it.pptx

Upload: jenica-diasmen-pabayo

Post on 01-Jun-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/9/2019 IT.pptx

    1/73

    Computing anCommunication

    Resources

  • 8/9/2019 IT.pptx

    2/73

    Learn the components of computers.

    Learn about personal computing devices.

    Understand the implications of the rapid advances in information and

    communication technologies.

    Be familiar with input and output resources.

    Recognize the dierences and advantages between storage media.

    Learn the advantages of prewritten software.

    Learn about dierent networking strategies between computers.

    Understand the dierences between communications over the public

    telephone system and networks.

    Learn about network protocols.

    istinguish between intranets! e"tranets! and the #nternet.

    Learning $b%ectives

  • 8/9/2019 IT.pptx

    3/73

    &ardware

    'ersonal

    Computing

    evices

    (oftware

    Communicati

    ons

    )

  • 8/9/2019 IT.pptx

    4/73

    C'U

    *emory

    (torage

    d

    *u

  • 8/9/2019 IT.pptx

    5/73

    Controls calculationscomparisons of data,and controls the movof data from one lo

    within the computanother

    Central 'rocessing Unit

  • 8/9/2019 IT.pptx

    6/73

  • 8/9/2019 IT.pptx

    7/73

    Processor CharacterisProcessor Speed is measured by the number of

    cycles per second

    Word Size is the measure of the size of the proceregisters! or how many bits may be moved with onthe processor

    , bit is a single value of zero or one

    , byte is made of eight bits and each byte can sto

    single character

    Processing power combines word size and proc

  • 8/9/2019 IT.pptx

    8/73

    Memory located ocomputer’s main c

    board called thmotherboard. at

    memory is lost whepower to the computurned o!.

    *emory -Ram or 'rimary (torag

  • 8/9/2019 IT.pptx

    9/73

  • 8/9/2019 IT.pptx

    10/73

  • 8/9/2019 IT.pptx

    11/73

  • 8/9/2019 IT.pptx

    12/73

    Memory located on athat is not on the circuit board. Many t

    this storage is remoand can be ta"en fro

    computer to another.not lost when the pothe computer is turn

    (torage -isk (pace or (econdary (torag

    #i$ed

    %em

    St

  • 8/9/2019 IT.pptx

    13/73

  • 8/9/2019 IT.pptx

    14/73

  • 8/9/2019 IT.pptx

    15/73

    & device that capturby a manual or elecmethod and transm

    data to storage or m

    #nput evices

  • 8/9/2019 IT.pptx

    16/73

  • 8/9/2019 IT.pptx

    17/73

    & device that repreand'or transmits dat

    the computer to the

    $utput evices

  • 8/9/2019 IT.pptx

    18/73

  • 8/9/2019 IT.pptx

    19/73

    & device that can peboth input and ou

    functions.

    *ultimedia

  • 8/9/2019 IT.pptx

    20/73

    Personal

    ComputingDevices

  • 8/9/2019 IT.pptx

    21/73

    P l C ti D i

  • 8/9/2019 IT.pptx

    22/73

    Personal Computing Devices

    P l C ti D i

  • 8/9/2019 IT.pptx

    23/73

    Personal Computing Devices

    %earable

    devices & !lor

    'eo(eo %atc

    T bl t H dh ld & P k t PC

  • 8/9/2019 IT.pptx

    24/73

    Tablets, Handheld & Pocket PCs

    Personal Computing devices are rapidly coming together as a sin )ost use a version o* )icroso*t word processing presentation an

    spreadsheet so*tware

    +nternet browser so*tware, calendars, email, and other so*tware

    comes with these devices

    Their key *eature is nobility# )ost are now manu*actured with wirenetwork capabilities as well

    T bl t H dh ld & P k t PC

  • 8/9/2019 IT.pptx

    25/73

    Tablets, Handheld & Pocket PCs

    Figure 5.10 ($amples of PersonalComputing evices) *a+ Compa -abletPC-C/00 series1 *b+ iP&2 Poc"et PCh3430 Series1 *c+ hp 5ornada 6789andheld PC.

    T bl t H dh ld & P k t PC

  • 8/9/2019 IT.pptx

    26/73

    Tablets, Handheld & Pocket PCs

    Tablet &

     Air 

    Tablets Handheld & Pocket PCs

  • 8/9/2019 IT.pptx

    27/73

    Tablets, Handheld & Pocket PCs

    Tablet & (

    'e-us .

    Tablets Handheld & Pocket PCs

  • 8/9/2019 IT.pptx

    28/73

    Tablets, Handheld & Pocket PCs

    Tablet &

    /amsung

    (ala-y 'o

    Pro 01#1

    Tablets Handheld & Pocket PCs

  • 8/9/2019 IT.pptx

    29/73

    Tablets, Handheld & Pocket PCs

    Handheld

    imate PD

    Tablets Handheld & Pocket PCs

  • 8/9/2019 IT.pptx

    30/73

    Tablets, Handheld & Pocket PCs

    Pocket

    !u2itsu

  • 8/9/2019 IT.pptx

    31/73

    Personal Digital Assistants

    • (enerally called PDAs, these devices are mainly

    personal organi3ation tasks• Calendars, contact lists, and notes are *eature m

    people associate with PDAs

    • PDAs are pocket si3e and have battery lives that

    days to months without being recharged

  • 8/9/2019 IT.pptx

    32/73

    Personal Digital Assistants

  • 8/9/2019 IT.pptx

    33/73

    Personal Digital Assistants

  • 8/9/2019 IT.pptx

    34/73

    Personal Digital Assistants

  • 8/9/2019 IT.pptx

    35/73

    Personal Digital Assistants

    Cell Phones with Interactive

  • 8/9/2019 IT.pptx

    36/73

    Messaging Capabilities

    Cell phone manu*acturers are now building an ability to display temessages and small images on their phone4s display screens, bl

    distinction between cell phones and PDAs

    Current cell phones still only have a rudimentary computing capa

    however, and their keypad and displays screens are limited as in

    output devices

    Cell phones acting computer terminals will likely be the ne-t step

    evolution o* these devices

  • 8/9/2019 IT.pptx

    37/73

    Home 'etworks

    • Home computer networks have become popul

    cable T5 companies and phone companies markmodems *or 6broadband7 +nternet connections us

    cable modems or  DS modems!

    • %ireless security uses "ired e#uivalent privac

    which encrypts the data trans*erred between thecomputer and wireless router#

  • 8/9/2019 IT.pptx

    38/73

    Home 'etworks

    %ireless outer 

  • 8/9/2019 IT.pptx

    39/73

    Home 'etworks

    broadband

    H C i / i

  • 8/9/2019 IT.pptx

    40/73

    Home Computing /ecurity

    • Three important aspects o* security

     – perating system updates

     – 5iruses

     – spyware

    H C ti / it

  • 8/9/2019 IT.pptx

    41/73

    Home Computing /ecurity

    • perating system pdates

     – +mportant *or security and e**iciency

    • Hackers are people who try to break into compu

    systems in order to: – (ather in*ormation;

     – Deny the owner access to his resources; – Delete *iles;

     – Disrupt the use by the owner 

    H C ti / it

  • 8/9/2019 IT.pptx

    42/73

    Home Computing /ecurity

    • 'iruses are small computer programs that replic

    inserting themselves into computer resources suprograms or *iles#

    • "orms are sel*contained *iles or programs – Does not have to attach to program or *ile#

     – Can delete, change *iles, send emails, and cause pr

    H C ti / it

  • 8/9/2019 IT.pptx

    43/73

    Home Computing /ecurity

    • Denial(o)(service attack is when the user is den

    access to the services o* the computer because overwhelmed with email#

    A ti i / *t

  • 8/9/2019 IT.pptx

    44/73

     Antivirus /o*tware

    /

  • 8/9/2019 IT.pptx

    45/73

    /pyware

  • 8/9/2019 IT.pptx

    46/73

    programs for directing a compprocessing electronic data

     01$ B,(#C 02'3(4

    S:S-(M S;#-W&%(

    -also called Operating System (oftperforms fundamental tasks that ausers of a particular computer re5u

  • 8/9/2019 IT.pptx

    47/73

  • 8/9/2019 IT.pptx

    48/73

    &PP S;#-W&%(

    < #s a program that enable the

    computer to carry out speci6ctasks.

    < #t can be obtained in a prewrittenform or produced in a customfashion for a particular user.

  • 8/9/2019 IT.pptx

    49/73

    Prewritten Application /o*tware 

    aka o!theshelf software 

    'rewritten software has two very important bene6custom software4

    < #t is available >;W.

    < #t is C9(&P

  • 8/9/2019 IT.pptx

    50/73

    Custom Application /o*tware 

    ,utomated 0eller *achines -,0*s

    (upermarket checkout scanners

  • 8/9/2019 IT.pptx

    51/73

    The ole o* =ser !riendly /o*tware 

    < user friendly 7 computer software is simple and

    intuitive to use

    < means the application has been carefully engineaccommodate a wide range of users

    < 1idespread use is the key.

    User friendly application

  • 8/9/2019 IT.pptx

    52/73

    User friendly applicationcharacteristics4< *enus! step8down lists of commands! and icons

  • 8/9/2019 IT.pptx

    53/73

    53

    T%%PH*+% S.ST%M• The speed of data transmission between computers

    that takes place over public telephone systems is oft

    slower than when computers are connected throughdedicated networks

    • The wire making the connections is similar;yet mos

    computer networks operate 100x faster than

    connections routed through the public telephone

    system because the protocols (the specification for

    formatting data to be transferred were established f

    voice grade communication when the !uality and

    speed of communication lines did not need to be hig

    Public Connections

  • 8/9/2019 IT.pptx

    54/73

    5"

    • #rotocols for the public telephone system were

    established to meet the minimum criteria of voice

    transmissions $ low grade analog transmissions $

    and that !uality for voice communications is

    significantly below the needs of computer data

    transmission

    • The theoretical limit for telephone modems is

    %"kbps but because of technical re!uirements for

    administering the transmission& telephone modem

    have a top transmission speed of 5%kbps

    • 'ata rates for other communications types are

    listed in Table 55

  • 8/9/2019 IT.pptx

    55/73

    55

    Private >ines

  • 8/9/2019 IT.pptx

    56/73

    5%

    Private >ines • ) private (leased or dedicated) line is a

    circuit that is always open to carry

    communication traffic

    • #rovided by the common carrier& the

    telephone company& your organi*ation pays

    a fixed monthly fee to use the line The

    more use the line receives& the smaller thecost is per$unit of data transmitted

    5irtual Private 'etwork 85P's

  • 8/9/2019 IT.pptx

    57/73

    5+

    8

    • ,#-s give users the security and speed of a

     private line along with the low cost of using

    the .nternet

    • Tunneling software establishes ,#-

    through a set of intermediary locations that

    host the data while its being transmitted

    • Tunneling is conceptually similar to

    establishing a private& secure circuit while

    the data is being sent

    C*MM+ICTI*+S ( +%T"*/0

  • 8/9/2019 IT.pptx

    58/73

    5/

    C*MM+ICTI*+S +%T"*/0

    • The .nternational rgani*ation for tandardi*ation

    wwwisoch& founded in 12"%& established the Ope

    Systems Interconnection (OSI) standardarchitecture for network connections

    • . consists of a seven$layer model (Table 5% and

    the levels are detailed so that the exact function for

    each layer of communication can be plainly defined

    • Two or more levels may be used by a single piece o

    communications hardware& while end$ to$ end

    communications involve all layers of the model

    • ommon networking devices are listed in Table 5+

    http://www.iso.ch/http://www.iso.ch/

  • 8/9/2019 IT.pptx

    59/73

    52

  • 8/9/2019 IT.pptx

    60/73

    %0

    Protocols *or Computer

    C i ti

  • 8/9/2019 IT.pptx

    61/73

    %1

    Communication• omputers (4mainframes were initially designed

    to share data with terminals that had no storage o

     processor and to simply provide a means for

    entering and displaying data from the computer 

    • .n response to the communications limitation&

    .67 and others began developing

    communications protocols• )n open protocol is a format whose specification

    are open to the public and can be used at no cost

    Proprietary Protocols

  • 8/9/2019 IT.pptx

    62/73

    %8

    • System Network Architecture (SNA)& established by .67 as a proprietary protocol in 12+"& re!uiresa main host computer that polls other computers

    connected by the network in a se!uence& much liketaking turns

    • .f a polled computer has data to send& the data istransferred& otherwise the next computer is polled

    • .67 was the first to develop a peer-to-peer 

    protocol that allows each computer to act as itsown controller& called Token ing (9igure 518

    • .n token ring& a logical token is passed betweencomputers The computer with the token is thecomputer is in control of communications

  • 8/9/2019 IT.pptx

    63/73

    %3

    thernet

  • 8/9/2019 IT.pptx

    64/73

    %"

    • :erox in cooperation with .ntel and 'igital

    !uipment orporation& developed a differen

    open protocol peer$to$peer communicationsarchitecture in the late 12+0s called !therne

    • t use tokens

    •.nstead& if a computer on the network wishes send data over the communications medium i

    simply checks to see if data is currently being

    transmitted .f not& it sends its message

    Packets

  • 8/9/2019 IT.pptx

    65/73

    %5

    • 9or large data transfers& messages need to be

     broken into smaller pieces so that the message

    from one computer does not dominate thecommunications medium

    • These smaller entities are called packets

    • The most important packet$ switching protocol is

    the one used by the .nternet& Transmission

    "ontrol #rotocol$Internet #rotocol (T"#$I#) 

    • T#?.# handles packeti*ation and also decides

    how the packets are best routed through the

    network from source to destination computer 

    +nternet 'etwork Addresses

  • 8/9/2019 IT.pptx

    66/73

    %%

    • .n order to route packets through the network&each computer handling packets of data must have

    a uni!ue address• This is called the I# address

    • .# addresses are made up of a set of four 1$bytenumbers& each between 0 to 855& separated by

     periods

    • They are often written in dotted decimal notation&such as@ 18/%"3881/

    • The left part of this number represents the numberof the network the computer is on& while the right

     part is the host number of that specific computer 

    +%T"*/0 T.P%S

  • 8/9/2019 IT.pptx

    67/73

    < Understanding the dierent types of networks is

    important since plays a dierent role in a 6rm

  • 8/9/2019 IT.pptx

    68/73

    < , local area networ"  *+ is a group of comand other devices -such as printers that areconnected together by a common networking m

    < L,)s typically %oin together computers that are physical pro"imity! such as in the same room orbuilding

    < L,)s will cover a total distance of less than half and can transfer data in >?*bps to >9igabit persecond.

  • 8/9/2019 IT.pptx

    69/73

    )etropolitan Area 'etworks and %ide Area 'e

  • 8/9/2019 IT.pptx

    70/73

    < , Metropolitan &rea >etwor" *M&>+ is one tha physical distance limit of roughly A? miles and

    typically links several buildings of an organizatiotogether

    < Wide &rea >etwor"s *W&>s+ are used to conncomputers and other devices when the distance

    constraints of L,)s and *,)s and uses the publitelephone system. or practical purposes! 1,)s been replaced by the #nternet

    +nternet 

    h l f i i i h di b

  • 8/9/2019 IT.pptx

    71/73

  • 8/9/2019 IT.pptx

    72/73

    C*MM+ICTI*+S

    < Computing devices and communications devices

    each incorporating features of the other into the

    < (ome of the limits to the possibilities of convergerelate to battery life! communication speed and size of display and keyboard! and the user

  • 8/9/2019 IT.pptx

    73/73