1 / 198

# - PowerPoint PPT Presentation

Outcome 1 - Contents. 1 Data Representation 2 Computer Structure 3 Computer Performance 4 Peripherals 5 Networking 6 Using Networks 7 Computer Software 8 Supporting Software. 1 Data Representation 1.1 Introduction. Lowest level in computer only binary numbers can be used.

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

• 1 Data Representation

• 2 Computer Structure

• 3 Computer Performance

• 4 Peripherals

• 5 Networking

• 6 Using Networks

• 7 Computer Software

• 8 Supporting Software

1 Data Representation 1.1 Introduction

• Lowest level in computer only binary numbers can be used.

• We work in base 10.

• Computer must be able to process +ive and –ive, very large and very small numbers.

• We look at how the computer uses numbers to represent text and graphics

1 Data Representation 1.2.1 Decimal Numbers

• We use base 10

• When expressing large numbers in terms of powers of 10 the following abbreviations are used:

• 101 = 10

• 102 = 100

• 103 = 1000 = 1 kilo

• 106 = 1,000,000 = 1 Mega

• 109 = 1,000,000,000 = 1 Giga

• 1012 = 1,000,000,000,000 = 1 Tera

1 Data Representation 1.2.1 BinaryNumbers

Computers work in number base 2 which uses 2 symbols, 0 and 1 to represent a value.

In computing systems, large numbers are expressed in terms of powers of 2 and use the following abbreviations:

21 has a decimal equivalent of 2

22 has a decimal equivalent of 4

23 has a decimal equivalent of 8

24 has a decimal equivalent of 16

25 has a decimal equivalent of 32

26 has a decimal equivalent of 64

27 has a decimal equivalent of 128

28 has a decimal equivalent of 256

29 has a decimal equivalent of 512

210 has a decimal equivalent of 1024 and is abbreviated to 1 kilo

220 has a decimal equivalent of 1,048,576 and is abbreviated to 1 Mega

230 has a decimal equivalent of 1,073,741,824 and is abbreviated to 1 Giga

240 has a decimal equivalent of 1,099,511,627,776 and is abbreviated to 1 Tera

1 Data Representation1.2.2 Decimal to Binary

• How to convert decimal to binary e.g. 29

Giving 11101

• Using 1 byte for storage gives 256 possible numbers.

• 2 byte gives 65536, 0-65535

• Increasing the size of the storage for numeric data increases the range of numbers which can be stored.

1 Data Representation1.2.3 Binary to Decimal

• Numbers converted to binary – number base 2

• Example of 154 represented as a binary number

=154

Long binary numbers can be difficult to read correctly.

Computers have memory addresses of 2 or 4 bytes long which give addresses of 16 or 32 bits.

Hexadecimal is base 16 and organises the bits into groups of four.

The conversion between base 2 and base 16 is very simple. Hex needs the digits 0-9 and letters A-F.

E.g. 11010100010110010011001010010110 becomes

1101 0100 0101 1001 0011 0010 1001 0110 which in Hex is D459 3256

1 Data Representation1.2.5 Why Binary

• Logic circuits based on two state logic – use only 0 and 1.

• We only need two voltages 0 and a voltage of any value = 1

• There are only 4 rules of arithmetic with binary (100 in base 10).

• Robust – can cope with degradation of signal.

Data Representation1.2.6 & 1.2.7 Integers

• Positive numbers

• Converted directly to binary

• 2 bytes = 16 bits gives 0 to 216-1 or 0 to 65535

• n bytes gives n*8 bits - 2n*8 - 1

• Negative Numbers

• 216 : Same range but –32768 to 32767

• Using sign bit 0 +ive and 1 –ive e.g. 011 = 3 and 111 = -3

• Sign and magnitude does not work because:

• Addition does not work properly (-5+-10 gives 15)

• Two 0’s (00000000 and 10000000)

Data Representation1.2.8 Twos Complement

• Two’s Complement is another way of representing negative numbers.

• Addition works and there is only one zero

• All 0’s are converted to 1’s and 1’s to 0’s then 1 is added.

• To convert 5 to –5

OR 5

OR -5

Data Representation1.2.9 Real Numbers

• Real numbers are stored as floating point or scientific notation. Numbers stored as base and exponent.

• E.g 34008.6 is .340086*105

• In binary 1101.1001 is .11011001*2100 (the 4is 100 in binary)

• The mantissa is 11011001 and the exponent is 100

• Usually 4 bytes used for mantissa and 2 for exponent

• Increasing the size of the mantissa increases accuracy

• Increasing the size of the exponent increases the range of numbers which can be stored

1 Data Representation1.3 Text

ASCII

• Each character is stored in an 8 bit binary code called the ASCII system.

• E.g. A is stored as 65 (01000001 in Binary).

• 1 byte can store 256 different characters – enough for all the keys on the keyboard and several foreign symbols (for currency etc.).

• Unicode

• Need to represent non-Latin chars e.g. Japanese and Chinese

• Characters encoded using 16 bits – 65,536 symbols.

• MS Office stores documents in Unicode

• Data Representation1.4 Graphics

Most displays use Raster graphics – same as TV.

Displays store images as a matrix of pixels in the refresh buffer.

Separate images now stored in VRAM (Video RAM).

VRAM represents the entire screen area and the term bit map is used to describe the one-to-one mapping of pixels in VRAM to pixels on the screen.

Data Representation1.4.1 Bit-mapped Graphics

• For a graphic drawn in a painting package the computer stores the data as a 2 dimensional array of pixels.

• Each pixel in a black and white image is 1 bit in memory.

• 2 bits can store 4 colours or shades of grey.

• 8 bits can store 256 colours.

• The number of bits used for each pixel is the bit depth.

• The resolution is the number of pixels in the height and width of the image.

• Bit mapped images are often generated from scanned pictures and can create huge files.

• Editing can be performed at pixel level.

• When images are enlarged they can become “lumpy” and lose definition.

Data Representation1.4.2 Calculating Memory Requirements

• We need to know the size of the image, resolution and bit depth.

• Size – usually inches e.g. 6” x 4”

• Resolution – say 500 dpi (pixels per inch)

• Bit Depth – e.g. 1 bytes for 256 colours

No of bytes is

There are many different ways of arranging the bytes that hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:

Data Representation1.4.3 Arranging The Bytes

The image is saved as a series of bytes to a storage device, such as memory or disk.If we wish to review the image then it is a simple matter to transfer the image data back into the video memory as a direct copy. As this image is also in a bit mapped format, we can still move it to and from other storage devices without any translation.

Data Representation hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:1.4.4 Greyscale

A rudimentary greyscale effect provides a ’black’, ’white’ and two levels of ’grey’. As this comprises four different values we need two bits to represent each pixel (00 for black, 01 for darker grey, 10 for lighter grey and 11 for white ).

As each pixel now requires twice as many bits, we will require twice as much memory for a given screen size as a black and white image.

We can provide more levels of grey by allocating more bits to each pixel. By the time we have eight bits (one byte) to one pixel we can represent 256 different intensities.

Monochrome displays are often clearer, especially for text than colour display. The requirement to use colour for such items as colour pictures and user interface issues, dictates that colour displays are more likely to be purchased.

Data Representation hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:1.4.6 Compression

• A colour bit – mapped image with a high resolution and 24 bit colour needs a lot of storage (50MB for a smallish photo).

• File compression is used to reduce storage requirements.

• Different techniques – coding using and index of colours actually used and not coding differences indistinguishable to the human eye.

Data Representation hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:1.4.5 Colour

One colour can be represented by one byte giving 256 colours (GIF format).

Monitors etc. have 3 primary (additive) colours, Red, Blue and Green. Other colours obtained from adding light.

We use 8 bits for Red, 8 for Blue and 8 for Green which give us 256 x 256 x256 colours – over 16 million.

We need 3 bytes to describe RGB coded colours.

Codes can be used by a programmer to describe colours in Hex code.

Data Representation hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:1.4.7 Vector Graphics

• Objects not described pixel by pixel but by its attributes (start & end positions, thickness & colour of lines etc.)

• Sometimes called object-orientated graphics.

• Vector graphics are resolution independent. Rasterisation need for conversion to bit map for display or printing.

• Editing at pixel level not possible.

• Can be scaled without losing original image quality

• Less storage required

• Can be grouped and edited at the object level.

• Can be placed over another graphic without rubbing it out as happens with bit-mapped.

2 Computer Structure hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:2.1 An Introduction

This unit on Computer Structure describes in detail the function of the component parts of a processor in the manipulation of data.

This is extended to the methods of transferring data within a processor and between a processor and memory.

The concept of a stored program is considered and the steps in the fetch-execute cycle to access and run programs. Memory types are considered, from registers to backing storage and how memory is defined and addressed.

2 Computer Structure hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:2.2 Computer Organisation

• Computers play a significant role in meeting our everyday requirements. You can now browse the Internet for:

• a new home,

• Shop on-line and have home delivery

• import a new car from abroad

• order clothes from a catalogue company

• communicate with friends overseas.

• The ways in which you learn are also changing.

• On-line homework

• Computer based learning tools

2 Computer Structure hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:2.2 Computer Organisation

• It makes sense to find out how they work and how you can make use of them.

• How are they structured?

• How do they operate?

• How is data represented?

• Why are some computers more powerful than others?

• What devices can you attach?

• How do they communicate?

• Answers can be found in the following Topic

2 Computer Structure hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:2.2. Calculating Machines- From Babbage to VLSI

• Logarithms developed by John Napier

• Other manual devices developed by Pascal & Liebniz

• First mechanical calculator developed by Charles Babbage (1792 – 1871) Difference Engine and then Analytical Engine.

• Idea of stored program concept developed.

• First Electrical machine Enigma codebreaker in WW2.

• Vacuum tubes (40’s replaced by transistors (60’s)

• From 1965 to present circuitry all on one chip Integrated circuits.

• Now we have VLSI (Very large Scale Integration)

2 Computer Structure hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:2.2.1 A Two State Machine

• Typical 4 box diagram

• Only 2 states used in all components and data storage, on or off, 1 or 0.

• Simplicity – 2 voltage levels.

• Good tolerance

• Simple calculations.

CPU

Processor

Input

Output

Memory

RAM & ROM

Backing

Storage

2 Computer Structure hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:2.2.2.1 The structure of the CPU (a)

Memory

Processor

Control unit

Control Bus

Internal buses

ALU

Data bus – 2 way

Registers, A, MAR, MDR, PC, SP

2 Computer Structure hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:2.2.2.1 The structure of the CPU (b)

• ALU (Arithmetic & Logic Unit)

• Data is processed and manipulated.

• Involves arithmetic operations and logical comparisons.

• Control Unit

• Manages execution of instructions.

• Sends control signals around the computer.

• Registers

• Storage location with the CPU

• Hold calculations, store addresses etc.

• Main Memory

• External Memory

• Peripheral Devices

2 Computer Structure hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:2.2.3 The stored program concept

All computers based on same basic design, known as the Von Neumann Architecture.

Computers carry out tasks by executing machine instructions. A series of these instructions is called a machine code program held in main memory as a stored program, a concept first proposed by John Von Neumann in 1945.

Central Processing Unit (CPU) fetches, decodes and executes the machine instructions.

By altering the stored program it is possible to have the computer carry out a different task.

2 Computer Structure hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:2.2.4 The fetch execute cycle

To execute a machine code program it must first be loaded, together with any data that it needs, into main memory (RAM). Once loaded, it is accessible to the CPU which fetches one instruction at a time, decodes and executes it at electronic speed.

Fetch, decode and execute are repeated until a program instruction to HALT is encountered. This is known as the fetch-execute cycle.

2 Computer Structure hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:2.2.4.1 The fetch execute cycle in detail

• This is how the:

• Data bus

• Control Bus

• Registers

• All take part in reading an instruction from memory and executing it.

2 Computer Structure hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:2.2.4.3 The fetch phase

.

1. The contents of the PC are copied into the MAR;

2. The contents of memory at the location designated by the MAR are copied into the MDR;

3. The PC is incremented;

4. The contents of the MDR are copied into the IR.

2.2.4.4 The Execute phase

1. Decode the instruction in the IR;

2. Execute the instruction in the IR.

2 Computer Structure hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:2.2.8 Computer Components and Their Function

The components of the CPU and the connections to devices that are external to it are shown.

2 Computer Structure hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:2.3 Memory

Main memory (RAM and ROM) stores programs and data while the computer is operating.

• Any location in memory can be read from or written to by referring to its address.

• Memory can be organised as:

• 8- bit wide (PC-8088)

• 16-bit wide (XT-8086, AT-80286)

• 32-bit wide (386DX, 486SX, 486DX)

• 64-bit wide (Pentium)

2 Computer Structure hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:2.3.1 RAM

• RAM

• Has same access time for all locations.

• Volatile – loses contents on power off.

• 2 Types of RAM Static and Dynamic

• Static – holds contents as long as there is power.

• Dynamic – has to be refreshed (every 2 ms).

• Each memory location has a unique address.

• 2 Computer Structure hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this: 2.3.2 ROM

• ROM

• Contents permanent or non-volatile.

• Software & data fixed into ROM at manufacture.

• Operating systems and specialised ROMs (e.g. cameras and CD players etc.).

• Some ROMs can be reprogrammed

• EPROM – electrically programmable read only memory (data erased by ultraviolet light and new program burned onto ROM

• EEPROM – electrically erasable programmable read only memory – selective parts can be reprogrammed & used in developmental work

2 Computer Structure hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this: 2.3.4 Cache Memory

• Faster processors mean data is being processed before the next instructions can be read from memory (system busses slow).

• Most systems have 2nd smaller area of fast SRAM. Next instructions read into cache – much faster than RAM.

2 Computer Structure hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this: 2.3.6 External Memory

• External memory, such as the hard disk, holds quantities of data too large to store in main memory.

• It is also used to keep a permanent copy of programs and data.

• Examples of external memory devices are:

• hard disk;

• floppy disk;

• zip disk;

• CD-R;

• magnetic tape;

• flash drive.

2 Computer Structure hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this: 2.4 Central Processing Unit

Central Processing Unit. The CPU coordinates and controls the activities of all other units in the computer system. It executes program instructions and manipulates data in accordance with the instructions.

It uses a standard architecture composed of the following three components:

Arithmetic and logic unit (ALU);

Control unit;

Registers.

All three components work together to form the processor.

2 Computer Structure hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this: 2.4.1 Architecture of the microprocessor

We will now study the internal architecture of the microprocessor (CPU) itself. Because of the stored program concept, we must consider the relationship between the CPU and memory.

This is a diagram of a fairly typical microprocessor design, showing the internal structure of the CPU and its relationship to the memory of the computer.

2 Computer Structure hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:2.4.2 Accessing Memory

The CPU has to access memory both for instructions and to receive and transmit data from or to memory.

Memory Address Register (MAR) - specifies the address in memory for the next read or write operation from or to memory;

The Memory Data Register (MDR) or Memory Buffer Register (MBR) - contains the data to be written to memory or receives the data read from memory.

• MAR register connected to the address bus

• MDR register connected to the data bus.

2 Computer Structure hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:2.4.2 Accessing Memory (2)

The MAR and MDR registers have a large part to

play in the fetch-execute cycle.

To read data from memory, CPU places the address of the memory location into the MAR and activates the memory-read control line of the system bus. This will cause the required data to be transmitted from memory via the data bus to the MDR;

To write from the CPU to memory, the CPU places the data to be written in theMDR; the address of the memory location where they are to be written is placed in the MAR; and the memory-write control line is activated.

2 Computer Structure hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:2.4.3 Functions of Control Bus

• Control bus has several lines, used singly to initiate a process.

• Write Line - initiates memory write operation.

• Clock – Generates pulse to synchronise components.

• Interrupt – Signal to processor of an interrupt like a key press or mouse click. Processor saves stack and deals with the interrupt.

• NMI – Non-Maskable Interrupt. Interrupt which cannot be ignored.

• Reset – Clears all registers, aborts program and gives control back to the operating system.

2 Computer Structure hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:2.4.3.1 Getting the processors attention

• Polling

• The processor checks each part of the system in turn and if any part wants the processors attention it signals to the processor.

• Interrupts

• This is how a PC works. When a key is pressed or mouse clicked an interrupt is generated and the processor carries out that task (sometimes it is “doing nothing” and is interrupted.

• Some interrupts need not be actioned (Maskable Interrupts), others must be actioned (NMI) e.g Ctrl+Alt+Del

2 Computer Structure hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:2.4.4 The Arithmetic Logic Unit

• ALU

• Where data is processed and manipulated.

• ALU involves arithmetic operations and logical operations .

• ALU uses temporary registers to hold data.

• Accumulator is main register.

2 Computer Structure hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:2.4.5 Registers

• memory address register (MAR) holds address of a location in main memory.

• memory buffer register (MBR) holds data that has just been read from main memory or is to be written to main memory.

• instruction register (IR) holds the current instruction that is being executed.

• program counter (PC) holds the address of the next instruction to be fetched from memory.

• Processor also has a set of general purpose registers. They are called general purpose because their role is not defined at manufacture and can be used by programmers as appropriate.

Data is transferred between memory and processor by buses. hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:

Pinpoint memory location.

One-way Bus

Data Bus

Transfers the data

Same size as Word size

Two-way Bus

Control Bus

Initiates and controls operations.

Inside the processor.

2 Computer Structure 2.5 Buses

Control Unit

Control Bus

Memory

Data Bus

Processor

2 Computer Structure hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:2.5.1 Addressability

• The Word Length is the size of data, in bits, which can be manipulated as a single unit by the processor.

• In an ideal computer the size of the data pathways and the size of memory locations will match.

• 8 bit address bus can access 28 = 256 locations

• 16 bit address bus can access 216 = 65,536 locations (64K)

• 24 bit address bus can access 224= 1,677,216 locations (16MB)

• 32 bit address bus can access 232 = 4294967296 locations (4GB)

• If we have 2 bytes or 4bytes for each memory location we get for a 24 bit bus 16MB of addressable locations, but 32MB or 64MB of actual storage.

3 Computer Performance hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:3.2 Measuring Performance

• When we measure performance we usually mean how fast the computer carries out instructions. The measure we use is MIPS, millions of instructions per second.

• MIPS affected by

• The clock speed of the processor

• The speed of the buses

• The speed of memory access.

3 Computer Performance hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:3.2.1 The Clock

• Every processor has a clock which ticks continuously at a regular rate.

• Synchronises all the components.

• Cycle time measured in MHz or GHz

• 200 MHz (megahertz) means the clock ticks 200,000,000 times a second (P1 -1995)

• 1.4 GHz (gigahertz) is 1,400,000,000 times a second (P4 – 2001)

• 2.3 – 4+ GHz on P5 in 2004

3 Computer Performance hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:3. 2 Measures of Processor Speed

• Clock Speed

• Generally the faster the clock speed the faster the processor – 3.2 GHz is faster than 933 MHz

• Mips – Millions of Instructions per Second

• Better comparison but beware of false claims e.g. only using the simplest & fastest instructions and different processor families.

• Flops – Floating Point Operations per sec.

• Best measure as FP operations are in every processor and provide best basis.

• Benchmark Tests

• Well defined standardised routine to test the performance of a computer.

• Dhrystone – tests string and frequently used functions

• Whetstone – test using arithmetic functions

3 Computer Performance hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:3.3.1 Data Bus Width

• A WORD is the basic number of bits a processor can handle in one operation.

• If word size and data bus same size then data transfers carried out in single operation.

• Width of data bus defines how much data can be carried in one fetch.

• 32 bit data bus (word length) carries twice as much data as a 16 bit bus and a 32 bit system should be faster.

• Most modern processor 32 bit but some AMD 64 bit.

• Width of Address bus affects the amount of memory which can be accessed.

3 Computer Performance hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:3.3.2 Peripherals & System Performance

• Peripherals work at much slower speeds than the CPU.

• Buffers and spooling can help.

• Sound cards can have their own processor, RAM and ROM.

• Video cards their own RAM (up to 256Mb)

3 Computer Performance hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:3.3.2 Interfaces & Input/output Devices

• An interface makes the link between the processor and a peripheral (disk drive, printer etc.).

• Peripherals work at different speeds, use different formats.

• Parallel to serial conversion is often needed

• Some devices are serial – 1 bit at a time is transferred. Serial used for long (over 2m) distances.

• Some are parallel (printers) – 8 bits at a time. Used for short distances problems with skewing – loss of data integrity.

• Interface transfers data so the processor is delayed as little as possible. It has buffers to store blocks of data in transit.

• Memory mapped I/O uses memory linked to peripheral.

• Spool files are used when large quantities of data are sent to a slow peripheral, like a printer. Enables background printing.

3 Computer Performance hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:3.3 Memory & System Performance

• Speed of access & Word size

• 15-120 nanosecond but memory speed and word size dictated by motherboard and processor

• Amount of memory

• Adding memory (upgrade) usually improves system performance esp. graphics & multimedia.

• Usually 2 slots on motherboard so max memory is 2 x largest modules (currently 512MB largest affordable.

• Cache (pronounced cash) memory

• Cache exists between memory and processor

• Very fast memory speeding data transfer in shorter fetch cycle.

4 Peripherals hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:4.1 Introduction

• Examine a range of hardware devices which carry out typical talks.

• We will examine devices in terms of:-

• Speed

• Cost

• Resolution

• Compatibility

• Developments and trends in storage devices

• Serial & parallel interfaces and wireless communications

4.2 – Input & Output Devices hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:4.2.1 Keyboards

• QWERTY keyboard

• has its roots in mechanical typewriters – to slow down operators to avoid jamming the keys.

• Key press causes a scan code to be sent to the computer.

• Sent via serial coble to keyboard controller.

• Sent as ASCII Codes

• Modified Keyboards

• Used to alleviate Repetitive Strain Injury (RSI)

• Customised keypads can have more (or fewer) keys all programmable to suit particular situations.

• Adjustable split keyboard in 3 parts to allow flexibility.

4.2 – Input & Output Devices hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:4.2.2 Scanners

• Scanners

• Flat bed scanner allows for up to A4 size documents

• Document placed face downwards on glass panel and scanned.

• Light beam reflects light from the document and photocells measure the light reflected.

• Analogue data needs converted to digital (A DC)

• Modern scanners use high bit depths to allow high resolutions.

• Images must be matched to their purpose

• No point in scanning at a resolution of more than 75 dpi for a screen based display.

• No point in scanning at 600 dpi for a printer rated at 300 dpi.

4.2 – Input & Output Devices hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:4.2.2 Scanners

• Accuracy – measured by how close the image is to the original.

• Resolution is the dots per inch (dpi) that can be detected by the scanner hardware. A 600 dpi scanner has 600 photocells per linear inch.

• Bit depth usually 24 bits (8 red, 8 green, 8 blue).

• Capacity

• Little internal buffering, rely on techniques to transfer the data.

• Storage can be high e.g. A4 page at 600 dpi requires 33.28MB for 8 bit and around 100MB for full colour.

• Cost

• Dropped dramatically in recent years

• Bundled software often the major selling point.

4.2 – Input & Output Devices hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:4.2.3 Sound

• Naturally Occurring Sound

• Natural sound is analogue in form

• To input sound to a computer

• Software samples the incoming signal

• Coverts the signal into digital form

• Usually compresses the file

• This is called ADC – Analogue to Digital Conversion

• Simplest input device is a microphone with sound card but sound files can be taken from a CD and downloaded from the Internet.

• Sound card performs the ADC and compression

4.2 – Input & Output Devices hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:4.2.3 Sound sampling

• Sampling

Sampler listens to sound repeatedly and stores a number representing the amplitude each time

• Sampling Rate

• No of times per second sampler listens to the sound e.g. 22 kHz is 22,000 times a second

• Sample Size

• No of bits stored per sample e.g. 8 or 16 bit samples

• Compression

• Reduce storage space and reduce quality

4.2 – Input & Output Devices hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:4.2.3 Sound

• Accuracy

• Resolution – Three sampling resolutions in common use.

• 11.025 KHz (8-bit) – voice quality

• 22.05 KHz (8-bit) – Quality of AM radio

• 44.1 KHz (16-bit) – CD quality stereo [data sampled 44,100 times per second]

• Bit-Depth

• 8-bit sample size can hold 256 amplitudes per sample

• 16-bit sample size can hold 65,536 amplitudes per sample

• Capacity

• No built-in cache. Depends on fast access via the sound card to hard disk storage. 10.09MB to store 2 mins stereo audio.

• Compression required e.g. reduce sample rate / size or use a compression technique to reduce file size.

4.2 – Input & Output Devices hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:4.2.4 Video

• Video Digitising

• is performed by special video digitising circuitry installed on the motherboard of the computer.

• File Formats

• Quick Time

• MPEG

• AVi

To playback video on a standard computer it will need to be decompressed by hardware or software, usually on the card.

Standards

AVI – (Audio Video Interleave) or Video for Windows. Being replaced by Active Movie which will playback AVI, QuickTime and MPEG.

QuickTime – CODEC s/w developed by Apple but used by both Mac and PC.

MPEG – Video board uses hardware to make compression much faster.

Accuracy – Depends on Compression Technique, frame rate and resolution.

Speed – Hardware must be fast enough to cope with stream of data to memory and to the hard disk.

Cost – Not only card but good Multiscan Monitor required (17” and 19” nowadays)

4.2 – Input & Output Devices4.2.4 Video

4.2 – Input & Output Devices decompressed by hardware or software, usually on the card.4.2.5 Digital Camera

• Film replaced by an array of photosensitive cells.

• Images stored electronically using photosensitive diodes called charge coupled devices (CCDs)

• Intensity of light recorded in an image.

• Analogue values converted to digital using ADC

• Compression usually takes place.

• Bit map files turned into JPEG

• Image transferred to computer

• Serial Cable

• Can then be printed, e:mailed etc.

4.2 – Input & Output Devices decompressed by hardware or software, usually on the card.4.2.5 Digital Camera

• Accuracy

• Resolution

• Measured in pixels or mega pixels – the more the better. E.g. 640 x 480 pixels or in megapixel mode 1280 x 960.

• Accuracy depends on the array of photosensitive cells.. The more sensors and the smaller they are the higher the resolution.

• Bit Depth

• Number of bits in proportional to the number of colours that can be represented.

• Capacity

• Based on resolution and memory in the device.

• Compression v altering resolution

• Cost

• Dropping as they become more common.

• Resolution main factor and also facilities (zoom, flash etc.).

4.2 – Input & Output Devices decompressed by hardware or software, usually on the card.4.2.6 Printers – Ink Jet Printer

• Ink-jet Printers are based on one of three different types of technology: continuous flow ink-jet, liquid ink-jet or phase-change ink-jet. We will look at how a liquid ink-jet printer works.

• Liquid ink-jet or bubble-jet, operates by squirting tiny droplets of ink onto the page. The ink is first heated by passing an electric current through a coil. In milliseconds a bubble of vapour appears, forcing a tiny drop of ink from the nozzle onto the paper.

• Resolution is typically 300 to 600 dots per inch, support the printing of text and graphics, colour and a range of shades.

• Speed is pretty slow with a range of 4 pages per minute to 8 pages per minute, depending upon the model.

4.2 – Input & Output Devices decompressed by hardware or software, usually on the card.4.2.6 Printers – Laser Printer

• This type of printer uses lasers to "write" a page image onto a special drum as an electrostatic charge. The charged drum attracts toner particles which are transferred to the page and heated to set the image.

• Usually a page is composed in the printer (often PostScript).

• Capacity

• On board RAM & processor needed to compose pages. The more RAM the higher quality graphics can be printed.

• Resolution

• 600 dpi quite common (300 cheaper, 1200 expensive)

• Speed

• The faster in pages per minute (ppm) the dearer ranges from 4 ppm to 20 ppm with 12 ppm being about average.

4.2 – Input & Output Devices decompressed by hardware or software, usually on the card.4.2.7 Multiscan Monitor

The CRT is the basis of most visual display technology.

The screen is arranged as a series of lines of dots and each dot is made up of three small areas of red, green and blue called a triad. The intensity of light shone on each triad determines the actual colour of the pixel.

The picture is redrawn between 50 and 100 times a second. This is the refresh rate.

A monitor which operate at different refresh rates is known as a multiscan or multisync monitor. The refresh rate is controlled by the video adapter.

Screen resolution is quantified by the dot pitch, the distance between the dots on the screen. Typically between 0.28 and 0.38mm, corresponding to 100 to 70 dpi.

4.3 Selecting hardware to match operational requirements decompressed by hardware or software, usually on the card.

• When given a scenario like setting up a library system you will have to consider:-

• RAM requirements

• Memory must be enough to run the software and support all the data in the system.

• Backing Storage

• Big enough to hold the O/S, Applications and data.

• Processor Performance

• Usually as fast as you can afford but must be fast enough to support all the applications recommended.

• Peripherals

• Specify type of printer, monitors etc.

• Communications

• Attached to a network or set up a new network. Internet connection (broadband?)

4.4 Buffers and Spoolers decompressed by hardware or software, usually on the card.4.4.1 Buffering

• Buffer

• area of memory used to transfer data between the computer and a peripheral.

• Used when a fast acting part of the system exchanges data with a slow peripheral

• Buffer stores the data until peripheral can act on it.

• Peripheral Buffer

• E.g. printer – very slow. Has on board RAM to store the incoming data (laser may have 8MB)

• E.g. Mass storage (disks). Data transferred in blocks so whole block transferred, managed by buffering

• Interface Buffer

• Universal Asynchronous Receiver/Transmitter (UART) handles transfer of serial to parallel and vice versa.

4.4 Buffers and Spoolers decompressed by hardware or software, usually on the card.4.4.2 Spooling

When large amounts of data are to be sent to a peripheral device, or when the peripheral is shared across a network then spooling is a preferred method of compensating for the difference in speeds of the processor and the peripheral.

Spooling involves the input or output of data to a tape or a disk.

This, for example, allows output to be queued from many different programs and sent to a printer by a print spooler (special operating system software).

The print spooler stores the data in files and sends it to the printer when it is ready, using a print queue.

4.5 – Storage Devices decompressed by hardware or software, usually on the card.4.5.1 Magnetic

Magnetic storage devices include hard disks, floppy disks, Zip disks and magnetic tape.

They are called magnetic storage devices because their recording surfaces are coated with a material that responds to magnetic fields to enable data to be stored.

Storage devices can be fixed or removable. Removable storage devices allow the user to disconnect the device and physically transport data from one computer to another.

Varieties of removable devices include the Iomega and Syquest hard disks and Jaz cartridges.

4.5 – Storage Devices decompressed by hardware or software, usually on the card.4.5.1.1 Magnetic Disk

All the sectors around the disk, equidistant from the centre, form a track. With multiple platters, the collection of tracks on each platter, equidistant from the spindle is called a cylinder. When data is to be read or written, the read and write heads are moved to the appropriate track, where they wait until the relevant sector spins past.

Speed

Rotational speed of hard disks has improved, from 3000 (rpm) of early disks, to current rotational speeds of 5,400 and even 7,200 rpm.

Performance is also measured in terms of the rate of data transfer from the disk.

SCSI - transfer rate 5Mb/sec

Ultra Fast SCSIIII transfer rates - 40 Mb/sec.

4.5 – Storage Devices decompressed by hardware or software, usually on the card.4.5.1.1 Magnetic Disk

Capacity

Hard disks have improved tremendously in their capacity to store data in the last 10 years. From the modest 10Mb disks of the early 80s to current 80 Gbyte disks on many of today’s PCs.

Access

The hard disk is a direct access device, meaning that data can be directly read or written to any portion of the disk.

4.5 – Storage Devices decompressed by hardware or software, usually on the card.4.5.1.2 Magnetic Tape

Storing data on tapes used to be the only solution to backing up hard disks of large capacity. Now, with large, removable magnetic disks and optical CR-RW technology, this is no longer the case.

However, removable storage media is comparatively expensive, costs 10 times tape. Tape, therefore, still has the edge in this market.

Tape is read and written on a tape drive. Data is written to tape in blocks with inter-block gaps between them. A single operation writes each block

Data is stored on magnetic tape as magnetised regions on the surface of the tape induced by the magnetic recording head. To read data, the tape passes under the read/write head and the stored magnetised regions produce very small voltages in the head, leading to a current in the head coil. This current can be analysed to give a representation of the stored binary data.

4.5 – Storage Devices decompressed by hardware or software, usually on the card.4.5.1.2 Magnetic Tape

Capacity

Magnetic tapes have large capacities, reaching up to several gigabytes and come in a variety of sizes and formats.

Since their introduction, tape drives have passed through many stages of improvement with extremely reliable Digital Audio Tape (44.1 kHz, 16-bit record and playback DAT) drives representing the current state of the art. A 4mm DAT tape can now store up to 24 Gbytes of data!

Access

Tapes are sequential access devices. Accessing data on tapes is therefore much slower than accessing data on disks.

They are not suitable as storage media for applications where data needs be used regularly - where a disk is a more appropriate medium. Because tapes are so slow, they are generally used only for long-term storage and backup.

4.5 – Storage Devices decompressed by hardware or software, usually on the card.4.5.2 Optical Storage

CD-ROM

A plastic disk is scanned using a laser. It reflects off pits on the surface differently from lands (bumps)

Re-writeable CD-ROM becoming more common.

Speed – from single (150KB/sec) to 32x (or even 40x). The x refers to the times faster than CD Audio.

Cost – CD-ROM Drives fairly cheap.

Access – Always random

4.5 – Storage Devices decompressed by hardware or software, usually on the card.4.5.3Magneto Optical Storage

Based on a combination of magnetic and optical technologies.

Active layer is magnetic material.

Recording – magnetic material heated beyond a particular temperature by laser, allows magnetisation to be reversed.

Reading – laser operates at much lower temp and reflected beam rotated by magnetic field and detected by read head.

Capacity – 3.5” disks of 128, 230 and 384 Mb

Speed – Varies as multiple of standard single speed

Cost – decreasing with time with different formats and capacities becoming available.

4.5 – Storage Devices decompressed by hardware or software, usually on the card.4.5.4 Solid State Storage Devices (SSSD)

Solid-state storage devices are made up entirely from electronic components i.e. they have no moving parts.

They are also called RAM disks, as they take the place of a magnetic disk as a mass storage device.

They can be in the form of a plug-in card or cartridge containing memory chips.

The chips of a SSSD are typically static RAM or Electrically Erasable Programmable ROM (EEPROM or Flash EPROM).

SSSD are used with devices where space is at a premium e.g. in a camera, or when portability is desirable e.g a USB flash drive.

4.6 Interfacing (1) decompressed by hardware or software, usually on the card.

Interfacing means making the hardware connections so that two devices can communicate effectively.

Data Format – data has to be consistent e.g. serial output to a serial device. Interface makes data consistent (also ADC)

Parallel/Serial – time & space division. Time separates transmission of actual bits and space can be used for multiple bits in parallel. Serial can be slow but use of fibre-optic cable very fast.

Voltage – different voltage levels between peripheral & computer need to be ironed out.

Protocols – rules that govern transmission of data. E.g. no of bits per packet, voltage levels etc.

4.6 Interfacing (2) decompressed by hardware or software, usually on the card.

Status signals from a device indicate what the device is doing at any given moment. E.g.if a device is unable to receive data, then a transmitting device can delay transmission and retry later.

Speed - Different devices send and receive data at different rates. The devices agree a rate prior to transmission by utilising a protocol.

Wireless communications can be achieved using WAP (Wireless Application Protocol) - a specification for a set of communication rules to standardise the way that wireless devices, such as cellular telephones and radio transceivers, can be used for Internet access, including e-mail, the World Wide web, newsgroups, and Internet Relay Chat (IRC). Interconnecting devices centred around an individual person is called a wireless personal area network (WPAN). Typically, a WPAN uses technology that permits communication between devices in a

5 Networking decompressed by hardware or software, usually on the card.5.1 Introduction

• This unit on Networking considers the basic system topologies and functions that allow computers to operate on a network.

• Various types of networks are considered ranging from small peer-to-peer networks to LANs, WANs and the Internet.

• Comparisons are made between the various networks in terms of type and scale and the effects of network failures.

5 Networking decompressed by hardware or software, usually on the card.5.2Networks

• connecting two or more computers togetherturns them into a computer Network.

• connecting two computer networks togethercreates an Internetwork.

• connecting millions of computers andcomputer networks together forms a huge internetwork or what we now refer to as theInternet.

• Economic and Social reasons for networks – desire to communicate probably most powerful reason.

• We take e-mail, Internet, Video conferencing for granted but none of the were obvious when networks first appeared.

5 Networking decompressed by hardware or software, usually on the card.5.2 Categorising ComputerNetworks

• Computer networks can be categorised by the rate at which data can be transferredbetween machines (Bandwidth), and the physical distance between them.

• Greater distance suggests lower bandwidth.

• Local Area Networks (LANs) – high bandwidth.

• Wide Area Networks (WANs) – low bandwidth (even broadband is slow compared to typical modern LAN bandwidth)

5 Networking decompressed by hardware or software, usually on the card.5.2.1 Local AreaNetworks (LANs)

• LANs very popular now and the technology has become much cheaper.

• Sharing resources

• LAN belongs to single organisation on a single site so a high level of trust develops.

• Share printers, scanners, hard disk space, applications and Internet connections

• Sharing Information

• Files and data. E-mail and appointments diaries, Intranet.

• Sharing Services

• Centralised backup, technical support, anti-virus, software installation and update.

5 Networking decompressed by hardware or software, usually on the card.5.2.1 (LANs) - Hardware

• Reduced Hardware costs have helped dramatic increase in LANs

• Network card – every PC on network needs a card to interface with the network.

• Hubs – typically 24 ports, each PC connects to port. Can be slow and cause bottlenecks.

• Switches – intelligent hubs (24 or racks of 24 x 8) – help reduce bottlenecks.

• Software is now much cheaper. Each station needs a network licence and server software needs to be licensed for the number of stations on the network

5 Networking decompressed by hardware or software, usually on the card.5.2.1.1 Sharing Resources on a LAN

• Hardware resources

• Expensive printers (laser and colour laser), plotters and hard disks not only shared to save money but installation and maintenance cheaper and easier.

• Software Resources

• Can set up an Intranet, use internal e:mail and Newsgroups.

• Also search facilities across the network.

5 Networking decompressed by hardware or software, usually on the card.5.2.1.2 Sharing Services on a LAN

• Network Manager

• Controls the network from any location

• Controls software installation and upgrades centrally.

• Control shared Internet access and Firewall protection.

• Provide automatic virus protection

• Do regular full backups and frequent (daily) incremental backups.

5 Networking decompressed by hardware or software, usually on the card.5.2.2 Wide Area Networks - WANs

• A WAN allows an organisation to maintain itsmanagement structure despite being geographicallydistributed around the world.

• WAN’s & Internet increasingly popular as cost of communication drops.

• Easier and cheaper to conduct business and communicate around the world.

5 Networking decompressed by hardware or software, usually on the card.5.2.2.1 Metropolitan Area Networks - MANs

• A MAN is a wide area network which has a city ormetropolitan area as its geographical limit.

• MANsare usually under the control of a single localauthority

• typically consists of a WAN which isadministered centrally, providing networked services tolocal government offices, schools, libraries, communitycentres etc.

• advantages of a MAN are the economiesof scale and the improved communications which canbe achieved by connecting local government officestogether.

• Local authorities usual host an Intranet for use of a staff on-line newsletter

• MANs rely on a high bandwidth and are really only suitable for Urban areas. Rural authorities have to use lower bandwidths (e.g. up to 2 Mbits/sec

5 Networking decompressed by hardware or software, usually on the card.5.2.2.2 Improved communications on a WAN

• E:mail allows users to communicate.

• Text and graphic messages

• File transfer by attaching files to e:mails

• Newsgroups are electronic bulletin boards

• Organised by threads of messages

• Can be set up and accessed if you have access to a News Server

• Electronic Forums

• Similar to newsgroups but controlled by a particular organisation e.g. on the BBC website forums exist for news, sport etc.

• List Servers

• Use e:mail to distribute messages rather than the user having to log onto a forum.

5 Networking decompressed by hardware or software, usually on the card.5.2.2.2 Improved communications on a WAN -2

• File Transfer Facilities

• Being able to transfer files over aWAN means that if the product you sell can be stored ortransmitted electronically, then you can sell it to anyone who is connected to the Internetwithout having to transfer a physical object.

• Items on sale over the Internet which canbe electronically distributed are things like software, music, photographic images, videoand information in the form of data files.

• Some companies are now offering servicessuch as remote backup and data storage over the Internet.

• Distributed Processing

• Different parts of a suite of programs can be run on different machine across the network.

• Allows software vendors to rent software rather than sell it.

• Search for Extraterrestrial Intelligence (SETI) uses volunteers whose computers process distributed data when idle.

5 Networking decompressed by hardware or software, usually on the card.5.2.2.3 Access to information on a WAN

• Information Services

• Internet access means you have instant access any time of the day or night without having to travel, to news, technical information and other data.

• Use a search engine on the web e.g. google

• Entertainment Services

• Internet radio, music channels and network games all possible on a low bandwidth. Information is broadcast once rather than being requested and transmitted separately for each user.

• Video on demand needs a high bandwidth and other services benefit from high bandwidth.

5 Networking decompressed by hardware or software, usually on the card.5.2.2.4 Teleworking

• Tele-working

• means working from home insteadof traveling to an office everyday

• Use communicationstechnology to keep in touchwith your employer.

• Can work in different country.

• Any job where where the results of your labour can be transmitted electronically can be classed as teleworking.

• Video conferencing

• Allows people to see and hear the people they are having a meeting with.

• Need specialised equipment and a high bandwidth.

5 Networking decompressed by hardware or software, usually on the card.5.2.2.4 Teleworking – advantages and disadvantages

• Employee saves time and money travelling, on childcare and can live in cheaper housing away from city. Deliver your work electronically.

• Employer saves money on office space; tele-workers usually work harder – no distractions. Save wages by employing people in countries where wages are low.

• Employee feelings of isolation, office chat and miss out on promotion. May work much harder and put in more hours than being paid.

• Employer needs to pay for training and installation of communications equipment. Security issues if employees log into the company network from home

5 Networking decompressed by hardware or software, usually on the card.5.2.3 Intranets

• Intranets

• Used by organisations to distribute information on a LAN

• Often used as a portal for the Internet and difficult to tell whether you are on the LAN or WAN

• Usually private and internal

• Can be used by companies with branches all over the world as secure information service.

5 Networking decompressed by hardware or software, usually on the card.5.2.4 Mainframe Networks

• Mainframe network with “Dumb” terminals

• Original communication method everyone used the same computer.

• Terminal has no processing power.

• Mainframe processor, memory and disks used by each terminal in turn.

• Current mainframes combined with conventional client-server networks. Client access mainframe via terminal emulation software

• Thin client Networks

• Low power workstations run applications on the server.

• Load O/S and software from the server.

• Server must be very powerful high spec with lots of memory.

• Useful for single application stations e.g. Internet Browser only.

5 Networking decompressed by hardware or software, usually on the card.5.3 Network Operating Systems

• Improved networking operating systems

• Easier to connect computers together

• Modern O/S has networking built-in

• Common standards such as TCP/IP

has made networking easier and cheaper.

• Main Functions of Network O/S

• Allows users to treat resources on other computers as if they were local resources

• Mapping directories or drives of remote machines

• Copying remote files to local drives

• Managing different operating systems on the network

• Ensuring data integrity

• Providing privacy and security of network resources

5 Networking decompressed by hardware or software, usually on the card.5.3.1 Client-Server Network

• Central server or servers

• Usually most powerful computers on the network.

• RAID drives and lots of memory

• Often run a different O/S to clients

• Provide access to shared resources without affecting the performance of any one machine.

• May act as mail servers, Intranet or proxy servers, networked storage or applications servers or news servers.

5 Networking decompressed by hardware or software, usually on the card.5.3.1 Client-Server Network Services

• Security

• Network software allows only users with correct passwords to access the system and files they have permission to use.

• Networked storage

• You can access centrally stored files from any machine on the network.

• Communications

• Internal & external e:mail, Intranet services.

• Internet and Firewall services

• Applications

• Applications stored centrally mean you always have access to that application even if it is not installed on your workstation.

• Support Services

• Virus checking, remote control, remote monitoring and central backup strategy.

5 Networking decompressed by hardware or software, usually on the card.5.3.1.1 Advantages of Client-Server Network

• Centralised control

• Of software installation

• Over software versions

• Ability to configure stations to a common format.

• Resources shared

• Hard disk space, expensive peripherals (laser & colour laser printers), modems and routers.

• Security

• Backup routines

• Easy to backup central server to tape either full or incremental backup

• Ease of expansion

• Most LANs can easily be extended by adding cables and stations.

5 Networking decompressed by hardware or software, usually on the card.5.3.1.1 Disadvantages of Client-Server Network

• Cable Faults

• In a bus topology can bring down whole sections of the network

• Server Failure

• Will bring down the entire network.

• Software incompatibility

• Some network s/w is proprietary and difficult to link to other LANs

• Management & Control

• The bigger the network the more highly trained and expensive the technician or controller is to employ.

5 Networking decompressed by hardware or software, usually on the card.5.3.2 Peer to Peer Networks

• Peer to peer

• All machines on network of equal status.

• No server on network

• Suitable for small (up to 5 stations) LANs.

• Used in home situations

• Also in small offices where all staff are trusted

• Security difficult to implement

• Bottlenecks can occur if more than one user wishes to access the same resource (e.g. hard disk) at the same time.

5 Networking decompressed by hardware or software, usually on the card.5.3.2 Advantages of Peer to Peer Networks

• Peer to peer networks are cheap and easy to implement.

• Modern operatingsystems like Windows 98 and Apple OSX have this sort of networking built in

• you do not have the expense of providing a dedicated machine to function as aserver

• If security is not a problem, then it is very convenient to be able to share files,access peripherals and have several people using the same Internet connectionwithout having to set up a more complex network structure.

5 Networking decompressed by hardware or software, usually on the card.5.3.2 Disadvantages of Peer to Peer Networks

• Organisation and management become difficult when several machine connected together and sharing files

• Versions of installed software are difficult to control.

• Backup difficult as files distributed across several machines.

• Proper security difficult as no easy way to restrict access to shared files or resources.

5 Networking decompressed by hardware or software, usually on the card.5.3.3 Stations and servers

• Network stations and servers are nodes on the network.

• Servers

• A server usually refers to a program and the computer it is running on.

• On a network, one machine may provide access toa number of different resources

• There may be a number of different machines actingas servers, each one providing access to different resources.

• Machine identification

• All nodes on a network, whether they are serversor network stations, will have a unique identity whichidentifies that particular machine.

• The type of identitya node has will be determined by the protocols runningon the network.

5 Networking decompressed by hardware or software, usually on the card.5.3.3 Stations and servers - 2

• Machine identification – Ethernet Standard

• Every network interface card has a Media Access Control (MAC) address – 6 bytes

• In TCP/IP every node has its own IP address – 4 bytes.

• Nodes may also have a network name.

5 Networking decompressed by hardware or software, usually on the card.5.3.3 Stations and servers – Network Servers

• File Server

• Print Server

• Applications Server

• Distributes applications around the network (read only access) to users.

• E:mail Server

• Stores users’ e:mails and account details. Regularly contacts external e:mail server to send and receive external mail.

• News Server

• Stores and forwards messages posted by users on a bulletin board system.

• Web Server

• Transmits and stores Web pages and provides access to to an Intranet.

• Proxy Server

• Connects a LAN to the Internet. Allows many users simultaneous access.

5 Networking decompressed by hardware or software, usually on the card.5.4 Network Topology

• A network topology describes the arrangement of computers to form anetwork. The actual physical layout is determined by the buildings or other locations thathouse the parts of the network.

• We will look at four local area network topologies.

• Bus

• Star

• Ring

• Mesh

5 Networking decompressed by hardware or software, usually on the card.5.4.1 Network Topology - Bus

4 Factors Affecting Performance4.6. Network Topology - Bus

Data Security – data encryption methods used. High collision rates requiring re-transmission

Bandwidth – available bandwidth shared amongst all stations accessing network. Data compression used.

Reliability – fault in one station has no effect on rest. Cable fault will lose all that section.

Cost – relatively cheap

Bus Topology- easy to expand and cheap to set up.

e.g. Ethernet in school or college.

5 Networking decompressed by hardware or software, usually on the card.5.4.2 Network Topology - Star

Data Security – higher security as data routed only to the computer that is to receive it. No collisions.

Reliability – if a link fails then only that station is off the network. Failure to central controller is fatal.

Cost – can be quite expensive due to high cost of cabling. Popular in small self-contained networks as not too expensive (small office).

All nodes connected to one central node that routes traffic to the appropriate place.

5 Networking decompressed by hardware or software, usually on the card.5.4.3 Network Topology - Ring

Similar to Bus in many respects with similar security problems.

Control system in charge of transmissions and stations guaranteed access to transmissions. Collisions avoided by use of a token

Additional expense for control s/w and system. May have to wait turn to transmit.

Network down to add station, but few if any crashes.

Ring Topology

5 Networking decompressed by hardware or software, usually on the card.5.4.4 Network Topology - Mesh

Fault in one cable does not affect network.

Multiple transmissions

Lots of wiring

Expensive

Excellent performance

Mesh Topology

6 Using Networks decompressed by hardware or software, usually on the card.6.1 Introduction

• This unit considers:-

• The hardware and software required to use networks

• Theassociated communications issues.

• The misuse of networks is also considered andthe implications discussed.

6 Using Networks decompressed by hardware or software, usually on the card.6.2.1 Network Hardware – The Hub

• A hub in an Ethernet network is a multi-port repeater.

• Hubs are most often used on networks using UTPcabling as the limit for this type of cable is 100 metres.

• A hubwill divide the network up into a series of different segments, reducing the likelihood that a cable fault will bring the whole network down.

• Hubsarecommonly supplied with 12 or 24 ports, and are suitable for distributing a UTP cable toa room or office full of network stations.

• A hub also functions at the lowest level of the OSI networking model, the PhysicalLayer.

6 Using Networks decompressed by hardware or software, usually on the card.6.2.2 Network Hardware – The Switch

• A switch (sometimes called a switched hub) divides the network up into collisiondomains. A Switch is often regarded as an intelligent Hub

• A Collision occurs when a station begins transmission and then receives thebeginning of a frame from another station.

• The station will immediately stop transmissionand issue a JAM signal onto the segment.

• This will indicate to the other transmittingstation that a collision has occurred and both stations will back off for a random amountof time and try to re-transmit.

• This back-off time is dependent on the number ofconsecutive collisions that were issued before a successful transmission.

• The morecollisions, the longer the maximum back-off time.

• This mechanism requires that stationsbe close enough together for each station to see any possible attempted transmissionbefore the first 64 bytes of its frame have been transmitted.

• This is because 64 bytes isthe minimum frame size for an Ethernet network.

6 Using Networks decompressed by hardware or software, usually on the card.6.2.3 Network Hardware – The Router

• A router works like a bridge on inter-networks using IP addresses.

• Routers are used to link Ethernet networks to the Internet via fibre or ISDN and ADSL lines.

• Possible to connect over 200 stations to the Internet and share the bandwidth intelligently.

6 Using Networks decompressed by hardware or software, usually on the card.6.2.4 Network Hardware – Network Interface Card

• Network Interface Card (NIC)

• Circuit board installed inside a computer to connect it to the network.

• NIC must be designed for the network it is connected to e.g. Ethernet card for Ethernet LAN.

• Provides a dedicated full time connection to the network.

6 Using Networks decompressed by hardware or software, usually on the card.6.3 Hardware & Software Factors

• 6.3.1 Processors

• Processor hungry applications run on networks (Browser, P2P. Virtual Private Networks)

• Features to consider

• Performance (High Speed and throughput)

• Flexibility (Ability to adapt to changing O/S and Application S/W)

• Power (High power leads to heat – need cooling etc.)

• Software Support (compilers, operating systems and libraries available to the processor)

6 Using Networks decompressed by hardware or software, usually on the card.6.3 Hardware & Software Factors

• 6.3.2 Memory

• Factors defining the memory that supports a network processor can be categorised asfollows:

• Shared, distributed or a combination

• Size and type of memory used

• Caches that are included on or off the chip

• Memory is available as RAM, on the NIC and shared from a server. Also can use a NMS (Network Memory server) – provides RAM as fast network memory paging.

• Special Features

• Memory / buffer controllers

• Packet management units

6 Using Networks decompressed by hardware or software, usually on the card.6.3 Hardware & Software Factors

• 6.3.3 Backing Storage

• Local storage on PC and remote network storage.

• Hard disks used throughout

• Specialised RAID systems used on shared network disks

• Some systems separate from main server and accessed via a storage server.

• Shared drives are assigned a network address allowing them to be accessed. E.g. Each “Home” drive has an address tied in with its owner’s account.

6 Using Networks decompressed by hardware or software, usually on the card.6.3 Hardware & Software Factors

• 6.3.4 Browsers

• A browser is the application program that enables a computer user, to look at, andinteract with World Wide web.

• It makes requests to web servers throughout the Internet.

• Netscape Navigator and Microsoft Internet Explorer are the only two browsers that thevast majority of Internet users are likely to use.

• The notion of a browserless web describes communication over the World Wide webbetween programs rather than between people using browsers and web servers anddoes not involve an interactive user.

6 Using Networks decompressed by hardware or software, usually on the card.6.3 Hardware & Software Factors

• 6.3.5 Network Operating Systems

• Server runs a specialised NOS

• Windows NT, Server 2000, Server 2003

• Unix based variations including Linux (open source).

• Workstations run client based O/S

• NT for Workstations, Widows 98, 2000, XP

• Server can cope with mixture of client O/S on the network (inc Mac OS)

• Transparency needed e.g.

• Printing or Saving a file should be the same operation whether locally or on the network.

• Achieved using a network driver called a Redirector

6 Using Networks decompressed by hardware or software, usually on the card.6.4 Technical Factors Affecting Communications

The technical factors which have led to the growthof computer networks have emerged in parallel with the economic factors which have driven the researchinto networking technology.

As the economic demandor networking technology has grown, the trend hasbeen for equipment prices to fall and performance toincrease.

Although still in its infancy, the development ofwireless networking is likely to follow the same pattern.

6 Using Networks decompressed by hardware or software, usually on the card.6.4.1 Cabling

• Cabling can affect bandwidth and different cabling is used in different situations.

• As more networks are installed the cost of cabling has fallen.

• Different cables used in different situations (even on one network)

• Ethernet uses UTP cabling (developed by Xerox) running at 100Mb/sec.

• Fibre Optic cable used to join areas of the network to the server. Very fast (e.g. 2Gb/sec) allowing many stations to share the bandwidth. Connects Hubs/Switches to a server.

6 Using Networks decompressed by hardware or software, usually on the card.6.4.2 Bandwidth

• The term bandwidth describes the rate at which data can betransmitted over a segment of a network.

• As users share networks the Bandwidth available to each user depends on the number of users. To maximise bandwidth either increase overall or reduce the demand.

• Reducing the demand

• Data Compression – remove redundant information

• Caching – Commonly viewed or used data stored locally to avoid transmission e.g. Internet home page. Most of a network profile.

• Broadcasting - - if data such as video or audio is transmitted live, then although the user only has one chance of viewing it, the bandwidth requirements will be a lot less than if users are continually downloading their own copy of the data.

• Increasing capacity

• Fibre Optic and satellite links on a LAN, ISDN and ADSL on the Web.

6 Using Networks decompressed by hardware or software, usually on the card.6.4.3 Wireless

• Features

• Slower than conventional cabling.

• Convenience of being able to move around rooms and buildings.

• Quick and easy to install

• Bluetooth allows devices such as mobile phones, printers and laptops to form a mini network when they are in close proximity.

• Mobile phones can access the Internet via Wireless Application Protocol (WAP)

6 Using Networks decompressed by hardware or software, usually on the card.6.5.1 Misuse of Networks – Social Issues

• Personal privacy

• The monitoring of individuals’ Internet and email useis a contentious issue. Many governments would liketo have access to this sort of information. Manyindividuals would not like them to have this kind ofaccess. With modern communications networks it istheoretically possible to trace the movements of anyindividual around the world - they use cash machines,pay with credit cards, use the Internet, use mobilephones, appear on surveillance cameras, and may useelectronic road tolling systems.All of these systems could be combined to track an individual’s movements.

• Evenorganisations who manage LANs are becoming concerned about the security andemployment issues surrounding email, and are starting to monitor all email activity ontheir networks to make sure that their employees are not divulging company secrets orusing the network facilities for their own personal use.

6 Using Networks decompressed by hardware or software, usually on the card.6.5.1 Misuse of Networks – Social Issues

• Encryption

• Encrypting data is a method of coding it, in order to make it difficult or even impossiblefor someone to read it unless they have authorisation from you. Some governmentsmake encrypting data illegal, others regard it as an individual right. There is a trade-off between security and convenience.

• Encryption is classified according to the number of bits needed for the key used toencode the data. The more bits that are used, the longer it takes for the code to becracked. As computers increase in power, the time and resources needed to crack suchcodes decreases, so the minimum encryption key size needs to increase as computertechnology improves.

• At the moment email on most networks is un-encrypted and insecure, as messages aresent as plain ASCII text. One popular and free encryption system currently available isPretty Good Privacy (PGP), although until recently PGP was regarded as “mutinous“by the USA government and its inventor was prosecuted for allowing details of how hissystem worked to be posted on the Internet.

6 Using Networks decompressed by hardware or software, usually on the card.6.5.1 Misuse of Networks –Disconnection

• Disconnection

• Many people feel that the Internet has accentuatedthe difference between the rich and the poor. Peoplein western countries are described as "Informationrich" whereas most people in the Third World are"Information poor", since connecting to to the Internetrequires expensive equipment and access to anetworking infrastructure which does not exist in manypoor countries.

6 Using Networks decompressed by hardware or software, usually on the card.6.5.1 Misuse of Networks – Social Isolation

• Social isolation

• There is a fear that the increased use of electroniccommunication will mean that many people will becomephysically more isolated from each other. The Internetencourages the creation of global communities, butmay result in neighbours not seeing each other forweeks on end.

6 Using Networks decompressed by hardware or software, usually on the card.6.5.2 Misuse of Networks – Ethical Issues

• Netiquette

• There are several conventions and a whole new vocabulary which has developed withregard to how you should behave on Internet newsgroups, using email, etc. Simplerules such as not sending "spam" (unsolicited commercial email), not shouting (writingin capital letters) and respecting people’s privacy may seem obvious, but it is easy tomake mistakes without realising it. The best policy when subscribing to a newsgroup orjoining a list server is to "listen" quietly for a while to see how others behave before yousubmit any contributions yourself.

6 Using Networks decompressed by hardware or software, usually on the card.6.5.2 Misuse of Networks – Ethical Issues

• Misrepresentation

• The ability to post messages on newsgroups ordiscussion lists anonymously means that offensivestatements can be made without the person makingthem being held to account.

6 Using Networks decompressed by hardware or software, usually on the card.6.5.2 Misuse of Networks – Ethical Issues

• Surveillance and monitoring

• The email you send and receive, the pages you view and the files you download via theInternet can all be logged by a number of organisations. These organisations may notalways have your best interests at heart.

6 Using Networks decompressed by hardware or software, usually on the card.6.5.2 Misuse of Networks – Ethical Issues

• Chatrooms

• Are popular with young people who use the Internet as they enable users tocommunicate in real time with others from all over the world. A chatroom on the Internetis an area where users can type messages which can be read immediately by anyoneelse connected to the same server. Communication is slow because of the need to typethe messages, but this disadvantage is outweighed by the immediacy of the system.One problem with chatrooms is that there is no way of verifying that the person you arecommunicating with is who they say they are. They may have lied about their age, theirsex, or why they are interested in chatting with you.

6 Using Networks decompressed by hardware or software, usually on the card.6.5.3 Misuse of Networks – Network Etiquette

• Netiquette

• While there are no international standards of behaviouron networks, there is an accepted code of conductoften referred to as netiquette.

• Netiquette is usually justcommon sense. Network administrators are the onlyusers of a network who have access to all the files on anetwork - it is considered unprofessional for a networkadministrator to access any personal file unless theyare required to do so to perform their job.

6 Using Networks decompressed by hardware or software, usually on the card.6.5.3 Misuse of Networks – Network Etiquette Rules

• Some network rules of etiquette on a LAN are:

• do not use other peoples identities and passwords;

• do not attempt to access files which are not yours;avoid wasting disk storage space or bandwidth unnecessarily. (Keeping your entiremusic collection in MP3 format on your network drive or downloading large videofiles at peak times of Internet use are activities unlikely to endear you to yournetwork administrator);

• avoid causing other people unnecessary work. It may be entertaining to installthe latest screen-saver on your network station, but the next user is unlikely toappreciate having to re-boot the machine because they do not know the password,and the network administrator is unlikely to enjoy un-installing it.

6 Using Networks decompressed by hardware or software, usually on the card.6.5.3 Misuse of Networks – Network Etiquette 2

• Some network rules of etiquette on a WAN are:

• Avoid wasting bandwidth by sending unnecessary emails, attachinguncompressed files or creating web pages with large or unnecessary graphics on them;

• Be aware that the Internet is used by people with a large variety of differentmachines running different operating systems and different browsers. If you wantother users to access information, try to store the files in a format which is goingto be easy to read for everyone. ASCII code is the simplest format for text. CSV isthe simplest format for a database;

• Try to create web pages which are readable no matter what resolution your monitoris set to use.

6 Using Networks decompressed by hardware or software, usually on the card.6.5.3 Misuse of Networks – Network Etiquette

• Email etiquette

• email messages should be concise and to the point;

• remember to make the subject line relevant to the message you are sending.

• do not repeat email messages. Give the recipient time to read your email and torespond to it;

• be professional and careful what you say about others.

• email is not a secure means of communication as it is transmitted withoutencryption.

• when being humorous, use emoticons to express humor. (Tilt your head to the leftto see the emoticon smile) :-) means happy face;

• typing mail messages all in upper case is considered SHOUTING! and rude;

• do not send people chain letters or hoax virus warnings. Such email just reducesthe bandwidth available for everyone;

• avoid sending anyone spam;

• do not attach large files to an email message without asking the recipient’spermission first.

6 Using Networks decompressed by hardware or software, usually on the card.6.5.3 Misuse of Networks – Network Etiquette

• Usenet etiquette

• All of the email etiquette rules apply to Usenet.

• remember to be courteous and respect others:

• when quoting someone else, remove what is not directly applicable to your reply.

• Do not automatically quote the entire body of messages you are replying to whenit is not necessary. Leave only the minimum necessary to provide context for yourreply.

• it is extremely rude to forward personal email to mailing lists or a newsgroupwithout the original author’s permission.only messages meant to be read by the entire group should go to the list. Send apersonal mail message aimed at one person to that person.

• posting an advertisement in news groups, unless it is specially chartered for thatpurpose like the for-sale newsgroup, or sending unsolicited advertisements withemail is considered rude.

6 Using Networks decompressed by hardware or software, usually on the card.6.5.3 Misuse of Networks – Network Etiquette

• Listserver etiquette

• All of the Usenet etiquette rules apply to listservers,though as your messages will arrive as emails to themembers of the list, it is best to be even more carefulthan when posting to a newsgroup. Some list serversgenerate large amounts of email every day. It is oftenwiser to receive the messages in digest form as onesingle email containing all the messages posted that day.

• Here are a few guidelines:

• when signing up for a group, save yoursubscription confirmation email for reference, sothat if you go on holiday or no longer wish toreceive the list messages, you will have thesubscription address for suspending mail;

• if you lose interest in a list-server, un-subscribe from it so that the messages beingsent to you do not clog up the network.

6 Using Networks decompressed by hardware or software, usually on the card.6.5.3 Misuse of Networks – Network Etiquette

6 Using Networks decompressed by hardware or software, usually on the card.6.5.4 Hacking

• The network operating system is responsible forsecurity on the network. The most obvious exampleof this is when a user logs on. The user must supplyan identity and a password. The operating systemcompares the data entered with the identities andpasswords in its database and if the two do not matchup then it will not allow that user any access to theresources on the network.

• If the identity and password do match, then the resources which the user has accessto will depend on the level of access that user has been given by the network manager.

• The access a user has to resources depends on that user’s level of permissions.

6 Using Networks decompressed by hardware or software, usually on the card.6.5.4 Hacking

• The easiest way to control different levels of access is to divide users into groups. Eachgroup can have different levels of access to the shared network resources. Such as a printer or need to be able to alter files ina particular section of the organisation’s Intranet. Once groups have been set up withdifferent permission levels, it is easier to give one or more users access to a resource bymaking them a member of a group than to individually change the permissions for eachuser. When a user tries to access a resource, whether it is a printer, a file or an area ofdisk storage, the operating system checks against the permissions for that resource. Ifthe user or the group they belong to does not have permissions for that resource thentheir access is denied. Users will probablybe given full permissions to their own file area, but only read access to parts of theIntranet, read/execute access to applications areas, and no access at all to networkmanagement areas or other user’s files.

6 Using Networks decompressed by hardware or software, usually on the card.6.5.4 Hacking

• Security on the Internet

• This is of particular concern to anyone purchasing goods or servicesusing e-commerce. Many people are concerned that their credit card details are beingtransmitted over the Internet when they use e-commerce systems.

• Anyone using an onlinebank account also needs to be reassured that the system they are using to accesstheir financial details is secure.

• A secure web browsing protocol named Secure HyperText Transmission Protocol (SHTTP) has been developed for this kind of transaction.SHTTP ensures that data transmitted using this protocol encrypts the data before it istransmitted using SSL (Secure Sockets Layer) originally developed by Netscape.

• Other security systems on the Internet depend on the issuing of digital certificates whichguarantee that you are who you say you are.

6 Using Networks decompressed by hardware or software, usually on the card.6.5.5 Viruses

• A virus is a piece of programming code that causes some unexpected and usuallyundesirable event in a computer system.

• They are often designed so that theyautomatically spread to other computer users on a network. Viruses can be transmittedas attachments to an e-mail, as a download, or be present on a disk being used forsomething else.

• Some viruses take effect as soon as their code takes residence in asystem whilst others lie dormant until something triggers their code to be executed bythe computer.

• Viruses can be extremely harmful and may erase data or require thereformatting of a hard disk once they have been removed.

6 Using Networks decompressed by hardware or software, usually on the card.6.5.6 Legal Protection

• Censorship and pornography

• What is legal in one country may not be legal in another.

• Not all governments encourage the free debate ofpolitical subjects and many governments try to blockaccess to political debate which is criticalof them.

• Many people believe that children shouldbe protected from violent, pornographic or extremepolitical material, though of course what is consideredto be extreme depends on the society.

• The world-wide nature ofthe Internet makes it very difficult if not impossible to control. An international standardof "rating" web pages for violent or sexual content has been developed which makescontrolling access easier.

• Many educational institutions and some Internet Service Providers install filteringsoftware on their Proxy Server which can be set to deny access to web pages ornews groups which contain offensivematerial.

• Commercialorganisations may deny their users access to entertainment or other services becausethey believe that their employees should only access material which is relevant to theirwork.

6 Using Networks decompressed by hardware or software, usually on the card.6.5.6 Legal Protection

• Taxation

• Buying and selling on the Internet makes it very difficultindeed to impose taxes, import duties or other fees,particularly if the item purchased such as software,music, or access to information can be transmittedelectronically and does not have to be physicallydelivered to the purchaser.

• If you work in one countrybut are employed in another (tele-commuting) whereshould you pay tax? Who should pay for your NationalInsurance? Which country’s employment laws shouldapply?

6 Using Networks decompressed by hardware or software, usually on the card.6.5.6 Legal Protection

• The Internet has made thedistribution of software cheapand easy, but of course thisalso means that the distributionof illegal copies of software isjust as easy.

• Software piracyis a major problem in manyparts of the world. Manypeople argue that softwarepiracy increases the cost ofsoftware because softwaredistributors need to chargemore to recover the cost ofresearch and development ifonly a percentage of thoseusing the software are actuallypaying for it.

• In addition to conventional software licensing, there are a number of alternative softwaredistribution models in existence, including Shareware, Adware and even Freeware.

• The Internet has made many of these distribution models viable because it provides alarge enough market and removes the cost of distribution from the developer.

• There is also concern over copyright concerning images and other data available on theInternet. The fact that this data is on a web page and anyone can access it does notmake it freely available for anyone to take for themselves and publish it under their ownname.

6 Using Networks decompressed by hardware or software, usually on the card.6.5.6 Legal Protection

• Computer Misuse Act

• In the United Kingdom, the Computer Misuse Act(1990) covers using computers to damage or stealdata.

• The Computer Misuse Act covers crimes such asbreaking into computer systems or networks to destroyor steal data and propagating viruses which destroy ordamage information or computer systems.

6 Using Networks decompressed by hardware or software, usually on the card.6.5.6 Legal Protection

• Data Protection Act

• In the United Kingdom, the Data Protection Act (1998) describes the duties andresponsibilities of those holding data on individuals.

• It also describes the right of theseindividuals.

• In general, it is the duty of those holding data on individuals to register withthe Data Protection Registrar, to keep the information secure, make sure it is accurate,and to divulge it only to those persons who are authorised to view it.

• It is the right ofan individual who has data stored concerning them to view that information and to haveit changed if it is inaccurate.

• There are a number of organisations which may be givenexemption from this act - namely the Police, Customs, National Security and HealthAuthorities.

6 Using Networks decompressed by hardware or software, usually on the card.6.5.6 Legal Protection

• Copyright Designs and Patents Act

• Copyright is the ownership of intellectual property outlined by a particular nation’s orinternational law.

• In the UK, the Designs and Patents Act of 1988, and legislation inother countries who signed the Berne Convention, provide protection.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.1 Introduction

• This unit on computer software considers the software that is required to support the use of computer systems.

• We consider the Different Categories of Software

• Emphasis is on systems software

• Also look at applications software & graphics

• Selection of software and file formats in LAN, Multimedia applications and web sites

7 – Computer Software decompressed by hardware or software, usually on the card. 7.2 Systems Software

• System software is designed to enable you to run a computer without having to knowexactly what’s going on inside.

• System software controls the actual operation of thecomputer system.

• You can enter instructions to the computer by typing at the keyboardor clicking on a mouse and the system software will convert these instructions intothe low-level operations needed for the computer to carry them outappropriately.

• The operating system is part of the system software.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.2 Systems Software – Operating System

• Manages the hardware & communicates with the user in 5 key areas.

• User Interface

• File Management

• Input and Output

• Memory Management

• Kernel

• O/S is broken down into layers so updates can be written for specific layers.

• Some parts of O/S held in ROM chips, but most parts held on disk – can be corrupted.

• O/S manages processes – programs in execution

7 – Computer Software decompressed by hardware or software, usually on the card. 7.2.1 Starting up

• The most essential and frequently used instructions of the operating system are held in main memory. This part of the operating system is known as the supervisor, executive or kernel.

• The remaining part of the operating system can be loaded into memory whenever it is needed.

• On power up computer carries out tasks to check that the basic hardware is operating correctly. It then tries to load the o/s program into main memory. Checking hardware, locating and loading the operating system is carried out by a small program called a boot program that is held in ROM.

• Booting means " to pull yourself up by your own bootstraps". The o/s builds its capability using what it already has, the ROM boot program, to load itself from disk into RAM.

• Once the operating system is loaded into main memory, it runs until the computer is switched off.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.2.1.1 ROM Based Operating Systems

• In ROM based operating systems, the operatingsystem is held on a ROM chip.

• releases main memory for applications

• Prevents the o/s from beingcorrupted.

• takes very littletime to load and be up and running.

• Changes to the operating system require an alterationto the ROM program and subsequent chip replacement.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.2.1.2 Disk Based Operating Systems

• With a disk based operating system the systemsoftware is held on backing storage and loaded intomain memory when the machine is switched on.

• Some computers have the operating system and utilitysoftware pre-installed on the hard disk otherwise theuser must install and configure the software.

• Originally, systems software wasdistributed on floppy disks. These days, desktop operating systems are solarge that they are distributed on CD-ROM, or upgradescan be downloaded directly from manufacturer’s websites.

• Features of Disk Based Systems

• Easy to upgrade via CD or the Internet

• Can get corrupted or damaged but easily re-installed

7 – Computer Software decompressed by hardware or software, usually on the card. 7.2.2 User Interfaces

• The most common styles include:

• form filling

• Seen in specialised applications such as configured database systems. Used to control the information entered.

• Provide users with a set of options. Restricts users to those options but easy to use for novices.

• command

• User types in commands. Can be very powerful, but hard to learn. For expert users usually.

• graphical user interfaces

• Generally uses the desktop metaphor> Users mouse as pointing/selecting/initiating device.

• natural language.

• Speech input and written language.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.2.3 File Management

• The operating system supervises the creation, deletion and updating of files.

• It deals with floppy & hard disks, CD-ROM and DVD, Memory sticks etc.

• Disks are divided into tracks and sectors. Each sector has an address.

• Simplest way of finding free space - search the disk until a suitable space can be found. Too slow for practical purposes, - better approach is to use an index file to keep track of the files and space on a disk.

• The use of an index means that some of the space on the disk is used to keep the index file, reducing the amount of space available for user files.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.2.3 File Management

• Index on a disk

• File Allocation Table (FAT). Set aside a fixed amount of space on the disk for the index, related to the number of files that the system can manage.

• E.g. a FAT12 system is capable of dealing with 212 or 4096 entries, uses little space on the disk. FAT12 is used for MS-DOS floppy disks and very small hard disks.

• FAT16 gives 216 entries - much larger hard disks.

• FAT32, which provides 232 entries for very large disks.

• Files allocated to clusters of sectors – reduces no of entries in FAT table

• A sector can contain either part of a file or 1 file. Lots of wasted space with many small files. A very large disk may have very large sectors and minimum file size may be 128K.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.2.3 Hierarchical Filing System

• A hierarchical filing system is shown.

• folder icons represent directories

• rectangle icons represent files.

• users can group related data into directories.

• It is possible to have many files of the same name existing in different directories.

• The file management system holds pathnames, providing unique identifiers for every file and directory that is created.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.2.4 Memory Management

• The operating system decides what programs and data are to be placed in memory.

• It also keeps track of what stage a program is at and this applies equally to the operating system's own memory space.

• If corrupted it could cause the computer to crash

7 – Computer Software decompressed by hardware or software, usually on the card. 7.2.4.1 Multitasking

• The simplest method of memory management is to have just one process in memory at a time. It uses all the memory there is. One problem is that a program needs to be entirely self-reliant and contain, for example, drivers for all I/O devices it needs to use. This method is no longer used.

• The technique simple PCs was to have the o/s and one user program at a time in memory. Basic Input Output System (BIOS) containing device drivers in ROM. This is called monoprogramming because there is only one user program in memory at a time. DOS works in this way.

• Windows offers multi-tasking. where several applications or tasks are (apparently) available at the same time, and the user can switch easily between one application and another.

• Similarly, Windows offers foreground/background processing. The foreground task can claim sole use of the processor but other background tasks can make use of the processor whenever the foreground task doesn’t need it.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.2.5 Input / Output

• The I/O system handles the interactions between the processor and all the devices that are part of the computer system. E.g. keyboard, the mouse, disk drives, modems and monitor.

• The I/O system also has to deal with external devices. E.g. printers and scanners.

• Peripherals work in different ways and at different speeds. All slower than the computer’s processor and memory.

• I/O system getting devices to work at their highest useful rates.

• Software can be thought of as organised in layers.

• lower layer deals directly with the hardware.

• consists of device drivers, software that handles one device or type of device.

• upper layer presents an interface to the user or application.

• The upper level is the I/O control system, which takes commands from the user checks them, and sends them to the appropriate part of the lower level. The lower level consists of device drivers.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.2.5 Input / Output - 2

• This diagram shows how these levels are related. An application starts things off by making a system call that demands action from the I/O system.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.2.5.1 Direct Memory Access

• A device controller usually has its own memory on board. This enables it to use Direct Memory Access (DMA) to get data to and from the computer’s memory.

• In DMA, the processor only sets up the transfer. Thereafter, some clock cycles are used by the I/O system for the data transfer. During these cycles, the processor is doing nothing but, during the other cycles, the processor can be getting on with its work: it doesn’t have to suspend the current process or spend time on context switches. On the whole, DMA saves time by saving the processor for other things than supervising data transfer.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.2.5.2 Virtual Devices

• A virtual device seems, to the user, like an actual device but is, in fact, a simulation maintained by the I/O system.

• E.G A Print spooler

• a virtual device, that takes data sent to the printer, stores data temporarily on disk, and prints the data when the system is ready to do so.

• Several print jobs can be sent to the printer at the same time and will be dealt with in an orderly manner.

• The jobs are placed in a print queue and serviced one by one.

• a user does not have to wait while the actual printing takes place but, having sent a print job to the spooler, can get on with other work on the computer.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.2.5.3 Buffering

• All I/O is relatively slow.

• Input by typing is painfully so. Screens and printers work a fair bit faster. I/O system needs to use the devices efficiently so as not to waste the CPU.

• A buffer is an area of memory set aside to help in the transfer of data between the computer and a device.

• A buffer provides a sort of barrier between parts of the computer system that work at different speeds.

• Buffering is used in sending blocks of data. Data is transferred into the buffer until it is full. Then the entire block is sent at once. This is more efficient than having the data trickle through the system.

• single buffering, the receiver has to wait for a block before it can do anything with it, and the transmitter of the data has to wait for the receiver to have processed the block before it can send another.

• With double buffering, two buffers are used and, as one is emptied, the other is being filled up. This makes more efficient use of both transmitter and receiver of the data.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.2.5.4 Device Drivers

• Device drivers are specialist software components that facilitate the operation of physical devices attached to the system. Without an appropriate device driver the system cannot communicate with a device, rendering the device useless.

• Each variety of device will have different hardware. For optimum performance, each device should be used with a device driver specifically written for use with that device. Some devices such as CD-ROM drives are currently so similar that it is possible to use a ’generic’ driver in conjunction with just about any CD-ROM.

• Modern operating systems offer the facility of adding device drivers to a system, at the same time that the device itself is added.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.2.5.5 Plug and Play

• Adding a new device to a system

• Historically a difficult and fiddly process. Often a new control card has to be plugged into the computer. Very often, switches on the device would have to be set by hand. Then the computer system would need a lot of tweaking before the operating system and the device could communicate in a satisfactory way.

• Plug and play

• tries to make installation more automatic.

• Standard agreed between the companies responsible for the different parts of a computer system.

• Windows automatically detects all plug and play devices on the system.

• The user has to supply very little information during installation and nothing at all from then on.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.2.6 Kernel

• The kernel

• central component of the system, upon which all of the other components depend.

• The kernel co-ordinates the activities of the system.

• typical operations of the kernel of single user system include:

• if a key is pressed, the device driver will notify the kernel which will pass the request to the user interface.

• If the user interface requests that a file be moved, the kernel will pass the request to the file system. Once the file system has finished, any messages from the file system will be sent to the user interface;

• if the user interface wishes to send a message to the user, the kernel will notify the device drivers for the output device (such as monitor or printer).

• In multi-tasking / multi-user systems the kernel will usually also be responsible for managing the processes as well.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.3 Utility Programs

• Utility programs enhance the operating system.

• Utility used to maintain a system

• Applications external to the use of the system.

• Examples

• 1 Disk partitioning tools

• 2 disk formatting programs

• 3 file compression utilities

• 4 disk defragmentation tools

• 5 virus checking tools

7 – Computer Software decompressed by hardware or software, usually on the card. 7.3.1 Disk Partitioning Tools

• Disk partitioning tools are used to divide one physical device into more than one logical device.

• Some operating systems require a disk to be partitioned before installation can take place, other systems provide the user with the facility to partition a disk for the purpose of convenience e.g user data.

• The disk partitioning tools provided with many operating systems can be regarded as a little primitive and unfriendly, but are usually sufficient for all but the most exotic of requirements.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.3.2 Disk Formatting Programs

• Disk formatting programs are used to prepare the surface of writeable media for use.

• The process often involves laying down ’markers’ for future use.

• Formatting a disk usually deletes any existing data on that disk, so caution should be exercised.

• File compression utilities

• File compression utilities are used to reduce the amount of space that a file takes up on disk. It will take a small amount of time to decompress a file, and also some time to compress a file before storage.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.3.3 Disk Defragmentation Tools

• Disk defragmentation tools are used to combat the problem of file fragmentation.

• Ideally,all of a file should be located in the same area of a disk, as this speeds up file accesses.

• Files are often broken up, with the various portions of the file dispersed across the disk.

• This usually happens when a number of small files are deleted from a disk, and the file system chooses to fill in the gaps left by the deleted files when the next file is saved.

• A defragmentation utility reorganises the way the files are laid out on the disk so that the components of a file are near to each other.

• Some operating systems are more prone to fragmentation than others, so not all systems will ship with a utility of this type.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.3.5 Anti-Virus Software

• Used to prevent the spread of viruses.

• Payload of a virus is the damage caused.

• Can reside in operating system and start up on boot-up making the machine run slowly and do strange things.

• May overwrite part of the O/S – machine useless.

• Anti-Virus software operates in different ways including

• 1. monitoring the size of files (if a program suddenly changes size this may indicate that a virus has attached to it);

• 2. monitoring the system for ’suspicious’ activities, such as trying to modify important files;

• 3. checking to see if a characteristic series of program instructions known as a signature appears in a file. The appearance of a recognised signature is an indication that a known virus is infecting a system.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.4 Graphic Applications

• Many applications use computers to generate images.

• The images can be an end in themselves, for example using a painting or a drawing package to generate a diagram or picture.

• These packages can vary in sophistication, from simple 2 dimensional object rendition, or elementary paintings to professional design work used by graphic illustrators.

• E.g. Computer Aided Design – suite of programs used to design kitchens, buildings etc. Also can cost up total job, produce bill of materials etc.

• E.g. Animations and simulations. Games etc rely on animations produced in drawing packages and imported into authoring environment. Also with “live action” used in TV and film industry.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.4.1 JPEG

• JPEG (Joint Photographic Experts Group) is a group of experts that develop and maintain standards for compression algorithms for computer image files.

• Any graphic image file created or converted using a JPEG standard is given this name.

• A JPEG file is created by choosing one of the set of compression algorithms available.

• For example, similar colours and minor changes in colour, need not be coded separately.

• JPEG processing makes image files small by removing detail. This is called a lossy compression. This will reduce the number of colours used to store the image and avoid unnecessary repetition of bit patterns.

• The highest quality results in the largest file size so a trade off has to be made between image quality and file size.

• JPEG is one of the image file formats supported on the WWW suffixed by ".jpg".

7 – Computer Software decompressed by hardware or software, usually on the card. 7.4.2 GIF

• The web also supports GIF (Graphics Interchange Format) images.

• These images are based on a compression algorithm that creates a codebook or dictionary of particular bit patterns. These in turn, are then substituted resulting in a smaller file.

• When decoding, the algorithm uncompresses the file to generate the original image.

• Significantly, GIFs preserve all the precise shapes in an image i.e. result in lossless compression.

• Restricted to 256 colours

7 – Computer Software decompressed by hardware or software, usually on the card. 7.4.3 TIFF

• TIFF (Tag Image File Format) is a common format for encoding bitmap images e.g. scanner images, and can be any resolution.

• TIFF files can be in any of several classes, including gray scale, colour palette, or RGB full colour, and can include files with JPEG and GIF formats.

• A TIFF file can be identified as a file with a ".tiff" or ".tif" suffix.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.5.1 Multimedia Software

• Multimedia

• combination of text, graphic artwork, sound, animation and video data types delivered to the user by computer or other electronic means.

• If the end user can control what is displayed, then it is called interactive multimedia.

• When data elements are linked to form a structure through which the user can navigate then it is called hypermedia. The World Wide web, e.g, is a hypermedia environment.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.4.1 Multimedia Software - 2

• Applications of multimedia

• Examples include the development of a World Wide web site, training and education programmes where information is presented for learning, or CD-ROM based encyclopaedias and games.

• Multimedia in the home includes anything from cookery to interior design. Although currently CD-ROM based, in future most multimedia software will reach the home via television sets with an in-built mechanism for user interaction.

• A pay-for play mechanism will allow you to download applications and entertainment packages as you require them.

• In public services, such as transport, museums, libraries and shopping centres, multimedia information kiosks designed to provide information and assistance at thet ouch of a button will become more prevalent.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.5.1.1 Common Features

• The software that allows you to put the different data elements together, build interactivity and navigation is called authorware.

• Authorware packages support the following basic authoring operations.

• ability to import media types;

• editing, particularly text and static images;

• programming - visually using icons and objects;

• scripting language;

• playback;

• delivery by building a run-time version of the project that does not need the full authoring software to execute.

• Examples of authoring software include: Macromedia Director, Apple’s Hypercard and Windows Toolbox.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.5.1.3 Interactive Presentations

• Images

• Simple graphs & charts from spreadsheet as well as colour images.

• Video

• Great deal of storage space & memory needed.

• If computer not powerful enough or bandwidth too low the video appears jerky.

• Sound

• Similar problems as with video so MP3 standard introduced.

• Animations

• From animated GIF files to full blown animated films. Great skill needed by animators.

7 – Computer Software decompressed by hardware or software, usually on the card. 7.5.2 Web Software

• The World Wide Web

• is a mass of global resources accessed anywhere in the world.

• Uses a Uniform Resource Locator (URL) and a browser.

• Websites can be built with many different tools but all contain pages in HTML

• HTML is interpreted by a browser .

• Hyperlinks are viewed by the browser as demands to fetch and display a new page.

• World Wide Web Consortium (WC3) founded in 1994

• Develop common protocols that promote evolution of WWW

• To ensure WWW interoperability

7 – Computer Software decompressed by hardware or software, usually on the card.7.5.3 Network Software

• All Stations should have the same O/S to use the network system and to share messages on the network system.

• Data Integrity – When an error is detected the Network O/S has to inform the network and the packet of data has to be re-transmitted.

• Multi-User Access – A user ID controls what the user has access to on the network.

• Encryption of Data – Typical networks hide data from the user, but a print server prints documents from many workstations and a fileserver often serves the whole network.

8 – Supporting Software decompressed by hardware or software, usually on the card.8.1 Introduction

• This unit on Supporting Software considers the factors affecting the deployment of software on a system.

• These include compatibility issues between the software and the intended hardware and operating system.

• Once up and running, the issue of protecting software and systems from viruses is then considered.

8 – Supporting Software decompressed by hardware or software, usually on the card.8.2 Application Software

• Application software supports user tasks.

• Reports, database, spreadsheet, artwork, web pages etc.

• GPPS of same genre often very similar.

• Need to match the correct package to the intended tasks.

• GPPS offer less functionality than specialised packages e.g. art facilities in Word nothing like in Photoshop.

• You should be familiar with

• General class of functions that different types of app packages support

• Data standards that facilitate the exchange of data between packages.

8 – Supporting Software decompressed by hardware or software, usually on the card.8.2.1 Application Requirements

• When buying software applications it is important to ensure that they will not conflict with your operating system or your hardware. If there are problems then your software will not run properly if at all! Each application software package includes details of the minimum system specification required to run the application. This will include:

• operating system;

• minimum RAM;

• minimum processor speed;

• minimum hard disk space;

• peripherals required.

8 – Supporting Software decompressed by hardware or software, usually on the card.8.2.2 Software Compatibility

• Whether you are installing or upgrading software, checking your hardware and software and O/S for compatibility is essential.

• The main factors to consider are:

• Memory requirements;

• Storage requirements;

• Operating System.

• It is important that checks are made to make sure you have the needed software, hardware, and operating system to run the application before installing.

8 – Supporting Software decompressed by hardware or software, usually on the card.8.2.3 – 8.2.5 Compatibility Requirements

• Memory requirements

• Software specifies minimum RAM to run, but may need more for enhanced performance..

• Storage Requirements

• Not only need enough disk space to install the s/w but take account of space needed for large data files (video, sound etc.)

• Operating System

• S/W usually upwards compatible for a while (W98 s/w may well work on XP) but not guaranteed.

• Device drivers needed may not be available any more.

• Large steps up not usually supported e.g. W95 on XP

8 – Supporting Software decompressed by hardware or software, usually on the card.8.3 Viruses

• A virus is program code that causes some undesirable and unexpected event to happen in a computer.

• Viruses are usually disguised as something innocent and are designed so that they automatically spread within or between computer systems.

• Viruses can enter a system as an attachment to an e-mail, download from the web, or from on a disk or CD.

• Some viruses take effect as soon as their code is executed.

• Others can wait until circumstances cause their code to be executed by the computer.

• Viruses can be quite harmful and erase data or close down a system.

8 – Supporting Software decompressed by hardware or software, usually on the card.8.3.1 Virus Types

• File Virus

• Attached to .exe or .com files or complete program or script attached to e.g. e-mail

• Resident in computer ready to cause havoc

• Boot Sector Virus

• These infect executable code found in boot sector on disks or the master boot record on hard disks.

• To infiltrate the boot sector, the virus is read while the system is running and then activated the next time the operating system is loaded.

• Macro Code Virus

• Macro viruses are fairly common viruses, but tend to do the least damage. Macro viruses infect applications and typically cause a sequence of actions within the application e.g. inserting unwanted words or phrases in a document.

8 – Supporting Software decompressed by hardware or software, usually on the card.8.3.1 Virus Code Actions

• Viruses use a combination of actions

• Replication

• Virus attaches itself to any type of file and replicates very quickly. Can replicate many times before activation

• Camouflage

• Takes on characteristics that detection software looks for. Good anti-virus s/w aware of this and makes more checks (check sum etc.).

• Watching

• Lies in wait and ambushes when codintion is met e.g. correct date.

• Delivery

• Used to be floppy disks, now e-mail. Virus waits for trigger to drop its payload.

8 – Supporting Software decompressed by hardware or software, usually on the card.8.3.3 Other Infections

• A worm is a self-replicating virus that does not alter any files but takes up residence in the computer’s active memory and duplicates itself. They only become noticeable once their replication consumes the memory to the extent that the system slows down or is unable to carry out particular tasks. Worms tend to use the parts of the computer’s operating system that is not seen by the user until it is too late.

• A Trojan horse is a program where harmful code is contained inside another code which can appear to be harmless. Once the apparently harmless code is in the computer, it releases the malicious code to do its damage.

8 – Supporting Software decompressed by hardware or software, usually on the card.8.4 Anti-Virus Techniques

• Checksum

• A checksum of key files is recorded. At run time checksum run again – if discrepancy then file could be infected.

• Virus Signatures

• Signature is unique pattern of bits within a virus. Once it is known anti-virus s/w uses it to identify and remove virus.

• Heuristic detection

• Approaches problem through past knowledge. Works on probability of file being infected e.g. finds file that checks for date.

• Memory Resident Monitoring

• Anti-virus s/w stays in memory at start-up and actively monitors the system. Delays in loading and execution of programs.

8 – Supporting Software decompressed by hardware or software, usually on the card.8.5 Virus Information Library

• Using a virus information library

• Literally thousands of viruses have been detected and catalogued using a Virus Information Library (VIL). One such VIL can be found at:

• http://vil.nai.com/vil/

• Using this or another source, find the details of at least one of each type of virus:

For each one, make a note of the following:

1. name:

2. type:

3. symptoms:

4. date discovered (find a recent one):

5. medium for infection (e.g. email, website):

6. cure (if any):

• file

• boot

• macro

• worm

• trojan