Upload
amanda-bryant
View
214
Download
0
Embed Size (px)
Citation preview
8/13/2019 Online Computer Store1040scribd
1/3
online Computer Store
Computer Hardware parts
Every profession has, at its core, a bunch of terms and data that's shared and understood by its
practitioners. laptop forensics is definitely no exception. during this section, I discuss the varied
terms accustomed describe a computer's parts and systems.
Case
The case, or chassis, is sometimes metal, and it surrounds, contains, and supports the pc system
parts. It shields electrical interference (both directions) and provides protection from dirt, moisture,
and direct-impact harm to the interior elements. it's generally mistakenly known as the central
process unit (CPU), that it's not.
Hard Drive
this can be the most storage media for many laptop systems; it holds the boot files, software
system files, programs, and data. It consists of a series of exhausting skinny platters revolving at
speeds starting from four,800 to 15,000 revolutions per minute (RPM). These platters (which
square measure magnetized) square measure accessed by heads moving across their surfaces
as they spin. The heads will scan or write, detective work or making microscopic changes in
polarity, with positive changes being 1s and negative changes being 0swhich is why we have a
tendency to seek advice from the pure binary numeration system of 1s and 0s."
Hard drive platters have Associate in Nursing addressing theme in order that the varied locations
wherever knowledge is hold on may be set for reads and writes. Originally this addressing themeconcerned the CHS system (C = Cylinder, H = Head, and S = Sector). A sector is that the
slightest of house on a drive that may be written to at a time. A sector contains 512 bytes that
may be utilized by the software system. both sides of the platter is formatted with a series of
concentric circles called tracks. Sectors square measure contained within the tracks, and
originally every track contains a similar range of sectors. A cylinder may be a logical construct; it's
a degree on all the platters wherever the heads align on a vertical axis passing through a similar
sector range on all the platters. There square measure 2 heads for every platter, one for every
aspect (side zero and aspect 1). looking on the quantity of platters gift, the heads are going to be
numbered. to work out the quantity of bytes gift on a tough drive, a formula is used: C n H n S n
512 = total storage bytes. The C is that the total range of cylinders, the H is that the total range of
heads, the S is that the range of sectors per track, and 512 may be a constant that represents the
quantity of bytes in an exceedingly sector usable by the software system (OS).
This formula holds true as long because the range of sectors per track remains a similar for all
tracks, that applies to older, lower-capacity exhausting drives. this method, however, has
limitations for drive storage capability. the restrictions replicate however densely inhabited
(sectors per track) the inner tracks square measure. The outer tracks, in contrast, will continually
hold a lot of knowledge than the inner tracks and contain wasted cupboard space. to beat this
limitation, Zoned-Bit Recording (ZBR) was developed; in ZBR, the quantity of sectors per track
varies in zones, with the outer zones containing a lot of sectors per track than the inner zones.
this method has immensely improved knowledge storage capacities.
8/13/2019 Online Computer Store1040scribd
2/3
The formula, however, isn't valid for contemporary drives, as a result of the quantity of sectors per
track isn't any longer constant if ZBR is gift. to handle the larger-capacity exhausting drives, a
brand new addressing theme has been developed, known as Logical Block Addressing (LBA).
during this system, sectors square measure addressed just by sector range, beginning with sector
zero, and therefore the exhausting drive's physics translate the arena range to a CHS price
understood by the drive. to work out the storage capability of exhausting drives victimization ZBR,
you establish the overall LBA sectors and multiply that range by 512 (bytes per sector). the
merchandise yields the overall storage capability of the drive in bytes (total LBA sectors n 512 =
total storage capability in bytes).
Depending on their electrical interface or controller, exhausting drives may be Advanced
Technology Attachment (ATA), that is currently usually known as PATA to differentiate parallel
from serial with the arrival of SATA; SATA (Serial ATA); or port.
Solid State Drive (SSD)
Redundant Array of cheap Disks (RAID)
1st I'll clear the air on the descriptor RAID. It suggests that Redundant Array of freelance Drives
(or Disks), and it's conjointly called Redundant Array of cheap Drives (or Disks). Thus, the letter I
will mean cheap or freelance, and therefore the letter D will mean drives or disks. however if you
discover yourself in Associate in Nursing argument over this at your next geek party, don't bet the
ranch as a result of either combination of those words is correct. A RAID is Associate in Nursing
array of 2 or a lot of disks combined in such the way on increase performance or increase fault
tolerance. in an exceedingly RAID zero, knowledge is patterned over 2 or a lot of disks, that will
increase performance by reducing scan and write times. However, if any disk fails in anexceedingly RAID zero, all knowledge is lost. in an exceedingly RAID one, knowledge is reflected
over the drives within the array. A RAID one doesn't increase performance, however it will
produce redundant knowledge, thereby increasing fault tolerance. in an exceedingly RAID five
configuration, generally knowledge is hold on on 3 drives, though alternative configurations may
be created. knowledge is patterned over 2 drives, and a parity stripe is formed on the third. ought
to anybody drive fail, it may be rebuilt" from the information of the opposite 2. RAID five achieves
fault tolerance and exaggerated performance. RAID zero + one may be a comparatively new sort
of RAID. it's generally designed with four drives; one combine is employed for marking
knowledge, and therefore the alternative combine may be a mirror of the patterned combine. With
this configuration, you once more come through high performance and fault tolerance. RAID zero
+ one can even be found as RAID one + zero. whereas similar, with the previous (0+1), the stripe
is made before the mirror. With the latter (1+0), the mirror is made before the stripe. instead of
digress into a discussion of the performance problems with these 2 totally different configurations,
over that affordable technicians will realize grounds for dispute, we'll locomote.
Network Interface Card (NIC) The NIC is Associate in Nursing extension card accustomed
connect the pc to a network. This practicality is offered via USB association and is made into most
digital computer and portable computer motherboards presently factory-made. LAN is that the
most typical sort of network in use, however Token Ring continues to be found in some gift
environments. the kind of network deployed determines which kind of network adapter, LAN or
Token Ring, are going to be used. every NIC includes a distinctive hardware address or serial
8/13/2019 Online Computer Store1040scribd
3/3
range coded into its memory. This address is termed its Media Access management (MAC)
address. the information Link Layer (DLL) protocol uses this address to spot and communicate
with alternative NICs on a similar network. This address is forty eight bits, or six sets of hex
values, and consists of 2 elements. the primary 3 hex values determine the manufacturer. The
second set of 3 hex values may be a distinctive serial range applied by the manufacturer to the
particular card. Most network cards these days square measure rated at 10/100 Mbps; but,
Gigabit LAN (1,000 Mbps) is sort of common additionally. Another sort of network is that the
wireless network, whereby the network packets square measure sent via radio waves rather than
over wires. Wireless NICs square measure generally PCI or USB or square measure offered as
on board the motherboard. All 3 varieties need Associate in Nursing antenna to receive the signal.
Modem A electronic equipment, that stands for modulate/demodulate, is employed to attach a
laptop to alternative computers employing a phonephone because the signal carrier. The
electronic equipment takes your computer's digital signals and modulates, or transforms, them to
analog signals for transmission over phonephone lines. On the receiving finish, the electronic
equipment demodulates, or transforms, the analog signals from the phonephone line back to
digital signals that the receiving laptop will perceive.
First communicator Hint
Upon discovering that a target laptop is connected to a network (telephone, wired, wireless), one
among your 1st considerations ought to be the potential for the destruction of information via
remote association. Disconnect the network association, or if it's wireless (such as a laptop), put
off the Wireless button. If the Wireless switch isn't gift, you will got to power down the machine likea shot. confine mind, though, that a choice to pull the plug" should be weighed against the loss of
potential proof by doing thus. Running processes, network connections, and knowledge in volatile
RAM are going to be lost once you pull the plug. If your case depends on this volatile knowledge,
you will value more highly to give a protect to dam wireless transmissions whereas you capture
the volatile knowledge.