You are on page 1of 39

MyanmarTechnology Gateway Co., Ltd.

COMPUTER AND
NETWORKING BASIC
MTG
INTRODUCTION
Computer is an electronic device that stores,
retrieves and process data, and can be
programmed with instruction.

The five main units of computer system


• Input unit
• Output unit
• Memory unit
• Control unit
• Arithmetic and Logical unit

MTG 2
INPUT UNIT

The input unit of a computer refers to the


input device, which is the hardware used to
receive data from humans. Input devices
convert data by humans into a form that is
understandable by computers. 
• Mouse
• Keyboard
• Microphone
• Scanner

MTG 3
OUTPUT UNIT

The output is how the computer presents the


results of the process. Outputs can be returned
to the user in many ways such as text on a
screen, printed materials, or as sound from a
speaker.
• Monitor
• Speaker
• Printer

MTG 4
MEMORY UNIT

It is used to store data, instructions and


information. It is also known as a
principal/primary/internal memory. There are
two types of memory.
• RAM
• ROM

MTG 5
CONTROL UNIT

A control unit, or CU, is circuitry within a


computer's processor that directs operations. It
instructs the memory, logic unit, and both
output and input devices of the computer on
how to respond to the program's instructions.

MTG 6
ARITHMETIC AND LOGICAL UNIT

The control unit tells the ALU what operation


to perform on that data and the ALU stores
the result in an output register. The control
unit moves the data between these registers,
the ALU, and memory.

MTG 7
MAIN PARTS OF COMPUTER

Motherboard
CPU
GPU
Memory
Storage

MTG 8
CPU

The CPU is the brain of a computer, it


takes input, translates it into binary,
performs basic functions, and sends the
data to the correct output devices. It
performs functions including arithmatic,
logic, and cache memory.

MTG 9
MEMORY

RAM – Random Access Memory


- The main “working” memory
- Data stored in RAM are volatile
- CPU uses this memory to perform the
tasks
- RAM only holds the data you need for
the apps and files that are currently open

MTG 10
MEMORY

ROM – Read Only Memory


- ROM is a special type of memory chip
that holds software that can be read but
not written to
- It is non-volatile memory type that
receives data and permanently writes it
on a chip
- A good example is ROM-BIOS chip,
which contain read-only software
- Some network card and video card
contain ROM chip

MTG 11
MEMORY

How computer memory is measured


- Bit
- All computers work on a binary system. i.e., 0 and 1
- Byte
- A byte consists of 8 bits
- Kilo Byte (KB)
- A kilobyte consists of 1024 bytes
- Mega Byte (MB)
- A megabyte consists of 1024 kilobytes
- Giga Byte (GB)
- A gigabyte consists of 1024 megabytes
- Terabyte, Petabyte, Exabyte, Zettabyte and so on

MTG 12
SOFTWARE COMPONENTS

There are three types of software


- System (operating system) software
- Device drivers
- Application software

MTG 13
OPERATING SYSTEM SOFTWARE

• Operating system is a special type of program that


loads automatically when you start computer.
• That allows to use the features of computer without
having to learn all details how the hardware works
• Make the computer easy to use without having to
understand bits and bytes

MTG 14
DEVICE DRIVER

• The device driver software sits between the hardware


device and the operating system.
• This allows generic instructions from software
applications to be turned into specific instructions for
that particular hardware device.
• Without the correct driver, a hardware component
may not work correctly, or even at all.

MTG 15
APPLICATION SOFTWARE

• An application software is the type of program that can be used


once the operating system has been loaded
• Examples of application software are MS Office, Photoshop

MTG 16
COMPUTER VIRUS

• Virus are small programs that hide themselves on the


computer storage
• That reproduces its own code by attaching itself to
other executable files
• The virus code is execute when the infected file is
executed
• It can change codes in its copies to avoid detection by
anti-virus software

MTG 17
HOW DO VIRUS INFECT PC

• Viruses hide on a disk and when you access disk, the virus program
will start and infect the computer
• They can spread from one computer to another, either via use of
infected USB or over a network computer, including the Internet

MTG 18
HOW TO PREVENT THE VIRUS DAMAGE

• Don’t open email attachments or click on hyperlinks


from unknown senders.
• Exercise caution when downloading files from the
Internet. Only download from trusted sources.
• New viruses are always being created so it is best to
have an anti-virus program that
automatically downloads updates.

MTG 19
VALUE OF BACKUP

• The Most important thing that you store on the


computer is information.
• The contents of a heard disk can represent years of
work.
• If the hard disk stops one day, you could lose all
those years of work.
• For this reason, it is VITAL that you take regular
backups of the information that is stored on
computer.
• Complete and incremental backups
• Use off-site storage
• Use passwords
• mtgrepo’s gists (github.com)

MTG 20
EMAIL PROTOCOLS

SMTP POP3 IMAP

SMTP – Simple Mail Transfer Protocol POP3 – the protocol which use to download The Internet Message Access Protocol
which use to send email to another server the email from server. Which widely use with (IMAP) is a mail protocol used for accessing
natively doesn’t come with Encryption. But Outlook, Thunderbird and other email client. email on a remote web server from a local
now a day, user can configure the SSL Enabled encryption with SSL/TLS to ensure client.
connection (Secure Sockets Layers) or your email are encrypted across the network. Port 143 - this is the default IMAP non-
STARTTLS to encrypt their mail sending. Port 110 - this is the default POP3 non- encrypted port
Port 25 - this is the default SMTP non- encrypted port Port 993 - this is the port you need to use if
encrypted port Port 995 - this is the port you need to use if you want to connect using IMAP securely
Port 465 - SSL Encryption port you want to connect using POP3 securely
Port 587 - STARTTLS Encryption port

MTG 21
EMAIL CLIENTS
There are two different types of mail clients

Web mail client Mobile/Desktop mail client

Rainloop MS Outlook
Roundcube Thunderbird
Zimbra – integrated with mail server Apple mail client
Atmail – integrated with mail server IBM Domino – integrated with mail server

MTG 22
BASIC OF NETWORKING

Components
• Hosts – PC, smartphones
• Routers & Switches
• Links – wired, wireless
• Protocols – TCP/IP
• Applications – http, ftp, smtp

MTG 23
THE USES OF NETWORK

• Data
• Shared files stored on server
• Software
• License servers
• API/Application server
• Shared peripheral device
• Printers and Faxes

MTG 24
NETWORK ARCHITECTURE

• The design of computers, devices, and media


on a network is sometimes called the
network architecture.
• Network types:
• LAN, WAN, MAN, PAN
• Network categories:
• Client/server network
• Peer-to-peer network

MTG 25
TYPES OF NETWORK

• Local Area Network (LAN)


• Contains in one office or building
• Wide Area Network (WAN)
• Uses public leased line
• More than one LAN
• The Internet
• Metropolitan Area Network (MAN)
• Large network that connects different organizations
• Personal Area Network (PAN)
• Very small network
• E.g., connection phone and PC

MTG 26
CLIENT/SERVER NETWORK

• computer networks that use a dedicated computer


(server) to store data, manage/provide resources
and control user access.
• Data storage, hosting web applications, email
services, monitoring network traffic
• More secure than peer-to-peer networks, faster
performance as each computer is only fulfilling
one role
• Server can be expensive, a network technician is
required

MTG 27
PEER-TO-PEER

• Each computer has equal capabilities


• Torrent (file sharing)
• TOR (anonymous internet browsing)
• Crypto block chain (decentralized transaction ledger)

MTG 28
NETWORK TOPOLOGY

MTG 29
NETWORK TOPOLOGY

BUS
• One wire connects all nodes
• Terminator ends of the wires
• Small amount of wire
• Slow, easy to crash

MTG 30
NETWORK TOPOLOGY

Star
• All nodes connect to a hub
• Most common topology
• One cable can not crash network
• One hub crashing downs entire network

MTG 31
NETWORK TOPOLOGY

Ring
• Nodes connected in a circle
• Tokens used to transmit data
• No data collisions
• Slow

MTG 32
NETWORK TOPOLOGY

Mesh
• All computers connected together
• Internet is a mesh network
• Data will always be delivered
• Hard to setup

MTG 33
NETWORK MEDIA

Wire
• Twisted pair (Cat5, Cat6) - Speed 1Mbps to 1000Mbps, 10Gbps
• Coaxial cable - Speed up to 10 Mbps
• Fiber-optic cable - Speed up to 100 Gbps
Wireless
• Radio wave – LAN (wifi)
• Microwave – WAN

MTG 34
NETWORK MEDIA

Network Hardware
• Network interface cards
• Connects node to the media
• Switches
• Connects the nodes in the same LAN
• Router
• Connects two or more LANs together

MTG 35
NETWORK PROTOCOLS

TCP/IP
• Transmission Control Protocol/Internet Protocol
• Transports data on the Internet
• Machines assigned a name of 4 numbers
• IP address: 103.47.185.129
• Dynamic Host Configuration Protocol (DHCP)
• Simplifies assignment of IP addresses

IPX/SPX
• Internet Packet Exchange/Sequenced Packet Exchange
• Transports data on a Novell NetWare network
• Older protocol
• Replaced by TCP/IP

MTG 36
INTERNET APPLICATION PROTOCOLS

FTP – File Transfer Protocol


SMTP – Sample Mail Transfer Protocol
SNMP – Simple Network Management Protocol
HTTP – Hypertext Transfer Protocol
NTP – Network Time Protocol
IMAP – Internet Message Access Protocol
ICMP – Internet Control Message Protocol

MTG 37
CLOUD SERVERS, HOSTING, VPS

• What are web hosting, cloud, VPS?


• They are the place or a computer to store and serve your
application to the Internet.
• Since they are the computer,
• They composed of CPU, RAM, Storage, Internet link and a
public IP address to be able to access from anywhere via
Internet.
• Application software can be installable as the respective OS.
• Although they are computer, they are not physical server.
The physical machines are virtualized/containerized into
the VM.

MTG 38
THANK YOU

MTG

You might also like