6 Expected Etiquettes o You shall now become a professional person. Demonstrate behavior of a professional. o Make yourself your parents and then the organization proud with your conduct and achievements. o You will require class attendance REGULARLY otherwise you shall struggle to understand this subject. Attending classes is for your own good. o Graphic Era lab exams of a very high standard. You are expected to run the code and answer viva-voice questions. 7 Expected Etiquettes o Very, Very important to learn programming basics to secure a good life and job. o Execute the code on a computer/smart phone then only your understanding shall increase. o You need to bring to my attention any issues regarding the course at the earliest to the attention of your class teacher, anything you feel should be looked into. o Show professional behavior to your teachers. 8 Words of positive Advice o Stress, Emotional problems. Feel free to contact your faculty. They shall help you connect to resources. o For God’s sake stay away from Drugs and other harmful substances. 9 ***** 1 Introduction to Computers o Introduction to Computers o Software & Hardware o Input / Output Devices o Computer memory o RAM/ROM o Understand bit, byte, KB, MB, GB and their relations to each other o Generation of computers o Operating System o Computer Networks 2 What is a Computer ? RAW DATA I NFORM ATI ON COM PUTER I NPUT OUTPUT PROCESSI NG • Computer is an electronic machine that takes in raw data as input, processes it and gives out useful information as output. o A computer is a machine that takes instructions and performs operations based on those instructions. 3 Why use Computers? • Increases the productivity and efficiency. • Can crunch data at lightning speed • Can store vast amounts of data • Helps sort, organize, and search through information. • Connects to the vast world of information thru the Internet. • Get a better understanding of data. • Can help in making a decision using the vast data. 6 Some Applications of Computers Word Processing Internet Digital Audio or Video Composition Desktop Publishing e-Business Bioinformatics Health care GIS and Remote Sensing Meteorology Multimedia and Animation Legal System Retail Business Video Games Entertainment Sports 1 Software & Hardware COMPUTER HARDWARE SYSTEM SOFTWARE SOFTWARE APPLICATION SOFTWARE SOFTWARE UTILITIES o Broadly the electronic circuitry is called the Hardware and programs and data the Software. o The Software is instructions in form of programs along with data manage the computer system and control the hardware components. Example: The antivirus, chrome browser, Linux OS that protects the computer system is a type of Software. 2 Hardware and Software both Necessary The computer on its own is of no use. The hardware needs a software (a set of programs & data) to instruct what has to be done. A program is a set of instructions that is arranged in a sequence to guide a computer to find a solution for the given problem. The process of writing a program is called programming. Computer software is written by computer programmers using a programming language. Examples of computer software include: Browsers, Windows, Linux Computer Games 3 * Courtesy ASUS * 4 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Birds Eye View of PC Hardware Scanner CPU (Microprocessor) Main memory (RAM) Expansion cards Power supply unit Optical disc drive Hard disk drive (HDD) Motherboard Speaker Monitor System software Application software Keyboard Mouse External hard disk Printer *** /* Most Humbly and Gratefully Acknowledge to all the Wonderful People making Content Freely Available Description : A stylized personal computer, with as many parts as possible shown and labeled Link : https://commons.wikimedia.org/wiki/File:Personal_computer,_exploded_6.svg License Type: Creative Commons Attribution 2.5 Generic license. Author: User:HereToHelp */ * ASUS Motherboard used for representational purpose only. Image credits ASUS. 5 Computer Hardware represents the physical and tangible components of a computer, i.e. the components that can be seen and touched. Examples of Hardware are the following Input devices − keyboard, mouse, etc. Output devices − printer, monitor, etc. Secondary storage devices − Hard disk, CD, DVD, etc. Internal components − CPU, motherboard, RAM, etc. 6 Types of Software's • Depending on function and application desired, Software can be divided into three major types: – System Software – Application Software – Utility Software 7 System Software Application Software It is a collection of programs that enable the users to interact with hardware components efficiently It is a collection of programs written for a specific application. Like, we have library system, inventory control system, etc It controls and manages the hardware It uses the services provided by the system software to interact with hardware components System software is machine dependant It is machine independent 8 System Software Application Software The programmer must understand the architecture of the machine and hardware details to write a system software The programmer ignores the architecture of the machine and hardware details to write an application software Interacts with the hardware directly Interacts with the hardware indirectly through system calls provided by system software Writing a system software is a complicated task Writing application programs is relatively very easy Example: compiler, operating system Example: MS-WORD, PAINT 1 Block or Functional Diagram of a Computer A computer is an electronic device which basically performs five major functions namely… o accepts data or instructions (input) via Input Devices o stores data (Primary and Secondary Memory) o process data (via CPU) o displays results (output) (via Output Devices) o controls and co-ordinates all operations inside a computer (via Control Unit) 2 3 WorkStation / Server ** All images courtesy ASUS computers computers. Images for representational purpose only. 4 Functional Block Diagram of a Computer ***** 8 Software Utilities Utility software is software designed to help to analyze, configure, optimize or maintain a computer. It is used to support the computer infrastructure - in contrast to application software, which is aimed at directly performing tasks that benefit ordinary users. Anti-virus utilities scan for computer viruses and block or remove them. Diagnostic programs determine and report the operational status of computer hardware and software. Memory testers are one example Cryptographic utilities encrypt and decrypt streams and files. 9 Backup software makes copies of all information stored on a disk and restores either the entire disk (aka Disk cloning) in an event of disk failure or selected files that are accidentally deleted or corrupted. Undeletion utilities are sometimes more convenient. Data conversion utilities transform data from a source file to some other format, such as from a text file to a PDF document. 10 Operating System The primary goal of an operating system is to make the computer system convenient and efficient to use. (Computer Usable) An operating system ensures that the system resources (such as CPU, memory, I/O devices, etc) are utilized efficiently i.e. Resource Manager. For example, there may be many service requests on a web server and each user request need to be serviced. Similarly, there may be many programs residing in the main memory. Therefore, the system needs to determine which programs are active and which need to wait for some I/O operation. 11 12 Functions / Objectives of Operating System o Manages the computer hardware o Process Management o Memory Management o I/O Device Management o File System o Protection / Security o Network Management o Network Services (Distributed Computing) o User Interface. 13 Examples of Operating System MS DOS System Windows Operating System UNIX LINUX Mobile Operating Systems iOS, Android, Windows Phone , BlackBerry OS ** Students can find out about Open Source Software and Commercial Software with examples. Freeware, Free Software, License etc ***** 1 Modern Electronic Computer Architecture Von Neumann Architecture 2 Von Neumann Architecture or the Princeton Model Proposed design architecture for an electronic digital computer with these components: o Processing unit contains arithmetic logic unit and processor registers o Control unit that contains an instruction register and program counter o Main Memory that stores data and instructions o External mass storage. Secondary device. o Input and output facility Also referred to as stored-program digital computer keeps both program instructions and data in read–write, random-access memory (RAM) 3 Intro to Computer Memory Computer’s memory is used to store data and programs. Two Major types o Primary or Main memory o Secondary or Auxiliary memory MAIN MEMORY: Instructions and data of a program in execution. Volatile, so retains content when power is on. Additionally, is expensive and limited in capacity. SECONDARY MEMORY: Data and programs not currently in use. Place of permanent data storage. 4 Secondary memory o Data and/or instructions stay permanently. Not reliant on power. o Cheaper and can store very large data quantity. o Certain device like pen drives etc data is portable, copied from one machine to another. o Slower speed of access compared to main memory. o Memory is organized into a number of partitions called as cells. Each cell has an address. Just like a housing colony. 5 Primary Memory (Main Memory) Contains data and instructions the computer is currently processing. Very less capacity compared to secondary memory. Example Hard Disk 1024 GB, main memory generally 4 to 16 GB Made up of semiconductors. Very fast compared to secondary memory but slower than Internal CPU memory (Registers). Volatile, and Required for program execution. 6 Types of RAM Static RAM (SRAM) Flip Flop (latch) is used to represent 1 and 0’s The word static indicates memory refresh is not required. Simpler Design. Faster and Used as cache memory Highly Reliable Expensive and Long life Finds use in digital Cameras, high end mobile phones. ** Image courtesy of Hyundai. Used for representational purpose only. 7 Dynamic RAM (DRAM) Consists of a Capacitor and Transistor Combo. Capacitor gradually discharges. Must be continually refreshed in order to maintain the data. Done by a refresh circuit that rewrites the data several times per second. As it is cheaper, smaller, higher capacity, forms major part of Main memory. Short data lifetime Slower as compared to SRAM Used as RAM Smaller/Denser in size, Less expensive More power consumption ** Image courtesy of Samsung. Used for representational purpose only. Samsung 16GB 8 Read Only Memory ROM stands for Read Only Memory. Data stored in ROM also known as firmware. Generally used in PC to store instructions needed to Boot-up** a computer. Non-volatile. Information programmed/stored permanently such memories is in ROM extensively used in electronic items like washing machine, Dishwasher, Cameras and microwave oven among others. ** ROM Role in Computer Booting Process subsequent video 9 Types of ROMs and their characteristics MROM (Masked ROM) Hard-wired* devices that contain preprogrammed set of data or instructions. PROM (Programmable Read Only Memory) PROM can be modified only once by the user/manufacturer. It can be programmed only once and is not erasable. EPROM (Erasable and Programmable Read Only Memory) EPROM can be erased by ultra-violet light. * Electronic circuitry that is designed to perform a specific task. 10 EEPROM (Electrically Erasable and Programmable Read Only Memory) EEPROM is programmed and erased electrically. Can be erased and reprogrammed about ten thousand times. Selective location can be modified and programmed. They can be erased one byte at a time, rather than the entire chip. 13 Sequential Data Access Random Data Access To reach a specific data item all items prior to it need to be traversed. Irrespective of the location of the data element, time taken to reach it is a constant for that media Examples: Magnetic Main Memory (RAM) Tape, Old Cassette players Devices are more Expensive and economical and lesser capacity generally have more capacity Depends upon Searching for a application: particular employee Example processing information salary of each employee 14 Sequential vs Random Access /* Most Humbly and Gratefully Acknowledge to all the Wonderful People making Content Freely Available Description : File:Random vs sequential access.svg Link : https://commons.wikimedia.org/wiki/File:Random_vs_sequential_access.svg License Type: I, the copyright holder of this work, release this work into the public domain. This applies worldwide. Author: Me (User:Intgr) */ 18 Secondary Memory /Auxiliary Memory Known as external memory Slower than the Primary memory. Stores data/information permanently. Huge Capacity based on need Cost per unit of storage is cheaper compared to RAM CPU can utilize secondary memory only when the contents are moved to the RAM. Devices are highly stable and Reliable Data permanent till deletion Modify, Delete data Example: Hard disk, CD-ROM, DVD, Pen Drive etc. 19 HARD DISK o Thought of as Circular plates (called as platters) stacked upon each other with suitable gaps. o Platters coated with magnetic medium for data recording. 20 Hard Disk Drive /* Most Humbly and Gratefully Acknowledge to all the Wonderful People making Content Freely Available Description : Diagram of a computer hard disk drive Link : https://commons.wikimedia.org/wiki/File:Hard_drive https://commons.wikimedia.org/wiki/File:Hard_drive-en.svg License Type: Creative Commons Attribution Attribution-Share Alike 3.0 Unported license. Author: Surachit */ 21 Platter Structure track (A), a geometrical sector (B), (B) a track sector (C) and a cluster of sectors (D). /* Most Humbly and Gratefully Acknowledge to all the Wonderful People making Content Freely Available Description: Disk structure showing a track (A), a geometrical sector (B), a track sector (C) and a cluster of sectors (D). The term "sector" in the context of computer engineering usually refers to (C). Link: https://commons.wikimedia.org/wiki/File:Disk https://commons.wikimedia.org/wiki/File:Disk-structure2.svg Author: Heron2/MistWiz License Terms: I, the copyright holder of this work, release this work into the public domain. This applies worldwide. */ 22 Hard drive geometry cylinder/head/sector /* Most Humbly and Gratefully Acknowledge to all the Wonderful People making Content Freely Available Description : hard drive geometry - cylinder/head/sector (per track) (CHS) This is an information graphic about a common early method for giving addresses to each physical block of data on a hard disk drive. Link : https://commons.wikimedia.org/wiki/File:Hard_drive_geometry_ https://commons.wikimedia.org/wiki/File:Hard_drive_geometry_-_English_-_2019 _2019-05-30.svg License Type: Creative Commons Attribution Attribution-Share Alike 4.0 International, 3.0 Unported, orted, 2.5 Generic, 2.0 Generic and 1.0 Generic license Author: Henry Mühlpfordt, png version from 2010: Bagok */ 16 Bits, Nibble, Bytes Bit (Binary Digit) 0 or 1 in binary system Nibble Group of 4 bits. Byte 8 bits is called byte. Word A computer word represents number of bits processed as a unit. Can vary from 8 bits to 64 bits to even more. 17 Typical Memory Units Encountered Seq. # Name Size 1 Bit 1 bit 2 Nibble 4 bits 3 Byte 8 bits 4 Kilobyte (KB) 1024 bytes 5 Megabyte (MB) 1024 KB 6 Gigabyte (GB) 1024 MB 7 Terabyte (TB) 1024 GB 21 Cache Memory Challenge is CPU is extremely fast. RAM is unable to cope up with CPU speed. Solution Cache memory. Placed between CPU and RAM CPU looks for Instructions and Data FIRST in Cache memory then to RAM. Cache memory much faster than RAM. Made up of expensive SRAM (Static RAM) Very very small compared to RAM Key concept is to HOLD frequently used data and instructions to provide faster access to CPU. 22 Cache Memory Conceptual Diagram * Temporal & Spatial Locality 23 Understanding Temporal and Spatial Locality number [5] Location Value 0 1 2 3 4 45 65 99 0 33 Keep adding number from location 0 to location 4 to sum { sum = sum + number [ i ] i =i+1 } // i = 0 , 1, 2, 3, 4 15 Computer Memory Hierarchy 1 Computer Languages Machine Language Assembly Language High Level Language Machine Level Language o Program is a set of instructions o Instructions executed by the CPU using data to achieve an objective o CPU fetches an instruction, decodes or figures it out and then executes the instruction o Binary means ON/OFF represented by 1s and 0s Please do some discovery as to why binary numbers are used in computers. Later on in the comments section, the best answer shall be put on top by me with my comments if required. 2 Machine Level Language (cont’d) o Instructions are written in terms of 1s and 0s only o Differs from Computer to Computer based on hardware architecture o Fastest execution & Efficient Code o Extremely difficult to write o Can make mistakes o For example Stop 0000 Start 0001 Error 1111 Add 1010 https://chortle.ccsu.edu/java5/Notes/chap04/ch04_4.html (Nice example of a machine language Code) Binary devices are Simple and easy to build. Binary signals are Unambiguous (which gives them noise immunity). • • • • Word Size Number of Registers Little Endian Big Endian Harvard vs. Von Neumann 3 Assembly Language o Uses Mnemonics (symbols to represent) Opcode (instructions) o Therefore human readable, understandable compared to machine language o For example 0000 STOP 0001 Start 1111 Error 1010 Add o Start, Stop, Error, Add are all examples of Mnemonics o Considered low level programming language o Needs Software called as Assembler for conversion o Still used critical parts. Code runs fast. o Highly dependent on the computer architecture 4 High Level Language (HLL) o Uses English like language o Simpler to write code compared to Assembly or machine language o Knowledge of Hardware not required o Needs software tools like Compiler to transform to machine code o Faster development and completion of coding tasks o The nature of HLL permits code to be used across different machines without major changes. o Code written is generally portable and hardware architecture Independent. o Examples: FORTRAN, COBOL, C, C++, JAVA etc o C Compilers generate code comparable to assembly language 5 Hardware, Machine Language, Assembly Language and High Level Language Relationship 6 Translators Assembler Compiler Interpreter Linker Loader Need for Translators and Support Tools o Computers understand only machine language o Support system software’s to take a program in high level language and help it execute on a given machine Assembler o System program that transforms code in Assembly language to Machine language (object code) Assembly Language MOV A, B Machine Language 0010 1100 0011 7 Compiler Translates a computer program written in a high level programming language to an executable for a target machine. i.e. Source Code to Assembly or machine code. High Level Language A=B Assembly Language MOV A, B Machine Language 0010 1100 0011 Example: GNU C Compiler 8 Interpreter o Reads a program in high level language and executes the instructions without having to compile the program first. o Takes a line of source code and executes that line. Then proceeds to do the same with the subsequent line. Examples: Python, PERL, BASIC languages 9 Compiler vs Interpreter Major Differences Compiler Interpreter Translates the entire program into machine code and then allows linking and loading for execution. Compiled program runs faster Produces complete error/warning list Converts one line of the source program and then executes that line. Proceeds to the next statement in this manner. Comparatively slower. Compile once run many times Source code required each time. Ex: C, C++ JAVA, Python etc Halts at the first error. 10 Linker o Referred alternatively as binder, link editor o Let us say we write some code that uses SQRT code already available. o Linker joins or patches your code with the externally available code, libraries. o Combines the output of a compiler or assembler to a single executable file. 11 Loader o o o Executable program from the secondary memory needs to be loaded into the RAM (main memory) for the CPU to execute the code. Verifies memory permissions permissions,, memory availability etc Hands over to the CPU the starting address for execution. 12 ***** 1 Generation of computers Background o We live in an information age or the age of Computers o Younger generation bought up in this age needs to develop an understanding and appreciation of computer technology evolution over a period of past 70-80 years o Broadly classified into five generations of development based on technology improvement, faster processing ability, and smaller size, more reliable, efficient, cheaper and capable of doing more things. o Over a period of time they have moved from Corporations to homes to all around. 2 First Generation – Vacuum Tubes (1940 to 1956) o Vacuum Tubes Based Circuits o Magnetic Drums For Memory o Enormous Size Filled Many Rooms o Consumed lot of electricity, Generated a lot of heat, and as a result excess of heat suffered Regular Breakdowns. o Machine language (Direct Communication with Computers) o Handled only one task at a time o Input was based on punched cards and paper tape o ENIAC (Electronic Numerical Integrator and Computer machines) 3 o UNIVAC (Universal Automatic Computer) the first every commercial computer purchased in 1951 by the US Census Bureau Link: https://commons.wikimedia.org/wiki/File:Used_Punchcard_(5151286161).jpg License : This file is licensed under the Creative Commons Attribution 2.0 Generic license. Author : Pete Birkinshaw from Manchester, UK Description : This card was used to load software into a mainframe computer. Each byte (the letter 'A', for example) is entered by punching out a column of holes. Link: https://commons.wikimedia.org/wiki/File:PaperTapes-5and8Hole.jpg License : I, the copyright holder of this work, release this work into the public domain. This applies worldwide. Author : TedColes Description : Five hole and eight hole perforated paper tape as used in telegraph and computer applications 4 English: ENIAC (Electronic Numerical Integrator And Computer) in Philadelphia, Pennsylvania. Glen Beck (background) and Betty Snyder (foreground) program the ENIAC in building 328 at the Ballistic Research Laboratory (BRL). https://commons.wikimedia.org/wiki/File:Eniac.jpg UNIVAC 1 https://www.thocp.net/hardware/univac.htm 5 Second Generation – Transistors (1956 – 1963) o Vacuum tubes replaced by transistors o Very Significant Development. Smaller, Faster, Cheaper, Less Power consumption o Punched card for input and printouts. o Development of Assembly Language using Mnemonics o Languages like ALGOL, FORTRAN, COBOL were being developed (HLL) o Instructions and Data were being stored in Main Memories called magnetic Cores (1955 – 1975) 6 Link: https://commons.wikimedia.org/wiki/File:KL_CoreMemory.jpg License : This file is licensed under the Creative Commons Attribution-Share Alike 3.0 Unported license. Author : Konstantin Lanzet Description : Core Memory Module IBM 1401 https://commons.wikimedia.org/wiki/File:BRL61-IBM_1401.jpg 7 Third Generation – Integrated Circuits (1964 – 1971) o Dawn of the Silicon based Chips o Transistors fabricated and densely packed on these chips o Huge gains in speed, reliability o Advent of Keyboards and Monitors along with OS for managing Hardware o End of Punched Cards and Paper Tapes o With modern OS, multiple applications could be executed simultaneously o Cheaper, more compact machines led to usage in more organizations, like banks and other financial institutions. 8 Link: https://commons.wikimedia.org/wiki/File:IBM_System360_Model_30.jpg License : This file is licensed under the Creative Commons Attribution 2.0 Generic license. Author : Dave Ross Description : An entry-level IBM System/360 system, on display at the Computer History Museum. 9 Fourth Generation – Microprocessors (1972 – 1989) o Revolutionary Intel 4004 Processor o Housed CPU, RAM, I/O and CU on single chip o Transformed Size from a ROOM to a PALM o Landmark 1981 IBM PC for Personal use. 1984 Apple McIntosh o Microprocessors and ICs got into all aspects of life. VLSI o Faster, Affordable, mass market, wider adoption from business to homes o Powerful machines helped spawn the growth of the Internet o GUI, Laptops, Palmtops etc 10 PDP-11 Link: https://commons.wikimedia.org/wiki/File:Pdp-11-40.jpg License : This file is licensed under the Creative Commons Attribution-Share Alike 3.0 Unported license. Author : Stefan_Kögl Description : PDP11/40 as exhibited in Vienna Technical Museum 11 Fifth Generation – Artificial Intelligence, Parallel Computing, Networking (1990 till date) o Ultra Large Scale Integrated Technologies (ULSI) o High Capacity Hard disks, Main memories o Serious attempts to use Computers to do tasks human do using AI o Massively Parallel Computers Cloud Computing o Data Centers, Internet in all domains and aspects of life o Truly the dawn of the Information age using Computers o Challenging applications like Natural Language Processing (NLP) being addressed 12 IBM Blue Gene P supercomputer Link: https://commons.wikimedia.org/wiki/File:IBM_Blue_Gene_P_supercomputer.jpg License : This file is licensed under the Creative Commons Attribution-Share Alike 2.0 Generic license. Author : Argonne National Laboratory's Flickr page Description : The IBM Blue Gene/P supercomputer installation at the Argonne Leadership Angela Yang Computing Facility located in the Argonne National Laboratory, in Lemont, Illinois, USA. ***** 1 Overview of Computer Networks o What is a Computer Network? o Need for a Computer Network o LAN, WAN o Common Networking Hardware at home or labs (Self Discovery). Million miles high overview of computer networks 2 What is a Computer Network? o An interconnection of nodes via means of digital technology for resource sharing and provision of services o Connectivity may be established by the means of Physical cables, Optical wires or Wireless technologies. o They communicate by the means of established rules called as Protocols o Nodes may be Computers, Printers, Scanners, Servers etc o Example of Resource sharing may be a high speed printer 3 o Resources are services (information information or Physical devices) provided by the Network Nodes. o Devices are identified by names and addresses for unique identification o Unique identification is required for locating and communicating to the right node. Descr:: An anchor chart (large poster for classroom display) which is based on the key Network theory content from OCR's GCSE in Computer Science J276. Teaches: Network hardware devices, packet switching, VPNs, Client Server Networks, Network Topologies, LAN vs WANS and Wifi vs Wired networks License:: This file is licensed under the Creative Commons Attribution Attribution-Share Share Alike 4.0 International license. Author: Mrlaulearning Link: https://commons.wikimedia.org/wiki/File:Computer_Networks_anchor_chart.svg 7 Common Networking Hardware o A Network interface card (network interface controller) connects a computer to a computer network, usually a LAN. o Modern computers support an internal NIC embedded on the motherboard Link: https://commons.wikimedia.org/wiki/File:Ethernet_NIC_100Mbit_PCI.jpg Description: 100MBit Ethernet NIC PCI card Author: afrank99 License: This file is licensed under the Creative Commons Attribution-Share Alike 2.0 Generic license. 8 Conceptual Diagram of a Com mputer Network Link: https://en.wikipedia.org/wiki/File:Sample https://en.wikipedia.org/wiki/File:Sample-network-diagram.png Descr: Depicts a sample, hypothetical network diagram. Author: SilverStartalk License: This work is licensed under the Creative Commons Attribution Attribution-ShareAlike ShareAlike 3.0 License 9 Network Switch o Connects other devices together. o Manage the flow of data across a network by transmitting only to the devices addressed. https://commons.wikimedia.org/wiki/File:Netgear_Gigabit_Switch_5-port.jpg Author Simon A. Eugster License: This file is licensed under the Creative Commons Attribution-Share Alike 3.0 Unported license. Description: A 5-port gigabit ethernet switch by Netgear. The LED above the red plug indicates an existing link (i.e. it is connected to some other device), the yellow cable is unconnected. 10 Router o At home provides Wi-Fi connectivity and is connected to a modem. Broadcasts information from the internet to other devices, like computers, phones, and tablets. o In the networking scheme of things it forwards data packets from one router to another router through the networks based on the address of the destination. Link: https://commons.wikimedia.org/wiki/File:Netgear-Nighthawk-AC1900-WiFi-Router.jpg Description: A Netgear Nighthawk WiFi router, model AC1900. This is a wireless router first released in 2013 with a list price of $249. It is a dual band router with a 1GHz dual core Author Evan-Amos License: I, the copyright holder of this work, release this work into the public domain. This applies worldwide. 11 Firewall o A network security system that monitors, controls to and from traffic from the network based on rules of security established. Acts as barrier between a trusted network and an untrusted network, like the Internet. English: Firewall separating zones of trust Author Luis F. Gonzalez I, the copyright holder of this work, release this work into the public domain. This applies worldwide. https://commons.wikimedia.org/wiki/File:Firewall_(networking).png 12 Modem o Stands for "modulator-demodulator" – is a hardware device. Transforms Analog signals coming from networks like Telephone, Cables etc to Digital Signals and vice versa. https://commons.wikimedia.org/wiki/File:BSNL-ADSL_Modem.JPG Description: Picture of BSNL ADSL Modem Author: Lijorijo at Malayalam Wikipedia License: This file is licensed under the Creative Commons Attribution 2.5 Generic license. 13 Proxy Server o A server application that acts as an intermediary for requests from clients seeking resources from servers that provides those resources. A proxy server thus functions on behalf of the client when requesting service, potentially masking the true origin of the request to the resource server. o Instead of connecting di directly rectly to a server that can fulfill a requested resource, the client directs the request to the proxy server, which evaluates the request and performs the required network transactions. With benefits such as load balancing, privacy, or security security* * Information Courtesy Wikipedia https://commons.wikimedia.org/wiki/File:CPT https://commons.wikimedia.org/wiki/File:CPT-Proxy.svg Author Milesjpool, Description: Diagram of a blocked web request, and a successful request via a proxy License: This file is licensed under nder the Creative Commons Attribution Attribution-Share Share Alike 4.0 International license. ***** 4 Why do we need a Computer Network? o Share the resources (Physical and Software) and in communication. o Users can exchange information through file sharing. o Some applications can be submitted to high-powered machines. Following a client-server model o Communicate via email, blogs, chats, and social media. o Voice calls using Internet Protocol (IP) o Education during Covid-19 o Sharing of Hardware devices such as printers, scanners, secondary memory i.e. Storage, processor etc 5 Types of Computer Networks Local Area Networks (LAN) o Generally a network owned and operated by a single entity o Restricted are small office,, lab, building, school or our university campus Link : https://commons.wikimedia.org/wiki/File:Ethernet_LAN.svg Author : T.seppelt, derivate work from File:Ethernet.png, Description : ethernet network License : This file is licensed under the Creative Commons Attribution Attribution-Share Share Alike 4.0 International license. 6 Wide Area Networks (WAN) o Across Wide Geographical Area o Composed on multiple LAN’s interconnected o Best example the Internet Link : https://commons.wikimedia.org/wiki/File:Lanwan.gif License: This file is licensed under the Creative Commons Attribution-Share Alike 4.0 International license. Author: Audit3 Description: Wide Area Network 1 Computer Booting Process in Simple Words Background o A computer requires an Operating system to become usable o The Operating system to work must be loaded into the main memory o Booting involves getting the hardware activated and…. o Broadly to load and hand over charge of the Computer to the Operating System o Very General and broad overview of the Booting Process is provided. Technical accuracy has been adjusted for conceptual clarity. /* Acknowledgement of the Image Source next slide… Link : https://commons.wikimedia.org/wiki/File:Power_On_-_texture.jpg Description: The power button of an ASUS laptop with surrounding concentric pattern. Attribution : (required by the license) © User:Colin / Wikimedia Commons / CC BY-SA 4.0 Changes: Image Cropped */ 2 Step 0 o Switch on the Main Power Supply to the Computer o Switch on the PC/Laptop Power Button o Power is supplied to all components on the motherboard and other hardware to allow them to work. o It is possible that the power supply may have some problems leading to incorrect voltage levels, this leads to a power failure message and the starting is aborted. Information: On a Computer Motherboard there is a special ROM called as the ROM BIOS (Basic Input Output System). This ROM called as BIOS is an EPROM (to allow future upgrades) comes pre-installed with the Computer 3 Step 1 o CPU (Pre-Configured) goes to a specific location in the RAM and executes a Jump to the ROM BIOS address o The CPU first loads data from a ROM, which executes a Power on Self Test (POST). In this phase a diagnosis is run to see if all the major hardware components are working normally. o Checks keyboard connection, video cards, speakers, main memory; etc Data is written and read back from main memory to see if RAM is functioning properly. o For example informs through beeps any known problems. Generally one beep to say all is well or two beeps to indicate some issue. 4 Step 2 o Only on successfully completing the POST process, Bootstrap loader executes. o Its job is to locate and load the Operating system into the Computer Boot Strapping: Pick up one self or in simple words self improvement by one’s own efforts 1 Course Outcomes Guaranteed PATH to being a multimillionaire and a career in a top notch company 2 o First step into the Wonderful world of programming o Master Programming Logic Algorithms and then flowcharts ( MOST IMPORTANT ) o Sound skills programming in computer o Be able to write code on your own o Follow the lecture sequence o Religiously follow the sessions and complete suggested assignments 3 /* Images Acknowledgement and Credits from Wikimedia Commons */ Author: Videoplasty.com Trophy Flat Icon.svg from Wikimedia Commons License: Creative Commons Attribution-ShareAlike 4.0 Credit line example: "Trophy Flat Icon.svg from Wikimedia Commons by Videoplasty.com, CC-BYSA 4.0" Descr: Success road sign. License: This file is licensed under the Creative Commons Attribution-Share Alike 2.0 Generic license. Author: Keith Ramsey (RambergMediaImages) Link: https://commons.wikimedia.org/wiki/File:Success_sign.jpg *****