Upload
lawlietll
View
220
Download
0
Embed Size (px)
Citation preview
8/13/2019 Ece353 Notes
1/72
PC HARDWARE
AND SOFTWAREECE353
SHAHIDAH SADIMIN
MAHIZAN AB MANAN
SOLAHUDDIN YUSUF FADHLULLAH
8/13/2019 Ece353 Notes
2/72
2
Table of Contents
1 Computer operations and installation .................................................................................................. 4
1.1 Introduction to various hardware of a PC ..................................................................................... 5
1.1.1 Input devices ......................................................................................................................... 5
1.1.2 Output devices ...................................................................................................................... 5
1.1.3 System Unit ........................................................................................................................... 7
1.2 Installing PC hardware and software .......................................................................................... 17
1.2.1 Motherboard Installation .................................................................................................... 17
1.2.2 Install a processor ............................................................................................................... 18
1.2.3 Installing memory ............................................................................................................... 19
1.2.4 Hard Disk Drive (HDD) Installation ...................................................................................... 20
1.2.5 Floppy disk drive (FDD) installation .................................................................................... 25
1.2.6 CD-ROM/DVD-ROM Installation ......................................................................................... 27
1.2.7 Graphics card installation ................................................................................................... 29
2 Operating system fundamentals and administration ......................................................................... 31
2.1 Operating system components, functions and types ................................................................. 31
2.2 Understanding the characteristics of the Microsoft Windows operating systems .................... 32
2.3 System administration and security ........................................................................................... 34
2.3.1 System administration ........................................................................................................ 34
2.3.2 Security ............................................................................................................................... 34
2.4 Installation of operating system ................................................................................................. 37
3 PC Multimedia capabilities ............................................................................................................... 37
3.1 Sound .......................................................................................................................................... 37
3.2 Video ........................................................................................................................................... 38
3.3 Applications ................................................................................................................................. 38
3.4 Getting the Right Sound Card ..................................................................................................... 38
3.4.1 Speaker support .................................................................................................................. 38
3.4.2 Recording Quality ................................................................................................................ 38
3.5 Installation of various multimedia components and peripherals ............................................... 39
3.5.1 Installing Sound in a Window System ................................................................................. 39
3.5.2 Installing Sound Programs .................................................................................................. 39
8/13/2019 Ece353 Notes
3/72
3
3.6 Troubleshooting sound ............................................................................................................... 39
3.7 Videoconferencing ...................................................................................................................... 40
4 PC networking and network services .............................................................................................. 41
4.1 Introduction to networking ......................................................................................................... 41
4.1.1 Client/Server Network ........................................................................................................ 42
4.1.2 Peer-to-peer (P2P) .............................................................................................................. 43
4.2 TCP/IP Networking Fundamentals .............................................................................................. 44
4.2.1 IP addresses and domain name .......................................................................................... 44
4.2.2 IP Address Classes ............................................................................................................... 46
4.3 Network Security ........................................................................................................................ 48
4.3.1 Firewall ................................................................................................................................ 48
5 Server hardware and print sharing ..................................................................................................... 49
5.1 Networked server requirements, hardware and installation ..................................................... 49
5.1.1 Servers ................................................................................................................................. 49
5.2 Printer and print sharing ............................................................................................................. 49
5.2.1 Types of printers ................................................................................................................. 50
5.2.2 Create a perfect print .......................................................................................................... 52
5.2.3 Printer Sharing .................................................................................................................... 53
6 Maintenance and troubleshooting ..................................................................................................... 58
6.1 Hardware and software maintenance issues .............................................................................. 58
6.2 Hardware and software troubleshooting ................................................................................... 59
7 LABORATORYATTACHMENT ............................................................................................................... 66
8/13/2019 Ece353 Notes
4/72
4
1 Computer operations and installationA computer is a machine that manipulates data according to a list of instructions. The first modern
computers developed in the mid-20th century (19401945) were the size of a large room. Modern
computers based on tinyintegrated circuits are millions to billions of times more capable than the early
machines, and are smaller in size. In a computer system, there are connections between hardware andsoftware to make the system work.
Hardware
Hardware are physical pieces of the computer system. They include cables, printers, monitors,
keyboards, and so on.
Main Hardware Component Function
Central processing unit (CPU) - "The brain of a computer.
- It performs all the fundamental processing
in a computer.
Main memory - Also known as Random Access Memory(RAM).
- It is made up of small consecutive memory
locations where each has unique number
known as address.
- Data is stored in these locations. It is
usually volatile (i.e., if power is lost
information is lost as well).
Secondary memory devices - It is used to store data.
- Example: Hard disk, floppy disk, CD. They
are usually nonvolatile.
Input/Output - It is used to get data and output data.
- Examples: mouse, keyboard, monitor,
printer
Software
Software is a collection of programs and a program is a collection of instructions that the computer
hardware executes. Software is divided into two forms.
Software Function
Operating system (OS) software An operating system, or OS, is a software program
that enables the computer hardware to
communicate and operate with the computer
software.It enables users to start and stop an application,
copy data, delete data, translates keyboard strokes
into codes and perform lots of other job.
http://en.wikipedia.org/wiki/Machinehttp://en.wikipedia.org/wiki/Data_(computing)http://en.wikipedia.org/wiki/Code_(computer_programming)http://en.wikipedia.org/wiki/Integrated_circuithttp://en.wikipedia.org/wiki/Integrated_circuithttp://en.wikipedia.org/wiki/Code_(computer_programming)http://en.wikipedia.org/wiki/Data_(computing)http://en.wikipedia.org/wiki/Machine8/13/2019 Ece353 Notes
5/72
5
Examples of OS:
Windows XP
Apple Macintosh OS X
Linux
Applications software Software other than the operating system that get
work done.Examples of application software:
Word processors
Web browsers
Games
1.1 Introduction to various hardware of a PCA computer functions through four stages, which are input, processing, output and storage. All the
processing and storage takes place in the system unit. System unit is a device where all the other parts
are connected to.
All of the other parts of the PC that are connected to the system unit are called peripherals. Every
peripheral connects to the system unit through one of the many types of ports. The next section will
discuss about the input and output devices, the hardware that make up the system unit and the storage.
1.1.1 Input devices
Input devices are hardware or peripherals that send information to CPU. The most common input
devices are the keyboard and mouse.
The keyboard connects into PS/2 keyboard port or a USB port. Most keyboard and PS/2 ports are
coloured purple. The mouse uses either a USB port or light green coloured mini-DIN port.
1.1.2 Output devices
Output devices are hardware or peripherals used to get information out of a computer. Monitor, printer
and speaker are examples of output devices.
Monitor
A monitor connects to the video connector on the system unit.Figure 1.1 shows 15 pin female VGA port
that can be found on a video card, where the video connector connects to the system unit. Video cards
with two connectors can support two monitors. Some motherboards have on board VGA ports as shown
inFigure 1.3.There is no need for a video card if the motherboard has on board VGA port.
Figure 1.1: 15 pin female VGA port
8/13/2019 Ece353 Notes
6/72
6
Figure 1.2: A Video card
Figure 1.3: A motherboard with on board VGA port
LCD Monitor
A LCD monitor is more preferable due to their shape compared to CRT. It uses less than half the
electricity that a CRT uses. But it lacks the colour saturation and contrast of a CRT. Dead pixel is also one
problem in LCD. Dead Pixels are not repairable hence they stay there for good. Dead Pixels can be
spotted in the same place every time you switch on your system.
CRT Monitor
Screen flicker as shown inFigure 1.4 is one problem in CRT which can cause eye strain and headaches.
To minimize that problem, the screen refresh rate need to be adjusted higher. You should select a
refresh rate of at least 75 Hertz or as maximum as possible. Compared to LCD, LCDs offer high refresh
rates and thus less eye strain.
Figure 1.4: Screen Flicker
http://upload.wikimedia.org/wikipedia/commons/c/c5/Gpu-connections.pnghttp://upload.wikimedia.org/wikipedia/commons/c/c5/Gpu-connections.pnghttp://upload.wikimedia.org/wikipedia/commons/c/c5/Gpu-connections.png8/13/2019 Ece353 Notes
7/72
7
To adjust the screen flicker:
Go to control panel
Adjust the monitor setting- screen refresh rate
Adjust to the maximum frequency possible (to minimum 75 Hertz )
The colour quality in the display settings is measured in bits. The higher the bit, the broder the colour
array will be produced from red, green and blue light (RGB) when they are added together. 1 bit will
produce 21colours. 2 bits will produce 22 colours.
Bit Number of colours
1 2 (mono)
2 4
4 16
8 256
16 64K
32 16.7 million
Printer
Almost all printers nowadays use USB connector. Some better models even use FireWire connections.
Older models use parallel connector.
Speaker
Speaker is connected to the port on a soundcard. The port is usually green in color. This is the universal
color of ports connecting to the sound card.
Figure 1.5: Speaker chords and a sound card
1.1.3 System Unit
A system unit is encapsulated in a case. Inside the case are the motherboard, CPU, RAM, power supply
and hard disk drive. The floppy disk drive connects to a computer system via a ribbon cable. CD writer is
also a typical device that is attached to the system via cable.
8/13/2019 Ece353 Notes
8/72
8
Case
The case comes in various size depends on user requirement ranging from Desktop, Mini, Midi and Full
tower. A bigger case provides more bays for drives and peripherals than a smaller case. If the case is
really small and cramped then it will have less air flow, which means the case temperature would be
higher than having a larger case with good air flow. This could lead to an unstable PC. The type of case
to be chosen depends on the form factor. The form factor determines the physical size of the
motherboard and the location of components and ports. There are several form factors and the most
common is the Advanced Technology Extended (ATX) form factor. Balanced Technology extended (BTX)
is a new form factor which can provide better ventilation than ATX. However, BTX has not yet made
much of impact on the industry, and the BTX motherboards, cases and thermal units are still rare.
Figure 1.6 : ATX Midi Tower case
Figure 1.7 : Desktop, Mini-Tower, Midi-Tower, and Full Tower
Motherboard
A motherboard is a Printed Circuit Board (PCB) that connects the processor, memory and all
expansion cards together to assemble a PC. A motherboard contains a number of special sockets
that accept various PC components. The CPU and RAM, for example, are plugged directly into the
motherboard. Floppy drives, hard drives, CD drives are connected to the motherboard through short
8/13/2019 Ece353 Notes
9/72
9
cables. It also provides onboard connectors for a mouse, printer or keyboard. Popular motherboard
manufacturers include Intel, Asus, Abit, Biostar, Gigabyte, MSI and Shuttle.
A motherboard is defined by its form factor, chipset and components. Most motherboards made
nowadays are ATX. An ATX motherboard has the standard I/O (Input/Output) connectors such as
PS/2 ports, USB ports, parallel port, serial port, etc, built onto the motherboard. ATX motherboardfits into a standard ATX case.
Figure 1.8 : A standard ATX motherboard
Figure 1.8 shows a standard ATX motherboard. It comes with four different expansion slots, two PCI
buses and two PCI Express slots. The PCI slot is where cards such as sound card, modem, tv card would
be connected. The PCI Express slot is where a PCI-E graphics card would be connected. The other
connectors include Intel LGA 1366 Socket for processor, DDR3 Memory slots for RAM and ATX 2.0 24pin
power connector.
Chipset
Every motherboard has a chipset. The chipset determines the type of processor the motherboard
accepts, the type and capacity of RAM and what sort of internal and external devices the motherboard
supports. The chipset facilitates the communication between the CPU and other devices in the system.
Most chipsets are composed of two primary chips, the Northbridge and the Southbridge; terms used by
AMD based motherboards. Some chipset manufacturers named the Northbridge chip as Memory
Controller Hub (MCH) and Southbridge chip as I/O Controller Hub (ICH).
The AMD based motherboards have the Northbridge chip to work with video card. The Intel based
motherboards have the Northbridge chip to help the CPU work with RAM. Current Northbridge chips do
a lot of work that they produce a lot of heat, so they get their own heat sink and fan assembly. The
Southbridge handles some expansion devices and mass storage drives, such as hard drives. Most
8/13/2019 Ece353 Notes
10/72
10
Southbridge chips do not need extra cooling and there are usually left exposed on the motherboard.
Popular chipset manufacturers include Intel, AMD, NVIDIA and VIA.
Motherboard Components
a) Central Processing Unit (CPU)
The processor also known as CPU is the brain of a computer. It performs calculations on binary numbers
to make the computers work. The commands a CPU knows how to perform are dictated from instruction
sets. The faster the processor, the faster it will execute instructions and run the programs. CPU contains
several areas of internal memory known as registers. The register is a small set of data holding places
that are part of a computer processor. A register may hold a computer instruction, a storage address, or
any kind of data. Data and addresses are stored in registers while processing.
CPU Cache
Modern CPUs contain small amount of high speed Static RAM (SRAM) called cache. A cache is a block ofmemory for temporary storage of data likely to be used again. Once the data is stored in the cache, it
can be used in the future by accessing the cached copy rather than re-fetching or recomputing the
original data. Data and instructions are stored in cache while they await processing. This increases
performance, as the CPU can access data in cache more rapidly than data in motherboard RAM. As CPU
advanced, the capacity of the cache increased. CPU cache is also known as L1, L2 or L3 cache. The L1
cache performs faster than the other.
CPU is dependable on PC usage. The list below suggests the type of suitable processor for different
usage.
i) Word-processing, browsing the web or other basic tasks
A processor also determines what the system is going to be used for. For word-processing, browsing
the web or other basic tasks, it may be sufficient to use an Intel Celeron or AMD DURON. They are
low-end processors and are available at a very competitive price. The new CPUs are judged on the
number of core a processor can have, that is how many cores can fit in each CPU. Dual core for
example is a CPU with two layers of CPU core. The more cores it has the better it is. So having a 3
GHz single core CPU is not better than having 2.4 GHz Dual Core CPU.
ii) Spreadsheet, databases, graphics and moderate video game
If the system is going to be used for spreadsheet, databases, graphics and playing some moderate
video games then an Intel Core 2 Duo or an AMD Athlon 64 X2 processor should be considered.
Intel Core 2 Duo and Athlon 64 X2 are both Dual Core, which means they have two CPU cores in one
Chip. Each core works separately hence the CPU can process two intensive tasks at the same time
without slowing down the system. For example a user may be running a virus checker in the
background while playing games without slowing the system down. They are also 64 Bit and support
64 bit Operating System, which means they can execute 64 bit instructions and run 64 bit operating
systems.
8/13/2019 Ece353 Notes
11/72
11
iii) Advanced workstation for Video Editing, CAD or 3D games
If the system is going to be used as an advanced workstation for doing work such as Video Editing,
CAD, or playing the latest 3D video games or other CPU intensive tasks then a higher end quad-core
or multi-core processor such as AMD Phenom X4, Intel Core 2 Quad or Intel i7 would be needed.
AMD Phenom X4 and Intel Core 2 Quad has four cores. Intel i7 has 4 cores but each core can processtwo threads so your operating system will treat it as 8 different processors. All of these modern
processors are 64 bit. They are all very fast and are capable of handling most of computing needs.
Figure 1.9 : A processor manufactured by Intel
iv) Server or power-user
Intel Xeon and AMD Opteron are high-end processors aimed at the serve or power-user market.
They are intended to be used in a PC with multiple processors.
Difference between Intel Dual Core and Core 2 Duo:
Intel Core 2 Duo works faster than Intel Dual Core because:
Intel Core 2 Duo processors:
have two cores in one package, but each core has one cache memory. This makes it work faster than
Dual Core.
Intel Dual Core processors:
have two cores in one package, but they are using one cache memory for the two cores.
8/13/2019 Ece353 Notes
12/72
12
b) Random access memory (RAM)
Figure 1.10 : RAM stick
RAM stores data and programs currently being used by the CPU. The amount of data or programs it can
store is measured in units called bytes. 1 byte consists of 8 bits.
RAM modules are either single- sided or double- sided. Single sided sticks have chips only on one side,
whereas both-sided have chips on both sides. Most RAM is single-sided.
RAM speed must match or exceed the speed of the system. For example, PC66 RAM can only be used on
a motherboard running at or below 66MHz. A motherboard with a frontside bus of 100MHz needs at
least PC100 RAM.
RAM comes in many forms. The older systems use SDRAM, while the current systems use DDR2 or DDR3
SDRAM (Double Data Rate Synchronous Dynamic Random Access Memory) which is faster than the old
SDRAM and use less power.
The type of RAM to be chosen depends on the compatibility with the motherboard. For example for an
Intel motherboard with Intel Core 2 Duo CPU, then it will support Dual-channel DDR2 800, 667 or 533.It
is recommended to get the highest memory speed the motherboard can support in order to get the
maximum performance. For the latest Intel i7 motherboard then a triple-channel DDR3 1600, 1333, or
1066 will be needed.
System RAM Recomendations
Operating System Minimum Solid Performance Power User
Windows 2000 32 MB 256 MB 512 MB
Windows XP 64 MB 512 MB 1 GB
Windows Vista 512 MB 1 GB 2 GB
8/13/2019 Ece353 Notes
13/72
13
Latency
RAM responds to electrical signals at varying rates. There is a slight delay when the memory controller
starts to grab a line of memory. This delay in RAMs response is called latency.RAM with a lower latency
is faster than RAM with higher latency. For example DDR 3200- CL2 is faster than DDR 3200 - CL3.
c) Power Supply Unit
A power supply unit (PSU) is the component that supplies power to a computer. More specifically, a
power supply unit is typically designed to convert 220-240 V AC power from the mains to usable low-
voltage 3.3V12 V DC power for the internal components of the computer.
d) Floppy Disk Drive
Floppy Disk Drive (FDD) is extinct due to the development of modern type high density data storage like
USB Flash drives. It is used to access floppy disks. Floppy drives are connected to the motherboard
through a ribbon cable. Floppy disk is ideal for storing small files and documents, creating boot disks up
to 1.44 Mb only.
Figure 1.11: A floppy disk
e) Hard Disk Drive
Hard disk drive (HDD) stores programs and data that are not currently being used by the CPU,including
the operating system, applications, user files and documents. It is a non-volatile storage, which means
the contents of the HDD is not lost if the PC is switched off.
It stores much more data than a typical PCs RAM, which is up to hundred of gigabytes. An average PC
has one hard drive, but special PCs that need to store large amount of data, such as a large corporations
main file storage can have 8 to 16 hard drives. Most type of hard drive fall under the AT Attachment
(ATA) standard. Two types of ATA hard drive:
i) Parallel ATA (PATA)
Older type of hard drive.
Use a ribbon cable for its connection.
8/13/2019 Ece353 Notes
14/72
14
Figure 1.12: PATA Cable and Port
ii) Serial ATA (SATA)
Modern type of hard drive.
Use a narrow cable.
8/13/2019 Ece353 Notes
15/72
15
Figure 1.13: SATA Cable and Port
Most motherboards have connection for both type of hard drives.The major HDD manufacturers are
IBM, Seagate, Maxtor, Western Digital and Fujitsu.
Figure 1.14 : IBM ATA100 drive
f) CD WriterCD Writer is a very good option for a backup device. It allows user to backup the contents of HDD onto a
CD-R, CD-RW & DVD-R disc. It also allows user to backup the existing application CD's. As blank CD's are
very cheap, it is an affordable backup device.
Like all other PC hardware a CD Writer comes in various speeds. A 32 speed drive can write a full 650MB
CD in around 4 mins and a 52 speed drive can write it in around 3 mins and so on.
Figure 1.15 : CD Writer
Difference between CD-R and CD-RW
CD-R:
CD-R will only allows user to write data onto it once.
CD-RW:
CD-RW disc allow data to be written, rewritten and erased.
8/13/2019 Ece353 Notes
16/72
16
How data is stored on a CD
i) On a blank CD-R disc, the dye layer is completely translucent, so all light reflects.
ii) The write laser of a CD burner is used to burn the dye layer.
iii) To record the data, the burner simply turns the laser writer on and off in synch with the pattern
of 1s and 0s od the data to be stored.
iv) The write laser darkens the material forming non-reflecting spot to encode a 0 and leaves the
unburnt area translucent to encode a 1.
g) External Connectors
Below are some external connectors that can be found on the motherboard.
Plugs, Ports, Jacks and connectors
Mini-DIN connectors
USB connectors
FireWire connectors
HDMI connectors
DB connectors
RJ connectors
Audio connectors
High-definition Multimedia Interface (HDMI) connector
Figure 1.16: HDMI connector
HDMI is a Digital audio/video connector for transmission of digital data. The transmission of digital audio
and video is accomplished through one single HDMI cable. Whereas VGA connectors are used solely to
carry analog video signals. HDMI is a cable simplification compared to older technologies. It allows the
transmission of uncompressed data. Hence, there will be no deterioration of video quality due to
"Digital -> Analogue -> Digital" conversions that were necessary using older interfaces to connect a DVD
player to a Digital TV set for example.
For PCs that will be used solely as a computer to a standard computer monitor, it is not necessary to
look for one with an HDMI connector. Those looking to use the computer in a home theater
environment with a high definition TV set can greatly benefit from the single cable that can carry both
the audio and the video.
http://en.wikipedia.org/wiki/File:HDMI.jpg8/13/2019 Ece353 Notes
17/72
17
HDMI can be found on many common devices such as DVD players, HD DVD players, Blu-ray Disc
players, Camcorders, Gaming Consoles (PlayStation 3) & Digital Cameras.
1.2 Installing PC hardware and software
Before unpacking all components from the original anti-static bags, put on the anti-static wrist strap,
which will discharge yourself. It is important to discharge yourself to avoid damaging your components
by anti-static shock by touching the components. If you do not have an anti-static wrist strap you can
discharge yourself by touching the metal edges of your PC case, although this is not recommended.
Have all the mounting screws that come with the motherboard and a screw driver handy as you would
need them during the later stages.
1.2.1 Motherboard Installation
The first thing you should do is unpack your ATX case. Take off the cover of your ATX case so that you
can access the inside. Place the ATX case on a desk so that you are looking down towards the open case.
Your case should come with motherboard mounting screws.
Now place your motherboard on top of the mounting screw holes. Make sure your ATX devices on the
motherboard such as PS/2 and parallel port are facing towards ATX back plate cut out. Gently push your
motherboard towards the cut out, every devices should fit easily into its corresponding cut out, as
shown below.
Figure 1.17: External ports must face towards back plate cut out.
The screw holes on your motherboard should align with the screw holes on your case. Place
your screws that came with the case into the appropriate holes and gently screw it on using a
screw driver.
The motherboard is now securely mounted to the case. You can now place the ATX power
connector to the motherboard. Your ATX case should come with a power supply unit (PSU) and
should already be mounted to the case. The ATX power connector is shown on image below.
8/13/2019 Ece353 Notes
18/72
18
Place the ATX power connector on top of the power socket on the motherboard. Push down the power
connector and it should clip onto the socket.
1.2.2 Install a processorLocate the processor socket on your motherboard. Figure 1.18 shows a socket 370 (Intel PIII 866
processor). The installation would be slightly different if you have a different processor i.e. Slot1 PIII
CPU, P4 Socket 478, Core 2 Duo Socket 775, AMD Slot A / Socket A, Socket AM2 CPU etc.
Raise the brown lever on the socket and slowly put the processor in place. You have to make sure the
pin 1 of your CPU goes into the pin 1 of your CPU socket otherwise the CPU would not get into the
socket. Do not try to force it in. It will go in gently if you fit it correctly. Now close the brown lever which
will securely hold the CPU in place.
Figure 1.18: Processor socket
Make sure the fan for the CPU has the correct speed, otherwise your CPU will get overheat and behave
abnormally or could be damaged. Take off the plastic cover from the bottom of the CPU fan that covers
the heat transfer pad. Now place the CPU fan on top the CPU and push down the metal clips on the fan
so that it clips onto the CPU socket.
8/13/2019 Ece353 Notes
19/72
19
Figure 1.19: A CPU fan placed on top of processor socket
CPU fan has a power connector which needs to be connected to CPU fan power socket on your
motherboard as shown inFigure 1.19.
Finally, you have to specify what frequency (speed) your CPU is running at. This can be done using
jumper settings, or on some modern motherboard it can be done in the BIOS, or your motherboard may
have automatic detection for your CPU frequency. Please refer to your motherboard manual for more
details. For example, the motherboard Abit BX133 has a dip-stick jumper setting and it can be setup in
the BIOS. The jumper is set to default, since the BIOS will be used to specify the CPU frequency. The CPU
runs at the bus speed of 133Mhz therefore the setting to use is 133 * 6.5(multiplier) under the BIOS,
which will the run the CPU at 866Mhz.
1.2.3 Installing memory
Installing memory is quite simple. This is a guide to install a SDRAM. Find the SDRAM banks on the
motherboard; they should look similar to the banks below. Notice the memory banks have a white clip
on each side. Make sure you release the clips so it bends to each side.
Figure 1.20: Gently fit the SDRAM into the memory bank.
Hold each corner of the SDRAM placing it on top of the bank 1. You will notice that the SDRAM has a cut
at the bottom side, it is there to prevent the memory going in the wrong way round. If you are holding
8/13/2019 Ece353 Notes
20/72
20
the SDRAM the incorrect way you will not be able to insert it. Gently push down the SDRAM and it
should clip on to the memory bank. The two white clips will now become straight holding each corner of
the memory. If you have more than one SDRAM perform same steps as above but placing the SDRAM in
memory bank 2 and so on.
1.2.4 Hard Disk Drive (HDD) Installation
Install IDE Hard Drive
The rear side of an IDE hard drive should look similar to the image below.
Figure 1.21: IDE HDD
The IDE/ATA connector is on the left hand side which consists of many pins. Next to the IDE connector is
the jumper setting for the drive. The HDD jumper should be set to Master, which is the default setting
for a new HDD. If there are two HDDs, set the second HDD to slave. Any other device sharing the sameIDE cable should be set to Slave. Different HDD has different jumper settings; .Figure 1.22 shows the
example of jumper connection for Seagate ATA drives. Please refer to your HDD manual for more
information. On the right hand side, next to the jumpers is the power connector.
8/13/2019 Ece353 Notes
21/72
21
Figure 1.22: Connection for Seagate ATA drives
Figure 1.23 andFigure 1.25 shows how an ATA 66 , ATA 33 and a power cable looks like. The ATA 66
cable which is also known as UDMA 66 cable is an advanced IDE cable, which offers higher performance
and data integrity than the standard IDE cable. ATA 66 cable consists of 80 conductors cable whereas
the standard IDE cable such as ATA 33 consists of 40 conductors cable.
8/13/2019 Ece353 Notes
22/72
22
Figure 1.23: ATA Cables
Figure 1.24: Connection of ULTRA ATA cable
Figure 1.25: Power Cable
Place your hard drive into the HDD mounting slot of your case, make sure the IDE/ATA connector is
facing outwards. Screw the HDD to the case using screws provided with the HDD or the ATX case.
8/13/2019 Ece353 Notes
23/72
23
Figure 1.26: Hard Drive is placed into the HDD mounting slot
Insert the ATA 66 cable into the ATA connector of the HDD. Make sure the pin 1 on the cable is
connected to pin 1 on the HDD connector. Pin 1 is the red or pink strip on the edge of an ATAcable.
Most new IDE/ATA cables are designed so that it will only go in one way which will correspond to pin 1.
Figure 1.27 : Inserting ATA 66 cable into the ATA connector of the HDD
Push the power cable into the power connector as shown below. The power cable is designed to go in
one way, so there should not be any problems.
Figure 1.28: Push the power cable into the power connector
8/13/2019 Ece353 Notes
24/72
24
Connect the other end of the ATA 66 cable to the primary ATA socket of the motherboard as shown
below. Make sure the pin 1 on the cable connects to the pin 1 on the ATA socket.
Figure 1.29: Connect the other end of the ATA 66 cable to the primary ATA socket of the motherboard
Install SATA Hard Drive
Installing SATA HDD is easier than installing IDE/PATA HDD. There is no Master-Slave relationship. Only
SATA HDD, SATA interface cable and power adapter are needed for the installation. There is no need for
jumper setting.Figure 1.30 shows the difference of cabling between PATA and SATA HDD.
Figure 1.30: Different cabling connection between IDE/PATA (above) and SATA HDD (below)
The magnetic space on the hard drive is divided into small storage areas. These storage areas are knownas 'sectors', however for efficiency purposes the sectors can be grouped together into 'clusters'. A sector
is the smallest addressable unit of a hard disk. A cluster is a fixed number of contiguous sectors (but not
necessarily physically contiguous).
8/13/2019 Ece353 Notes
25/72
25
If you save a very small file to your computer it will all fit within 1 storage cluster on the hard drive. If
you save a very large file it may fill up many clusters, that is, as many clusters as it takes to hold all the
content of the file.
Hard Drive Partitioning;
i) To organize a hard disk drive.
ii) Enable a single HDD to store more than one OS.
Hard Drive Formatting:
After a HDD has been partitioned, it must be formatted to enable it to hold data.
1.2.5 Floppy disk drive (FDD) installation
The rear side of a floppy drive looks similar to the one shown inFigure 1.31.
Figure 1.31: Rear side of a floppy drive
The black connector on the left hand side is the floppy disk connector. It is different from the IDE
connector and uses a different cable. The small white connector on the right hand side is the power
connector for the floppy drive.Figure 1.32 andFigure 1.33shows what a floppy drive cable and floppy
drive power connector looks like.
8/13/2019 Ece353 Notes
26/72
26
Figure 1.32: Floppy drive cable
Figure 1.33: Floppy drive power cable
Place the floppy drive into the FDD mounting slot as shown. Screw the drive securely into place.
Figure 1.34: Placing the floppy drive into FDD mounting slot
Insert the floppy drive cable into the floppy drive connector. Make sure the pin 1 on the cable connects
to the pin 1 on the floppy drive connector. As you already know by now that pin 1 is the red or pink strip
on the edge of the floppy drive cable. Most floppy drive cables are designed so that it will only go in on
way.
8/13/2019 Ece353 Notes
27/72
27
Figure 1.35: Connected cables
Push the floppy drive power cable to the power connector. This will only go in on way.
Figure 1.36: Connecting the other end of floppy drive cable to floppy drive connector on the motherboard
Finally connect the other end of the floppy drive cable to floppy drive connector on the motherboard.
Make sure pin 1 on the cable connects to pin 1 on the connector.
1.2.6 CD-ROM/DVD-ROM Installation
The rear side of a CD / DVD-ROM should look similar to image shown onFigure 1.37.
Figure 1.37: The rear side of a CD/DVD-ROM
On the right hand side you have the power connector. Next to power connector you have the IDE
connector. On the left hand side near the IDE connector you have the jumper settings for the DVD-ROM.
8/13/2019 Ece353 Notes
28/72
28
The jumper is set to Master by default. However if the IDE cable is shared with another device like HDD,
then you would have to set the jumper to Slave, as your HDD would be set to Master.
Next to the jumpers you have the CD Audio-Out socket. One side of your audio cable connects to this
socket and other side connects to the sound card cd-in socket. This would allow you to listen to Audio
CD's on your computer.
Figure 1.38: Mounting the CD/DVD-ROM drive into its mounting socket
Mount your CD/DVD-ROM drive into its mounting slot. Use the supplied screws to screw the drive into
position.
Connect the IDE cable to the drives IDE connector. Make sure the pin 1 on the cable is connected to pin
1 on the drives IDE connector. Pin 1 is the red or pink strip on the edge of an IDE cable. Connect the
other end of the IDE cable to the IDE socket on your motherboard as shown inFigure 1.39.Again, make
sure you connect the cable to pin 1. The IDE socket could be your primary or secondary socket
depending which socket you choose. If your HDD is on the primary IDE socket and your secondary IDEsocket is free, then it is better to use your secondary IDE socket for the CD/DVD-ROM.
Figure 1.39: Connecting the other end of the IDE cable to the IDE socket on your motherboard
Finally connect the power cable to power connector.Connect one end of the audio cable to the CDAudio-Out socket and the other end to the sound card (audio card) cd-in socket as shown onFigure 1.40.
8/13/2019 Ece353 Notes
29/72
29
Figure 1.40: Connecting the power cable and the audio cable
1.2.7 Graphics card installation
Most modern graphics cards are AGP based and connects to the AGP bus of the motherboard. An AGP
bus (slot) looks like the following image. The brown slot is where you connect your AGP graphics card.
Figure 1.41: Graphics card slot
Place your AGP card on top of the slot and gently push it down. The card should firmly sit into position.
Figure 1.42: Placing the graphics card into the slot
All you need to do now is to screw the metal plate on the front of the card to the ATX case. Use the
screws supplied with case and screw the card to the case.
8/13/2019 Ece353 Notes
30/72
30
Figure 1.43: Screwing the graphics card to the case
8/13/2019 Ece353 Notes
31/72
31
2 Operating system fundamentals and administration
2.1 Operating system components, functions and types
Operating System Components
The operating system comprises a set of software packages that can be used to manage interactionswith the hardware. The following elements are generally included in this set of software:
Component Function
Kernel Represents the operating system's basic
functions such as management of memory,
processes, files, main inputs/outputs and
communication functionalities.
Shell Allows communication with the operating system
via a control language.
Lets the user to control the peripherals withoutknowing the characteristics of the hardware
used, management of physical addresses, etc.
File System Allows files to be recorded in a tree structure.
Operating System Functions
An operating system performs four basic functions:
i. Communicate with hardware
OS provides a method for other program to communicate with the hardware of the PC.
ii. Provide user interfaceProvide a visual representation of the computer of the computer on the monitor that makes
sense to the people using the computer.
iii. Provide a structure for accessing applications.
User can run, use and shut down the programs of their choice via the user interface.
iv. Enable user to manipulate programs and data.
User can add, move and delete the installed programs and data.
Operating system accomplish all tasks above with two user interfaces; text based and graphical. A text-
based or command line interface (CLI), enable user to type commands directly to the OS, the OS will
responds to the commands. Whereas, Graphical User Interface (GUI) draws pictures on the screen with
which user interact using a mouse or similar device.
Operating System Types
Below is a basic list of the different types of operating systems. Many computer OS will fall into more
than one of the below categories.
8/13/2019 Ece353 Notes
32/72
32
i. Multi-user
A multi-user operating system allows multiple users to use the same computer at the same time and/or
different times.
ii. MultiprocessingAn operating system that is capable of supporting and utilizing more than one computer processor.
iii. Multitasking /Multiprogramming
An operating system that is capable of allowing multiple software processors to run at the same time.
For example, a user can open MS Word and browsing at the same time.
iv.Multithreading /Time-sharingA program that is capable of doing multiple things simultaneously. A browser, for example, might want
to download one file in one window, while it is trying to upload another and print some other file. This
ability of a program to do multiple things simultaneously is implemented through threads.
2.2 Understanding the characteristics of the Microsoft Windows operating systemsWindows is the trade name for a very large family of Microsoft operating systems created over 20 years
ago. Windows as a full-blown OS really got its start with Windows NT 3.1 in 1993. It came in two
versions, Workstation and Advanced Server. Windows NT went through a number of upgrades. The only
problem with NT was that it had high hardware requirements and did not get along well with the older
version of Windows.
Windows Versions
Windows 9x includes windows 95, 98 and Me. Windows NT, 2000, XP and Vista are all based on
Windows NT and offer substantial benefits over Windows 9x editions.
Windows 2000 comes in two basic varieties, Professional and Server. Professional was aimed at the
business workstation user while Server was meant for Servers. There are several different versions of
Windows 2000 Server.
Windows XP comes as a workstation OS only. There is no XP Server. The two main version of XP are XP
Home designed for home users, and XP Professional designed for business environments and power
users.
Windows 2003 comes only in a server version.
The newest version of Windows is Windows Vista. It comes in five varieties, each targeting at different
users.
8/13/2019 Ece353 Notes
33/72
33
Characteristics of Windows 2000/XP
Windows 2000 was basically Windows NT with several improvements, such as support for plug and play
and an improved interface. Windows XP is based on Windows NT/2000 and support NTFS file system.
Windows 2000/XP takes an object oriented approach, separating the OS into three distinct parts: the
drives, the NT Executives and the subsystems.
Microsoft designed and optimized every aspect of Windows 2000/XP for multiuser, networked
environments. This is most evident in the file system 2000 and XP use a powerful and robust file
system called NT- File System (NTFS).
NTFS offers the following excellent features:
Long filenames
Redundancy
Backward compatibility
Recoverability
Security
NTFS filenames can be up to 255 characters. NTFS has powerful security functions. The three major
features of NTFS security are accounts, groups and permissions. Every Windows 2000/XP has a super
account called administrator that has access to everything.
Improvement of Windows Vista over Windows XP
a) Windows Aero (Graphical Interface)
Windows Vista features a totally different look for its interfacea cleaner, transparent look with
impressive graphic quality.
b) Windows Sidebar
Windows Vista offers a panel (transparent, if you're using Windows Aero) that displays your selection of
Windows gadgetsmini-applications that perform useful functions, such as a clock, a calendar, a
Microsoft Office Outlook inbox representation, and currency exchange.
c) Microsoft Windows Media Player 11
Media Player 11 has a new graphics-oriented interface.
d) Windows Search
One of the most helpful new features in Windows Vista, you can now search for files or applicationsfrom almost anywhere. Unlike in Windows XP, with Window Search, you can simply type a few letters of
your search request, and the results appear on the flya helpful feature when looking for a file or
application from the Start menu.
8/13/2019 Ece353 Notes
34/72
34
2.3 System administration and security
2.3.1 System administration
Control over local resources must be established to create a secure computing environment. Access
control is about physical security, authentication, the file system, users and groups and security policies.
Physical security
The first order of security is to block access to physical hardware from people who should not have
access.
Authentication
i) Something you know:
The type of authentication that falls into this category is the password. This is not a good type of
authentication since password can be guessed.
ii) Something you have:
Using Smart Card can reduce the risk of someone guessing a password. But the cost is high and the risk
also can arise when the card is stolen.
iii) Something you are:
Using Biometrics is the type of authentication that make use of our physical traits. It may be using the
fingerprints, retina identification, voice or facial geometry. Again, this type of authentication is quite
costly.
File system
On a Windows machine with multiple users, NT file system (NTFS) must be used.
Users and Groups
Windows uses user accounts and groups as the bedrock of access control. A user account gets assigned
to a group such as User or Administrator, gets certain permission and password.
2.3.2 Security
Malware includes viruses, worms, Trojan Horses and spyware.
A virus is a part of malicious software that gets passed from computer to computer and is designed toattach itself to another program on a computer, leaving infections as it travels. Some viruses cause only
mildly annoying effects while others can damage your hardware, software, or files. Almost all viruses are
attached to an executable file, which means the virus may exist on your computer but it cannot infect
your computer unless you run or open the malicious program. It is important to note that a virus cannot
be spread without a human action, (such as running an infected program) to keep it going. People
8/13/2019 Ece353 Notes
35/72
35
continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-
mails with viruses as attachments in the e-mail.
A worm is a freestanding program that takes advantage of security flaws and copies itself over and over
again which can slow the network. One example would be for a worm to send a copy of itself to
everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyonelisted in each of the receivers address book, and the manifest continues on down the line. Due to the
copying nature of a worm and its ability to travel across networks the end result in most cases is that the
worm consumes too much system memory (or network bandwidth), causing Web servers, network
servers, and individual computers to stop responding. In more recent worm attacks such as the much
talked about Blaster Worm, the worm has been designed to tunnel into your system and allow malicious
users to control your computer remotely.
Trojan are freestanding programs that do something other than what a user expects it to do when run,
such as expecting a game to run but erasing CMOS Settings instead. The Trojan horse itself would
typically be a Windows executable program file, and thus must have an executable filename extension
such as .exe, .com, .scr, .bat, or .pif. Some Trojans are designed to be more annoying than malicious (like
changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting
files and destroying information on your system. Trojans are also known to create a backdoor on your
computer that gives malicious users access to your system, possibly allowing confidential or personal
information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other
files nor do they self-replicate.
Spyware can capture keystrokes to steal password. It disguises itself as useful utilities. It can reconfigure
dial-up settings to use different phone number at higher connection charge.
To help protect the computer from malware, the following should be used:
i. Run up to date antivirus software
Download updates frequently to ensure your software has the latest fixes for new viruses, worms,
and Trojan Horses. Additionally you want to make sure your anti-virus program has the ability to
scan e-mail and files as they are downloaded from the Internet.
ii. Use firewall
A firewall is a system which prevents unauthorized use and access to your computer. A firewall can
be either hardware or software. Hardware firewalls provide a strong degree of protection from most
forms of attack coming from the outside world and can be purchased as a stand-alone product or in
broadband routers.iii. Apply all security patches/security updates
iv. Run Windows update automatically
Antivirus program
Antivirus programs use different techniques to combat different type of viruses.
8/13/2019 Ece353 Notes
36/72
36
Boot sector viruses
The detect boot sector viruses by comparing the drives boot sector to a standard boot sector.
Some antivirus programs make a backup copy of the boot sector. If they detect viruses, the will
use the back up copy to replaced the infected boot sector.
Executable viruses
These viruses are difficult to find because they can be on any file in the drive. Antivirus programs
will use their library of signature to detect the viruses. A signature is the code pattern of a
known virus. The programs will compare the executable file with the list of signatures.
Macro viruses
Antivirus program detects macro viruses through the presence of virus signatures or certain
macro commands that indicate a known macro virus.
8/13/2019 Ece353 Notes
37/72
37
2.4 Installation of operating system
There are several types of OS installation:
a) Clean Installation
Clean installation is installing OS onto a completely empty hard drive. Clean installation is performed by
resetting the CMOS to tell the system to boot from the CD-Media drive before the hard drive. There isalways opportunity to partition and format the hard drive and then install Windows.
b) Upgrade Installation
The new OS installs into the same folder as the old OS; the new OS replaces the old OS but retains all
saved data inherits the previous settings such as the font style, desktop colours, background and so on.
To begin upgrading, just insert the upgrade version CD-ROM and the installation will start automatically.
If not , locate WINNT32.EXE on the CD-ROM, and run it manually.
c) Multiboot Installation
For example a PC can have both Windows 2000 and Windows XP as its OS. This installation allows userto choose which Windows version to boot.
3 PC Multimedia capabilities
3.1 Sound
A number of software can play sounds on Windows computer. Commonly a Windows PC comes with
Windows Media Player. However, it may be better to download more player since not all players can
play all sounds. InTable 3.1 is a list of common sound file formats.
Table 3.1: Sound file formatsSound File Format Description
WAV
The first sound format , the pulse code modulation
(PCM) which was modified to suit the use in PC, and
known as WAV format.
But WAV file can be huge in size.
Recorded file.
MP3
A new format was introduced to
compress/decompress the WAV file.
This new format is known as MPEG-1 Layer 3 codec,
called by its extension, MP3. The newer version of MP3 is known as MP4.
MP4 support audio and video
Recorded file.
MIDI
Better than WAV in term of file size.
MIDI file is a text file.
The sound card will play the notes according to the
8/13/2019 Ece353 Notes
38/72
38
text file.
3.2 Video
Recorded audio files and MIDI files are not the only files that play sounds on the computer. Video files
also have sound built into them. To play the sound that accompanies the video, the video player
program must support the particular video file format. Below are the most common video formats inthe PC world:
a) AVI - Audio Video Interleave
b) MPEG - Moving Pictures Expert Group
c) MOV - Quick Time
d) ASF - Advanced Streaming Format
e) RM - Real Media
f) Flash
g) WMV - Windows Media Video
3.3 Applications
Many other applications, especially games, play sound too. Most applications, including games use
standard WAV, MP3 or MIDI files.
3.4 Getting the Right Sound Card
All sound cards can play music and drive a pair of speaker. They differ in five basic areas: processor
capabilities, speaker support , recording quality, jacks and extra features. Sound cards come with many
built-in features and basically they have:
a) Two separate processors (one for recorded sound likes WAV file and one for MIDI file format)b) Support chips for joysticks and other pointing devices that plug into the game port.
But the sound card itself is just not enough. You need good quality speakers to hear good quality sound
or music.
3.4.1 Speaker support
Every sound card supports two speakers or or a pair of headphones, but better sound cards support
multiple speakers up to eight speakers to provide surround sound. A popular speaker addition is a
subwoofer which provides the amazing low frequency sounds.
3.4.2 Recording Quality
Almost sound card has input for a microphone. The quality of the input port is measured by signal-to-
noise ratio (SNR) and expressed in decibels. The smaller the number, the worse the card is for recording.
Low- end and mid-range soundcard have SNR, 30 to 50 decibels which make them unacceptable for
recording. High-end sound card offers a 96 to more 100+ SNR, a level near to what professional
musicians use.
8/13/2019 Ece353 Notes
39/72
39
3.5 Installation of various multimedia components and peripherals
3.5.1 Installing Sound in a Window System
There are two choices available for sound hardware on PC nowadays: onboard sound built into the
motherboard or a separate sound card. To install a sound card, just snap the card into a slot, plug some
speakers into the card, load a driver and you are done. With onboard sound , you need to make sure the
sound is enable in your CMOS and then load the driver. The same with most devices, the installation of
sound card include three major parts: Physical installation, device driver installation and configuration.
Physical Installation
1) Shut down your computer, unplug it and open the case
2) Find an open PCI slot and snap in the sound card
3) If installing into an older system, connect the CD audio cable to the back of the optical drive, and
plug the other end into the CD audio port.
Device Driver Installation
Once the sound card is installed, start the system and let Windows install the cards driver. This applies
to expansion cards and onboard sound. It is always best to install the driver that comes in on a CD ROM
with your sound card. After the sound card and the driver are installed, check the Device manager to
ensure that the driver was installed correctly.For USB sound card, you must install the driver first before
connecting the USB sound card.
Configuration
Your final step is to configure the sound card using configuration programs and test it using an
application. You may adjust the volume of the sound.
3.5.2 Installing Sound Programs
A program is needed to play sound on your PC. Examples are Windows Media Player,Winamp or
something similar.
3.6 Troubleshooting sound
a) Volume
Check the volume controls on the speakers. If the speaker volume is ok, check the volume control in
Windows by clicking on the speaker icon on the system tray.
b) Speakers
Make sure the speakers are turned on and getting the power.
Make sure the speakers are plugged into the proper connection of the sound card.
8/13/2019 Ece353 Notes
40/72
40
c) Configuration Problems
Check the Device Manager. If a question mark appears as shown inFigure 3.1 , reinstall the driver.
Figure 3.1: Device manager panel
3.7 Videoconferencing
A videoconference is an interactive telecommunication technologies which allow two or more locations
to interact via two-way video and audio transmissions simultaneously. It uses telecommunications of
audio and video to bring people at different sites together for a meeting. This videoconference involves
equipment like camera, microphone and PC.
8/13/2019 Ece353 Notes
41/72
41
Figure 3.2: Videoconferencing
Advantages
1. No need to travel long distances for the conference.
2. Allows large number of people at different locations to interact with one another effectively.
3. PowerPoint and other visual displays can be shared with everyone attending the conference at
the same time.
4. Virtual whiteboards allow people from different locations to add in their own thoughts or ideas
into one collaborative space.
5. It is possible, with some services, for everyone to gain access to another computer, seeing
whatever is on that computer screen. With more advanced services, a document can even be
changed and typed into directly from other computers connected into the conference.
Disadvantages
1. Expensive
2. No eye contact
4 PC networking and network services
4.1 Introduction to networking
A network is simply a collection of computers or other hardware devices that are connected together,
either physically or logically, using special hardware and software, to allow them to exchange
information and cooperate. Some advantages of networking are:
a) File sharing
File sharing is the most common function provided by networks and consists of grouping all data
files together on a server or servers. When all data files in an organization are concentrated in
one place, it is much easier for staff to share documents and other data. It is also an excellent
way for the entire office to keep files organised according to a consistent scheme. Network
operating systems such as Windows Server 2003 allow the administrator to grant or deny
groups of users access to certain files.
8/13/2019 Ece353 Notes
42/72
42
b) Hardware Sharing
An example of hardware sharing is the Print Sharing. When printers are made available over the
network, multiple users can print to the same printer. This can reduce the number of printers
your organization must purchase, maintain and supply.
c) Internet Access
Allow for access to the outside world.
There are several types of network. Among them are client/server network and peer to peer network.
4.1.1 Client/Server Network
Client / Server network contains servers as well as client computers. Servers are powerful computers
dedicated to provide certain services. These services can consist of many different roles, including file
services, web services, email services, domain name lookup services, Internet sharing services, etc.Clients are PCs or workstations on which users run applications. Clients rely on servers for resources,
such as files, devices and sometimes even processing power. A great example of the Client-Server
network model is actually the World Wide Internet. On the Internet clients, or computer with web
browsers, access web sites that are hosted on servers.
This model differs from the Peer-to-peer network model in that the servers usually do not dually act as a
workstation, and the workstations usually do not act as servers.
Characteristics of Client/Server networkOne machine is dedicated as a server.
It is designed for large number of computer.
The server has Network Operating System (NOS) optimized for sharing files, with powerful caching
software that enable high speed file access, high level of protection and organization that permits
extensive control of the data.
Advantages of a Client-Server network
a) Centralized - Resources and data security are controlled through the server.
b) Scalability - Any or all elements can be replaced individually as needs increase.c) Flexibility - New technology can be easily integrated into the system.
d) Accessibility - Server can be accessed remotely and across multiple platforms.
e) Security - Server can manage access lists and restrict certain areas and/or files.The username and
password can be configured at the server side. Once done, it will be set for the entire network.
8/13/2019 Ece353 Notes
43/72
43
Figure 4.1: Client/Server network
4.1.2 Peer-to-peer (P2P)
Basically, a P2P network is an ad hoc network that connects participants directly, rather than through a
central point. The combined bandwidth of participants is used to transfer data. Many P2P network are
set up to share music, video, and text files.
Characteristics of P2P
a) Enable any of the machines to act as a server.
b) Every server can perform both server and client functions.
c) Not designed for a large number of computers, maximum is 15 PCs.
d) Weak security
Advantages of a peer-to-peer network
a) Less initial expense since there is no need for a dedicated server.b) No need for a network administrator.
c) Network is fast and inexpensive to setup and to maintain.
d) Each PC can make backup copies of its data to other PCs for security.
e) Easiest type of network to build.
8/13/2019 Ece353 Notes
44/72
44
Figure 4.2: Peer to peer network
4.2 TCP/IP Networking Fundamentals
TCP and IP were developed by United States Department of Defense (DOD) research project to connect
a number different networks designed by different vendors into a network of networks (the "Internet").
It was initially successful because it delivered a few basic services that everyone needs (file transfer,
electronic mail, remote logon) across a very large number of client and server systems. Several
computers in a small department can use TCP/IP (along with other protocols) on a single LAN. The IP
component provides routing from the department to the enterprise network, then to regional networks,
and finally to the global Internet. TCP/IP is made up of two acronyms, TCP, for Transmission Control
Protocol, and IP, for Internet Protocol. TCP handles packet flow between systems and IP handles the
routing of packets.TCP/IP is the protocol used for communication over the Internet and on most
computer networks today.
4.2.1 IP addresses and domain name
4.2.1.1 IP addressesIP addresses are normally expressed in decimal format as a "dotted decimal number" like 216.27.61.137.
Butcomputers communicate inbinary form. Look at the same IP address in binary:
11011000.00011011.00111101.10001001
http://computer.howstuffworks.com/pc.htmhttp://computer.howstuffworks.com/bytes.htmhttp://computer.howstuffworks.com/bytes.htmhttp://computer.howstuffworks.com/pc.htm8/13/2019 Ece353 Notes
45/72
45
The four numbers in an IP address are called octets, because they each have eight positions when
viewed in binary form.
If all the positions are add together, you get 32, which is why IP addresses are considered 32-bit
numbers. Since each of the eight positions can have two different states (1 or 0) the total number of
possible combinations per octet is 28or 256. So each octet can contain any value between 0 and 255.
Combine the four octets and you get 232
or a possible 4,294,967,296 unique values. Out of the almost
4.3 billion possible combinations, certain values are restricted from use as typical IP addresses. For
example, the IP address 0.0.0.0 is reserved for the default network and the address 255.255.255.255 is
used for broadcasts.
The octets serve a purpose other than simply separating the numbers. They are used to create classes of
IP addresses that can be assigned to a particular business, government or other entity based on size and
need. The octets are split into two sections: Net and Host. The Net section always contains the first
octet. It is used to identify the network that a computer belongs to. Host (sometimes referred to as
Node) identifies the actual computer on the network. The Host section always contains the last octet.
There are five IP classes plus certain special addresses.
There are two ways of assigning IP addresses:
a) Static addressing
The IP address for a computer never changes and is assigned manually by a network
administrator.
b) Dynamic addressing
A computer is assigned an address from an available pool of IP addresses. This is handled by the
Dynamic Host Configuration Protocol (DHCP). This IP address is temporary and may or may not
be the same from session to session. This type of addressing is better than static addressing
because it provides better security measures to keep hackers out of the computer system.
4.2.1.2 Domain namesDomain names were born to enable people to work with names rather than numbers. It takes the place
of an IP addresse, making it easier for people to remember it. Consider this URL, www.yahoo.com. The
domain name is yahoo.com. The server where Yahoo!s main website is deployed has an IP address,
such as 123.45.67.89, but it is rather easier to recall yahoo.com instead of the IP address.
8/13/2019 Ece353 Notes
46/72
46
4.2.1.3 DNS serversURL is not important to a computer. What important is only the IP address of the computer hosting that
URL. When you enter a URL in a browser, your computer converts the URL into an IP address. To do this,
your computer consults a database that is maintained on a DNS server, which functions like a phone
book for the internet.
4.2.2 IP Address Classes
a) Default Network- The IP address of 0.0.0.0is used for the default network.
Class A
This class is for very large networks, such as a major international company might have. IP
addresses with a first octet from 1 to 126 are part of this class. The other three octets are used to
identify each host. This means that there are 126 Class A networks each with 16,777,214 (224
-2)
possible hosts for a total of 2,147,483,648 (231
) unique IP addresses. Class A networks account for
half of the total available IP addresses. In Class A networks, the high order bit value (the very first
binary number) in the first octet is always 0.
Loopback- The IP address 127.0.0.1is used as the loopback address. This means that it is used by the
host computer to send a message back to itself. It is commonly used for troubleshooting and network
testing.
Class B
Class B is used for medium-sized networks. A good example is a large college campus. IP addresses
with a first octet from 128 to 191 are part of this class. Class B addresses also include the second
octet as part of the Net identifier. The other two octets are used to identify each host. This means
that there are 16,384 (214
) Class B networks each with 65,534 (216
-2) possible hosts for a total of
1,073,741,824 (230
) unique IP addresses.
8/13/2019 Ece353 Notes
47/72
47
Class B networks make up a quarter of the total available IP addresses. Class B networks have afirst bit value of 1 and a second bit value of 0 in the first octet.
Class C
Class C addresses are commonly used for small to mid-size businesses. IP addresses with a first
octet from 192 to 223 are part of this class. Class C addresses also include the second and third
octets as part of the Net identifier. The last octet is used to identify each host. This means that
there are 2,097,152 (221
) Class C networks each with 254 (28-2) possible hosts for a total of
536,870,912 (229
) unique IP addresses. Class C networks make up an eighth of the total available IP
addresses. Class C networks have a first bit value of 1, second bit value of 1 and a third bit value of
0 in the first octet.
Class D
Used for multicasts, Class D is slightly different from the first three classes. It has a first bit value of
1, second bit value of 1, third bit value of 1 and fourth bit value of 0. The other 28 bits are used to
identify the group of computers the multicast message is intended for. Class D accounts for 1/16th
8/13/2019 Ece353 Notes
48/72
48
(268,435,456 or 228
) of the available IP addresses.
Class E
Class E is used for experimental purposes only. Like Class D, it is different from the first three
classes. It has a first bit value of 1, second bit value of 1, third bit value of 1 and fourth bit value of
1. The other 28 bits are used to identify the group of computers the multicast message is intended
for. Class E accounts for 1/16th
(268,435,456 or 228
) of the available IP addresses.
Broadcast
Messages that are intended for all computers on a network are sent as broadcasts. These
messages always use the IP address 255.255.255.255.
4.3 Network Security
Network security is generally taken as providing protection at the boundaries of an organization,
keeping the potential hackers out. Network security starts from authenticating any user, commonly
with a username and a password. Once authenticated, a stateful firewall enforces access policies such as
what services are allowed to be accessed by the network users.
4.3.1 Firewall
It is a software or hardware used to prevent unauthorized access to your network, and is the front line
of defense against viruses, worms, Trojan Horse attacks and hackers. Todays firewall can even deliver
web content filtering, intrusion prevention services and antivirus protection. Using a combination of
hardware and software solutions, the Firewall enables you to:
a) Control incoming and outgoing traffic between the Internet and your protected networks
b) Hide your internal IP addresses from the external network
c) Control User Authentication
d) Configure access rules by user or group
e) Filter by user, group, time-of-day or content category
8/13/2019 Ece353 Notes
49/72
49
Figure 4.3: Firewall hardware
5 Server hardware and print sharing
5.1 Networked server requirements, hardware and installation
5.1.1 Servers
Servers serve many different network users and assist them with accomplishing a variety of task. The
number and types of servers on client/server network depend on the networks size an workload. As
more users are added to a network, dedicated servers are also added to lessen the burden of the main
server.
5.1.1.1 Dedicated serversDedicated servers are used to fulfill one specific function such as handling e-mail. Any repetitive tasks
requested by users is a good candidate to relegate to a dedicated server. Common types of dedicated
servers are :
i) Print servers
ii) Application servers
iii) Database servers
iv) e-mail servers
When dedicated servers are deployed, the main server becomes an authentication server and/or a file
server.
5.1.1.2 Authetication serversAuthetication servers keep track of who is logging on to the network and which services on the network
are available to each user.
5.1.1.3 File serversFile servers store and manage files for network users.
5.2 Printer and print sharing
A printer is a peripheral device, which is attached to the computer to produce written material or
graphics on paper or other print material. When you write a word document you send input and when
8/13/2019 Ece353 Notes
50/72
50
you take a printout of this document via the printer you get a hard copy output. Choosing a printer may
be based on some of the following:
a) Speed
A printers speed determines how many pages it can print per minute (ppm). Many inkjet printers have
the speed of those of laser jet printers. Printing speeds vary by model and range from 8 to 30 ppm for
both inkjet and laser printers.
b) Resolution
A printers resolution is measured in dot per inch(dpi) or number of dots of ink in one-inch line. Higher
dpi produces higher quality printing. The dpi may be represented as 600 x 600, or some just stated by
600 dpi. For general-purpose printing 300 dpi is already enough. For photo printing 1200 dpi or higher is
better.
5.2.1 Types of printers
Printers are made by using different technologies. The following are several types of printer that are
available in the market.
a) Dot matrix printers
These printers consist of print head, pins and ribbon. As the head moves across the paper, pins hit the
ribbon to insert ink on paper to create text.
b) Characters printer
8/13/2019 Ece353 Notes
51/72
51
You cannot print graphics by these printers. Just like the typewriter, it consists of alphabets or
characters. Each character strikes the ribbon to insert a character on the paper.
c) Ink jet printers
This type of printer is popular among home PC users because of high quality, less expensive and
photo quality output copy. It consists of inkjet print cartridges or ink boxes. Your colour ink jet
printer needs two ink jet cartridges one black and other tri or four colour to produce a colour
print copy. Ink from the nozzle in the form of tiny droplets is used to create text and images on
the paper.
d) Laser printers
8/13/2019 Ece353 Notes
52/72
52
These printers give high speed and high quality output by using laser technology. It consists of
electrostatic charge, rotating drum, laser beam and toner.
5.2.2 Create a perfect print
After setting up the printer your first task is to know how to create a perfect document. As youknow from the printer you can print word documents, greeting cards and envelopes, etc. Print
icon is always seen on the tool bar of the program file. But before you click it remember that
you must setup the page size and some other details because without completing these
formalities you cannot print a document. Here are few points that you should keep in mind
before you start printing.
a) Click on page setup
Go to the file menu option and click "Page setup". Now click the "page size" tab and if you want
to print an envelope select envelop from the paper size list box. On the right side "preview" of
your selection helps you to take the finale decision.
b) Set the orientation
At the bottom of the page size tab, two options for page orientation are given. This option gives
you opportunity to print the text or image in portrait or landscape style.
c) Types of printing paper
It is very important to the choose right kind of printing paper because if you try to make a print
of a photograph on a plain sheet of paper you are bound to get poor quality prints. To print a
photograph you need shiny glossy paper. For double-sided printing, thick paper is used so that
the text or image of one side of the paper cannot appear on the other side.
d) Maintaining your printer
To get flawless and good quality prints it is necessary that your printer should be in first-class
condition. Following are few tips to keep your printer in good condition.
Keep away dust and smudge from your printer.
Never try to clean the inside of the printer with a wet cloth.
8/13/2019 Ece353 Notes
53/72
53
To clean colour cartridges, select your printer and right click to open-up the short cut
menu. Select properties and then select the services tab. Now click "clean the print
cartridges" button.
You can get more information about your printer from the user guide.
5.2.3 Printer SharingAt times it is necessary to connect the same printer to more than one computer in a home,
office, or educational setting. There are several different hardware options available for sharing
a printer, ranging from the inexpensive and simple to the more complex.
a) USB/Parallel
Figure 5.1: A printer connected to computer using USB and parallel cable
This is the easiest, least expensive way of sharing a printer. However, it is limited to sharing a
printer with no more than two computers. It also requires that one (or both) computer has a
standard parallel port, and the other has a USB port. The printer must have ports and cables for
connecting it to both USB and parallel ports at the same time. After proper port and driver
configuration, this should allow both computers to send print jobs to the same printing device,
using their separate cables.
b) Using printer switch
8/13/2019 Ece353 Notes
54/72
54
Figure 5.2: A printer connected to multiple computers using switch
Referred to under various different names, including "parallel switch", "A-B switch", or "auto
switch", a printer switch lets multiple computers be connected to the same printer, usually via
parallel or USB cables.
Figure 5.3: The USB 2.0 High Speed Four Computers Device Sharing Switch with
Manual Push Button Selector
Unlike other options, many of these units require a knob to be turned or a button pressed each
time a different computer is used to print. However, some are available which automatically
connect the printer to the computer that is requesting to print. Most units are limited to either
two or four computers. This hardware is easier to set up than a networked hardware sharing
system, and is more likely to be compatible with different computer models. It also does not
require any different software configuration or settings.
8/13/2019 Ece353 Notes
55/72
55
c) Networking
Figure 5.4: A printer connected to a network
One of the various types of computer network systems can be set up to enable this type of
hardware sharing. This technique requires a router, an appropriate network interface card
installed in each computer, and the right type of networking cables. It is usually more expensive
than the above-mentioned options, and uses slightly more electricity. However, it makes other
functions possible (like sharing an internet connection or easily transferring files from one
computer to another), and allows for a much greater number of systems to be connected.
Figure 5.5: A printer connected to a network through a router
Enable Printer Sharing in Windows XP
Follow these instructions to share printers connected to a Windows XP computer on a local
network.
1) On the computer that is wired to the printer (called the hostcomputer), open Windows
Control Panel (from the Start menu).
2) Open (double click) the Printers and Faxes icon from within the Control Panel window. If
using the Category View for Control Panel, first navigate to the Printers and Other
8/13/2019 Ece353 Notes
56/72
56
Hardware category to find this icon. In Classic View, simply scroll down the list of icons
in alphabetical order to find the Printers and Faxes icon.
3) In the list of printers and faxes within the Control Panel window, select (single click) the
icon for a printer you wish to share.
4) From the Printer Tasks pane (left hand side of the Control Panel window), click Share
this printer. Alternatively, you can right-click on the selected printer icon to open a pop-
up menu and choose the Sharing...option from this menu. In both cases, a new Printer
Properties window appears.
However, if at this stage you receive an error message starting with Printer Properties
cannot be displayed, this indicates the printer is not currently connected to the
computer. You must physically connect the computer and printer to complete this step.
5) In the Printer Properties window, click on the Sharing tab and select the Share this
printer radio button. In the Share name field, enter a descriptive name for the printer:This is the identifier that will be shown to other devices on the local network when they
make connections Click OK or Apply to complete this step.
At this stage, the printer will now be accessible to other devices on the local network.
Close the Control Panel window when finished.
To test sharing is configured properly for this printer, attempt to access it from a different
computer on the local network. From another Windows computer, for example, you can
navigate to the Printers and Faxes section of Control Panel and click the Add a printer task. The
share name chosen above identifies this printer on the local network.
Enable Printer Sharing in Windows Vista
Windows Vista uses a default workgroup name of WORKGROUP.
8/13/2019 Ece353 Notes
57/72
57
Figure 5.6: Dialog box for Printer Sharing in Windows VistaUse the 'Share name' field to give the printer a distinctive name.
1) Select Control Panel' from the Start menu.
2) Select Printer from the Hardware and Sound group.
3) A list of installed printers and faxes will display.
4) Right-click on the icon of the printer you wish to share and select Sharing from the pop-up
menu.
5) Click the Change sharing options button.
6) The User Account Control system will ask for permission to continue. Click the Continue
button.
7) Place a check mark next to the Share this printer item.
8) Enter a name for the printer in the Share name field.
9) Click the Apply button.
10)Close the printers Properties window and the Printers and Faxes window.
http://z.about.com/d/macs/1/0/T/0/-/-/vistap