they are more effective and provide
better performance.
•A switch which is often,
termed a ‘smart hub’.
•With switching, each
connection gets “dedicated
bandwidth” and can operate
at full speed.
libtejavino@gmail.com
BRIDGE
•The main network device found at the data link layer is a
bridge, mainly used for connecting two network or
local area networks.
•This device works at a higher layer than the repeater and
therefore is a more complex device.
•This means that the amount of traffic on the medium can
be reduced and therefore, the usable bandwidth can be
increased
•Bridges are store and forward devices to provide error
detection
libtejavino@gmail.com
HUB VS BRIDGE VS SWITCH
• Hub is really a repeater
• A Message sent by one host is sent to all other hosts.
• One of the simplest ways to create a network
• Bridge is a more Intelligent from of Hub
• Packets are processed based on MAC address
(Hardware Address) inside the incoming packet.
• Swtich = Bridge with more than 2 Ports
• More scalable and Practical
• Bridge is not very useful for end-computig devices
• Hubs cannot handle large data traffic
libtejavino@gmail.com
ROUTERS
 Router is a device which is use to create an
internetworking in our WANs and LANs.
 The main purpose of router is routing, which means
taking a packet from one device and sending it through
the network to another device on a different network.
 A Packet is nothing but the unit of data.
 A packet normally contains Data
Type, Packet Count, Recipient’s IP
address, Sender’s IP address, and
Data.
 Actually routers need to transfer the
data from source machine to
destination machine but other
information in packets it need during
its transportation process.
libtejavino@gmail.com
NETWORK DEVICE DOMAINS
libtejavino@gmail.com
FULLY CONNECTED NETWORKS
 If every subscriber is to be connected to every
other subscriber, then we need a very large
number of links. Every subscriber is directly
connected to every other subscriber. Networks
with this kind of connectivity are called fully
connected networks.
Source: O’Reilly
libtejavino@gmail.com
SWITCHED NETWORKS
 The number of communication links can be
reduced significantly by using a switch along
with communication links for establishing
connection between subscribers.
 Switch, as you know, is a device that is used to
make and break electrical connections.
Switched
communication
networks are those in
which data
transferred from
source to destination
is routed between
various
intermediate nodes
libtejavino@gmail.com
BASICS OF NETWORK TECHNOLOGY
A Network Is Two
Or More Devices
Connected
Together
Through links. A
network link is
communicating
pathway to
transfer data from
one device to
another.
One way to
categorize the
different types
of computer
Network Designs
is by their scope or
scale.
For historical
reasons, the
networking
industry refers to
nearly every type
of design as some
Kind Of Area
Network.
libtejavino@gmail.com
NETWORKING BASICS
 Networks are not new to us. We are familiar with
postal networks, railway networks, airline networks,
etc
 A fundamental difference between telecommunication
and other networks is that telecommunication
networks operate in the electrical, optical or
electromagnetic domains.
 A Computer network includes the network operating
system in the client and server machines, the cables,
which connect different computers and all supporting
hardware in between such as bridges, routers and
switches.
 In wireless systems, antennas and towers are also
part of the network.
libtejavino@gmail.com
ADVANTAGES OF NETWORKS
 Computers in a networked environment provide
numerous advantages when compared to
computers in a stand-alone environment.
Sharing Reliability Scalability
Communication
Medium
Increased
Productivity
libtejavino@gmail.com
NETWORK CLASSIFICATION
 We see different types of networks available like
mobile networks, computer networks and TV
networks around us
 Let us now learn about different types of
computer networks available around us and try
to classify them.
Size
•LAN
•MAN
•WAN
•PAN
Connection
Type
•Wired
Network
•Wireless
Network
Architecture
•Peer to Peer
network
•Client-
Server
Network
libtejavino@gmail.com
NETWORK CLASSIFICATION
• Local Area NetworkLAN
• Wide Area NetworkWAN
• Wireless Local Area NetworkWLAN
• Metropolitan Area NetworkMAN
• Storage Area Network, System Area Network, Server
Area Network, or sometimes Small Area NetworkSAN
• Campus Area Network, Controller Area Network, or
sometimes Cluster Area NetworkCAN
• Personal Area NetworkPAN
libtejavino@gmail.com
LAN (LOCAL AREA NETWORK)
 The network that spans a relatively small area that
is, in the single building or campus is known as
LAN.
 A Library will have a wired or wireless LAN for
users to interconnect local devices (e.g., printers and
servers).
Local area networking
uses switches, bridges
and/or repeaters, and
hubs to interconnect
LANs and increase
overall size.
libtejavino@gmail.com
MAN (METROPOLITAN AREA NETWORK)
 MAN is a Computer network connecting two or more
LANs or CANs (Campus Area Networks) together but within
a Town or City.
 In terms of geographic area MANs are larger than
LANs, but smaller than Wide-Area Networks (WANs).
 MANs are usually characterised by very high-speed
connections using fiber optical cable or other digital
media.
Range is
anywhere from
5 to 50km in
diameter.
libtejavino@gmail.com
WAN (WIDE AREA NETWORK)
 WAN is a computer network that spans a
relatively large geographical area.
 WAN consists of many local-area networks
(LANs)
 They can connect networks Across Cities, States
or even Countries
 They can also be connected through leased lines
or satellites.
libtejavino@gmail.com
PERSONAL AREA NETWORK (PAN)
 A personal area network (PAN) is a computer
network used for communication among
computer devices close to one person.
 Some examples of devices that may be used in a
PAN are printers; fax machines, telephones,
Personal Digital Assistants (PDAs) or Scanners.
libtejavino@gmail.com
TYPE OF CONNECTION
 According to the connection-type, networks can
be classified as using wire connection or wireless
connection:
• A network that connects devices
using cables (wires) like Coaxial
Cable, Twisted pair Cable,
Optical Fiber Cable etc.
Wired
Network
• A network that connects devices
using Wireless technologies like
Bluetooth, Infrared, Radio
Frequency, Wifi etc.
Wireless
Network
libtejavino@gmail.com
FUNCTIONAL RELATIONSHIP
 Functional Relationship or Network architecture could
be another important criteria to classify the networks.
• It is commonly
implemented where less
than ten computers are
involved and where strict
security is not necessary
Peer to
peer
network
• In this architecture each
computer or process on the
network is either a client or
a server. Client/server
networks are more suitable
for larger networks
Client-
Server
Network
libtejavino@gmail.com
LOCAL AREA NETWORK (LAN) TOPOLOGIES
 Topology refers to the shape of a network, or the
network’s layout.
 How different nodes in a network are connected to
each other and how they communicate with each other
is determined by the network’s topology.
libtejavino@gmail.com
BUS TOPOLOGY
• In Bus topology, all devices are connected to a central cable,
called the bus or backbone.
• The bus topology connects workstations using a single cable.
• Each workstation is connected to the next workstation in a
point-to-point fashion.
• All workstations connect to the same cable.
libtejavino@gmail.com
STAR TOPOLOGY
• Star topology uses a central hub through which, all
components are connected.
• In a Star topology, the central hub is the host computer,
and at the end of each connection is a terminal
libtejavino@gmail.com
RING TOPOLOGY
•Ring Topology all devices are connected to one another in
the shape of a closed loop, so that each device is connected
directly to two other devices.
•One on either side of it, i.e., the ring topology connects
workstations in a closed loop.
libtejavino@gmail.com
TREE TOPOLOGY
• Tree topology is a LAN topology in which only one
route exists between any two nodes on the network.
• The pattern of connection resembles a tree in which
all branches spring from one root.
libtejavino@gmail.com
MESH TOPOLOGY
•Devices are connected with many redundant interconnections
between network nodes.
•In a well-connected topology, every node has a connection to
every other node in the network
•The cable requirements are high, but there are redundant
paths built in.
•Failure in one of the computers does not cause the network to
break down
libtejavino@gmail.com
WIRELESS TECHNOLOGY
•As we know wireless transmission means where data
transmission happen without wires.
•No physical connectors between the two communicating
devices.
•In wireless transmission data is sent through the atmosphere
or air.
• Nowadays everyone
wants an
uninterrupted
Omnipresent
network access from
everywhere and
every time.
libtejavino@gmail.com
Wi-Fi is a trademark of the Wi-Fi Alliance for certified
products based on the IEEE 802.11 standards
It is often suggested that Wi-Fi means Wireless Fidelity.
(compared with the long-established audio recording term
High Fidelity or Hi-Fi.)
However, officially the term Wi-Fi does not mean
anything.
WI-FI
Wi-Fi Enabled Devices
• Nowadays we see that most of the personal computer
operating systems, many game consoles, laptops,
smart phones, printers, and other peripherals
support Wi-Fi. Many consumer devices use Wi-Fi.
libtejavino@gmail.com
WIMAX
The meaning of WiMAX is Worldwide Interoperability for Microwave
Access.
“WiMAX” was created by the WiMAX Forum.
Which was formed to promote conformity and interoperability of the
standard.
It is a telecommunications technology that provides wireless
transmission of data using a variety of transmission modes.
From point-to-multipoint links to portable and fully mobile Internet
access.
Less data rate is major problem of wireless technology however through
WiMAX we can reach up to 3 Megabits/second broadband data rate.
IEEE standard available for WiMAX is 802.16 standard
libtejavino@gmail.com
LI-FI
•Li-Fi (Light Fidelity) is wireless communication technology
•Which utilizes light to transmit data and position between devices.
•The term was first introduced by Harald Haas during a 2011 TEDGlobal talk in
Edinburgh
•In technical terms, Li-Fi is a light communication system that is capable of
transmitting data at high speeds over the visible light, ultraviolet, and infrared
spectrums.
•In its present state, only LED lamps can be used for the transmission of visible
light.
libtejavino@gmail.com
WI-FI VS LI- FI
libtejavino@gmail.com
WEB BROWSERS
 Web browsers are used to look for information on the
net while editors are used to create web pages.
 There are many web browsers but the most common
two are Microsoft Internet Explorer and Google
Chrome.
libtejavino@gmail.com
WEB BROWSERS & PAGES
 Editors are used to create web pages
 Pages on the WWW are written primarily in
html (Hypertext Mark-up Language).
 HTML files are plain text files and describe text
formatting and are not a programming language
as such.
 All html documents have the same structure with
different codes, as the designer requires.
 Software that is WYSIWYG – ‘what you see is
what you get’ implies that the contents of the
screen are the same as the final printer or
browser versions.
libtejavino@gmail.com
WORLD WIDE WEB (WWW)
 World Wide Web (WWW) or simply Web is very popular
on the Internet.
 A Large number of business houses, government
agencies and many individuals have their own web
sites.
 The concept of Web started in 1989 in France.
 In 1994, a consortium called World Wide Web
Consortium (W3C) was established.
 W3C now has many countries as its members and is
responsible for development and standards for Web and
its access.
 Web is a collection of documents (Web Pages) scattered
all over the world that are accessible over the Internet.
 These documents are hypertexts as they contain
embedded links to other documents.
libtejavino@gmail.com
UNIFORM RESOURCE LOCATOR (URL)
 Embedded links are in the form of Uniform
Resource Locator (URL) that contains three
parts:
 a resource name, the identification of the
server in which the resource is located and the
protocol that can be used to access the resource
libtejavino@gmail.com
HYPERLINK
 URL is unique identifier for a specific resource on the
Internet anywhere in the world. An embedded URL
is called hyperlink.
 Static web pages are designed using a language
called Hypertext Markup Language (HTML) that
allows a developer to place text, graphics, sound,
video and hyperlinks in a web page.
Web
Pages
Static
Dynamic
libtejavino@gmail.com
HYPERTEXT MARKUP LANGUAGE (HTML)
 HTML defines how documents are to be formatted
and mixes the contents and format information.
 This poses serious problems while editing the pages.
 To overcome this deficiency, two new languages
developed they are,
HTML
XML
XSL
XML sets standards for
structuring the contents XSL for formatting the
pages.
libtejavino@gmail.com
COOKIES
 Cookies are short strings of data that a server
sends along with a web page
 Uses the same later for meeting user
preferences.
 The user, however, has the option of blocking
cookies being stored on his/her system.
libtejavino@gmail.com
HYPERTEXT TRANSFER PROTOCOL
 The protocol used for communication between the
web browser client and the server is called Hypertext
Transfer Protocol (HTTP).
 For secure applications, Secure Hypertext Transfer
Protocol (HTTPS) is used.
 HTTP is used universally to access web services all
over the Internet.
 It specifies how a client may send requests to servers
and how the servers may respond.
 The requests are sent in the form of ASCII (American
Standard Code for Information Interchange) strings and the
responses are received in the form of Multipurpose
Internet Mail Extension (MIME) format.
libtejavino@gmail.com
libtejavino@gmail.com
FILE TRANSFER PROTOCOL (FTP)
 FTP is used to transfer files from one computer to
another on the Internet.
 FTP works in an interactive mode.
libtejavino@gmail.com
SIMPLE MAIL TRANSFER PROTOCOL – (SMTP)
 SMTP (Simple Mail Transfer Protocol)
protocol is used by the Mail Transfer Agent (MTA)
to deliver an email to the recipient’s mail server.
 The SMTP protocol can only be used to send
emails, not to receive them.
 The vast majority of mail servers use SMTP.
libtejavino@gmail.com
NETWORKED ELECTRONIC INFORMATION
SOCIETY (NEIS)
 Networked society means one in which a large
proportion of the world population is
interconnected or networked by some form of
telecommunication system.
 People carry out their day-to-day activities using
the network predominantly.
 Day-to-day activities may involve tasks such as
banking, ticket booking for travel or
entertainment, product ordering, financial
transactions, exchange of mails, retrieving of
information from a database, downloading of
music files, simple telephone conversation etc.
libtejavino@gmail.com
ELECTRONIC TEXT MESSAGING
 Electronic text messaging primarily refers to Small
Messaging Service (SMS).
 SMS offered by mobile communication systems or
Instant Messaging Service (IMS) offered by online
chat rooms on the Internet.
 In the 1990s electronic mail used to be referred to
as text messaging.
 In SMS, the interaction may or may not be in real
time.
 In IMS, it usually happens in real time. Option
here other party even though he/she is not online.
libtejavino@gmail.com
MULTIMEDIA MESSAGING
 Multimedia means a combination of video, sound
and text. Multimedia messaging (MMS) usually
means multimedia information being exchanged
on mobile networks.
 Digital image or still picture is stored and
transmitted using a microscopic process.
 The picture is formed as a matrix of dots called
pixels or pels. The word pixel or pel is a short
form for picture element.
 The horizontal and vertical dot densities together
are called the resolution of the picture.
Tagged Image File Format (TIFF)
Graphics Image Format (GIF)
Joint Picture Expert Group (JPEG)
libtejavino@gmail.com
ELECTRONIC MAIL
 Electronic mail, popularly known as e-mail, is the
most widely used form of communication on the
Internet almost two decades.
 Today it is grown exponentially to the point where
its volume per day is far in excess of the conventional
paper mail
 Fax communication is terminal-to-terminal
 E-mail communication is user-to-user/s
SMTP: Simple Mail Transfer Protocol
libtejavino@gmail.com
INTERACTIVE TELEVISION (ITV)
 Interactive television (ITV) is a network
application for the user.
 Today, television is a broadcast service. Different
channels transmit pre-scheduled programs.
 The user can select a channel of his/her choice
and view the programme that is being telecast
currently.
 ITV offers flexibility and control in viewing
programmes.
 Conventional TV transmission may
be analog or digital whereas ITV is
digital only.
 Conventional TV is available via sky,
satellite or cable communication
whereas ITV is available via network.
libtejavino@gmail.com
VIRTUAL REALITY (VR)
 Virtual reality is a computer-generated
artificial reality that projects a person
into a sensation of three dimensional
space.
 Virtual reality is becoming more popular
in arcade type games.
 Virtual reality is a Simulator.
 A simulator is a device that represents
the behavior of physical or abstract
systems.
 Simulators are used very effectively
in training applications for
aeroplane pilots or bus drivers
to help them deal with various real-
life situations in a safe environment
libtejavino@gmail.com
AUGMENTED REALITY (AR)
 Augmented reality is an interactive experience of
a real-world environment where the objects that
reside in the real world are enhanced by
computer-generated perceptual information.
libtejavino@gmail.com
SECURITY
 In the pre-computer era, information in an
organization used to be secured physical and
administrative measures.
 For example, a conventional library has manual
checks at the entry/exit point.
 In other office areas, secure cabinets and
restricted physical access were used for
information security.
 The electronic information security measures fall
under two different classes:
Information
Security
Network
Security
Computer
Security
libtejavino@gmail.com
SECURITY
Computer
Security
• The measures used for securing information stored
side a computer fall under the class computer
security.
Network
Security
• The measures used while transmitting information
over a network fall under the class network
security.
Information
Security
• Information security, sometimes shortened to
infosec, is the practice of protecting information by
mitigating information risks. It is part of
information risk management.
libtejavino@gmail.com
INFORMATION SECURITY
 Threat to information resources may come from
within an organization or from external sources.
Internal
Threats
External
Threats
WHY INFORMATION SECURITY?
 Information is a valuable commodity and some
persons attempt to derive benefits by exploiting
others’ information resources.
 Attempts may also be made to destroy other’s
information resources to cause harm to the
owner.
libtejavino@gmail.com
AAA SECURITY
 AAA security is predominantly concerned with
access to information resources residing on a
server connected to a network or on a standalone
computer.
 The access may come from a user or a computer
program running on another computer or server.
Authentication
Authorisation
Auditing
libtejavino@gmail.com
FIREWALLS
 Firewall is a device that is designed to protect an
organization's local network from external
attacks while permitting the local network users
to safely access the external resources.
 It is a wall that prevents electronic fires (external
security attacks) from spreading to the local
network
 It acts as a gatekeeper for the local network.
 No one can enter, (i.e., no access can be made to)
the local network without the permission of the
gatekeeper.
libtejavino@gmail.com
PROXY SERVERS
 Proxy servers are computer systems that perform
firewall functions at the application level. In the
sessions layer or applications layer level.
 Hence, proxy servers are also called as
application level firewall.
 Both firewalls and a proxy servers act as single
entry/exit point where security checks and audit
inspections are imposed
libtejavino@gmail.com
DATA SECURITY
 Data security means protecting digital data, such as
those in a database, from destructive forces and from
the unwanted actions of unauthorized users, such as
a cyberattack or a data breach.
libtejavino@gmail.com
MALICIOUS SOFTWARE
 A malicious computer program is one that harms
the normal functioning of a computer.
 Malicious computer programs enter the computer
systems via Internet, and removable mass
storage devices such as floppies, pen drives and
CDs.
libtejavino@gmail.com
ANTIVIRUS
 Anti-Virus programs that keep a continuous watch on what
enters the system.
 Anti-virus programs scan all incoming code and data to ensure
virus-free import.
 They also scan every removable storage device whenever they are
mounted on the system.
 If Viruses are found means it will neutralized or healed. If this is
not possible, the import process is rejected.
 The user is given an appropriate message when scanning is done.
 Antivirus programs usually go through three phases of operation.
Detection Identification Removal
libtejavino@gmail.com
ENCRYPTION
 Encryption is the art of hiding the meaning contained
in a message.
 Decryption is the reverse process of encryption to
extract the hidden meaning.
 The general field of study of encryption and decryption
and related aspects is known as cryptography.
 Cryptography is an age-old technique for
communicating secretly between two parties.
 Military personnel and persons in love have been using
this technique for ages.
libtejavino@gmail.com
libtejavino@gmail.com
SEARCH ENGINES
Internet offers a powerful tool known as search engine to
manage, filter and retrieve the information for their users.
Search engine is a tool for locating information from a
collection.
Search engines uses information about the information (such
as metadata, catalogue) stored in the database to locate
information.
Sometimes they perform full text search within the
document from first character to last character.
The search is done on pattern matching algorithm whether it
is a database or full text.
libtejavino@gmail.com
SEARCH TOOLS
•Academic and Professional Directories
•These are often created and maintained by subject
experts to support the needs of researchers.
•INFOMINE, from the University of California, is a
good example of an academic directory.
•Commercial Directories
•These cater to the needs of general public.
Directories of Yahoo! and Google are examples of
commercial directories.
Search
Directory
•Meta Search engines are online tools (search engines)
which performs simultaneous search on more than
one search engine at a time.
•These search engines aggregates the results into a
single list and displays them according to their
source.
•e.g. Dogpile is a metasearch engine and gets its
results from Google, Yahoo, MSN Search, Ask ,
About, MIVA, LookSmart, and more.
Meta-
search
Engines
libtejavino@gmail.com
FEATURES OF SEARCH TOOLS
Keyword
Search
Boolean
Search
Proximity
Search
Truncation
Search
Case
Sensitive
Search
Limiting
Search
Fields
Search
File
Types
Search
Stop
Words
Ranking
Family
Filters
Fuzzy
Search
libtejavino@gmail.com
INTRUSION DETECTION SYSTEM
• An Intrusion Detection System (IDS) is a system
that monitors network traffic for suspicious activity
and issues alerts when such activity is discovered.
• It is a software application that scans a network or
a system for harmful activity or policy breaching.
libtejavino@gmail.com
IDS AND IPS
libtejavino@gmail.com

Weitere ähnliche Inhalte

Was ist angesagt?

Computer Hardware and software
Computer Hardware and softwareComputer Hardware and software
Computer Hardware and softwareVisualBee.com
 
An overview of computers and programming languages
An overview of computers and programming languages An overview of computers and programming languages
An overview of computers and programming languages Ahmad Idrees
 
Fundamental of computer
Fundamental of computerFundamental of computer
Fundamental of computerstudent
 
Lecture 3 basic syntax and semantics
Lecture 3  basic syntax and semanticsLecture 3  basic syntax and semantics
Lecture 3 basic syntax and semanticsalvin567
 
Types of Operating System
Types of Operating SystemTypes of Operating System
Types of Operating SystemHemant Raj
 
Computer organization
Computer organizationComputer organization
Computer organizationishapadhy
 
Operating system presentation
Operating system presentationOperating system presentation
Operating system presentationashanrajpar
 
Primary and secondary storage devices
Primary and secondary storage devicesPrimary and secondary storage devices
Primary and secondary storage devicesPichano Kikon
 
Programming Fundamentals lecture 1
Programming Fundamentals lecture 1Programming Fundamentals lecture 1
Programming Fundamentals lecture 1REHAN IJAZ
 
Computer Concepts
Computer ConceptsComputer Concepts
Computer ConceptsPhoebe Kim
 
Output devices
Output devicesOutput devices
Output devicesRajThakuri
 

Was ist angesagt? (20)

Computer Hardware and software
Computer Hardware and softwareComputer Hardware and software
Computer Hardware and software
 
computer Architecture
computer Architecturecomputer Architecture
computer Architecture
 
System software
System softwareSystem software
System software
 
Computer systems
Computer systemsComputer systems
Computer systems
 
An overview of computers and programming languages
An overview of computers and programming languages An overview of computers and programming languages
An overview of computers and programming languages
 
Fundamental of computer
Fundamental of computerFundamental of computer
Fundamental of computer
 
Binary code
Binary codeBinary code
Binary code
 
Basic organization of computer
 Basic organization of computer Basic organization of computer
Basic organization of computer
 
Lecture 3 basic syntax and semantics
Lecture 3  basic syntax and semanticsLecture 3  basic syntax and semantics
Lecture 3 basic syntax and semantics
 
Types of Operating System
Types of Operating SystemTypes of Operating System
Types of Operating System
 
Computer organization
Computer organizationComputer organization
Computer organization
 
Operating system presentation
Operating system presentationOperating system presentation
Operating system presentation
 
Primary and secondary storage devices
Primary and secondary storage devicesPrimary and secondary storage devices
Primary and secondary storage devices
 
Programming Fundamentals lecture 1
Programming Fundamentals lecture 1Programming Fundamentals lecture 1
Programming Fundamentals lecture 1
 
Word processing
Word processing  Word processing
Word processing
 
Computer network
Computer networkComputer network
Computer network
 
Computer programming
Computer programmingComputer programming
Computer programming
 
Types of computer
Types of computerTypes of computer
Types of computer
 
Computer Concepts
Computer ConceptsComputer Concepts
Computer Concepts
 
Output devices
Output devicesOutput devices
Output devices
 

Ähnlich wie UGC NET - Unit 7 (INFORMATION TECHNOLOGY)

ACM, Real world everyday applications of computer science. History of Comp...
ACM,    Real world everyday applications of computer science. History of Comp...ACM,    Real world everyday applications of computer science. History of Comp...
ACM, Real world everyday applications of computer science. History of Comp...Faizan Tanoli
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming conceptshermiraguilar
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming conceptshermiraguilar
 
Chapter 2Hardware2.1 The System Unit2.2 Data and P
Chapter 2Hardware2.1 The System Unit2.2 Data and PChapter 2Hardware2.1 The System Unit2.2 Data and P
Chapter 2Hardware2.1 The System Unit2.2 Data and PEstelaJeffery653
 
UNit 1sbhejsjejdhdhdjjejejdhejjjdjdhdhheh.pptx
UNit 1sbhejsjejdhdhdjjejejdhejjjdjdhdhheh.pptxUNit 1sbhejsjejdhdhdjjejejdhejjjdjdhdhheh.pptx
UNit 1sbhejsjejdhdhdjjejejdhejjjdjdhdhheh.pptxhello1506hello
 
Computer capsule ibps_po_2014
Computer capsule ibps_po_2014Computer capsule ibps_po_2014
Computer capsule ibps_po_2014Lucky Saini
 
Unit1 lesson2 internet_friendly
Unit1 lesson2 internet_friendlyUnit1 lesson2 internet_friendly
Unit1 lesson2 internet_friendlyNeil James
 
Is202 ch03 and ch04
Is202   ch03 and ch04Is202   ch03 and ch04
Is202 ch03 and ch04Shaheen Khan
 
Cibm ch03 and ch04
Cibm   ch03 and ch04Cibm   ch03 and ch04
Cibm ch03 and ch04Shaheen Khan
 
Information technology
Information technologyInformation technology
Information technologyManoj Soni
 
Basic Components of Computer
Basic Components of ComputerBasic Components of Computer
Basic Components of ComputerRajGopalAgrawal
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computerGulfam Jutt
 
Computer Short Note1.docx
Computer Short Note1.docxComputer Short Note1.docx
Computer Short Note1.docxSamyaGufoor
 
COMPUTER CONCEPTS AND FUNDAMENTALS OF PROGRAMMING
COMPUTER CONCEPTS AND FUNDAMENTALS OF PROGRAMMINGCOMPUTER CONCEPTS AND FUNDAMENTALS OF PROGRAMMING
COMPUTER CONCEPTS AND FUNDAMENTALS OF PROGRAMMINGInfinity Tech Solutions
 
Lecture 12-1234865709062834-2
Lecture 12-1234865709062834-2Lecture 12-1234865709062834-2
Lecture 12-1234865709062834-2Sami Khan
 
Computer Applications In Business by Mahatma Gandhi University
Computer Applications In Business by Mahatma Gandhi University Computer Applications In Business by Mahatma Gandhi University
Computer Applications In Business by Mahatma Gandhi University Mahatma Gandhi University
 

Ähnlich wie UGC NET - Unit 7 (INFORMATION TECHNOLOGY) (20)

ACM, Real world everyday applications of computer science. History of Comp...
ACM,    Real world everyday applications of computer science. History of Comp...ACM,    Real world everyday applications of computer science. History of Comp...
ACM, Real world everyday applications of computer science. History of Comp...
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
 
Chapter 2Hardware2.1 The System Unit2.2 Data and P
Chapter 2Hardware2.1 The System Unit2.2 Data and PChapter 2Hardware2.1 The System Unit2.2 Data and P
Chapter 2Hardware2.1 The System Unit2.2 Data and P
 
UNit 1sbhejsjejdhdhdjjejejdhejjjdjdhdhheh.pptx
UNit 1sbhejsjejdhdhdjjejejdhejjjdjdhdhheh.pptxUNit 1sbhejsjejdhdhdjjejejdhejjjdjdhdhheh.pptx
UNit 1sbhejsjejdhdhdjjejejdhejjjdjdhdhheh.pptx
 
Computer capsule ibps_po_2014
Computer capsule ibps_po_2014Computer capsule ibps_po_2014
Computer capsule ibps_po_2014
 
Unit1 lesson2 internet_friendly
Unit1 lesson2 internet_friendlyUnit1 lesson2 internet_friendly
Unit1 lesson2 internet_friendly
 
Is202 ch03 and ch04
Is202   ch03 and ch04Is202   ch03 and ch04
Is202 ch03 and ch04
 
Cibm ch03 and ch04
Cibm   ch03 and ch04Cibm   ch03 and ch04
Cibm ch03 and ch04
 
Comp generations 09
Comp generations 09Comp generations 09
Comp generations 09
 
Information technology
Information technologyInformation technology
Information technology
 
Basic Components of Computer
Basic Components of ComputerBasic Components of Computer
Basic Components of Computer
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Computer Short Note1.docx
Computer Short Note1.docxComputer Short Note1.docx
Computer Short Note1.docx
 
ICT.pptx
ICT.pptxICT.pptx
ICT.pptx
 
COMPUTER CONCEPTS AND FUNDAMENTALS OF PROGRAMMING
COMPUTER CONCEPTS AND FUNDAMENTALS OF PROGRAMMINGCOMPUTER CONCEPTS AND FUNDAMENTALS OF PROGRAMMING
COMPUTER CONCEPTS AND FUNDAMENTALS OF PROGRAMMING
 
Lecture 12-1234865709062834-2
Lecture 12-1234865709062834-2Lecture 12-1234865709062834-2
Lecture 12-1234865709062834-2
 
PCT Slide1
PCT Slide1PCT Slide1
PCT Slide1
 
Computer Applications In Business by Mahatma Gandhi University
Computer Applications In Business by Mahatma Gandhi University Computer Applications In Business by Mahatma Gandhi University
Computer Applications In Business by Mahatma Gandhi University
 

Kürzlich hochgeladen

"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Roommeghakumariji156
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoilmeghakumariji156
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsPriya Reddy
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...meghakumariji156
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsMonica Sydney
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...kumargunjan9515
 

Kürzlich hochgeladen (20)

"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 

UGC NET - Unit 7 (INFORMATION TECHNOLOGY)

  • 1. UNIT – 7 INFORMATION TECHNOLOGY Vinod libtejavino@gmail.com libtejavino@gmail.com
  • 2. INTRODUCTION TO INFORMATION TECHNOLOGY •The term computer has been borrowed from compute that means- to calculate. •Where as, initially computers were used to perform arithmetic calculations at fast speed, Now they are used in every field. •Computer is an electronic device, which takes input from the user, performs calculations and gives out the result. •It is also said that computer is a electronic data processor, because it can receive, store, process and retrieve any kind of data. libtejavino@gmail.com
  • 3. DEFINITION OF COMPUTER HIGH SPEED ELECTRONIC DEVICE TAKING AN INPUT PROCESS GIVING OUTPUT libtejavino@gmail.com
  • 4. CHARACTERISTICS OF A COMPUTER Speed Accuracy Diligence Versatility Stores Data Dumb It has no emotions libtejavino@gmail.com
  • 5. APPLICATION OF COMPUTERS In applications like Word-processor, Calculations, Games And In Domestic Applications For preparing mark sheets and to correct examination papers In Banking Transactions through out the world In monitoring millions of phone calls and in keeping lines of COMMUNICATION Using computerized technology in Telephone Exchanges In Railway/Airway Reservations for journey to places thousands of kilometers away In Monitoring Life Support Systems in medical equipments and in diagnosing and curing diseases libtejavino@gmail.com
  • 6. STRUCTURE OF COMPUTER •Controls the operation of the computer and performs its data processing functions. Often simply referred to as processor Central Processing Unit (CPU): •Stores data Main Memory: •Moves data between the computer and its external environment I/O Unit: • Some mechanism that provides for communication among CPU, main memory, and I/O unit System Interconnection: libtejavino@gmail.com
  • 7. HISTORY & DEVELOPMENT OF COMPUTERS •In olden days we calculate using our fingers. Even today we learn calculation using our fingers. •In this process of learning, different methods are invented to do the same faster and accurately. •Let us have a look on some early computing machines libtejavino@gmail.com
  • 8. EARLY COMPUTING MACHINES AND INVENTORS Abacus Slide Rule Pascaline Arithmetical Replica Arithometer Differential Engine Punched Cards Electronic computers Mark- I libtejavino@gmail.com
  • 9. GENERATIONS OF COMPUTERS First Generation 1940-1956 Vacuum Tubes Second Generation 1956-1963 Transistors Third Generation 1964-1971 Integrated Circuits (IC) Fourth Generation 1971 -Present Microprocessors Fifth Generation Present and Beyond Artificial Intelligence (AI) libtejavino@gmail.com
  • 10. ANATOMY OF A COMPUTER Source: NIOS Computer Science libtejavino@gmail.com
  • 11. CENTRAL PROCESSING UNIT  The CPU (Central Processing Unit) is the brain of the system. It executes all the program code from the operating system and the applications you run, and does most of the calculating and processing of data libtejavino@gmail.com
  • 12. MAIN MEMORY • The Main Memory (MM) consists of magnetic or electronic components, which store the information needed by the computer. • Random Access Memory or RAM is the memory that the computer uses to temporarily store the information as it is being processed. One of the first home computers used 64 KB, Now we having 2 to 4 GB RAM • Most of the Main Memory is erasable and may be changed at will, some memory is used to store constants and often- used utility programs and is not erasable by the CPU, and such memory is called Read Only Memory (ROM). eg. Operating Systems libtejavino@gmail.com
  • 13. INPUT/OUTPUT DEVICES The I/O devices are the computer's link with the outside world. The Input Unit consists of one or more devices. There are a number of devices that perform the function of input devices. The Output Unit converts the binary data into a form that users can understand libtejavino@gmail.com
  • 15. PROGRAMMING LANGUAGE  Programming languages are used in computer programming to implement algorithms.  Most programming languages consist of instructions for computers.  A programming language is a formal language, which comprises a set of instructions that produce various kinds of output. libtejavino@gmail.com
  • 18. INFORMATION REPRESENTATION AND STORAGE  Digital computer represents all information using the binary numeral system. Text, numbers, pictures, audio, and nearly any other form of information can be converted into a string of bits, or binary digits, each of which has a value of 1 or 0  A bit refers to a digit in the binary numeral system (base 2). For example, the number 100101 1 is 7 bits long libtejavino@gmail.com
  • 19. BINARY DIGIT  Binary digits are almost always used as the basic unit of information storage and communication in digital computing and digital information theory.  Claude E. Shannon first used the word bit in a 1948 paper. He attributed its origin to John W. Tukey, who had written a Bell Labs memo in 9 January 1947 in which he contracted "binary digit" to simply "bit“.  Vannevar Bush had written in 1936 of "bits of information" that could be stored on the punch cards used in the mechanical computers of that time. libtejavino@gmail.com
  • 20. UNIT: The bit, as a unit of information, is the amount of information carried by a choice between two equally likely outcomes. The name bit is mostly used when discussing data capacity, emphasising the storage of data as in dividual binary digits. A byte is a collection of bits, originally variable in size but now almost always eight bits libtejavino@gmail.com
  • 22. BINARY SYSTEM  The Binary System of numeration is the simplest of all positional number systems. The base - or the radix - of the binary system is 2, which means that only two digits – 0 and 1 - may appear in a binary representation of any number.  Computer memory comprises small elements that may only be in two states - off/on - that are associated with digits 0 and 1. Such an element is said to represent one bit - binary digit.  Binary numbers are written with only two symbols - 0 and 1. For example, a = 1101. libtejavino@gmail.com
  • 23. QUICK RECAP  The first electronic computer - ENIAC that stood for Electronic Numerical Integrator And Calculator - was built in 1946 at the University of Pennsylvania, but the invention of the binary system dates almost 3 centuries back.  Gottfried Wilhclm Leibniz (1646-1716), the co- inventor of Calculus, published his invention in 1701 in the paper ‘Essay d'une nouvelle science des nombres’ that was submitted to the Paris Academy. libtejavino@gmail.com
  • 24. NUMBER SYSTEMS IN COMPUTER libtejavino@gmail.com
  • 25. AMERICAN STANDARD CODE FOR INFORMATION INTERCHANGE (ASCII)  ASCII is a character encoding standard for electronic communication.  ASCII is the traditional name for the encoding system; the Internet Assigned Numbers Authority (IANA) prefers the updated name us-ascii, which clarifies that this system was developed in the US and based on the typographical symbols predominantly in use there.  ASCII is one of the IEEE* milestones. * Institute of Electrical and Electronics Engineers libtejavino@gmail.com
  • 26. INDIAN SCRIPT CODE FOR INFORMATION INTERCHANGE (ISCII)  ISCII is a coding scheme for representing various writing systems of India. It encodes the main Indic scripts and a Roman transliteration.  The supported scripts are: Assamese, Bengali (Bangla), Devanagari, Gujarati, Gurmukhi, Kannada, Malayalam, Oriya, Tamil, and Telugu.  ISCII has not been widely used outside certain government institutions and has now been rendered largely obsolete by Unicode. libtejavino@gmail.com
  • 27. UNICODE  Unicode is a computing industry standard for the consistent encoding, representation, and handling of text expressed in most of the world's writing systems.  The standard is maintained by the Unicode Consortium, and as of May 2019 the most recent version, Unicode 12.1 Contains a repertoire of 37,994 characters covering 150 modern and historic scripts, as well as multiple symbol sets and emoji. libtejavino@gmail.com
  • 28. COMMUNICATION Communication is a process of sharing ideas, information, and messages with others at a particular time and place. Communication is a vital part of personal life and is also important in business, education, and any other situation where people encounter each other. Communication between two people is an outgrowth of methods developed over centuries of expression libtejavino@gmail.com
  • 29. WHAT IS COMMUNICATION AND WHY • Communication is the transfer of data or information from one device to another device via some form of transmission medium. • Based on the communication medium we can estimate the time it is going to take to transfer data/information. • Different types of medium are available for communication; some of them are Twisted-Pair cable, Coaxial cable, Fiber- Optic cable etc. • Currently the trend is on Wireless Technology for communication, like Cellular phones, walkic-talks, pagers etc. wireless communication internally uses Radio waves or Microwaves or Infrared etc. libtejavino@gmail.com
  • 30. ROLE OF COMMUNICATION SYSTEMS Communication through distance (transmission) or in time (storage) Adapt the information to the physical channel (analog/digital and other conversion) Hide unwanted properties of the physical channel from the users (e.g. error control) Reliable, secure, and efficient Flexible & Simple implementation Deliver information from sources to destinations through physical channels libtejavino@gmail.com
  • 31. CHARACTERISTICS COMMUNICATION  The communicating devices must be a part of a communication system made up of a combination of hardware and software.  The effectiveness of the communications systems depends on the following characteristics. Delivery AccuracyTimeliness libtejavino@gmail.com
  • 32. COMPONENTS OF COMMUNICATION Sender Ideas Encoding Channel Receiver Decoding Feedback libtejavino@gmail.com
  • 33. COMMUNICATION SYSTEMS The development of computer networks was started when computers became faster, more- powerful and smaller. In the 1960’s the Advanced Research Projects Agency (ARPA) of the U.S. Department of Defence Along with researchers working on military projects at research centres and universities across the country, developed a network called the ARPANET libtejavino@gmail.com
  • 34. TELECOMMUNICATION NETWORKS •Modern telecommunication started with telegraph network followed by the telephone network. •Since the connections are established by switching in a telephone network and the network is open to public, it is called Public Switched Telephone Network (PSTN). •When digital computers came about, a new class of networks, known as data networks were developed to support computer interconnections. •The data network has today evolved as Internet. libtejavino@gmail.com
  • 35. INTEGRATED SERVICES DIGITAL NETWORK (ISDN)  With the maturing of digital technology, a further advanced telecommunication network called Integrated Services Digital Network (ISDN)  ISDN is capable of supporting all types of services like telephony, facsimile, data transfer and video transmission.  We have three major classes of telecommunication networks in operation: Telephone Network (Landline and Mobile) Data Network (Internet) Integrated Services Digital Network (ISDN). libtejavino@gmail.com
  • 36. TELEPHONE NETWORKS  Technique or procedure that has evolved in the last 120 years from a number of giant corporations is capable of working with each other.  With the evolution of mobile communications predominantly for voice communication, the telephone network may be viewed in two different classes Landline Networks Mobile Networks libtejavino@gmail.com
  • 37. LANDLINE NETWORKS  Landline telephony was born in March 1876 when Alexander Graham Bell demonstrated long distance voice communication over a pair of wires.  In 1877, Operator manned Switching Systems were set up with the subscribers connected to the operator switchboard giving birth to the concept of telephone networks.  Automatic Switching Systems were invented and put into operation by early 1890s.  A powerful application of touch-tone dialling is the data in voice answer (DIVA) system.  This system of digit dialling and voice response is also popularly known as Interactive Voice Response System (IVRS). Pulse Dialling Dual Tone Multi-Frequency libtejavino@gmail.com
  • 38. MOBILE NETWORKS  Mobile communication per se was first introduced in 1946 in USA to support Defence.  Early systems used a central radio station with a large antenna mounted at a high point, like a hill, which radiated high power to cover the entire target area within which mobility was supported.  Personal Mobile System (PMS) is based on cellular communication principle in which a distributed network of smaller radio stations, called base stations (BS)  The first generation cellular system went into operation in 1983 in the United States and was known as advanced mobile phone system (AMPS).  European standards are known as Global System for Mobile (GSM) communications standards. India adopted GSM standards in 1992. Digital cellular systems like GSM are called second-generation systems libtejavino@gmail.com
  • 39. MOBILE NETWORKS Credits: PHD Media & iCharts.Net libtejavino@gmail.com
  • 40. NEED OF INTERNET • The main reason is that each computer network is designed with a specific purpose. • Eg. LAN is used to connect computers in a smaller area, and it provides fast communication. • A Computer can communicate with the computers attached to the same network, because they are inter- compatible. • As more and more organisations had multiple computer networks, this became a major issue. As a result, the concept of internetworking (internet) came into being. • This means that there should be a network of all physically separate networks. libtejavino@gmail.com
  • 41. NEED OF PROTOCOLS / STANDARDS  All Communication need to follow a protocol.  Protocol is nothing but a convention or standard.  Eg. Green Signal/Flag and Train  If the speaker speaks too fast, the listener will say go-slow to understand. Just like that,  In Computer World if the receiving computer is not fast enough, and cannot hold any more data, it requests the sender to wait or control the transfer by slowdown. libtejavino@gmail.com
  • 42. TCP/IP LAYERS AND PROTOCOLS  To provide the set of rules and standardization among the different computer networks. •International Standards Organization (ISO) •In 1984 Created a Model •Open System Interconnection (OSI) libtejavino@gmail.com
  • 43. OPEN SYSTEM INTERCONNECTION (OSI) libtejavino@gmail.com
  • 44. OPEN SYSTEM INTERCONNECTION (OSI), TCP/IP MODEL AND PROTOCOL SUITE libtejavino@gmail.com
  • 45. INTERFACE LAYER OR (PHYSICAL + DATA LINK LAYER)  The physical layer deals with the hardware level like, transmission media, connections and the voltage for digital signals.  The data link layer deals with media access and control strategies, frame format etc. INTERNET LAYER OR NETWORK LAYER  The Internet layer is an important layer in the protocol suite.  At this layer, TCP/IP supports Internetworking Protocol (IP). IP is a host-to-host protocol.  Ensuring maximum efficiency, TCP/IP supports four other protocols: ARP, RARP, ICMP and IGMP in this layer. libtejavino@gmail.com
  • 46. PROTOCOL (CONT) Address Resolution Protocol (ARP) •On a LAN, each machine is identified with a unique physical address imprinted on the network interface card. ARP is used to find the physical address of a machine when its IP address is known. Reverse Address Resolution Protocol (RARP) •It is used to find the IP address of a machine when its physical address is known. It is used when a diskless computer is booted or a computer is connected to the network for the first time. Internet Control Message Protocol (ICMP) •IP is unreliable are best effort delivery. In case of failures ICMP is used to send notifications to the sender about packet problems. It sends error and query messages. Internet Group Message Protocol (IGMP) •It is used for multicasting, which is transmission of a single message to a group of Recipients. libtejavino@gmail.com
  • 47. TRANSPORT LAYER  TCP/IP supports two protocols: TCP, UDP, IP is host-to-host protocol, which can deliver the packet from one physical device to another physical device. •It is simpler of the two protocols. It does not provide reliability. It is, therefore faster, and using for applications in which delay is intolerable (in case of audio and video). User Datagram Protocol (UDP) •TCP is reliable, connection-oriented protocol. By connection oriented, we mean that a connection must be established between both ends before either can transmit data. It ensures that communication is error-free and in sequence. Transmission Control Protocol (TCP) libtejavino@gmail.com
  • 48. APPLICATION LAYER It allows the user to run various applications on Internet. These applications are File Transfer Protocol (FTP), remote login (TELNET), email (SMTP), WWW (HTTP). The session layer of OSI model is almost dropped in TCP/IP. Whenever we work on the Internet we use most of these protocols. For example when use are surfing or browsing the Internet websites actually you are using WWW. libtejavino@gmail.com
  • 49. ANALOG AND DIGITAL COMMUNICATION  Communication from a source to a destination, that is, from one computer to another or from one device to another, involves the transfer of information from the sender to the receiver.  The transfer of data from one machine to another machine such that, the sender and the receiver both interpret the data correctly is known as Data Communication.  Broadly the data communication can be divided into two types Analog and Digital. As you may know that signals carry the data for communication.  Classification of Analog and Digital is based on the signals which are used for data transfer. libtejavino@gmail.com
  • 50. ANALOG SIGNAL  We mostly use analog signals in our day-to-day life.  Whatever we are talking meaning voice signals, Radio and TV broadcasting signals, Electricity signals, Sunlight or other lights signals, all are nothing but examples of Analog signal.  Analog Signals get weaker with the distance therefore, in long distance communication like telephones, radio and TV communication we use a device named “Amplifiers”.  Amplifiers amplify noise along with the original signal. libtejavino@gmail.com
  • 51. DIGITAL DATA TRANSMISSION  Computers are digital machines because at their most basic level they can distinguish between just two values, 0 and 1, or off and on, or high and low voltage as depicted in below pic.  All data that a computer processes must be encoded digitally, as a series of zeroes and ones.  A hardware device called Repeater is used to regenerate the digital signal. The repeater measures the signal values at regular intervals to recognise the 0’s and 1’s in the signal and regenerates them. libtejavino@gmail.com
  • 52. DATA COMMUNICATION MODES  Data can be transmitted from Source to Destination in a number of ways. The different modes of data transmission are outlined as follows: Asynchronous SynchronousIsochronous Simplex Half Duplex Full Duplex libtejavino@gmail.com
  • 53. ASYNCHRONOUS COMMUNICATION  Controlling the timing of operations by the use of pulses sent when the previous operation is completed rather than at regular intervals.  Each frame begins with a start bit that enables the receiving device to adjust to the timing of the transmitted signal. libtejavino@gmail.com
  • 54. SYNCHRONOUS COMMUNICATION  Instead of sending single character or few bit we can send a group or block of data at once, and this methods is called synchronous communication. libtejavino@gmail.com
  • 55. ISOCHRONOUS COMMUNICATION  This is another alternative mechanism for data transmission, which combines the approaches of asynchronous and synchronous communications. libtejavino@gmail.com
  • 56. SIMPLEX COMMUNICATION  This is one of the simplest techniques for data communication, in which we have one permanent sender and permanent receiver.  In Simplex transmission, at any point of time one of the communicating devices can only send data, whereas the other can only receive it.  Can you think about some example? libtejavino@gmail.com
  • 57. HALF DUPLEX COMMUNICATION  As we know data communication is more about exchanging and sharing data, which may not be fulfilled by the simplex communication.  Direction of the data one at a time like A to B or B to A libtejavino@gmail.com
  • 58. FULL DUPLEX COMMUNICATION  The Transmission of data in two directions simultaneously. libtejavino@gmail.com
  • 59. COMMUNICATION CHANNELS  One of the most common ways to transport data from one computer to another is to write them onto magnetic tape or floppy disks, physically transport the tape or disks to the destination machine, and read them back in again.  Cable is the medium through which information usually moves from one network device to another.  There are several types of cable, which are commonly used with LANs. libtejavino@gmail.com
  • 60. TWISTED PAIR CABLE  Twisted pair cable comes in two varieties: unshielded twisted pair and shielded twisted pair.  Unshielded twisted pair (UTP) is the most popular and is generally the best option for small networks UTP cables contain four twisted-pairs (Orange, Green, Blue & Brown) enclosed in a common sheath. libtejavino@gmail.com
  • 61. COAXIAL CABLE  Another common transmission medium is the coaxial cable. It has better shielding than twisted pairs, so it can span longer distances at higher speeds.  A coaxial cable consists of a stiff copper wire as the core, surrounded by an insulating material. The insulator is encased by a cylindrical conductor, often, as a closely woven braided mesh. The outer conductor is covered with a protective plastic sheath. libtejavino@gmail.com
  • 62. OPTICAL FIBER  Fiber Optic cabling consists of a center glass core surrounded by several layers of protective materials.  It transmits light rather than electronic signals eliminating the problem of electrical interference.  Fiber optic cable has the ability to transmit signals over much longer distances than coaxial and twisted pair.  It also has the capability to carry information at vastly greater speeds. This capacity broadens communication possibilities to include services such as video conferencing and interactive services libtejavino@gmail.com
  • 63. COMMUNICATION DEVICES • A Communications device is a hand-held or wearable device which is enables Communication. • There are several communication devices used in data communication. In the sender and receiver computers, we should have Network Interface Card and Modem before connected to the Internet connection. • There are many other devices being used at different levels and in different types of networks. libtejavino@gmail.com
  • 64. NETWORK INTERFACE CARD (NIC)  It connects the computer to the cabling, which in turn links all of the computers on the network together as shown in figure libtejavino@gmail.com
  • 65. REPEATER  It is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto the other side of an obstruction so that the signal can cover longer distances without degradation libtejavino@gmail.com
  • 66. HUB  A hub is a device used to connect a PC to the network.  The function of a hub is to direct information around the network, facilitating communication between all connected devices, means A hub contains multiple ports. When a packet arrives at one port, it is copied to all the ports of the hub.  Hubs can improve performance, especially for bursty traffic and large file transfers.  However, total bandwidth remains fixed; as network traffic grows, performance suffers and it does not reduce collisions libtejavino@gmail.com
  • 67. SWITCH  A switch is a data-link layer network device that forwards frames using MAC (Media Access Control ) addresses in the header of frames.  It is used to improve network performance by segmenting the network and creating separate collision domains. It can also reduce competition for bandwidth.  During new installations switches should be used instead of hubs as they are more effective and provide better performance. •A switch which is often, termed a ‘smart hub’. •With switching, each connection gets “dedicated bandwidth” and can operate at full speed. libtejavino@gmail.com
  • 68. BRIDGE •The main network device found at the data link layer is a bridge, mainly used for connecting two network or local area networks. •This device works at a higher layer than the repeater and therefore is a more complex device. •This means that the amount of traffic on the medium can be reduced and therefore, the usable bandwidth can be increased •Bridges are store and forward devices to provide error detection libtejavino@gmail.com
  • 69. HUB VS BRIDGE VS SWITCH • Hub is really a repeater • A Message sent by one host is sent to all other hosts. • One of the simplest ways to create a network • Bridge is a more Intelligent from of Hub • Packets are processed based on MAC address (Hardware Address) inside the incoming packet. • Swtich = Bridge with more than 2 Ports • More scalable and Practical • Bridge is not very useful for end-computig devices • Hubs cannot handle large data traffic libtejavino@gmail.com
  • 70. ROUTERS  Router is a device which is use to create an internetworking in our WANs and LANs.  The main purpose of router is routing, which means taking a packet from one device and sending it through the network to another device on a different network.  A Packet is nothing but the unit of data.  A packet normally contains Data Type, Packet Count, Recipient’s IP address, Sender’s IP address, and Data.  Actually routers need to transfer the data from source machine to destination machine but other information in packets it need during its transportation process. libtejavino@gmail.com
  • 72. FULLY CONNECTED NETWORKS  If every subscriber is to be connected to every other subscriber, then we need a very large number of links. Every subscriber is directly connected to every other subscriber. Networks with this kind of connectivity are called fully connected networks. Source: O’Reilly libtejavino@gmail.com
  • 73. SWITCHED NETWORKS  The number of communication links can be reduced significantly by using a switch along with communication links for establishing connection between subscribers.  Switch, as you know, is a device that is used to make and break electrical connections. Switched communication networks are those in which data transferred from source to destination is routed between various intermediate nodes libtejavino@gmail.com
  • 74. BASICS OF NETWORK TECHNOLOGY A Network Is Two Or More Devices Connected Together Through links. A network link is communicating pathway to transfer data from one device to another. One way to categorize the different types of computer Network Designs is by their scope or scale. For historical reasons, the networking industry refers to nearly every type of design as some Kind Of Area Network. libtejavino@gmail.com
  • 75. NETWORKING BASICS  Networks are not new to us. We are familiar with postal networks, railway networks, airline networks, etc  A fundamental difference between telecommunication and other networks is that telecommunication networks operate in the electrical, optical or electromagnetic domains.  A Computer network includes the network operating system in the client and server machines, the cables, which connect different computers and all supporting hardware in between such as bridges, routers and switches.  In wireless systems, antennas and towers are also part of the network. libtejavino@gmail.com
  • 76. ADVANTAGES OF NETWORKS  Computers in a networked environment provide numerous advantages when compared to computers in a stand-alone environment. Sharing Reliability Scalability Communication Medium Increased Productivity libtejavino@gmail.com
  • 77. NETWORK CLASSIFICATION  We see different types of networks available like mobile networks, computer networks and TV networks around us  Let us now learn about different types of computer networks available around us and try to classify them. Size •LAN •MAN •WAN •PAN Connection Type •Wired Network •Wireless Network Architecture •Peer to Peer network •Client- Server Network libtejavino@gmail.com
  • 78. NETWORK CLASSIFICATION • Local Area NetworkLAN • Wide Area NetworkWAN • Wireless Local Area NetworkWLAN • Metropolitan Area NetworkMAN • Storage Area Network, System Area Network, Server Area Network, or sometimes Small Area NetworkSAN • Campus Area Network, Controller Area Network, or sometimes Cluster Area NetworkCAN • Personal Area NetworkPAN libtejavino@gmail.com
  • 79. LAN (LOCAL AREA NETWORK)  The network that spans a relatively small area that is, in the single building or campus is known as LAN.  A Library will have a wired or wireless LAN for users to interconnect local devices (e.g., printers and servers). Local area networking uses switches, bridges and/or repeaters, and hubs to interconnect LANs and increase overall size. libtejavino@gmail.com
  • 80. MAN (METROPOLITAN AREA NETWORK)  MAN is a Computer network connecting two or more LANs or CANs (Campus Area Networks) together but within a Town or City.  In terms of geographic area MANs are larger than LANs, but smaller than Wide-Area Networks (WANs).  MANs are usually characterised by very high-speed connections using fiber optical cable or other digital media. Range is anywhere from 5 to 50km in diameter. libtejavino@gmail.com
  • 81. WAN (WIDE AREA NETWORK)  WAN is a computer network that spans a relatively large geographical area.  WAN consists of many local-area networks (LANs)  They can connect networks Across Cities, States or even Countries  They can also be connected through leased lines or satellites. libtejavino@gmail.com
  • 82. PERSONAL AREA NETWORK (PAN)  A personal area network (PAN) is a computer network used for communication among computer devices close to one person.  Some examples of devices that may be used in a PAN are printers; fax machines, telephones, Personal Digital Assistants (PDAs) or Scanners. libtejavino@gmail.com
  • 83. TYPE OF CONNECTION  According to the connection-type, networks can be classified as using wire connection or wireless connection: • A network that connects devices using cables (wires) like Coaxial Cable, Twisted pair Cable, Optical Fiber Cable etc. Wired Network • A network that connects devices using Wireless technologies like Bluetooth, Infrared, Radio Frequency, Wifi etc. Wireless Network libtejavino@gmail.com
  • 84. FUNCTIONAL RELATIONSHIP  Functional Relationship or Network architecture could be another important criteria to classify the networks. • It is commonly implemented where less than ten computers are involved and where strict security is not necessary Peer to peer network • In this architecture each computer or process on the network is either a client or a server. Client/server networks are more suitable for larger networks Client- Server Network libtejavino@gmail.com
  • 85. LOCAL AREA NETWORK (LAN) TOPOLOGIES  Topology refers to the shape of a network, or the network’s layout.  How different nodes in a network are connected to each other and how they communicate with each other is determined by the network’s topology. libtejavino@gmail.com
  • 86. BUS TOPOLOGY • In Bus topology, all devices are connected to a central cable, called the bus or backbone. • The bus topology connects workstations using a single cable. • Each workstation is connected to the next workstation in a point-to-point fashion. • All workstations connect to the same cable. libtejavino@gmail.com
  • 87. STAR TOPOLOGY • Star topology uses a central hub through which, all components are connected. • In a Star topology, the central hub is the host computer, and at the end of each connection is a terminal libtejavino@gmail.com
  • 88. RING TOPOLOGY •Ring Topology all devices are connected to one another in the shape of a closed loop, so that each device is connected directly to two other devices. •One on either side of it, i.e., the ring topology connects workstations in a closed loop. libtejavino@gmail.com
  • 89. TREE TOPOLOGY • Tree topology is a LAN topology in which only one route exists between any two nodes on the network. • The pattern of connection resembles a tree in which all branches spring from one root. libtejavino@gmail.com
  • 90. MESH TOPOLOGY •Devices are connected with many redundant interconnections between network nodes. •In a well-connected topology, every node has a connection to every other node in the network •The cable requirements are high, but there are redundant paths built in. •Failure in one of the computers does not cause the network to break down libtejavino@gmail.com
  • 91. WIRELESS TECHNOLOGY •As we know wireless transmission means where data transmission happen without wires. •No physical connectors between the two communicating devices. •In wireless transmission data is sent through the atmosphere or air. • Nowadays everyone wants an uninterrupted Omnipresent network access from everywhere and every time. libtejavino@gmail.com
  • 92. Wi-Fi is a trademark of the Wi-Fi Alliance for certified products based on the IEEE 802.11 standards It is often suggested that Wi-Fi means Wireless Fidelity. (compared with the long-established audio recording term High Fidelity or Hi-Fi.) However, officially the term Wi-Fi does not mean anything. WI-FI Wi-Fi Enabled Devices • Nowadays we see that most of the personal computer operating systems, many game consoles, laptops, smart phones, printers, and other peripherals support Wi-Fi. Many consumer devices use Wi-Fi. libtejavino@gmail.com
  • 93. WIMAX The meaning of WiMAX is Worldwide Interoperability for Microwave Access. “WiMAX” was created by the WiMAX Forum. Which was formed to promote conformity and interoperability of the standard. It is a telecommunications technology that provides wireless transmission of data using a variety of transmission modes. From point-to-multipoint links to portable and fully mobile Internet access. Less data rate is major problem of wireless technology however through WiMAX we can reach up to 3 Megabits/second broadband data rate. IEEE standard available for WiMAX is 802.16 standard libtejavino@gmail.com
  • 94. LI-FI •Li-Fi (Light Fidelity) is wireless communication technology •Which utilizes light to transmit data and position between devices. •The term was first introduced by Harald Haas during a 2011 TEDGlobal talk in Edinburgh •In technical terms, Li-Fi is a light communication system that is capable of transmitting data at high speeds over the visible light, ultraviolet, and infrared spectrums. •In its present state, only LED lamps can be used for the transmission of visible light. libtejavino@gmail.com
  • 95. WI-FI VS LI- FI libtejavino@gmail.com
  • 96. WEB BROWSERS  Web browsers are used to look for information on the net while editors are used to create web pages.  There are many web browsers but the most common two are Microsoft Internet Explorer and Google Chrome. libtejavino@gmail.com
  • 97. WEB BROWSERS & PAGES  Editors are used to create web pages  Pages on the WWW are written primarily in html (Hypertext Mark-up Language).  HTML files are plain text files and describe text formatting and are not a programming language as such.  All html documents have the same structure with different codes, as the designer requires.  Software that is WYSIWYG – ‘what you see is what you get’ implies that the contents of the screen are the same as the final printer or browser versions. libtejavino@gmail.com
  • 98. WORLD WIDE WEB (WWW)  World Wide Web (WWW) or simply Web is very popular on the Internet.  A Large number of business houses, government agencies and many individuals have their own web sites.  The concept of Web started in 1989 in France.  In 1994, a consortium called World Wide Web Consortium (W3C) was established.  W3C now has many countries as its members and is responsible for development and standards for Web and its access.  Web is a collection of documents (Web Pages) scattered all over the world that are accessible over the Internet.  These documents are hypertexts as they contain embedded links to other documents. libtejavino@gmail.com
  • 99. UNIFORM RESOURCE LOCATOR (URL)  Embedded links are in the form of Uniform Resource Locator (URL) that contains three parts:  a resource name, the identification of the server in which the resource is located and the protocol that can be used to access the resource libtejavino@gmail.com
  • 100. HYPERLINK  URL is unique identifier for a specific resource on the Internet anywhere in the world. An embedded URL is called hyperlink.  Static web pages are designed using a language called Hypertext Markup Language (HTML) that allows a developer to place text, graphics, sound, video and hyperlinks in a web page. Web Pages Static Dynamic libtejavino@gmail.com
  • 101. HYPERTEXT MARKUP LANGUAGE (HTML)  HTML defines how documents are to be formatted and mixes the contents and format information.  This poses serious problems while editing the pages.  To overcome this deficiency, two new languages developed they are, HTML XML XSL XML sets standards for structuring the contents XSL for formatting the pages. libtejavino@gmail.com
  • 102. COOKIES  Cookies are short strings of data that a server sends along with a web page  Uses the same later for meeting user preferences.  The user, however, has the option of blocking cookies being stored on his/her system. libtejavino@gmail.com
  • 103. HYPERTEXT TRANSFER PROTOCOL  The protocol used for communication between the web browser client and the server is called Hypertext Transfer Protocol (HTTP).  For secure applications, Secure Hypertext Transfer Protocol (HTTPS) is used.  HTTP is used universally to access web services all over the Internet.  It specifies how a client may send requests to servers and how the servers may respond.  The requests are sent in the form of ASCII (American Standard Code for Information Interchange) strings and the responses are received in the form of Multipurpose Internet Mail Extension (MIME) format. libtejavino@gmail.com
  • 105. FILE TRANSFER PROTOCOL (FTP)  FTP is used to transfer files from one computer to another on the Internet.  FTP works in an interactive mode. libtejavino@gmail.com
  • 106. SIMPLE MAIL TRANSFER PROTOCOL – (SMTP)  SMTP (Simple Mail Transfer Protocol) protocol is used by the Mail Transfer Agent (MTA) to deliver an email to the recipient’s mail server.  The SMTP protocol can only be used to send emails, not to receive them.  The vast majority of mail servers use SMTP. libtejavino@gmail.com
  • 107. NETWORKED ELECTRONIC INFORMATION SOCIETY (NEIS)  Networked society means one in which a large proportion of the world population is interconnected or networked by some form of telecommunication system.  People carry out their day-to-day activities using the network predominantly.  Day-to-day activities may involve tasks such as banking, ticket booking for travel or entertainment, product ordering, financial transactions, exchange of mails, retrieving of information from a database, downloading of music files, simple telephone conversation etc. libtejavino@gmail.com
  • 108. ELECTRONIC TEXT MESSAGING  Electronic text messaging primarily refers to Small Messaging Service (SMS).  SMS offered by mobile communication systems or Instant Messaging Service (IMS) offered by online chat rooms on the Internet.  In the 1990s electronic mail used to be referred to as text messaging.  In SMS, the interaction may or may not be in real time.  In IMS, it usually happens in real time. Option here other party even though he/she is not online. libtejavino@gmail.com
  • 109. MULTIMEDIA MESSAGING  Multimedia means a combination of video, sound and text. Multimedia messaging (MMS) usually means multimedia information being exchanged on mobile networks.  Digital image or still picture is stored and transmitted using a microscopic process.  The picture is formed as a matrix of dots called pixels or pels. The word pixel or pel is a short form for picture element.  The horizontal and vertical dot densities together are called the resolution of the picture. Tagged Image File Format (TIFF) Graphics Image Format (GIF) Joint Picture Expert Group (JPEG) libtejavino@gmail.com
  • 110. ELECTRONIC MAIL  Electronic mail, popularly known as e-mail, is the most widely used form of communication on the Internet almost two decades.  Today it is grown exponentially to the point where its volume per day is far in excess of the conventional paper mail  Fax communication is terminal-to-terminal  E-mail communication is user-to-user/s SMTP: Simple Mail Transfer Protocol libtejavino@gmail.com
  • 111. INTERACTIVE TELEVISION (ITV)  Interactive television (ITV) is a network application for the user.  Today, television is a broadcast service. Different channels transmit pre-scheduled programs.  The user can select a channel of his/her choice and view the programme that is being telecast currently.  ITV offers flexibility and control in viewing programmes.  Conventional TV transmission may be analog or digital whereas ITV is digital only.  Conventional TV is available via sky, satellite or cable communication whereas ITV is available via network. libtejavino@gmail.com
  • 112. VIRTUAL REALITY (VR)  Virtual reality is a computer-generated artificial reality that projects a person into a sensation of three dimensional space.  Virtual reality is becoming more popular in arcade type games.  Virtual reality is a Simulator.  A simulator is a device that represents the behavior of physical or abstract systems.  Simulators are used very effectively in training applications for aeroplane pilots or bus drivers to help them deal with various real- life situations in a safe environment libtejavino@gmail.com
  • 113. AUGMENTED REALITY (AR)  Augmented reality is an interactive experience of a real-world environment where the objects that reside in the real world are enhanced by computer-generated perceptual information. libtejavino@gmail.com
  • 114. SECURITY  In the pre-computer era, information in an organization used to be secured physical and administrative measures.  For example, a conventional library has manual checks at the entry/exit point.  In other office areas, secure cabinets and restricted physical access were used for information security.  The electronic information security measures fall under two different classes: Information Security Network Security Computer Security libtejavino@gmail.com
  • 115. SECURITY Computer Security • The measures used for securing information stored side a computer fall under the class computer security. Network Security • The measures used while transmitting information over a network fall under the class network security. Information Security • Information security, sometimes shortened to infosec, is the practice of protecting information by mitigating information risks. It is part of information risk management. libtejavino@gmail.com
  • 116. INFORMATION SECURITY  Threat to information resources may come from within an organization or from external sources. Internal Threats External Threats WHY INFORMATION SECURITY?  Information is a valuable commodity and some persons attempt to derive benefits by exploiting others’ information resources.  Attempts may also be made to destroy other’s information resources to cause harm to the owner. libtejavino@gmail.com
  • 117. AAA SECURITY  AAA security is predominantly concerned with access to information resources residing on a server connected to a network or on a standalone computer.  The access may come from a user or a computer program running on another computer or server. Authentication Authorisation Auditing libtejavino@gmail.com
  • 118. FIREWALLS  Firewall is a device that is designed to protect an organization's local network from external attacks while permitting the local network users to safely access the external resources.  It is a wall that prevents electronic fires (external security attacks) from spreading to the local network  It acts as a gatekeeper for the local network.  No one can enter, (i.e., no access can be made to) the local network without the permission of the gatekeeper. libtejavino@gmail.com
  • 119. PROXY SERVERS  Proxy servers are computer systems that perform firewall functions at the application level. In the sessions layer or applications layer level.  Hence, proxy servers are also called as application level firewall.  Both firewalls and a proxy servers act as single entry/exit point where security checks and audit inspections are imposed libtejavino@gmail.com
  • 120. DATA SECURITY  Data security means protecting digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach. libtejavino@gmail.com
  • 121. MALICIOUS SOFTWARE  A malicious computer program is one that harms the normal functioning of a computer.  Malicious computer programs enter the computer systems via Internet, and removable mass storage devices such as floppies, pen drives and CDs. libtejavino@gmail.com
  • 122. ANTIVIRUS  Anti-Virus programs that keep a continuous watch on what enters the system.  Anti-virus programs scan all incoming code and data to ensure virus-free import.  They also scan every removable storage device whenever they are mounted on the system.  If Viruses are found means it will neutralized or healed. If this is not possible, the import process is rejected.  The user is given an appropriate message when scanning is done.  Antivirus programs usually go through three phases of operation. Detection Identification Removal libtejavino@gmail.com
  • 123. ENCRYPTION  Encryption is the art of hiding the meaning contained in a message.  Decryption is the reverse process of encryption to extract the hidden meaning.  The general field of study of encryption and decryption and related aspects is known as cryptography.  Cryptography is an age-old technique for communicating secretly between two parties.  Military personnel and persons in love have been using this technique for ages. libtejavino@gmail.com
  • 125. SEARCH ENGINES Internet offers a powerful tool known as search engine to manage, filter and retrieve the information for their users. Search engine is a tool for locating information from a collection. Search engines uses information about the information (such as metadata, catalogue) stored in the database to locate information. Sometimes they perform full text search within the document from first character to last character. The search is done on pattern matching algorithm whether it is a database or full text. libtejavino@gmail.com
  • 126. SEARCH TOOLS •Academic and Professional Directories •These are often created and maintained by subject experts to support the needs of researchers. •INFOMINE, from the University of California, is a good example of an academic directory. •Commercial Directories •These cater to the needs of general public. Directories of Yahoo! and Google are examples of commercial directories. Search Directory •Meta Search engines are online tools (search engines) which performs simultaneous search on more than one search engine at a time. •These search engines aggregates the results into a single list and displays them according to their source. •e.g. Dogpile is a metasearch engine and gets its results from Google, Yahoo, MSN Search, Ask , About, MIVA, LookSmart, and more. Meta- search Engines libtejavino@gmail.com
  • 127. FEATURES OF SEARCH TOOLS Keyword Search Boolean Search Proximity Search Truncation Search Case Sensitive Search Limiting Search Fields Search File Types Search Stop Words Ranking Family Filters Fuzzy Search libtejavino@gmail.com
  • 128. INTRUSION DETECTION SYSTEM • An Intrusion Detection System (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered. • It is a software application that scans a network or a system for harmful activity or policy breaching. libtejavino@gmail.com