Outcome 1 - Contents
Outcome 1 - Contents
1 Data Representation 2 Computer Structure 3 Computer Performance 4 Peripherals 6 Using Networks 7 Computer Software 8 Supporting Software 5 Networking
1 Data Representation
1.2.1 BinaryNumbers
Computers work in number base 2 which uses 2 symbols, 0 and 1 to represent a value. In computing systems, large numbers are expressed in terms of powers of 2 and use the following abbreviations:
21 has a decimal equivalent of 2 22 has a decimal equivalent of 4 23 has a decimal equivalent of 8 24 has a decimal equivalent of 16 25 has a decimal equivalent of 32 26 has a decimal equivalent of 64 27 has a decimal equivalent of 128 28 has a decimal equivalent of 256 29 has a decimal equivalent of 512 210 has a decimal equivalent of 1024 and is abbreviated to 1 kilo 220 has a decimal equivalent of 1,048,576 and is abbreviated to 1 Mega 230 has a decimal equivalent of 1,073,741,824 and is abbreviated to 1 Giga 240 has a decimal equivalent of 1,099,511,627,776 and is abbreviated to 1 Tera
Giving 11101 Using 1 byte for storage gives 256 possible numbers. 2 byte gives 65536, 0-65535
Increasing the size of the storage for numeric data increases the range of numbers which can be stored.
+16 +8
Negative Numbers
216 : Same range but 32768 to 32767
Using sign bit 0 +ive and 1 ive e.g. 011 = 3 and 111 = -3 Sign and magnitude does not work because: Addition does not work properly (-5+-10 gives 15) Two 0s (00000000 and 10000000)
Twos Complement is another way of representing negative numbers. Addition works and there is only one zero All 0s are converted to 1s and 1s to 0s then 1 is added. To convert 5 to 5
0 1 1
0 1 1
0 1 1
0 1 1
0 1 1
1 0 0
0 1 1
1 0 +1 1
OR 5
OR -5
Unicode
Need to represent non-Latin chars e.g. Japanese and Chinese Characters encoded using 16 bits 65,536 symbols. MS Office stores documents in Unicode
Data Representation
1.4.2 Calculating Memory Requirements
We need to know the size of the image, resolution and bit depth.
Size usually inches e.g. 6 x 4 Resolution say 500 dpi (pixels per inch) Bit Depth e.g. 1 bytes for 256 colours
No of bytes is
Pixels Across 6 x 500 Pixels down 4 x 500 Total Pixels 24 x 250,000 = 6,000,000 * Bit depth 6,000,000 bytes / 1024 = 5859K = 5.7 MB
Data Representation
1.4.3 Arranging The Bytes
There are many different ways of arranging the bytes that hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:
The image is saved as a series of bytes to a storage device, such as memory or disk.If we wish to review the image then it is a simple matter to transfer the image data back into the video memory as a direct copy. As this image is also in a bit mapped format, we can still move it to and from other storage devices without any translation.
Data Representation
1.4.4 Greyscale
A rudimentary greyscale effect provides a black, white and two levels of grey. As this comprises four different values we need two bits to represent each pixel (00 for black, 01 for darker grey, 10 for lighter grey and 11 for white ).
As each pixel now requires twice as many bits, we will require twice as much memory for a given screen size as a black and white image. We can provide more levels of grey by allocating more bits to each pixel. By the time we have eight bits (one byte) to one pixel we can represent 256 different intensities. Monochrome displays are often clearer, especially for text than colour display. The requirement to use colour for such items as colour pictures and user interface issues, dictates that colour displays are more likely to be purchased.
Data Representation
1.4.6 Compression
A colour bit mapped image with a high resolution and 24 bit colour needs a lot of storage (50MB for a smallish photo). File compression is used to reduce storage requirements. Different techniques coding using and index of colours actually used and not coding differences indistinguishable to the human eye.
Data Representation
1.4.5 Colour
One colour can be represented by one byte giving 256 colours (GIF format).
Monitors etc. have 3 primary (additive) colours, Red, Blue and Green. Other colours obtained from adding light. We use 8 bits for Red, 8 for Blue and 8 for Green which give us 256 x 256 x256 colours over 16 million.
2 Computer Structure
2.2. Calculating Machines- From Babbage to VLSI
Abacus developed about 1300 AD by Chinese Logarithms developed by John Napier Other manual devices developed by Pascal & Liebniz First mechanical calculator developed by Charles Babbage (1792 1871) Difference Engine and then Analytical Engine. Idea of stored program concept developed. First Electrical machine Enigma codebreaker in WW2. Vacuum tubes (40s replaced by transistors (60s) From 1965 to present circuitry all on one chip Integrated circuits. Now we have VLSI (Very large Scale Integration)
CPU
Input Processor Memory
RAM & ROM
Output
Backing Storage
2 Computer Structure
2.2.2.1 The structure of the CPU (a)
Memory
Control Bus
Processor
Control unit
ALU
Data bus 2 way Address bus 1 way
Registers, A, MAR, MDR, PC, SP
2 Computer Structure
2.2.2.1 The structure of the CPU (b)
ALU (Arithmetic & Logic Unit) Data is processed and manipulated. Involves arithmetic operations and logical comparisons. Control Unit Manages execution of instructions. Sends control signals around the computer. Registers Storage location with the CPU Hold calculations, store addresses etc. Main Memory External Memory Peripheral Devices
2 Computer Structure
2.2.3 The stored program concept
All computers based on same basic design, known as the Von Neumann Architecture.
Computers carry out tasks by executing machine instructions. A series of these instructions is called a machine code program held in main memory as a stored program, a concept first proposed by John Von Neumann in 1945. Central Processing Unit (CPU) fetches, decodes and executes the machine instructions. By altering the stored program it is possible to have the computer carry out a different task.
2 Computer Structure
2.2.4 The fetch execute cycle
To execute a machine code program it must first be loaded, together with any data that it needs, into main memory (RAM). Once loaded, it is accessible to the CPU which fetches one instruction at a time, decodes and executes it at electronic speed. Fetch, decode and execute are repeated until a program instruction to HALT is encountered. This is known as the fetch-execute cycle.
2 Computer Structure
2.2.4.1 The fetch execute cycle in detail
This is how the:
Address bus Data bus
Control Bus
Registers All take part in reading an instruction from memory and executing it.
2 Computer Structure
2.2.4.3 The fetch phase
1. . The contents of the PC are copied into the MAR;
2. The contents of memory at the location designated by the MAR are copied into the MDR; 3. The PC is incremented; 4. The contents of the MDR are copied into the IR.
2 Computer Structure
2.2.8 Computer Components and Their Function
The components of the CPU and the connections to devices that are external to it are shown.
2 Computer Structure
2.3 Memory
Main memory (RAM and ROM) stores programs and data while the computer is operating.
Any location in memory can be read from or written to by referring to its address.
2 Computer Structure
2.3.1 RAM
RAM
Has same access time for all locations. Volatile loses contents on power off.
2 Computer Structure
2.3.2 ROM
ROM
Contents permanent or non-volatile. Software & data fixed into ROM at manufacture. Operating systems and specialised ROMs (e.g. cameras and CD players etc.).
2 Computer Structure
2.3.4 Cache Memory
Faster processors mean data is being processed before the next instructions can be read from memory (system busses slow). Most systems have 2nd smaller area of fast SRAM. Next instructions read into cache much faster than RAM.
2 Computer Structure
2.3.6 External Memory
External memory, such as the hard disk, holds quantities of data too large to store in main memory. It is also used to keep a permanent copy of programs and data.
zip disk;
CD-R; magnetic tape; flash drive.
2 Computer Structure
2.4 Central Processing Unit
Central Processing Unit. The CPU coordinates and controls the activities of all other units in the computer system. It executes program instructions and manipulates data in accordance with the instructions. It uses a standard architecture composed of the following three components:
Arithmetic and logic unit (ALU); Control unit; Registers. All three components work together to form the processor.
2 Computer Structure
2.4.1 Architecture of the microprocessor
We will now study the internal architecture of the microprocessor (CPU) itself. Because of the stored program concept, we must consider the relationship between the CPU and memory.
This is a diagram of a fairly typical microprocessor design, showing the internal structure of the CPU and its relationship to the memory of the computer.
2 Computer Structure
2.4.2 Accessing Memory
The CPU has to access memory both for instructions and to receive and transmit data from or to memory.
Memory Address Register (MAR) - specifies the address in memory for the next read or write operation from or to memory; The Memory Data Register (MDR) or Memory Buffer Register (MBR) - contains the data to be written to memory or receives the data read from memory. MAR register connected to the address bus MDR register connected to the data bus.
2 Computer Structure
2.4.2 Accessing Memory (2)
The MAR and MDR registers have a large part to play in the fetch-execute cycle. To read data from memory, CPU places the address of the memory location into the MAR and activates the memory-read control line of the system bus. This will cause the required data to be transmitted from memory via the data bus to the MDR; To write from the CPU to memory, the CPU places the data to be written in theMDR; the address of the memory location where they are to be written is placed in the MAR; and the memory-write control line is activated.
2 Computer Structure
2.4.3 Functions of Control Bus
Control bus has several lines, used singly to initiate a process.
Read Line initiates memory read operation. Write Line - initiates memory write operation. Clock Generates pulse to synchronise components. Interrupt Signal to processor of an interrupt like a key press or mouse click. Processor saves stack and deals with the interrupt. NMI Non-Maskable Interrupt. Interrupt which cannot be ignored. Reset Clears all registers, aborts program and gives control back to the operating system.
2 Computer Structure
2.4.3.1 Getting the processors attention
Polling
The processor checks each part of the system in turn and if any part wants the processors attention it signals to the processor.
Interrupts
This is how a PC works. When a key is pressed or mouse clicked an interrupt is generated and the processor carries out that task (sometimes it is doing nothing and is interrupted. Some interrupts need not be actioned (Maskable Interrupts), others must be actioned (NMI) e.g Ctrl+Alt+Del
2 Computer Structure
2.4.4 The Arithmetic Logic Unit
ALU
Where data is processed and manipulated. ALU involves arithmetic operations and logical operations . ALU uses temporary registers to hold data. Accumulator is main register.
2 Computer Structure
2.4.5 Registers
memory address register (MAR) holds address of a location in main memory. memory buffer register (MBR) holds data that has just been read from main memory or is to be written to main memory. instruction register (IR) holds the current instruction that is being executed. program counter (PC) holds the address of the next instruction to be fetched from memory. Processor also has a set of general purpose registers. They are called general purpose because their role is not defined at manufacture and can be used by programmers as appropriate.
2 Computer Structure
2.5 Buses
Data is transferred between memory and processor by buses. Address Bus
Pinpoint memory location. One-way Bus
Data Bus
Transfers the data Same size as Word size Two-way Bus
Control Bus
Initiates and controls operations.
2 Computer Structure
2.5.1 Addressability
The Word Length is the size of data, in bits, which can be manipulated as a single unit by the processor. In an ideal computer the size of the data pathways and the size of memory locations will match. Address bus determines amount of addressable memory
8 bit address bus can access 28 = 256 locations 16 bit address bus can access 216 = 65,536 locations (64K) 24 bit address bus can access 224= 1,677,216 locations (16MB) 32 bit address bus can access 232 = 4294967296 locations (4GB) If we have 2 bytes or 4bytes for each memory location we get for a 24 bit bus 16MB of addressable locations, but 32MB or 64MB of actual storage.
3 Computer Performance
3.2 Measuring Performance
When we measure performance we usually mean how fast the computer carries out instructions. The measure we use is MIPS, millions of instructions per second. MIPS affected by
The clock speed of the processor The speed of the buses The speed of memory access.
3 Computer Performance
3.2.1 The Clock
Every processor has a clock which ticks continuously at a regular rate. Synchronises all the components. Cycle time measured in MHz or GHz 200 MHz (megahertz) means the clock ticks 200,000,000 times a second (P1 -1995) 1.4 GHz (gigahertz) is 1,400,000,000 times a second (P4 2001) 2.3 4+ GHz on P5 in 2004
Benchmark Tests
Well defined standardised routine to test the performance of a computer. Dhrystone tests string and frequently used functions Whetstone test using arithmetic functions
3 Computer Performance
3.3.1 Data Bus Width
A WORD is the basic number of bits a processor can handle in one operation.
If word size and data bus same size then data transfers carried out in single operation.
Width of data bus defines how much data can be carried in one fetch.
32 bit data bus (word length) carries twice as much data as a 16 bit bus and a 32 bit system should be faster. Most modern processor 32 bit but some AMD 64 bit.
Width of Address bus affects the amount of memory which can be accessed.
3 Computer Performance
3.3.2 Peripherals & System Performance
3 Computer Performance
3.3.2 Interfaces & Input/output Devices
An interface makes the link between the processor and a peripheral (disk drive, printer etc.). Peripherals work at different speeds, use different formats. Parallel to serial conversion is often needed
Some devices are serial 1 bit at a time is transferred. Serial used for long (over 2m) distances. Some are parallel (printers) 8 bits at a time. Used for short distances problems with skewing loss of data integrity.
Interface transfers data so the processor is delayed as little as possible. It has buffers to store blocks of data in transit. Memory mapped I/O uses memory linked to peripheral. Spool files are used when large quantities of data are sent to a slow peripheral, like a printer. Enables background printing.
3 Computer Performance
3.3 Memory & System Performance
Amount of memory
Adding memory (upgrade) usually improves system performance esp. graphics & multimedia. Usually 2 slots on motherboard so max memory is 2 x largest modules (currently 512MB largest affordable.
4 Peripherals
4.1 Introduction
Examine a range of hardware devices which carry out typical tasks. We will examine devices in terms of: Speed Cost Resolution Compatibility
Developments and trends in storage devices Serial & parallel interfaces and wireless communications
Modified Keyboards
Used to alleviate Repetitive Strain Injury (RSI) Customised keypads can have more (or fewer) keys all programmable to suit particular situations. Adjustable split keyboard in 3 parts to allow flexibility.
Scanners
Flat bed scanner allows for up to A4 size documents
Document placed face downwards on glass panel and scanned. Light beam reflects light from the document and photocells measure the light reflected. Analogue data needs converted to digital (A DC)
Modern scanners use high bit depths to allow high resolutions. Images must be matched to their purpose
No point in scanning at a resolution of more than 75 dpi for a screen based display. No point in scanning at 600 dpi for a printer rated at 300 dpi.
Capacity
Little internal buffering, rely on techniques to transfer the data. Storage can be high e.g. A4 page at 600 dpi requires 33.28MB for 8 bit and around 100MB for full colour.
Cost
Dropped dramatically in recent years Bundled software often the major selling point.
This is called ADC Analogue to Digital Conversion Simplest input device is a microphone with sound card but sound files can be taken from a CD and downloaded from the Internet. Sound card performs the ADC and compression
Capacity
No built-in cache. Depends on fast access via the sound card to hard disk storage. 10.09MB to store 2 mins stereo audio. Compression required e.g. reduce sample rate / size or use a compression technique to reduce file size.
Video Digitising
is performed by special video digitising circuitry installed on the motherboard of the computer. File Formats
Quick Time MPEG AVi
Capacity
Based on resolution and memory in the device. Compression v altering resolution
Cost
Dropping as they become more common. Resolution main factor and also facilities (zoom, flash etc.).
Peripheral Buffer
E.g. printer very slow. Has on board RAM to store the incoming data (laser may have 32MB) E.g. Mass storage (disks). Data transferred in blocks so whole block transferred, managed by buffering
Interface Buffer
Universal Asynchronous Receiver/Transmitter (UART) handles transfer of serial to parallel and vice versa.
Magnetic tapes have large capacities, reaching up to several gigabytes and come in a variety of sizes and formats. Since their introduction, tape drives have passed through many stages of improvement with extremely reliable Digital Audio Tape (44.1 kHz, 16bit record and playback DAT) drives representing the current state of the art. A 4mm DAT tape can now store up to 24 Gbytes of data! Access
Tapes are sequential access devices. Accessing data on tapes is therefore much slower than accessing data on disks. They are not suitable as storage media for applications where data needs be used regularly - where a disk is a more appropriate medium. Because tapes are so slow, they are generally used only for long-term storage and backup.
CD-ROM
A plastic disk is scanned using a laser. It reflects off pits on the surface differently from lands (bumps) Re-writeable CD-ROM becoming more common. Capacity About 650Mb Speed from single (150KB/sec) to 32x (or even 40x). The x refers to the times faster than CD Audio. Cost CD-ROM Drives fairly cheap. Access Always random
5 Networking
5.1 Introduction
This unit on Networking considers the basic system topologies and functions that allow computers to operate on a network. Various types of networks are considered ranging from small peer-to-peer networks to LANs, WANs and the Internet. Comparisons are made between the various networks in terms of type and scale and the effects of network failures.
5 Networking
5.2 Networks
connecting two or more computers together turns them into a computer Network. connecting two computer networks together creates an Internetwork. connecting millions of computers and computer networks together forms a huge internetwork or what we now refer to as the Internet. Economic and Social reasons for networks desire to communicate probably most powerful reason. We take e-mail, Internet, Video conferencing for granted but none of the were obvious when networks first appeared.
5 Networking
5.2 Categorising Computer Networks
Computer networks can be categorised by the rate at which data can be transferred between machines (Bandwidth), and the physical distance between them. Greater distance suggests lower bandwidth. Local Area Networks (LANs) high bandwidth. Wide Area Networks (WANs) low bandwidth (even broadband is slow compared to typical modern LAN bandwidth)
5 Networking
5.2.1 Local Area Networks (LANs)
LANs very popular now and the technology has become much cheaper. Sharing resources
LAN belongs to single organisation on a single site so a high level of trust develops. Share printers, scanners, hard disk space, applications and Internet connections
Sharing Information
Files and data. E-mail and appointments diaries, Intranet.
Sharing Services
Centralised backup, technical support, anti-virus, software installation and update.
5 Networking
5.2.1 (LANs) - Hardware Reduced Hardware costs have helped dramatic increase in LANs
Network Interface Card every PC on network needs a card to interface with the network. Provides the machine with a unique address on the network (MAC) Hubs typically 24 ports, each PC connects to port. Can be slow and cause bottlenecks. Switches intelligent hubs (24 or racks of 24 x 8) help reduce bottlenecks. Software is now much cheaper. Each station needs a network licence and server software needs to be licensed for the number of stations on the network
5 Networking
5.2.1.1 Sharing Resources on a LAN
Hardware resources
Expensive printers (laser and colour laser), plotters and hard disks not only shared to save money but installation and maintenance cheaper and easier.
Software Resources
Can set up an Intranet, use internal e:mail and Newsgroups. Also search facilities across the network. Software can be shared according to licensing agreements.
5 Networking
5.2.1.2 Sharing Services on a LAN
Network Manager
Controls the network from any location Controls software installation and upgrades centrally. Control shared Internet access and Firewall protection. Provide automatic virus protection Do regular full backups and frequent (daily) incremental backups.
5 Networking
5.2.2 Wide Area Networks - WANs
A WAN allows an organisation to maintain its management structure despite being geographically distributed around the world. WANs & Internet increasingly popular as cost of communication drops. Easier and cheaper to conduct business and communicate around the world.
5 Networking
5.2.2.1 Metropolitan Area Networks - MANs
A MAN is a wide area network which has a city or metropolitan area as its geographical limit.
MANs are usually under the control of a single local authority typically consists of a WAN which is administered centrally, providing networked services to local government offices, schools, libraries, community centres etc. advantages of a MAN are the economies of scale and the improved communications which can be achieved by connecting local government offices together. Local authorities usually host an Intranet for use of a staff on-line newsletter MANs rely on a high bandwidth and are really only suitable for Urban areas. Rural authorities have to use lower bandwidths (e.g. up to 2 Mbits/sec)
5 Networking
5.2.2.2 Improved communications on a WAN
E:mail allows users to communicate.
Text and graphic messages File transfer by attaching files to e:mails
Electronic Forums
Similar to newsgroups but controlled by a particular organisation e.g. on the BBC website forums exist for news, sport etc.
List Servers
Use e:mail to distribute messages rather than the user having to log onto a forum.
5 Networking
5.2.2.2 Improved communications on a WAN -2
File Transfer Facilities
Being able to transfer files over a WAN means that if the product you sell can be stored or transmitted electronically, then you can sell it to anyone who is connected to the Internet without having to transfer a physical object. Items on sale over the Internet which can be electronically distributed are things like software, music, photographic images, video and information in the form of data files. Some companies are now offering services such as remote backup and data storage over the Internet.
Distributed Processing
Different parts of a suite of programs can be run on different machine across the network. Allows software vendors to rent software rather than sell it. Search for Extraterrestrial Intelligence (SETI) uses volunteers whose computers process distributed data when idle.
5 Networking
5.2.2.3 Access to information on a WAN
Information Services
Internet access means you have instant access any time of the day or night without having to travel, to news, technical information and other data. Use a search engine on the web e.g. google
Entertainment Services
Internet radio, music channels and network games all possible on a low bandwidth. Information is broadcast once rather than being requested and transmitted separately for each user. Video on demand needs a high bandwidth and other services benefit from high bandwidth.
5 Networking
5.2.2.4 Teleworking
Tele-working
means working from home instead of traveling to an office every day Use communications technology to keep in touch with your employer. Can work in different country. Any job where the results of your labour can be transmitted electronically can be classed as teleworking.
Video conferencing
Allows people to see and hear the people they are having a meeting with. Need specialised equipment and a high bandwidth.
5 Networking
5.2.2.4 Teleworking advantages and disadvantages
Advantages
Employee saves time and money travelling, on childcare and can live in cheaper housing away from city. Deliver your work electronically. Employer saves money on office space; tele-workers usually work harder no distractions. Save wages by employing people in countries where wages are low.
Disadvantages
Employee feelings of isolation, office chat and miss out on promotion. May work much harder and put in more hours than being paid. Employer needs to pay for training and installation of communications equipment. Security issues if employees log into the company network from home
5 Networking
5.2.3 Intranets
Intranets
Used by organisations to distribute information on a LAN Often used as a portal for the Internet and difficult to tell whether you are on the LAN or WAN Usually private and internal Can be used by companies with branches all over the world as secure information service.
5 Networking
5.2.4 Mainframe Networks
Mainframe network with Dumb terminals
Original communication method everyone used the same computer. Terminal has no processing power. Mainframe processor, memory and disks used by each terminal in turn. Current mainframes combined with conventional client-server networks. Client access mainframe via terminal emulation software
5 Networking
5.3 Network Operating Systems
Improved networking operating systems
Easier to connect computers together Modern O/S has networking built-in Common standards such as TCP/IP has made networking easier and cheaper.
5 Networking
5.3.1 Client-Server Network
5 Networking
5.3.1 Client-Server Network Services
Security
Network software allows only users with correct passwords to access the system and files they have permission to use.
Networked storage
You can access centrally stored files from any machine on the network.
Communications
Internal & external e:mail, Intranet services. Internet and Firewall services
Applications
Applications stored centrally mean you always have access to that application even if it is not installed on your workstation.
Support Services
Virus checking, remote control, remote monitoring and central backup strategy.
5 Networking
5.3.1.1 Advantages of Client-Server Network
Centralised control
Of software installation Over software versions Ability to configure stations to a common format.
Resources shared
Hard disk space, expensive peripherals (laser & colour laser printers), modems and routers.
Security
Access to file and other resources easily implemented.
Backup routines
Easy to backup central server to tape either full or incremental backup
Ease of expansion
Most LANs can easily be extended by adding cables and stations.
5 Networking
5.3.1.1 Disadvantages of Client-Server Network
Cable Faults
In a bus topology can bring down whole sections of the network
Server Failure
Will bring down the entire network.
Software incompatibility
Some network s/w is proprietary and difficult to link to other LANs
5 Networking
5.3.2 Peer to Peer Networks
Peer to peer
All machines on network of equal status. No server on network Suitable for small (up to 5 stations) LANs. Used in home situations Also in small offices where all staff are trusted Security difficult to implement Bottlenecks can occur if more than one user wishes to access the same resource (e.g. hard disk) at the same time.
5 Networking
5.3.2 Advantages of Peer to Peer Networks
Peer to peer networks are cheap and easy to implement. Modern operating systems like Windows 98 and Apple OSX have this sort of networking built in you do not have the expense of providing a dedicated machine to function as a server If security is not a problem, then it is very convenient to be able to share files, access peripherals and have several people using the same Internet connection without having to set up a more complex network structure.
5 Networking
5.3.2 Disadvantages of Peer to Peer Networks
Organisation and management become difficult when several machine connected together and sharing files Versions of installed software are difficult to control. Backup difficult as files distributed across several machines. Proper security difficult as no easy way to restrict access to shared files or resources.
5 Networking
5.3.3 Stations and servers
Network stations and servers are nodes on the network. Servers
A server usually refers to a program and the computer it is running on. Servers provide access to resources on a network. On a network, one machine may provide access to a number of different resources There may be a number of different machines acting as servers, each one providing access to different resources.
Machine identification
All nodes on a network, whether they are servers or network stations, will have a unique identity which identifies that particular machine. The type of identity a node has will be determined by the protocols running on the network.
5 Networking
5.3.3 Stations and servers - 2
Machine identification Ethernet Standard
Every network interface card has a Media Access Control (MAC) address 6 bytes In TCP/IP every node has its own IP address 4 bytes. Nodes may also have a network name.
5 Networking
5.3.3 Stations and servers Network Servers
File Server
Controls log-ins and gives users access to files
Print Server
Allows a user access to a shared printer.
Applications Server
Distributes applications around the network (read only access) to users.
E:mail Server
Stores users e:mails and account details. Regularly contacts external e:mail server to send and receive external mail.
News Server
Stores and forwards messages posted by users on a bulletin board system.
Web Server
Transmits and stores Web pages and provides access to to an Intranet.
Proxy Server
Connects a LAN to the Internet. Allows many users simultaneous access.
5 Networking
5.4 Network Topology
A network topology describes the arrangement of computers to form a network. The actual physical layout is determined by the buildings or other locations that house the parts of the network. We will look at four local area network topologies. Bus Star Ring Mesh
Bus Topology- easy to expand and cheap to set up. e.g. Ethernet in school or college.
5 Networking
5.4.2 Network Topology - Star
Data Security higher security as data routed only to the computer that is to receive it. No collisions. Reliability if a link fails then only that station is off the network. Failure to central controller is fatal. Cost can be quite expensive due to high cost of cabling. Popular in small self-contained networks as not too expensive (small office).
All nodes connected to one central node that routes traffic to the appropriate place.
Ring Topology
Mesh Topology
Excellent performance
This unit considers: The hardware and software required to use networks
6.3.1 Processors
Processor hungry applications run on networks (Browser, P2P. Virtual Private Networks) Features to consider
Performance (High Speed and throughput) Flexibility (Ability to adapt to changing O/S and Application S/W) Power (High power leads to heat need cooling etc.) Software Support (compilers, operating systems and libraries available to the processor)
Memory is available as RAM, on the NIC and shared from a server. Also can use a NMS (Network Memory server) provides RAM as fast network memory paging. Special Features
Memory / buffer controllers Packet management units Address generation units
Cabling can affect bandwidth and different cabling is used in different situations.
As more networks are installed the cost of cabling has fallen. Different cables used in different situations (even on one network)
Ethernet uses UTP cabling (developed by Xerox) running at 100Mb/sec. Fibre Optic cable used to join areas of the network to the server. Very fast (e.g. 2Gb/sec) allowing many stations to share the bandwidth. Connects Hubs/Switches to a server.
Increasing capacity
Fibre Optic and satellite links on a LAN, ISDN and ADSL on the Web.
Features
Slower than conventional cabling. Convenience of being able to move around rooms and buildings. Quick and easy to install Bluetooth allows devices such as mobile phones, printers and laptops to form a mini network when they are in close proximity. Mobile phones can access the Internet via Wireless Application Protocol (WAP)
Disconnection
Many people feel that the Internet has accentuated the difference between the rich and the poor. People in western countries are described as "Information rich" whereas most people in the Third World are "Information poor", since connecting to to the Internet requires expensive equipment and access to a networking infrastructure which does not exist in many poor countries.
Social isolation
There is a fear that the increased use of electronic communication will mean that many people will become physically more isolated from each other. The Internet encourages the creation of global communities, but may result in neighbours not seeing each other for weeks on end.
Netiquette
There are several conventions and a whole new vocabulary which has developed with regard to how you should behave on Internet newsgroups, using email, etc. Simple rules such as not sending "spam" (unsolicited commercial email), not shouting (writing in capital letters) and respecting peoples privacy may seem obvious, but it is easy to make mistakes without realising it. The best policy when subscribing to a newsgroup or joining a list server is to "listen" quietly for a while to see how others behave before you submit any contributions yourself.
Misrepresentation
The ability to post messages on newsgroups or discussion lists anonymously means that offensive statements can be made without the person making them being held to account.
Netiquette
While there are no international standards of behaviour on networks, there is an accepted code of conduct often referred to as netiquette. Netiquette is usually just common sense. Network administrators are the only users of a network who have access to all the files on a network - it is considered unprofessional for a network administrator to access any personal file unless they are required to do so to perform their job.
6 Using Networks
6.5.3 Misuse of Networks Network Etiquette Rules
Taxation
Buying and selling on the Internet makes it very difficult indeed to impose taxes, import duties or other fees, particularly if the item purchased such as software, music, or access to information can be transmitted electronically and does not have to be physically delivered to the purchaser. If you work in one country but are employed in another (tele-commuting) where should you pay tax? Who should pay for your National Insurance? Which countrys employment laws should apply?
7 Computer Software
7.1 Introduction
This unit on computer software considers the software that is required to support the use of computer systems. We consider the Different Categories of Software
Emphasis is on systems software Also look at applications software & graphics Selection of software and file formats in LAN, Multimedia applications and web sites
7 Computer Software
7.2 Systems Software
System software is designed to enable you to run a computer without having to know exactly whats going on inside. System software controls the actual operation of the computer system. You can enter instructions to the computer by typing at the keyboard or clicking on a mouse and the system software will convert these instructions into the low-level operations needed for the computer to carry them out appropriately. The operating system is part of the system software.
7 Computer Software
7.2 Systems Software Operating System
Manages the hardware & communicates with the user in 5 key areas.
1. 2. 3. 4. 5. User Interface File Management Input and Output Memory Management Kernel
O/S is broken down into layers so updates can be written for specific layers. Some parts of O/S held in ROM chips, but most parts held on disk can be corrupted. O/S manages processes programs in execution
In ROM based operating systems, the operating system is held on a ROM chip. Advantages
releases main memory for applications Prevents the o/s from being corrupted. takes very little time to load and be up and running.
Changes to the operating system require an alteration to the ROM program and subsequent chip replacement.
menu driven
Provide users with a set of options. Restricts users to those options but easy to use for novices.
command
User types in commands. Can be very powerful, but hard to learn. For expert users usually.
natural language.
Speech input and written language.
A buffer is an area of memory set aside to help in the transfer of data between the computer and a device.
A buffer provides a sort of barrier between parts of the computer system that work at different speeds. Buffering is used in sending blocks of data. Data is transferred into the buffer until it is full. Then the entire block is sent at once. This is more efficient than having the data trickle through the system. single buffering, the receiver has to wait for a block before it can do anything with it, and the transmitter of the data has to wait for the receiver to have processed the block before it can send another. With double buffering, two buffers are used and, as one is emptied, the other is being filled up. This makes more efficient use of both transmitter and receiver of the data.
The kernel
central component of the system, upon which all of the other components depend. The kernel co-ordinates the activities of the system. typical operations of the kernel of single user system include: if a key is pressed, the device driver will notify the kernel which will pass the request to the user interface. If the user interface requests that a file be moved, the kernel will pass the request to the file system. Once the file system has finished, any messages from the file system will be sent to the user interface; if the user interface wishes to send a message to the user, the kernel will notify the device drivers for the output device (such as monitor or printer). In multi-tasking / multi-user systems the kernel will usually also be responsible for managing the processes as well.
7 Computer Software 7.3 Utility Programs Utility programs enhance the operating system.
Utility used to maintain a system Applications external to the use of the system.
Examples
1 Disk partitioning tools 2 disk formatting programs 3 file compression utilities 4 disk defragmentation tools 5 virus checking tools
Video
Great deal of storage space & memory needed. If computer not powerful enough or bandwidth too low the video appears jerky.
Sound
Similar problems as with video so MP3 standard introduced.
Animations
From animated GIF files to full blown animated films. Great skill needed by animators.
7 Computer Software
7.5.3 Network Software
All Stations should have the same O/S to use the network system and to share messages on the network system. Data Integrity When an error is detected the Network O/S has to inform the network and the packet of data has to be re-transmitted. Multi-User Access A user ID controls what the user has access to on the network. File Attributes A user usually has read/write (r/w) access to their own files, read-only access to shared files. Encryption of Data Typical networks hide data from the user, but a print server prints documents from many workstations and a fileserver often serves the whole network.
8 Supporting Software
8.1 Introduction
This unit on Supporting Software considers the factors affecting the deployment of software on a system. These include compatibility issues between the software and the intended hardware and operating system. Once up and running, the issue of protecting software and systems from viruses is then considered.
8 Supporting Software
8.2 Application Software Application software supports user tasks.
Reports, database, spreadsheet, artwork, web pages etc. GPPS of same genre often very similar. Need to match the correct package to the intended tasks. GPPS offer less functionality than specialised packages e.g. art facilities in Word nothing like in Photoshop. You should be familiar with
General class of functions that different types of app packages support Data standards that facilitate the exchange of data between packages.
8 Supporting Software
8.2.1 Application Requirements
When buying software applications it is important to ensure that they will not conflict with your operating system or your hardware. If there are problems then your software will not run properly if at all! Each application software package includes details of the minimum system specification required to run the application. This will include:
operating system; minimum RAM; minimum processor speed; minimum hard disk space; peripherals required.
8 Supporting Software
8.2.2 Software Compatibility
Whether you are installing or upgrading software, checking your hardware and software and O/S for compatibility is essential. The main factors to consider are:
Memory requirements; Storage requirements; Operating System.
It is important that checks are made to make sure you have the needed software, hardware, and operating system to run the application before installing.
8 Supporting Software
8.2.3 8.2.5 Compatibility Requirements
Memory requirements
Software specifies minimum RAM to run, but may need more for enhanced performance..
Storage Requirements
Not only need enough disk space to install the s/w but take account of space needed for large data files (video, sound etc.)
Operating System
S/W usually upwards compatible for a while (W98 s/w may well work on XP) but not guaranteed.
Device drivers needed may not be available any more. Large steps up not usually supported e.g. W95 on XP
8 Supporting Software
8.3 Viruses
A virus is program code that causes some undesirable and unexpected event to happen in a computer. Viruses are usually disguised as something innocent and are designed so that they automatically spread within or between computer systems. Viruses can enter a system as an attachment to an email, download from the web, or from on a disk or CD. Some viruses take effect as soon as their code is executed. Others can wait until circumstances cause their code to be executed by the computer. Viruses can be quite harmful and erase data or close down a system.
8 Supporting Software
8.3.1 Virus Types
File Virus
Attached to .exe or .com files or complete program or script attached to e.g. e-mail Resident in computer ready to cause havoc
8 Supporting Software
8.3.1 Virus Code Actions
Viruses use a combination of actions
Replication Virus attaches itself to any type of file and replicates very quickly. Can replicate many times before activation Camouflage Takes on characteristics that detection software looks for. Good anti-virus s/w aware of this and makes more checks (check sum etc.). Watching Lies in wait and ambushes when codintion is met e.g. correct date. Delivery
Used to be floppy disks, now e-mail. Virus waits for trigger to drop its payload.
8 Supporting Software
8.3.3 Other Infections
A worm is a self-replicating virus that does not alter any files but takes up residence in the computers active memory and duplicates itself. They only become noticeable once their replication consumes the memory to the extent that the system slows down or is unable to carry out particular tasks. Worms tend to use the parts of the computers operating system that is not seen by the user until it is too late. A Trojan horse is a program where harmful code is contained inside another code which can appear to be harmless. Once the apparently harmless code is in the computer, it releases the malicious code to do its damage.
8 Supporting Software
8.4 Anti-Virus Techniques
Checksum
A checksum of key files is recorded. At run time checksum run again if discrepancy then file could be infected.
Virus Signatures
Signature is unique pattern of bits within a virus. Once it is known anti-virus s/w uses it to identify and remove virus.
Heuristic detection
Approaches problem through past knowledge. Works on probability of file being infected e.g. finds file that checks for date.
8 Supporting Software
8.5 Virus Information Library
Using a virus information library
Literally thousands of viruses have been detected and catalogued using a Virus Information Library (VIL). One such VIL can be found at: http://vil.nai.com/vil/ Using this or another source, find the details of at least one of each type of virus:
For each one, make a note of the following: 4. date discovered (find a recent 1. name: one): 5. medium for infection (e.g. email, 2. type: website): 3. symptoms: 6. cure (if any):