IT and BCA 2nd Semester (1431568611_899871421)

advertisement
Evolution of computers
The history of computers gives us the basic idea of the technological development the
computers have gone through in the past, and leads to its projections in future. The Abacus
(Developed by ancient Romans) is the earliest digital computer and it represents numbers by
the position of the beads on a rack. Positioning the beads appropriately can carry out simple
and rapid addition and subtraction.
Ancestors of modern age computers were the earliest mechanical and electro-mechanical
devices. These can be traced as far back as the 17th century.
The first attempt towards automatic computing was made by Blaise Pascal, a French
mathematician. He invented the Mechanical Adding Machine in 1642. This device consisted
of a number of gears and chains and performed repeated additions and subtractions. It was
called Pascaline.
Later Charles Babbage invented two machines and he is called to be the father of modern
digital computers. He designed the following two computers –
1) The “Difference Engine” (1822)
He designed this machine based on the mathematical principle of finite differences and
used to solve calculations on large numbers and also used to solve trigonometric
functions and polynomials.
2) The “Analytical Engine” (1842)
It is a general purpose computing device and it could perform any mathematical
operation at a speed of 60 additions per minute.
Generation of computers
The history of computer development can be divided into distinct phases which are often
referred to as generation of computing devices and in computer terminology it is a step in
technology. Each generation of computers is characterized by a major technological
development that fundamentally changes the way computers operate, resulting in increasingly
smaller, cheaper, more powerful, efficient and reliable devices with decreasing energy
consumption and lesser generation of heat. Generally the term generation is used to distinguish
between varying hardware technologies only. But nowadays, it has been extended to include
both software and hardware. Each generation and the developments led to the current devices
that we use today.
1. First Generation of Computers (1940-1956) – Vacuum Tubes
This generation of computers used vacuum tubes in their circuitry and magnetic drums
for memory. A vacuum tube is a glass device that used filaments as a source of electrons
and could control and amplify electronic signals. Input was based on punch cards and
paper tape, and output was displayed on printouts. These could perform calculations in
milliseconds but they have some demerits as follows –
a) Very large in size taking up entire room
b) Very expensive to operate
c) Consumes a great deal of electricity
d) Generates a lot of heat resulting in malfunctioning
2. Second Generation of Computers (1956-1963) – Transistors
This generation of computers used Transistors in place of vacuum tubes. The transistor
was far superior to the vacuum tubes, allowing computers to become smaller, faster,
cheaper, more energy-efficient and more reliable than the first generation of computers.
Input was still based on punch cards, and output was displayed on printouts.
The main demerit is that it still generates a great deal of heat that could result in
computer damage.
3. Third Generation of Computers (1964-1971) – Integrated Circuits
This generation of computers used Integrated Circuits (IC) in place of transistors.
Instead of punched cards and printouts, users interacted with third generation of
computers through devices like keyboards and monitors. They also interfaced with an
operating system that allowed the device to run different applications at a time with a
central program that monitored the computer memory.
The main demerit is that it still generates a great deal of heat that could result in
computer damage
4. Fourth Generation of Computers (1971-Present) – Microprocessors
This generation of computers used Large Scale Integration (LSI) and Very Large Scale
Integration (VLSI). VLSI uses hundreds of thousands of components onto a single chip.
Some of the advantages are a) Fast processing in a small area and helped to diminish the size and price of
computers
b) Increased storage
c) Modular design, versatility, and compatibility
d) Sophisticated programs and languages for special applications
5. Fifth Generation of Computers (Present and Beyond) – Ultra Large Scale
Integration (ULSI)
This generation of computers used Ultra Large Scale Integration (ULSI). ULSI
increases hundreds of thousands of components remaining on a single chip to millions.
They are based on artificial intelligence and are still developing. They use parallel
processing and supercomputers is helping to make artificial intelligence as reality.
Some of the advantages are a) Very fast speed
b) Larger capacity storage like RAID and optical disk
c) Supports more complex applications
Keyboard
Keyboard devices allow input into the computer system by pressing a set of keys, mounted on
a board connected to the computer system. Keyboard devices are classified as –
1) General-purpose keyboards
2) Special-purpose keyboards
1) General-purpose keyboards
The most popular keyboard used today is the 101 – keys with a traditional QWERTY layout,
having an alphanumeric keypad, 12 function keys, different special function keys, numeric
keypad, and cursor-control keys. It is so called because the arrangement of its alphanumeric
keys in the upper left row.
a) Alphanumeric keypad – It contains keys for the English alphabets, 0-9 numbers, special
characters like * + – / [ ] etc.
b) 12 function keys – F1 – 12 keys and are a set of user programmable function keys.
c) Special-function keys – Designed for special functions assigned to each of these keys.
They are as follows –
i)
Shift – Used to enter capital letters or special characters defined above
the number keys
ii)
Spacebar – Used to enter a space at the cursor location
iii)
Ctrl – Used in conjunction with other keys to provide added
functionality on the keyboard
iv)
Alt – Like Ctrl key, it is also used to expand the functionality of the
keyboard
v)
Tab – Used to move the cursor to the next tab position
vi)
Backspace - Used to move the cursor one position to the left and delete
the character in that position
vii)
Caps Lock – Used to toggle between the capital letter lock feature on or
off. When it is “on”, it locks the keypad for capital letters only
viii) Num Lock – Used to toggle between the number lock feature on or off.
When it is “on”, it allows us to input numbers from the numeric keypad
ix)
Insert – Used to toggle between the insert and overwrite mode during
data entry. When it is “on”, entered text is inserted at the cursor location
x)
Delete – Used to delete the character at the cursor location
xi)
Home – Used to move the cursor to the beginning of the work area
xii)
End – Used to move the cursor to the end of the work area
xiii) Page Up – Used to display the previous page of the current document
xiv) Page Down – Used to display the next page of the current document
xv)
Escape – Used to negate the current command
xvi) Print Screen – used to print what is being currently displayed on the
screen
d) Numeric keypad – It consists of keys having numbers (0-9) and mathematical operators
(+ – * /). It is usually located on the right side of the keyboard and supports quick entry
of numerical data.
e) Cursor-Control keys – Defined by the arrow keys and used to move the cursor in the
direction of the arrow (up, down, left and right)
2) Special-purpose keyboards
These are standalone data entry systems used for computers deployed for specific applications
like keyboards used in Automatic Teller Machine (ATM) where keyboard is used for limited
functionality. Other examples are Point-of-Scale (POS) terminals at fast food joints,
Air/Railway reservation counters.
Mouse
It is a pointing device that a computer user pushes across a desk surface in order to point to a
place on a display screen and to select one or more actions possible from that position. The
mouse first became a widely used computer tool when Apple Computer made it as a standard
part of the Apple Macintosh. Todat, mouse is an integral part of the graphical user interface
(GUI) of any personal computer. The mouse apparently got its name by being about the same
size and colour of a toy mouse.
It has usually two buttons at the top: the left one is used most frequently and it lets the user
click once to select a particular position and double click to open a particular select object. The
second button on the right is used to open a pop-up menu for less-frequently needed capability.
In some models, we have a third button for additional capabilities.
Scanners
They are input devices used for direct data entry from the source document into the computer
system. They facilitate the capturing information and storing it in a graphical format for
displaying it back on the graphical screen. They consists of two components – one to illuminate
the page so that the optical image can be captured and the other to convert the captured
graphical image into a digital format for storing. The graphical image thus scanned can be seen
and processed directly by the computer.
Capturing information using scanners reduces the possibility of human error typically seen
during large data entry. The reduction in human intervention improves the accuracy of data and
provides for timeliness of the information processed.
There are two types of scanners – Contact and Laser. Both bounce a beam of light off an
image, and then measure the reflected light to determine the value of the image. Hand-held
contact scanners make contact as they are brushed over the printed matter to be read. Laser
based scanners are more versatile as they can read the printed data near the scanning area.
Hand-held scanners are used where the information to be scanned or the volume of the
documents to be scanned is very low. But they are cheaper as compared to flat-bed scanners.
Monitors
Monitors use a cathode ray tube (CRT) top display information. It resembles a television screen
and is similar to it in other aspects. It is typically associated with a keyboard for manual input
of characters. The screen displays information as it is typed and enabling a visual check of
input before it is transferred to the computer for further processing. It is also used to display
the output from the computer and hence it is termed as a display device. It is the most
commonly used i/o device today and is also known as a soft copy terminal. A printing device
is required to produce a hard copy on a piece of paper.
Speaker
A loudspeaker or speaker is an electroacoustic transducer, a device which converts an electrical
audio signal into a corresponding sound and is used as an output device in our computers. The
first crude loudspeakers were invented during the development of telephone systems in the late
1800s, but electronic amplification by vacuum tube beginning around 1912 made loudspeakers
truly practical. By the 1920s they were used in radios, phonographs, public address systems
and theatre sound systems for talking motion pictures.
The most popular speaker used today is the dynamic speaker, invented in 1925 by Edward
W. Kellogg and Chester W. Rice. The dynamic speaker operates on the same basic principle
as a dynamic microphone, but in reverse, to produce sound from an electrical signal. When an
alternating current electrical audio signal input is applied through the voice coil, a coil of wire
suspended in a circular gap between the poles of a permanent magnet, the coil is forced to move
rapidly back and forth due to Faraday's law of induction, which causes a diaphragm (usually
conically shaped) attached to the coil to move back and forth, pushing on the air to create sound
waves. Besides this most common method, there are several alternative technologies that can
be used to convert an electrical signal into sound.
Printers
Printers are used for producing output on paper. The printers can be classified into categories
based on –
a) Printing technology
b) Printing speed
c) Printing quality
Printing Technology
Printers are classified as impact and non-impact printers based on the technology they use for
producing output.
a) Impact printers
They use the standard typewriter mechanism where a hammer strikes through an
inked ribbon. These printers have a mechanism that touches the paper in order to
create an image. Eg. Dot matrix printers and character printers.
b) Non-impact printers
They don’t touch the paper when creating an image. They use chemical, heat or
electrical signals to etch symbols on paper. Eg. Inkjet, laser, and thermal printers.
Printing Speed
It defines the number of characters printed in a unit of time. Based on the speed, these
printers may be classified as –
a) Character printers – prints one character at a time
b) Line printers – prints one line at a time
c) Page printers – prints entire page at a time
Printing speeds are therefore measured in terms of characters-per-second or cps for a
character printer, lines-per-minute or lpm for a line printer, and pages-per-minute or
ppm for a page printer.
Printing Quality
Printing quality is determined by the resolution of printing and is characterized by the number
of dots that can be printed per linear inch, horizontally or vertically. It is measured in terms of
dots-per-inch or dpi. Printers can be classified as near-letter-quality or NLQ, letter-quality or
LQ, near-typeset-quality or NTQ, and typeset-quality or TQ based on their printing quality.
The resolution for NLQ, LQ, NTQ, and TQ are 300 dpi, 600 dpi, 1200 dpi, and 2000 dpi
respectively. NLQ and LQ printers are used for ordinary printing in day-to-day activities, while
NTQ, and TQ are used to produce top-quality printing, typically required in publishing
industry.
Type of printers
Various type of printers available in the market are –
i)
Dot Matrix printer
These printers were the most popular impact printers used in personal computing.
They use a print head consisting of a series of small pins to strike a ribbon
coated with ink, causing the ink to transfer to the paper at the point of impact.
Characters are thus produced in a matrix format. The shape of each character i.e.
the dot pattern is obtained from information held electronically.
Features –
a) Low cost
b) Attractive in the personal computer market
c) Printing speed is 40-1000 cps
The major disadvantage of this printer is that the printing quality is low.
ii)
Inkjet Printer
These printers use a series of nozzles to spray drops of ink directly on the paper.
These are the non-impact printers. The print head consists of a number of tiny
nozzles that can be selectively heated up in a few microseconds by an IC –
register. When this happens, the ink near it vaporizes and is ejected through
the nozzle to make a dot on the paper placed in front of the print head. The
character is printed by selectively heating the appropriate set of nozzles as the
print head moves horizontally.
Features –
a) Dots are extremely small usually 50-60 microns in diameter
b) Dots are positioned very precisely with resolutions of upto 1440×720 dots
per inch (dpi)
c) Dots can have different colors combined together to create photo-quality
images.
The major disadvantages are –
a) Ink cost is expensive
b) Slower than dot-matrix printers
These are generally used by the people or organizations where printing speed is not
the most important factor.
iii) Laser Printer
These printers use dry ink (toner), static electricity, and heat to place and bond the
ink onto the paper. They use a combination of laser and photocopier technology.
Printing is achieved by deflecting the laser beam onto the photosensitive surface of
a drum after which the latent image attracts the toner to the image. The toner is then
electrostatically transferred to the paper and fixed into permanent image. They are
capable of converting computer output into print page by page. Since characters are
formed by very tiny ink particles, they can produce high quality images (text and
graphics)
Features –
a) High quality printing
b) Silent in use
c) Faster in printing than other printers
d) High Speed and printing range is 10 – 200 pages per minute depending on
the model
The major disadvantage of this printer is that it is the expensive one.
Hard Disk
A hard disk drive (HDD) is a data storage device used for storing and retrieving digital
information using rapidly rotating disks (platters) coated with magnetic material. An HDD
retains its data even when powered off. Data is read in a random-access manner, meaning
individual blocks of data can be stored or retrieved in any order rather than sequentially. The
first hard disks, which first showed up in the 1950s on mainframe computers, were 20 inches
in diameter and held only a few megabytes of data. Hard disks were originally called as fixed
disks and Winchester drives and became known as hard disks later to differentiate them from
floppy disks.
Introduced by IBM in 1956, HDDs became the dominant secondary storage device for generalpurpose computers by the early 1960s. Continuously improved, HDDs have maintained this
position into the modern era of servers and personal computers. More than 200 companies have
produced HDD units, though most current units are manufactured by Seagate, Toshiba and
Western Digital.
The two most common form factors for modern HDDs are 3.5-inch, for desktop computers,
and 2.5-inch, primarily for laptops.
As of 2015, the primary competing technology for secondary storage is flash memory in the
form of solid-state drives (SSDs), but HDDs remain the dominant medium for secondary
storage due to advantages in price per unit of storage and recording capacity. However, SSDs
are replacing HDDs where speed, power consumption and durability are more important
considerations.
Major components of a hard disk drive are as follows –
i)
ii)
iii)
iv)
v)
vi)
vii)
viii)
Disk platters
Spindle and spindle motor
Read/Write heads
Head actuators
Air filter
Logic board
Connectors and jumpers
Bezel
Each hard disk is organized into the following organizing building blocks –
i)
ii)
iii)
Track – they are concentric areas on the disk that complete one circumference of
the disk. On a disk drive there can be 1,000 tracks or more. The first track where
the data is written first, is along the outer edge of the disk. Tracks of the same
number on all platters on the drive form a cylinder.
Sectors – Sectors divide the disk into the number of cross-sections that intersect all
of the tracks on the disk. A sector is typically 512 bytes in length, and disk drives
have from 100 to 300 sectors per track.
Cylinders – Cylinders reflect how the read/write heads move in and out of the disk
platters in unison. This grouping technique is unique to hard disks. It is the logical
grouping of the same tracks on each disk surface.
iv)
v)
Clusters – A cluster is formed from group of sectors. This logical grouping is used
by OS to track data on the disk. There are normally around 64 sectors to a cluster,
but the size of the disk drive and the OS in use determine the actual number of
sectors in a cluster.
Multiple zone recording – This technique is used on some disks to eliminate the
effect of the shape of the disk in recording sectors. More sectors are placed on tracks
closer to the outer edge of the disk and fewer sectors are placed on the tracks closer
to the inside edge.
Multiple disks are usually stacked and used together to create disk storage systems having large
capacities. The multiple disks are fixed on a central shaft, one below the other to form a disk
pack. This is then mounted on a disk drive that has a motor to rotate this disk pack about its
axis. The disk drive has an access arm assembly with a separate read/write head for each surface
of the disk pack. The access arms for all the disk surfaces move together. So a disk system is
addressed by the disk number, the disk surface, sector number, and the track within the sector.
Usually the upper surface of the topmost disk and the lower surface of the bottom-most disk
are not used as they are prone to getting scratched easily. For faster access of data from the
disk packs, a concept called cylinder is used. A set of corresponding tracks on all the recording
surfaces on the disk pack together form a cylinder. If there are 100 tracks on each disk surface,
there are 100 cylinders in the disk pack.
Cylinder-based organization provides faster data access. The related records of the file can be
stored on the same cylinder (on multiple disks of a disk pack) and subsequently with one
movement of the access arm, all records on say cylinder 5 (5th track of every recording surface)
can be simultaneously read.
The figure shows a disk pack with four disks.
The storage capacity of a disk system can determined as –
Storage capacity = No. of recording surfaces × No. of tracks per surface × No. of sectors
per track × No. of bytes per sector
FAT
A file allocation table (FAT) is a file system developed mostly for hard drives that
originally used 12 or 16 bits for each cluster entry into the file allocation table. It is stored on
a hard disk or floppy disk that indicates the status and location of all data clusters that are on
the disk. It is used by the operating system (OS) to manage files on hard drives and other
computer systems. It is found in flash memory, digital cameras and portable devices. The
FAT file system is supported by nearly all OSs installed on personal computers (PCs). It is
used to store file information and extend the life of a hard drive. Most hard drives require a
process known as seeking; this is the actual physical searching and positioning of the
read/write head of the drive. The FAT file system was designed to reduce the amount of
seeking and thus minimize the wear and tear on the hard disc. Although first produced for
hard disc drives, FAT was later used for storing information on portable media such as flash
memory cards. If the file allocation table is damaged or lost, then a disk is unreadable.
The FAT12 is the file system on a floppy disk. The number “12” is derived from the
fact that the FAT consists of 12-bit entries.
The storage space on a floppy disk is divided into units called sectors. In larger
storage devices, a bunch of sectors form a cluster. However, for the floppy disk, the number
of sectors in a cluster is one. Also, the size of a sector (and hence a cluster) is 512 bytes for a
floppy disk.
Disk organization
A floppy disk layout (FAT-12) consists of four major sections: the boot sector,
FAT tables, root directory, and data area:
Figure 1 Disk organization of the FAT12 file system
•
The boot sector consists of the first sector (sector 0) on the volume or disk. The boot
sector contains specific information about the rest of organization of the file system,
including how many copies of the FAT tables are present, how big a sector is, how many
sectors in a cluster, etc.
•
FAT tables contain pointers to every cluster on the disk, and indicate the number of
the next cluster in the current cluster chain, the end of the cluster chain, whether a cluster is
empty, or has errors. The FAT tables are the only method of finding the location of files and
directories on the rest of the disk. There are typically two redundant copies of the FAT table
on disk for data security and recovery purposes. On a floppy, since a cluster consists of just
one sector, there is a FAT entry pointer to every sector on the disk.
•
The Root directory is the primary directory of the disk. Unlike other directories
located in the data area of the disk, the root directory has a finite size (For FAT12, 14 sectors
* 16 directory entries per sector = 224 possible entries), restricting the total amount of files or
directories that can be created therein.
•
Data Area is the first sector or cluster of the data area corresponds to cluster 2 of the
file system (the first cluster is always cluster 2). The data area contains file and directory data
and spans the remaining sectors on the disk.
Why do we need a FAT?
The directory entry has a field called the First Logical Cluster field which
specifies where the file or subdirectory begins. Since files and directories can be larger
than a sector, a directory or file may have to be stored across more than one sector. The data
sectors belonging to a file or a directory are not always stored in contiguous locations in
memory. A FAT therefore is used to keep track of which sectors are allocated to which
file.
To retrieve the entire contents of a file, for example, the First Logical Cluster field
would point to the sector number that holds the first 512 bytes of data. The data from this
sector needs to be read in. To determine if there is more data, one must examine the FAT
entry that corresponds to the First Logical Cluster. By examining the FAT entry value, it can
be determined if there is another sector allocated to this file. If there is, then the logical sector
value is translated to physical sector value and the data from that sector is read in. Next, the
FAT entry for the second data sector is examined to see if it is the end of the file. If not, the
process is continued.
Therefore, the FAT allows the access of data stored in non-contiguous sectors of the
storage device.
In the Figure, File1.txt is stored in logical sectors 2, 4, 6 and 7. The directory entry
field “Start Cluster” i.e. First Logical Cluster field points to sector number 2 which is the first
data sector. In the FAT, the value at FAT entry 2 is 4, indicating that the next data sector of
File1.txt is stored in logical sector 4. The last sector is sector 7, which is evident as the FAT
entry 7 holds the EOC value.
In a FAT folder structure, files are given the first available location on the volume. The
starting cluster number is the address of the first cluster used by the file. Each cluster contains
a pointer to the next cluster in the file, or an end-of-file (EOF) indicator at (0xFFFF) which
indicates that this cluster is the end of the file. These pointers and end-of-file indicators are
shown in the above Figure.
Figure: Files on a FAT Volume
The above figure shows three files in a folder. File1.txt is large enough to use three
clusters. File2.txt is a fragmented file that also requires three clusters. The third file, File3.txt,
fits completely in one cluster. In each case, the folder entry points to the first cluster of the file.
In this section, the choice of the value “12” is explained followed by a description on
how a 12-bit value is stored in the FAT.
The space on a floppy disk = 1.44 MB.
The number of bytes in a sector = 512 bytes
The number of sectors in 1.44 MB = x ≈ 2812
Therefore, the minimum number of bits required to address “x” sectors = 12 bits (211
< 2812)
It can be seen from the above computations that 12 bits is the minimum number of bits
needed to access the entire 1.44M space of a floppy disk.
FAT12 is the original implementation of FAT and is intended for very small media.
The file allocation table for FAT12 is smaller than the file allocation table for FAT16 and
FAT32, because it uses less space for each entry.
FAT16 is not recommended for volumes larger than 511 MB because, when relatively
small files are placed on a FAT16 volume, FAT uses disk space inefficiently. We cannot use
FAT16 on volumes larger than 4 gigabytes (GB), regardless of the cluster size.
FAT16 supports volumes up to 2 GB, whereas theoretically FAT32 can manage
volumes up to 2 TB. The FAT32 on-disk format and features on Windows 2000 are similar to
those on Windows 95 OSR2 and Windows 98.
FAT32 uses 4 bytes per cluster and FAT16 uses 2 bytes per cluster within the file
allocation table.
Difference between FAT12, FAT16 and FAT32
Attribute
FAT12
FAT16
FAT32
Used for
Floppies, small
Small to large hard
Large to very large
hard drives
drives
hard drives
12 bits
16 bits
32 bits
~4,096
~65,536
~268, 435, 456
512 B to 4 KB
2 KB to 32 KB
4 KB to 32 KB
Size of each FAT
entry
Maximum number of
clusters
Supported cluster size
Maximum volume size
16 MB
2 GB
2 TB
NTFS
NTFS stands for New Technology File System developed by Microsoft and this took
over FAT as the primary file system being used in windows. Starting with Windows NT 3.1,
it is the default file system of Windows family.
NTFS has several improvements over FAT and HPFS (High Performance File
System), the system that it suspended, such as improved support for metadata, and the use of
advanced data structures to improve performance, reliability, and disk space utilization, plus
additional extensions, such as security access control lists (ACL) and file system journaling.
Difference between FAT32 and NTFS
FAT32
NTFS
FAT32 provides very little security. A user
NTFS allows the use of NTFS Permissions.
with access to a drive using FAT32 has
It's much more difficult to implement, but
access to the files on that drive.
folder and file access can be controlled
individually, down to an extreme degree if
necessary.
FAT32 must be used for any drives that
must be accessed when the computer is
NTFS volumes are not recognized by
Windows 95/98/Me.
booted from Windows 95/98 or Windows
Me.
FAT and FAT32 volumes can be converted
NTFS cannot be converted to FAT32
to NTFS volumes.
without reformatting.
It does not support disk quotas.
NTFS supports disk quotas, allowing you to
control the amount of disk usage on a per
user basis.
FAT32 supports no file compression
NTFS supports file compression.
It is not very reliable since it does not support It is highly reliable since it supports bad
bad cluster mapping.
cluster mapping and transaction logging.
Defragmentation
Defragmentation is the process of locating the noncontiguous fragments of data into which a
computer file may be divided as it is stored on a hard disk, and rearranging the fragments and
restoring them into fewer fragments or into the whole file. Defragmentation reduces data
access time and allows storage to be used more efficiently.
Some operating systems automatically defragment storage periodically; others require that the
user occasionally use a special utility for this purpose. Windows 98 comes with a built-in
defragmenter as a "system tool" that the user can run. Windows NT did not come with a
defragmenter because its file system, NTFS, was designed to minimize fragmentation;
however, NT users often find one necessary and several vendors provide defragmenters.
Windows 2000 comes with a "light" version of the Diskeeper defragmenter; some users
(especially corporate users) use Diskeeper or some other full-function defragmentation
program to manage storage efficiency and performance. Windows XP comes with a utility
called "Disk Defragmenter."
Disk Error
A hard disk drive failure occurs when a hard disk drive malfunctions and the stored information
cannot be accessed with a properly configured computer. A disk failure may occur in the course
of normal operation, or due to an external factor such as exposure to fire or water or high
magnetic fields, or suffering a sharp impact or environmental contamination, which can lead
to a head crash.
Hard drives may fail in a number of ways. Failure may be immediate and total, progressive, or
limited. Data may be totally destroyed, or partially or totally recoverable.
Earlier drives had a tendency toward developing bad sectors with use and wear; these bad
sectors could be "mapped out" so they were not used and did not affect operation of a drive,
and this was considered normal unless many bad sectors developed in a short period of time.
Some early drives even had a table attached to a drive's case on which bad sectors were to be
listed as they appeared. Later drives map out bad sectors automatically and invisibly to the
user; S.M.A.R.T. (Self-Monitoring, Analysis, and Reporting Technology) information logs
these problems. A drive with bad sectors may usually continue to be used.
Some hard drives simply fail because of worn out parts, others fail prematurely. HDD
manufacturers typically specify a Mean Time Between Failures (MTBF) or an Annualized
Failure Rate (AFR) which are population statistics that cannot predict the behavior of an
individual unit. These are calculated by constantly running samples of the drive for a short
amount of time, analyzing the resultant wear and tear upon the physical components of the
drive, and extrapolating to provide a reasonable estimate of its lifespan. HDDs typically fail
within a short time if there is a defect present from manufacturing. If an HDD proves reliable
for a period of a few months after installation, the HDD has a significantly greater chance of
remaining reliable. Therefore, even if a HDD is subjected to several years of heavy daily use,
it may not show any notable signs of wear unless closely inspected. On the other hand, an HDD
can fail at any time in many different situations.
Components of the electronic circuitry may fail making the drive inoperable.
Bearing and motor failure may fail or burn out, and bearings may wear enough to prevent
proper operation.
The most notorious cause of HDD failure is a head crash, where the internal read-and-write
head of the device, usually just hovering above the surface, touches a platter, or scratches the
magnetic data-storage surface. A head crash usually incurs severe data loss, and data recovery
attempts may cause further damage if not done by a specialist with proper equipment.
Another cause of failure is a faulty air filter. The air filters on today's HDDs equalize the
atmospheric pressure and moisture between the HDD enclosure and its outside environment.
If the filter fails to capture a dust particle, the particle can land on the platter, causing a head
crash if the head happens to sweep over it. After an HDD crash, particles from the damaged
platter and head media can cause one or more bad sectors. These, in addition to platter damage,
will quickly render a HDD useless.
During normal operation, heads in HDDs fly above the data recorded on the disks. Modern
HDDs prevent power interruptions or other malfunctions from landing its heads in the data
zone by either physically moving (parking) the heads to a special landing zone (an area of
the platter usually near its inner diameter) on the platters that is not used for data storage,
or by physically locking the heads in a suspended (unloaded) position raised off the platters.
Some early PC HDDs did not park the heads automatically when power was prematurely
disconnected and the heads would land on data. In some other early units the user would run a
program to manually park the heads.
Disk Cleanup
Disk Cleanup (cleanmgr.exe) is a computer maintenance utility included in Microsoft
Windows designed to free up disk space on a computer's hard drive. The utility first searches
and analyzes the hard drive for files that are no longer of any use, and then removes the
unnecessary files and helps us remove them to cleanup some space and make our computer run
a bit faster. There are a number of different file categories that Disk Cleanup targets when
performing the initial disk analysis:

Compression of old files

Temporary Internet files

Temporary Windows files

Downloaded program files

Recycle Bin

Removal of unused applications or optional Windows components

Setup log files

Offline web pages (cached)
Floppy Disk
The disks used with a floppy disk drive are small removable disks made of plastic coated with
magnetic recording material. There are two sizes commonly used with diameters 51/4 and 31/2
inches.
1. The 51/4 disk is a 51/4 inch diameter floppy disk. Earlier such disks recorded data only
on one side and were called single-sided (SS) disks. Today both surfaces are used for
recording and are called double-sided (DS) disks. These are available in two capacities
– double density (DD) and high density (HD), where density refers to the number of
bits that can be stored per square inch area. The capacity of the disk is 1.2 MB and has
96 total no. of tracks.
2. The 31/2 disk is a 31/2 inch diameter floppy disk. These record data on both sides and
are therefore double sided disks. These disks come in three different capacities – double
density, high density, and very high density. These are smaller and can store more data
than the 51/4 inch disks. The capacity of the disk is 1.44 MB and has 80 total no. of
tracks.
Sliding metal piece
cover (Flap)
Label for identification
Write-protect tab
Fig. 31/2 inch Floppy Disk
The storage capacity of the disk can be calculated as –
Storage capacity = No. of recording surfaces × No. of tracks per surface × No. of sectors
per track × No. of bytes per sector
Virtual Memory
A process was loaded into the main memory for execution only when sufficient free memory
was found to be available to load the entire process. This scheme suffers from the following
two limitations –
1) A process cannot be loaded and has to keep waiting for its execution to start until
sufficient free memory for loading the entire process becomes available.
2) A process cannot be loaded in a system whose main memory size is less than total
memory required by the process.
Virtual Memory is a memory management scheme that overcomes the above mentioned
limitations by allowing the execution of processes that might not be completely loaded in the
main memory i.e. it does not require the entire process to be in main memory before the process
can execute.
In a virtual memory system, all processes are partitioned into pages and reside on the on-line
secondary storage. The physical memory is also portioned into page frames of the same size.
Now instead of swapping the entire process before its execution can start, a swapping algorithm
(called demand paging) is used that swaps in only those pages of a process that are currently
needed in the main memory for continuing the process’s execution.
Cache Memory
Cache memories are small, fast memories placed between the CPU and the main memory. They
are faster than the main memory with access times closer to the speed of the CPU. Although
caches are fast, they are also very expensive and so are used only in small quantities. Cache
memories are therefore intended to provide fast memory retrieval without sacrificing the size
of the memory.
Though the memory is small, it is used in increasing the overall speed of the memory due to
the property of locality of reference.
The memory references at any given interval of time tend to be confined to a few localized
areas in the memory. This phenomenon is known as the property of locality of reference. Based
on the locality of reference, the cache contains a copy of certain portions of main memory. The
memory read or write operation is first checked with the cache and if the desired data is
available in the cache it is used by the CPU directly. Otherwise, a block of words is read from
the main memory to cache and the CPU then reads these words from the cache.
Fig. Functioning of the Cache Memory
Optical Media or Disks
Optical disks are storage devices with huge storage capacity. It is a relatively new storage media
and uses laser beam technology for reading and writing of data. Optical disks consist of one
large track that starts from the outer edge and spirals inward towards the center. It is split up
into sectors but these are of the same length regardless of its location on the track. Data is
packed at maximum density over the disk.
The storage capacity of an optical disk is determined as –
Storage Capacity = Number of sectors × Number of bytes per sector
(We don’t consider the number of tracks as there is only one track)
The technology used in optical disks uses laser beams to write and read data as opposed to the
read/write head used in magnetic disks. Data is recorded by etching microscopic pits (burning
surface) on the disk surface. A high intensity laser beam is used to etch the pits while a low
intensity laser beam is used for data retrieval.
The optical disks that are becoming increasing popular in various computer applications are
CD-ROMs, Erasable Optical disks, and DVDs.
CD - ROM
The CD-ROM (Compact Disc Read-only Memory) is a direct extension of the audio CD. It is
usually made from a resin named polycarbonate that is coated with aluminium to form a highly
reflective surface. The information on a CD-ROM is stored as a series of microscopic pits on
the reflective surface (using a high intensity laser beam). The process of recording information
on these disks is known as mastering. This is so called because this master disk is then used to
make a die, which is used to make copies.
The information is retrieved from a CD-ROM using a low powered laser beam, which is
generated in an optical disc drive unit. The disk is rotated and the laser beam is aimed at the
disk. The intensity of the laser beam changes as it encounters a pit. A photo-sensor detects the
change in intensity, thus recognizing the digital signals recorded on the surface of the CDROM and converts them into electronic signals of 1s and 0s.
The information stored in the CD-ROM can be read only. It cannot be modified in any way. It
is therefore useful for applications in which there is a database of information that is useful as
it is and does not need changing in any way, eg. A directory such a Yellow Pages. CD-ROMs
are useful for distributing information to a large number of users.
Advantages of CD-ROM:
1) Large storage capacity for information or data
2) Fast and inexpensive mass replication
3) Suitable for archival storage as they are removable disks
Disadvantages of CD-ROM:
1) They are read-only and cannot be updated
2) Access time is greater than that of magnetic disc
DVD
Digital Versatile Discs is an optical disk storage format, which is used for digital representation
of movies and other multimedia presentations that combine sound with graphics. DVDs are
similar to Compact Discs (CDs) but with much greater storage capacity than that of CDs. A
DVD uses 5-inch disc storage capacity ranging from 4.7 GB to 17 GB. A DVD can store entire
movie, or several hours of audio, or computer data of 5 GB or more. We can use DVDs for
recording purpose on both sides as well as in dual layers, which provides us two individual
recordable layers on a single-sided DVD disc.
BIOS
The Basic Input/Output System (BIOS) is a built-in software. It is placed in the ROM chip on
our motherboard. It is also called as ROM BIOS. BIOS performs Power-On Self-Test. It is a
diagnostic testing tool that checks whether our hardware devices are working properly or not.
Modern PCs contain flash BIOS. In the flash BIOS, the BIOS have been stored on a flash
memory chip that is rewritable memory chip. We can update the flash BIOS, if needed in future.
It acts as an interface between the OS and the hardware components, when the system is
booting and running.
Some of the manufacturers of BIOS are –
1. American Megatrends Inc. (AMI)
2. Award
3. MR BIOS
4. Phoenix Technologies
Functions –
1. Ensures the basic operability of each component by using the list of all the hardware in
the system.
2. Identifies and configures new hardware including hard drives and floppy drives.
3. Finds a valid operating system and transfers the control of the system to that operating
system after the boot functions have been completed.
SMPS (Switched-Mode Power Supply)
It is an electronic power supply unit. It helps us to convert input power to a controlled voltage.
A computer works on DC power supply, however, the power socket provides us with AC power
supply. One of the main functions of SMPS is to convert the AC power into DC power.
Power connector is an electrical connector that is used to carry DC or low frequency AC power.
With the help of power connectors, the power supply unit provides current to the different
components of a system which includes motherboard, hard drive, floppy drive, and other
components. The different of power connectors are –
1. AT Power Connectors
AT (Advanced Technology) power connectors have two 6-wire connectors named P8
and P9 which are used to connect to the motherboard with black wires facing each other.
The different form factors are PC/XT, AT, Baby AT, and LPX and use a pair of 6-wire
connectors known as AT style connectors.
2. ATX Power Connectors
ATX (Advanced Technology Extended) power is a 20-pin connector which outputs 6
types of voltages. ATX style power connectors are used by ATX/NLX form factors.
3. Standard Peripheral Power Connectors
It is also known as 4-pin Molex power cable or 4-pin molex. The 4-wire connectors are
used by the disk drive power connectors.
Pin Number
Color
Pin 1
Yellow
+12V
Pin2
Black
Ground
Pin3
Black
Ground
Pin4
Red
+5V
4. Floppy Drive Power Connectors
It is known as mini-plug and are used in 3.5 inch floppy disk drive.
Description
RJ45 Connector
The standard connector for unshielded twisted pair cable is an RJ45 connector. This is
a plastic connector that looks like a large telephone-style connector. A slot allows the RJ-45 to
be inserted only one way. RJ stands for Registered Jack, implying that the connector follows a
standard borrowed from the telephone industry. This standard designates which wire goes with
each pin inside the connector.
NIC Card
The network interface card (NIC) provides the physical connection between the
network and the computer workstation. Most NICs are internal, with the card fitting into an
expansion slot inside the computer. Some computers use external boxes which are attached to
a serial port or a SCSI port. Every NIC has a MAC address (Medium Access Control), which
is a binary address unique to a single network. This MAC address is 48-bit long and used to
uniquely identify each node of a network.
NICs are major factor in determining the speed and performance of a network.
The NIC has a driver, which is a software component that manages the NIC. The NIC
driver serves as a crucial role in the networking architecture.
Network Cable
Cable is the medium through which information usually moves from one network device to
another.
There are several types of cables which are commonly used with LANs. They are –
1. Twisted Pair cable
2. Coaxial Cable
3. Fiber Optic cable
1. Twisted Pair Cable
It contains two cable wires that uses copper as a conductor. These wires have a plastic
insulation and are twisted. One twisted cable wire carries the signal to the receiver and
the other cable wire acts as a ground reference. At the other end, the receiver obtains
the difference in the values of the signal between two cable wires. The cable wires are
twisted to provide protection against crosstalk and noise. It is generally used for voice
and data communication.
Twisted pair cable comes in two varieties – shielded and unshielded. The shielded
twisted pair cable has a metal shield covering each pair of insulated cable wires. This
type of shielding protects the cable from external electromagnetic interferences and
crosstalk. STP is suitable for environments with electrical interference, but the extra
shielding can make the cables quite bulky.
Unshielded twisted pair cable is the most popular cable and is generally the best option
for school networks. The cable has four pairs of wires inside the jacket. Each pair is
twisted with a different number of twists per inch to eliminate interference from
adjacent pairs and other electrical devices. The tighter the twisting, the higher the
supported transmission rate and the greater the cost per foot. It is generally used in
Ethernet networks and telephone systems.
The main disadvantage of UTP is that it may be susceptible to radio and electrical
frequency interference.
2. Coaxial cable
Coaxial cable consists of a two conductors. One is the inner conductor of solid copper
and the other is the outer conductor. The outer conductor acts as a shield against
noise. There is insulating plastic between the conductors and the whole cable is
covered with plastic jacket. The coaxial cable can carry signals of higher frequency
ranges than twisted pair cables. These cables are used in cable TV network and
traditional Ethernet LANs.
3. Fiber Optic cable
It is made up of glass or plastic and the signal propagates in the form of light. The inner
core is surrounded by a cladding of glass or plastic that is less dense than the core. It
contains greater bandwidth than the metallic cables. Due to greater bandwidth, these
cables can carry more data. Fiber optic cables are thinner and lighter than metallic
cables. The main disadvantage of this type of cable is that it is much more expensive
on install.
Switch
It is a network hardware device and is used to connect multiple computers in a LAN.
They are generally used in areas of high network traffic. A switch is able to inspect the
received data packet and determines its source and destination devices and forward it
accordingly. So, on a busy network, a switch performs better work than a hub.
Hub/Concentrator
A concentrator is a device that provides a central connection point for cables from
workstations, servers, and other peripherals to form a small network. Hubs are multislot
concentrators into which can be plugged a number of multi-port cards to provide additional
access as the network grows in size. Some concentrators are passive, that is they allow the
signal to pass from one computer to another without any change. Most concentrators are active,
that is they electrically amplify the signal as it moves from one device to another. Active
concentrators are used like repeaters to extend the length of a network.
In a network, the hub broadcasts the data packets to all the computers in the network
without determining the source and destination devices of the data.
Repeater
The repeater electrically amplifies the signal it receives and rebroadcasts it. Repeaters
can be separate devices or they can be incorporated into a concentrator. They are generally
used when the total length of the network cable exceeds the standards set for the type of cable
being used.
I/O Box Connector
It is a connector mounting RJ45 connector into keystone wall plate, face plate,
surface-mount box, or a patch panel with rectangular holes, called ports. One end of the patch
cord is connected to the I/O box connector and the other end is connected to the host machine
for sharing resources or information in LAN.
Patch panel
A patch panel, patch bay, patch field or jack field is a device or unit featuring a
number of jacks, usually of the same or similar type, for the use of connecting and routing
circuits for monitoring, interconnecting, and testing circuits in a convenient, flexible manner.
Patch panels are commonly used in computer networking, recording studios, and radio and
television.
Patch cord
A patch cable or patch cord or patch lead is an electrical or optical cable used to
connect one electronic or optical device to another for signal routing. Devices of different types
(e.g., a switch connected to a computer, or a switch to a router) are connected with patch cords.
Patch cords are usually produced in many different colors so as to be easily distinguishable,
and are relatively short, perhaps no longer than two metres. Types of patch cords include
microphone cables, headphone extension cables, XLR connector, Tiny Telephone (TT)
connector, RCA connector and ¼" TRS phone connector cables (as well as modular Ethernet
cables), and thicker, hose-like cords (snake cable) used to carry video or amplified signals.
However, patch cords typically refer only to short cords used with patch panels.
Patch cords can be as short as 3 inches, to connect stacked components or route signals
through a patch bay, or as long as twenty feet or more in length for snake cables. As length
increases, the cables are usually thicker and/or made with more shielding, to prevent signal loss
and the introduction of unwanted radio frequencies and electromagnetic interference.
Patch cords are often made of coaxial cables, with the signal carried through a shielded
core, and the electrical ground or earthed return connection carried through a wire mesh
surrounding the core. Each end of the cable is attached to a connector so that the cord may be
plugged in. Connector types may vary widely, particularly with adapting cables.
Patch cords may be:

Single-conductor wires using, for example, banana connectors

Coaxial cables using, for example, BNC connectors

Shielded or unshielded Cat5, Cat5e, Cat6 or Cat6A cables using 8P8C (RJ-45) modular
connectors with straight-through T568A or T568B wiring.

Optical fiber cables
A patch cord is always fitted with connectors at both ends.
IP Address
An IP-address is a unique 32-bit logically assigned binary number of four octets, which
is represented in decimal notation, designated to a particular device. Hosts and routers used in
the TCP/IP protocol suite are identified by the IP-address. IP- address is used to send and
receive information from one host to another through a physical medium such as, cable on the
network. IP – address is divided into five type of classes: A, B, C, D, and E and each class has
its specific range. The first four bits of an IP- address determines the class into which an IPaddress fits. The IP-address consists of two parts –
1. Network ID: identifies the network to which the host is connected. It is same for all
the hosts on a particular network.
2. Host ID: identifies the host on the network. It is different for different hosts on the
network.
Eg. 192.168.75.38 (Network ID: 192.168.75
Host ID: 38)
Rules regarding the identification of IP address:
1. An IP – address cannot be duplicated
2. All hosts bits cannot be set to zero
3. All host bits cannot be set to one
4. 127 cannot be taken as the first octet because it is reserved as a loopback address (
Address that acts as a test mechanism for network devices and protocols)
Types of IP-addresses
Class A: If the first bit is zero, IP-address belongs to Class A address. Class A addresses are
used when there are several hosts communicating on a large network. It uses the first octet, in
which the first bit is set to zero, and the other seven bits are all set to one. These networks use
the first 8 bits of the IP – address to identify the network address and the remaining 24 – bits
are used to identify the individual hosts. Class A has upto 224 different host IDs.
Class B: If the first bit is one and the second bit is zero, IP-address belongs to Class B address.
Class B addresses uses the first two octets or 16 bits of an IP – address to identify the network
address and the remaining 16 bits are used to identify the host ID. Class B has upto 216 different
host IDs. Class B addresses are used in medium to large scale organization.
Class C: If the first two bits are one and the third bit is zero, IP-address belongs to Class C
address. Class C addresses uses the first three octets or 24 bits of an IP – address to identify the
network address and the remaining 8 bits are used to identify the host ID. Class C has upto 2 8
different host IDs. Class C addresses are used in LANs.
Class D: If the first three bits are one and the fourth bit is zero, IP-address belongs to Class D
address. Class D addresses are not assigned to hosts but are designed for multicasting
communication.
Class E: If all the four bits are one, IP-address belongs to Class E address. Class E addresses
are not assigned to hosts. These types of addresses are not used for general applications but are
reserved for experimental purpose.
In addition to five types of IP addresses, following are the other types of IP addresses –
1. Unicast IP address: Helps in one-to-one communication. It uniquely identifies a host
in the network when a data packet is sent from a host to the destination address.
2. Multicast IP address: Helps in one-to-many communication, when a data packet is
sent from a host to a group of hosts and not to a single destination address.
3. Broadcast IP address: Helps in one-to-all communication. A broadcast allows a data
packet to be sent from a host to all other hosts on the network.
Download