Professional Documents
Culture Documents
Unit 1.1-Merged
Unit 1.1-Merged
1 [BHM105]
Computer Fundamentals
Definition of a Computer:
• A computer is an electronic device that operates under the
control of a set of instructions that is stored in its memory unit.
• A computer is a collection of hardware and software
components that help you complete many different tasks.
• A computer can be more accurately defined as an electronic
device that takes data as input, stores, and processes it, and
displays the output according to the given instructions.
Data
A computer usually accepts input in the form of data. Data is the raw
material. Data refers to numerical (1,2,3,4,5,6,7,8,9,0), alphabetical
(A,B,C,D ……Z) and special characters (e.g., @,#,$,%,^,&,!). A set of
numbers could be examples of data. OR
Data is a word of Latin used to describe a collection of natural
phenomena like numbers, characters, images, or symbols, in a very
broad sense.
Information
Information is the finished product (manipulation of raw facts).
Information refers to data in a particular context, which helps us
understand facts. Example- +91(011) 2555-1212 is a telephone no. of
a directory. It includes country code 91, an area code 011, a
telephone exchange 2555, and a number within the exchange 1212.
Definition of a Computer:
A computer is an electronic device that operates under the control of
a set of instructions that is stored in its memory unit.
A computer is a collection of hardware and software components that
help you complete many different tasks.
A computer can be more accurately defined as an electronic device
that takes data as input, stores, and processes it, and displays the
output according to the given instructions.
Characteristics of computer
Computers of all sizes have common characteristics:
• Speed
• Reliability
• Multitasking
• Diligence
• Accuracy
• Memory capacity
Speed
• It works at very high speeds and can much faster than humans.
• It is equivalent to one million mathematicians working 24 hours
a day.
Reliability
• Computers are extremely reliable as well. Most errors are
caused by humans, not computers.
• Computers are capable of storing enormous amounts of data
that must be located and retrieved very quickly.
Multitasking
• Modern computers can perform multiple tasks at once. i.e. they
can perform a set of works simultaneously.
• Example – at the same time it can play a game & printing your
document.
Diligence
• Unlike a human, a computer simply does not get bored or tired.
• Repetitive work does not affect the computer.
Accuracy
• Computers rarely make mistakes.
• Most computer errors are caused by human faults
Storage capacity
• It stores a huge amount of data/information
Classification of Computers
Limitations of Computer
The computer cannot operate without the instructions given by
humans. It is programmed to work effectively, fast, and accurately.
The computer cannot think by itself and does not have common
sense. It is totally dependent on humans.
• Depend on the user’s input.
• The computer has no imagination.
• Cannot detect an error in logic.
• An only an expert user can work on it.
• Cannot take its own decisions.
• No Learning Power
The computer has no learning power. The computer cannot perform
the tasks without instructions. It cannot read the same instructions
time and again. Once the instructions are given it will work for one
time. It can solve the problems but it cannot learn the problems. It
can only work according to the instructions given.
Components of a Computer
A computer system consists of both hardware and information stored
on the hardware. Information stored on computer hardware is often
called software.
The hardware components of a computer system are the electronic
and mechanical parts
The software components of a computer system are the data and
computer programs.
The major hardware components of a computer system are:
1. Processor
2. Main memory
3. Secondary memory
4. Input devices
5. Output devices
Generations of Computers
First Generation
• Basic component – Vacuum Tubes 1940-1956
• Processing Speed – Slow & Unreliable Machine
• Heat Generation – Huge amount of Heat generated
• Size – Bulky & Non – Portable Machine
• Instructions – Only Machine Language was used
• User Friendly – Very Difficult to operate
• Cost – Production & Maintenance costs were very High
• Example – ENIAC, UNIVAC, ENIAC = (Electronic Numerical
Integrator and Calculator, UNIVAC = (Universal Automatic
Computer)
Second Generation
• Basic component – Transistors & Diodes
• Processing Speed – More reliable than 1st one
• Heat Generation – Less amount of Heat generated
• Size – Reduced size but still Bulky
• Instructions – High-level Language was used (Like COBOL,
FORTRAN)
• User Friendly – Easy to operate from 1st one
• Cost – Production & Maintenance costs was < 1st
• Example – IBM 7090, NCR 304
Third Generation
• Basic component –Integrated Circuits 1964-1971
• Processing Speed – More reliable than 1st & 2nd Machine
• Heat Generation – The lesser amount of Heat generated
• Size – Smaller than older computer
• Instructions –Expensive use of High-level Language
• User Friendly – General-purpose Machine used in commercial
Application
• Cost – Production & Maintenance costs were Cheaper than the
older one
• Example – IBM 360, CDC 7600
Fourth Generation
• Basic component –: Microprocessors 1971-Present
• 8842Thousands of integrated circuits were built onto a single
silicon chip.
• Processing Speed – Most reliable than older computer
• Heat Generation – Virtually no Heat generated
• Size – Smallest in size making them easily portable
• Instructions –Very sophisticated programs & Languages use
• User Friendly –Easiest to operate
• Cost – Production & Maintenance costs were Cheapest than the
older one
• Example – IBM 3090, VAX
Fifth Generation
• Fifth Generation – Present and Beyond: (Artificial Intelligence)
• Fifth-generation computing devices, based on artificial
intelligence, are still in development.
Mouse:
The mouse is an input device that is used with your personal
computer. It rolls on a small ball and has two or three buttons on the
top. When you roll the mouse across a flat surface the screen censors
the mouse in the direction of mouse movement. The cursor moves
very fast with mouse giving you more freedom to work in any
direction. It is easier and faster to move through a mouse
Types of Mouse:
• Trackball Mouse: In this, the ball is rolled at one place rolling the
mouse on the tabletop.
• Optical Mouse: It uses a light beam to detect movement.
Scanner
The keyboard can input only text through keys provided in it. If we
want to input a picture the keyboard cannot do that. The scanner is
an optical device that can input any graphical matter and display it
back. The common optical scanner devices are:
• Magnetic Ink Character Recognition (MICR): This is widely used
by banks to process large volumes of cheques and drafts.
Cheques are put inside the MICR. As they enter the reading unit
the cheques pass through the magnetic field which causes the
read head to recognize the character of the cheques.
• Optical Mark Reader (OMR): This technique is used when
students have appeared in objective type tests and they had to
mark their answer by darkening a square or circular space by
pencil. These answer sheets are directly fed to a computer for
grading where OMR is used.
• Optical Character Recognition (OCR): This technique unites the
direct reading of any printed character. Suppose you have a set
of handwritten characters on a piece of paper. You put it inside
the scanner of the computer. This pattern is compared with a
site of patterns stored inside the computer. Whichever pattern
is matched is called a character read. Patterns that cannot be
identified are rejected. OCRs are expensive though better the
MICR.
SOFTWARE CONCEPTS
The system software is a type of computer program that is designed
to run a computer’s hardware and application programs. If we think
of the computer system as a layered model, the system software is
the interface between the hardware and user applications. The
operating system (OS) is the best-known example of system software.
The OS manages all the other programs on a computer.
Besides the application software, there is another software called
system software. The system software is the operating system. This is
very important for the working of the PC.
Example – Windows 98, Windows 95, Windows XP, Solaris, Linux,
Unix, Vista, etc.
When a user wants to store any data or program, the data or the
program is stored at a location that is known only to the operating
system. Therefore, the operating system performs the task of storage
management.
Other examples of system software include:
• The BIOS (basic input/output system) gets the computer system
started after you turn it on and manages the data flow between
the operating system and attached devices such as the hard
disk, video adapter, keyboard, mouse, and printer.
• The boot program loads the operating system into the
computer’s main memory or random-access memory (RAM).
• An assembler takes basic computer instructions and converts
them into a pattern of bits that the computer’s processor can
use to perform its basic operations.
• A device driver controls a particular type of device that is
attached to your computers, such as a keyboard or a mouse.
The driver program converts the more general input/output
Application Software
Application software is a program or group of programs designed for
end-users. These programs are divided into two classes: system
software and application software. While system software consists of
low-level programs that interact with computers at a basic level,
application software resides above system software and includes
applications such as database programs, word processors, and
spreadsheets. Application software may be bundled with system
software or published alone.
Application software may simply be referred to as an application.
Different types of application software include:
• Application Suite: Have multiple applications bundled together.
Related functions, features, and user interfaces interact with
each other.
• Enterprise Software: Addresses an organization’s needs and
data flow in a huge distributed environment
• Enterprise Infrastructure Software: Provides capabilities
required to support enterprise software systems
Compilers
• Besides the application software and the system software, there
is a third kind of software called the compiler software.
• A compiler is a system program that translates source code
(user-written program) into object code (binary form).
• The whole source code file is compiled in one go and a
complete.
• This means that the program can only be executed once the
translation is complete.
• It is 5-25 times faster than an interpreter.
• Ex- C & C++ are most popular compiled language.
Interpreter
Translate the high-level language and execute the instruction before
passing on to the next instruction.
• An Interpreter is a contrast to a compiler, analyses & executes
the source code line- by – line without looking at the entire
program.
• First, it translates & executes the first line then it moves to the
next line of the source code & repeats the process.
• It is a slow process.
• It is used in the FORTRAN program.
• Ex- JavaScript & VBScript are interpreted language.
INTERPRETER COMPILER
It translates the program line by
It assembles the whole program.
line,
The debugging process is
complex as it generates errors
The debugging process is easy.
only at the end of the
compilation.
The object code of the statement The object code produced by the
produced by the interpreter is compiler is permanently saved
not saved. for future reference.
It is a complicated process
It is a smaller program compared
compared to an interpreter.
to a compiler. Thus, it occupies
Thus, it has a higher execution
lesser memory space and has a
time and occupies larger
lower execution time.
memory space.
It is 5-25 times faster than an
It is a slow process.
interpreter.
It is used in the FORTRAN
It is used in C language program.
program.
BASICS OF MS-DOS
External Commands
These external commands are for performing advanced tasks and
they do need some external file support as they are not stored in
COMMAND.COM. There are also Batch commands or Batch files
which are text files that contain a list of internal and/or external
commands which are executed in sequence when the batch file is
executed. AUTOEXEC.BAT gets executed automatically on booting.
Examples of External Commands are:
• DELTREE- Short for delete tree, deltree is a command used to
delete files and directories permanently from the computer.
• TREE- Allows the user to view a listing of files and folders in an
easy to read the listing.
• PRINT – The print command allows users to print a text file to a
line printer, in the background.
• FIND – Allows you to search for text within a file.
INTRODUCTION TO WINDOWS
file. You can move windows around the display screen, and
change their shape and size at will.
• Menus: Most graphical user interfaces let you execute
commands by selecting a choice from a menu.
In addition to their visual components, graphical user interfaces also
make it easier to move data from one application to another. A true
GUI includes standard formats for representing text and graphics.
Because the formats are well-defined, different programs that run
under a common GUI can share data. This makes it possible, for
example, to copy a graph created by a spreadsheet program into a
document created by a word processor.
Many DOS programs include some features of GUIs, such as menus,
but are not graphics based. Such interfaces are sometimes called
graphical character-based user interfaces to distinguish them from
true GUIs.
Windows versions
Following is a brief summary of the client versions of Windows (a
user’s PC running Windows). For more on the server versions, see
Windows Server 2003, Windows Server 2008, and Windows Server
2012.
Windows 10 S (2017)
The streamlined version that obtains content via the Internet. See
Windows 10 S.
Windows 10 (2015) – MS Version 6.4
The next client version of Windows. See Windows 10.
Windows 8/8.1 (2012-2013) – MS Version 6.2/6.3
The current client version of Windows. See Windows 8.
Windows 7 (2009) – MS Version 6.1
The previous client version of Windows. Windows 7 greatly improved
stability over Vista. See Windows 7.
Windows Vista (2006) – MS Version 6.0
A client version of Windows that was widely criticized for its bugs and
behavior (see Windows Vista). Windows Server 2008 was the server
counterpart. See Windows Server 2008.
Windows XP (2001) – MS Version 5.1
A client version of Windows that has been widely used. Adding more
security and administrative capabilities, XP became available in 64-bit
versions for AMD x86 and Intel Itanium CPUs. See Windows XP.
NETWORK TOPOLOGY
Bus Topology
In the bus topology, the server is at one end, and the client PCs
(devices) are connected at different points or positions along with the
network. All signals pass through each of the devices. Each device has
a unique identity and can recognize those signals intended for it. It is
easy and simple to design and implement.
Advantages:
• Easy to implement and extend
• Well suited for temporary or small networks not requiring high
speeds
• Cheaper than other topologies.
• Cost-effective as only a single cable is used.
• Cable faults are easily identified.
Disadvantages
• Limited cable length and the number of stations.
• If there is a problem with the cable, the entire network goes
down.
• Maintenance costs may be higher in the long run.
• It works best with a limited number of nodes.
• It is slower than the other topologies.
Star Topology
This is a form of LAN architecture is which nodes on a network are
connected to a common central hub or switch, and this is done by the
use of dedicated links.
• In this kind of topology all the cables run from the computers to
the central location where they are all connected by a device
called hub or switch (or host node).
• Each computer on a star network communicates with a central
device that resends the message either to each computer or
only to the destination computer, e.g. if it is a hub then it will
send to all and if it is a switch then it will send to the only
destination computer.
• When network expansion is expected and when the greater
reliability is needed, star topology is the best.
Advantages:
1) It is easy to modify and add new computers without disturbing the
rest of the network.
2) The center of the star network is a good place to diagnose the
faults.
3) Single computer failure does not necessarily bring down the whole
star network.
Disadvantages:
1) If the central device (or the host node) fails the whole network fails
to operate.
2) Star networking is expensive because all network cables must be
pulled to one central point, requires more cable than other network
topologies.
Ring Topology
• This topology is a simple design and consists of a single cable
that forms the main data path in the shape of a ring. Each
device is connected to a closed-loop of cable. Signals travel in
one direction from one node to all other nodes around the loop.
• In this type, each computer is connected to the next computer
with the last one connected to the first.
• Each retransmits what it receives from the previous computer.
The message flows around the ring in one direction.
• The ring network does not subject to signal loss problems as a
bus network experience.
• There is no termination because there is no end to the ring.
Advantages:
1) Each node has equal access.
2) Capable of high-speed data transfer.
Disadvantages:
1) Failure of one computer on the ring can affect the whole network.
2) Difficult to troubleshoot the network.
NETWORK APPLICATIONS
TYPES OF NETWORK
Node
Any system or device connected to a network is also called a node.
For example, if a network connects a file server, five computers, and
two printers, there are eight nodes on the network. Each device on
the network has a network address, such as a MAC address, which
uniquely identifies each device. This helps keep track of where data is
being transferred to and from on the network.
A node can also refer to a leaf, which is a folder or file on your hard
disk. In physics, a node, or nodal point, is a point of minimum
displacement or where multiple waves converge, creating a net
amplitude of zero.
In communication networks, a node is an active electronic device that
is attached to a network and is capable of sending, receiving, or
forwarding information over a communications channel.
Server
• A computer or application, that provides a service to client
software on other computers. Servers are used for web hosting
and other web applications
• A high-end computer with specific software that allows other
computers to use its facilities for connection to data drives,
email, printers, the Internet, or other services.
• A computer or device on a network that manages network
resources. For example, a file server is a computer and storage
device dedicated to storing files. Any user on the network can
store files on the server.
A server is a computer program or device that provides a service to
another computer program and its user, also known as the client. In a
data center, the physical computer that a server program runs on is
also frequently referred to as a server. That machine may be a
dedicated server or it may be used for other purposes as well. In the
client/server programming model, a server program awaits and fulfils
requests from client programs, which may be running in the same or
other computers. A given application in a computer may function as a
client with requests for services from other programs and also as a
server of requests from other programs.
Types of servers
Servers are often categorized in terms of their purpose. A few
examples of the types of servers available are:
• A Web server is a computer program that serves requested
HTML pages or files. In this case, a Web browser acts as the
client.
• An application server is a program in a computer in a distributed
network that provides the business logic for an application
program.
• A proxy server is a software that acts as an intermediary
between an endpoint device, such as a computer, and another
server from which a user or client is requesting a service.
• A mail server is an application that receives incoming e-mails
from local users (people within the same domain) and remote
senders and forwards outgoing e-mails for delivery.
• A virtual server is a program running on a shared server that is
configured in such a way that it seems to each user that they
have complete control of a server.
• A blade server is a server chassis housing multiple thin, modular
electronic circuit boards, known as server blades. Each blade is a
server in its own right, often dedicated to a single application.
• A file server is a computer responsible for the central storage
and management of data files so that other computers on the
same network can access them.
• A policy server is a security component of a policy-based
network that provides authorization services and facilitates
tracking and control of files.
CHANNEL
A Channel can take many forms, including ones suitable for storage
which can communicate a message over time as well as space. A
connection between initiating and terminating nodes of a circuit. A
single path provided by a transmission medium via either physical
separation, such as by multi-pair cable.
Types of Channel
Fiber optic “cable”
Coaxial Cable Types
Twisted Pair
Coaxial Cable
Coaxial cable, or coax, is a cable consisting of an inner conductor,
surrounded by a tubular insulating layer
typically made from a flexible material, all of which is then
surrounded by another conductive layer and then finally covered
again with a thin insulating layer on the outside.
The Coaxial cable is used as a transmission line for radio frequency
signals, in applications such as connecting radio transmitters and
receivers with their antennas, carrying internet connections, and
distributing cable television.
Twisted Pair
A type of cable made by intertwining two separate insulated wires
together. There are two types of twisted pair: shielded and
unshielded. Shielded Twisted Pair (STP) has a fine wire mesh
surrounding the wires to protect the transmission;
Unshielded Twisted Pair (UTP) does not. Shielded cable is used in
older telephone networks, networks, and data communications to
reduce outside interference.
HUBS
Types of Hub: On the basis of its working methods, the Hubs can be
divided into three types, given as:
1. Active Hub
2. Passive Hub
3. Intelligent Hub
Active Hub: As its name suggests, Active Hub is a hub which can
amplify or regenerate the information signal. This type of bus has an
advantage as it also amplifies the incoming signal as well as forward it
to multiple devices. This Bus is also known as Multiport Repeater. It
can upgrade the properties if incoming signal before sending them to
a destination.
Passive Hub: Passive Hub works like a simple Bridge. It is used for
just creating a connection between various devices. It does not have
the ability to amplify or regenerate any incoming signal. It receives a
signal and then forwards it to multiple devices.
Intelligent Hub: This is the third and last type of Bus. It can perform
tasks of both Active and Passive buses. Also, it can perform some
other tasks like Bridging and routing. It increases the speed and
effectiveness of total network thus makes the performance of the
whole network fast and efficient.
ARCNET
Ethernet
Later, Ethernet hubs largely gave way to network switches, their more
sophisticated and modern counterparts. Because a hub cannot
discriminate between points on a network segment, it can’t send data
directly from point A to point B. Instead, whenever a network device
sends a transmission via an input port, the hub copies the data and
distributes it to all the available output ports.
NETWORK SOFTWARE
SDN Framework
The Software-Defined Networking framework has three layers as
depicted in the following diagram:
• Application Layer: SDN applications reside in the Application
Layer. The applications convey their needs for resources and
services to the control layer through APIs.
• Control Layer: The Network Control Software, bundled into the
Network Operating System, lies in this layer. It provides an
abstract view of the underlying network infrastructure. It
receives the requirements of the SDN applications and relays
them to the network components.
• Infrastructure Layer: Also called the Data Plane Layer, this layer
contains the actual network components. The network devices
reside in this layer that shows their network capabilities through
the Control to data-Plane Interface