it.pptx
TRANSCRIPT
-
8/9/2019 IT.pptx
1/73
Computing anCommunication
Resources
-
8/9/2019 IT.pptx
2/73
Learn the components of computers.
Learn about personal computing devices.
Understand the implications of the rapid advances in information and
communication technologies.
Be familiar with input and output resources.
Recognize the dierences and advantages between storage media.
Learn the advantages of prewritten software.
Learn about dierent networking strategies between computers.
Understand the dierences between communications over the public
telephone system and networks.
Learn about network protocols.
istinguish between intranets! e"tranets! and the #nternet.
Learning $b%ectives
-
8/9/2019 IT.pptx
3/73
&ardware
'ersonal
Computing
evices
(oftware
Communicati
ons
)
-
8/9/2019 IT.pptx
4/73
C'U
*emory
(torage
d
*u
-
8/9/2019 IT.pptx
5/73
Controls calculationscomparisons of data,and controls the movof data from one lo
within the computanother
Central 'rocessing Unit
-
8/9/2019 IT.pptx
6/73
-
8/9/2019 IT.pptx
7/73
Processor CharacterisProcessor Speed is measured by the number of
cycles per second
Word Size is the measure of the size of the proceregisters! or how many bits may be moved with onthe processor
, bit is a single value of zero or one
, byte is made of eight bits and each byte can sto
single character
Processing power combines word size and proc
-
8/9/2019 IT.pptx
8/73
Memory located ocomputer’s main c
board called thmotherboard. at
memory is lost whepower to the computurned o!.
*emory -Ram or 'rimary (torag
-
8/9/2019 IT.pptx
9/73
-
8/9/2019 IT.pptx
10/73
-
8/9/2019 IT.pptx
11/73
-
8/9/2019 IT.pptx
12/73
Memory located on athat is not on the circuit board. Many t
this storage is remoand can be ta"en fro
computer to another.not lost when the pothe computer is turn
(torage -isk (pace or (econdary (torag
#i$ed
%em
St
-
8/9/2019 IT.pptx
13/73
-
8/9/2019 IT.pptx
14/73
-
8/9/2019 IT.pptx
15/73
& device that capturby a manual or elecmethod and transm
data to storage or m
#nput evices
-
8/9/2019 IT.pptx
16/73
-
8/9/2019 IT.pptx
17/73
& device that repreand'or transmits dat
the computer to the
$utput evices
-
8/9/2019 IT.pptx
18/73
-
8/9/2019 IT.pptx
19/73
& device that can peboth input and ou
functions.
*ultimedia
-
8/9/2019 IT.pptx
20/73
Personal
ComputingDevices
-
8/9/2019 IT.pptx
21/73
P l C ti D i
-
8/9/2019 IT.pptx
22/73
Personal Computing Devices
P l C ti D i
-
8/9/2019 IT.pptx
23/73
Personal Computing Devices
%earable
devices & !lor
'eo(eo %atc
T bl t H dh ld & P k t PC
-
8/9/2019 IT.pptx
24/73
Tablets, Handheld & Pocket PCs
Personal Computing devices are rapidly coming together as a sin )ost use a version o* )icroso*t word processing presentation an
spreadsheet so*tware
+nternet browser so*tware, calendars, email, and other so*tware
comes with these devices
Their key *eature is nobility# )ost are now manu*actured with wirenetwork capabilities as well
T bl t H dh ld & P k t PC
-
8/9/2019 IT.pptx
25/73
Tablets, Handheld & Pocket PCs
Figure 5.10 ($amples of PersonalComputing evices) *a+ Compa -abletPC-C/00 series1 *b+ iP&2 Poc"et PCh3430 Series1 *c+ hp 5ornada 6789andheld PC.
T bl t H dh ld & P k t PC
-
8/9/2019 IT.pptx
26/73
Tablets, Handheld & Pocket PCs
Tablet &
Air
Tablets Handheld & Pocket PCs
-
8/9/2019 IT.pptx
27/73
Tablets, Handheld & Pocket PCs
Tablet & (
'e-us .
Tablets Handheld & Pocket PCs
-
8/9/2019 IT.pptx
28/73
Tablets, Handheld & Pocket PCs
Tablet &
/amsung
(ala-y 'o
Pro 01#1
Tablets Handheld & Pocket PCs
-
8/9/2019 IT.pptx
29/73
Tablets, Handheld & Pocket PCs
Handheld
imate PD
Tablets Handheld & Pocket PCs
-
8/9/2019 IT.pptx
30/73
Tablets, Handheld & Pocket PCs
Pocket
!u2itsu
-
8/9/2019 IT.pptx
31/73
Personal Digital Assistants
• (enerally called PDAs, these devices are mainly
personal organi3ation tasks• Calendars, contact lists, and notes are *eature m
people associate with PDAs
• PDAs are pocket si3e and have battery lives that
days to months without being recharged
-
8/9/2019 IT.pptx
32/73
Personal Digital Assistants
-
8/9/2019 IT.pptx
33/73
Personal Digital Assistants
-
8/9/2019 IT.pptx
34/73
Personal Digital Assistants
-
8/9/2019 IT.pptx
35/73
Personal Digital Assistants
Cell Phones with Interactive
-
8/9/2019 IT.pptx
36/73
Messaging Capabilities
Cell phone manu*acturers are now building an ability to display temessages and small images on their phone4s display screens, bl
distinction between cell phones and PDAs
Current cell phones still only have a rudimentary computing capa
however, and their keypad and displays screens are limited as in
output devices
Cell phones acting computer terminals will likely be the ne-t step
evolution o* these devices
-
8/9/2019 IT.pptx
37/73
Home 'etworks
• Home computer networks have become popul
cable T5 companies and phone companies markmodems *or 6broadband7 +nternet connections us
cable modems or DS modems!
• %ireless security uses "ired e#uivalent privac
which encrypts the data trans*erred between thecomputer and wireless router#
-
8/9/2019 IT.pptx
38/73
Home 'etworks
%ireless outer
-
8/9/2019 IT.pptx
39/73
Home 'etworks
broadband
H C i / i
-
8/9/2019 IT.pptx
40/73
Home Computing /ecurity
• Three important aspects o* security
– perating system updates
– 5iruses
– spyware
H C ti / it
-
8/9/2019 IT.pptx
41/73
Home Computing /ecurity
• perating system pdates
– +mportant *or security and e**iciency
• Hackers are people who try to break into compu
systems in order to: – (ather in*ormation;
– Deny the owner access to his resources; – Delete *iles;
– Disrupt the use by the owner
H C ti / it
-
8/9/2019 IT.pptx
42/73
Home Computing /ecurity
• 'iruses are small computer programs that replic
inserting themselves into computer resources suprograms or *iles#
• "orms are sel*contained *iles or programs – Does not have to attach to program or *ile#
– Can delete, change *iles, send emails, and cause pr
H C ti / it
-
8/9/2019 IT.pptx
43/73
Home Computing /ecurity
• Denial(o)(service attack is when the user is den
access to the services o* the computer because overwhelmed with email#
A ti i / *t
-
8/9/2019 IT.pptx
44/73
Antivirus /o*tware
/
-
8/9/2019 IT.pptx
45/73
/pyware
-
8/9/2019 IT.pptx
46/73
programs for directing a compprocessing electronic data
01$ B,(#C 02'3(4
S:S-(M S;#-W&%(
-also called Operating System (oftperforms fundamental tasks that ausers of a particular computer re5u
-
8/9/2019 IT.pptx
47/73
-
8/9/2019 IT.pptx
48/73
&PP S;#-W&%(
< #s a program that enable the
computer to carry out speci6ctasks.
< #t can be obtained in a prewrittenform or produced in a customfashion for a particular user.
-
8/9/2019 IT.pptx
49/73
Prewritten Application /o*tware
aka o!theshelf software
'rewritten software has two very important bene6custom software4
< #t is available >;W.
< #t is C9(&P
-
8/9/2019 IT.pptx
50/73
Custom Application /o*tware
,utomated 0eller *achines -,0*s
(upermarket checkout scanners
-
8/9/2019 IT.pptx
51/73
The ole o* =ser !riendly /o*tware
< user friendly 7 computer software is simple and
intuitive to use
< means the application has been carefully engineaccommodate a wide range of users
< 1idespread use is the key.
User friendly application
-
8/9/2019 IT.pptx
52/73
User friendly applicationcharacteristics4< *enus! step8down lists of commands! and icons
-
8/9/2019 IT.pptx
53/73
53
T%%PH*+% S.ST%M• The speed of data transmission between computers
that takes place over public telephone systems is oft
slower than when computers are connected throughdedicated networks
• The wire making the connections is similar;yet mos
computer networks operate 100x faster than
connections routed through the public telephone
system because the protocols (the specification for
formatting data to be transferred were established f
voice grade communication when the !uality and
speed of communication lines did not need to be hig
Public Connections
-
8/9/2019 IT.pptx
54/73
5"
• #rotocols for the public telephone system were
established to meet the minimum criteria of voice
transmissions $ low grade analog transmissions $
and that !uality for voice communications is
significantly below the needs of computer data
transmission
• The theoretical limit for telephone modems is
%"kbps but because of technical re!uirements for
administering the transmission& telephone modem
have a top transmission speed of 5%kbps
• 'ata rates for other communications types are
listed in Table 55
-
8/9/2019 IT.pptx
55/73
55
Private >ines
-
8/9/2019 IT.pptx
56/73
5%
Private >ines • ) private (leased or dedicated) line is a
circuit that is always open to carry
communication traffic
• #rovided by the common carrier& the
telephone company& your organi*ation pays
a fixed monthly fee to use the line The
more use the line receives& the smaller thecost is per$unit of data transmitted
5irtual Private 'etwork 85P's
-
8/9/2019 IT.pptx
57/73
5+
8
• ,#-s give users the security and speed of a
private line along with the low cost of using
the .nternet
• Tunneling software establishes ,#-
through a set of intermediary locations that
host the data while its being transmitted
• Tunneling is conceptually similar to
establishing a private& secure circuit while
the data is being sent
C*MM+ICTI*+S ( +%T"*/0
-
8/9/2019 IT.pptx
58/73
5/
C*MM+ICTI*+S +%T"*/0
• The .nternational rgani*ation for tandardi*ation
wwwisoch& founded in 12"%& established the Ope
Systems Interconnection (OSI) standardarchitecture for network connections
• . consists of a seven$layer model (Table 5% and
the levels are detailed so that the exact function for
each layer of communication can be plainly defined
• Two or more levels may be used by a single piece o
communications hardware& while end$ to$ end
communications involve all layers of the model
• ommon networking devices are listed in Table 5+
http://www.iso.ch/http://www.iso.ch/
-
8/9/2019 IT.pptx
59/73
52
-
8/9/2019 IT.pptx
60/73
%0
Protocols *or Computer
C i ti
-
8/9/2019 IT.pptx
61/73
%1
Communication• omputers (4mainframes were initially designed
to share data with terminals that had no storage o
processor and to simply provide a means for
entering and displaying data from the computer
• .n response to the communications limitation&
.67 and others began developing
communications protocols• )n open protocol is a format whose specification
are open to the public and can be used at no cost
Proprietary Protocols
-
8/9/2019 IT.pptx
62/73
%8
• System Network Architecture (SNA)& established by .67 as a proprietary protocol in 12+"& re!uiresa main host computer that polls other computers
connected by the network in a se!uence& much liketaking turns
• .f a polled computer has data to send& the data istransferred& otherwise the next computer is polled
• .67 was the first to develop a peer-to-peer
protocol that allows each computer to act as itsown controller& called Token ing (9igure 518
• .n token ring& a logical token is passed betweencomputers The computer with the token is thecomputer is in control of communications
-
8/9/2019 IT.pptx
63/73
%3
thernet
-
8/9/2019 IT.pptx
64/73
%"
• :erox in cooperation with .ntel and 'igital
!uipment orporation& developed a differen
open protocol peer$to$peer communicationsarchitecture in the late 12+0s called !therne
• t use tokens
•.nstead& if a computer on the network wishes send data over the communications medium i
simply checks to see if data is currently being
transmitted .f not& it sends its message
Packets
-
8/9/2019 IT.pptx
65/73
%5
• 9or large data transfers& messages need to be
broken into smaller pieces so that the message
from one computer does not dominate thecommunications medium
• These smaller entities are called packets
• The most important packet$ switching protocol is
the one used by the .nternet& Transmission
"ontrol #rotocol$Internet #rotocol (T"#$I#)
• T#?.# handles packeti*ation and also decides
how the packets are best routed through the
network from source to destination computer
+nternet 'etwork Addresses
-
8/9/2019 IT.pptx
66/73
%%
• .n order to route packets through the network&each computer handling packets of data must have
a uni!ue address• This is called the I# address
• .# addresses are made up of a set of four 1$bytenumbers& each between 0 to 855& separated by
periods
• They are often written in dotted decimal notation&such as@ 18/%"3881/
• The left part of this number represents the numberof the network the computer is on& while the right
part is the host number of that specific computer
+%T"*/0 T.P%S
-
8/9/2019 IT.pptx
67/73
< Understanding the dierent types of networks is
important since plays a dierent role in a 6rm
-
8/9/2019 IT.pptx
68/73
< , local area networ" *+ is a group of comand other devices -such as printers that areconnected together by a common networking m
< L,)s typically %oin together computers that are physical pro"imity! such as in the same room orbuilding
< L,)s will cover a total distance of less than half and can transfer data in >?*bps to >9igabit persecond.
-
8/9/2019 IT.pptx
69/73
)etropolitan Area 'etworks and %ide Area 'e
-
8/9/2019 IT.pptx
70/73
< , Metropolitan &rea >etwor" *M&>+ is one tha physical distance limit of roughly A? miles and
typically links several buildings of an organizatiotogether
< Wide &rea >etwor"s *W&>s+ are used to conncomputers and other devices when the distance
constraints of L,)s and *,)s and uses the publitelephone system. or practical purposes! 1,)s been replaced by the #nternet
+nternet
h l f i i i h di b
-
8/9/2019 IT.pptx
71/73
-
8/9/2019 IT.pptx
72/73
C*MM+ICTI*+S
< Computing devices and communications devices
each incorporating features of the other into the
< (ome of the limits to the possibilities of convergerelate to battery life! communication speed and size of display and keyboard! and the user
-
8/9/2019 IT.pptx
73/73