CHN Final 18-12-2022
CHN Final 18-12-2022
As Per C-21
B. BABAMASTHAN
MOHD RIAZ
N. DHANANJAYA
The object of this book is to provide a suitable Textbook for Diploma students. A
modern approach has been adopted in presentation of this text.
This book meets the desires of all students. Some of the salient features of this
book are:
1. This book is written strictly as per the syllabus prescribed in C-21 by SBTET,
Telangana.
2. The material has been presented in a very simple and logical manner so as to lead
the students from simple to complex in “Computer Hardware & Networking”.
3. The difficult topics are explained with the help of clear diagrams, wherever
necessary.
4. The language used in this book is so simple.
5. Throughout the book, the reader will have a clear understanding of the subject
matter discussed.
6. The book will be very much useful not only to the students but also to the subject
teachers.
7. The book is organized into SIX chapters.
B. BABAMASTHAN
MOHD RIAZ
N. DHANANJAYA
(Authors)
E-mail: mgbpulications@gmail.com
Computer Hardware & Networking
Course Title : Computer Hardware & Course Code CS - 404
Networking
➢ Input Devices
3.1 List the various Input devices used with a general purpose computer
3.2 Explain the working principle of Keyboard (Wired & Wireless Keyboard)
3.3 Discuss the working principle of Opto-mechanical mouse and Optical
Mouse (Wired & wireless Mouse)
3.4 List the various scanners
3.5 Explain the working of flat bed scanner and hand held scanner.
3.6 Explain the working of a Webcam
➢ Output Devices
3.7 List the various Output devices used with a general purpose computer
3.8 Describe the working principle of CRT Monitor
3.9 Describe the working principle of LCD/TFT/LED/OLED Monitors
3.10 Describe different categories of printers (Impact and Non-Impact)
3.11 Describe the working principle of Dot matrix printer
3.12 Describe the working principle of inkjet printer
3.13 Describe the working principle of Laser printer
3.14 Know about Multi-Function printer
4.0 Introduction to Networks and Network Topologies
4.1 Understand the Overview of Networking.
4.2 State the Need for Networking.
4.3 Classification of Networks –LAN, MAN, WAN
4.4 List the Hardware and Software Components of Computer Network
4.5 Overview of Network Topologies.
4.6 Understand the basic Network Topologies such as Bus, Ring and Star
and Complex topologies like Mesh and Hybrid Topologies.
4.7 Various Network Communication Standards.
4.8 OSI Reference Model.
4.9 TCP/IP Reference Model.
5.0 LAN components and Protocols
5.1 Know about LAN Connectors, wireless network adapter
5.2 Know about Coaxial Cables, Twisted-Pair Cables, Optical Fiber Cables,
and connectors used in Networking.
5.2.1 Know the Preparation of straight and cross cable
5.3 Know about Ethernet
5.4 Explain LAN Devices
5.4.1 Repeaters
5.4.2 Hubs
5.4.3 Switches
5.4.4 Bridges
5.4.5 Gateways
5.4.6 Network Interface Cards (NICs)
5.4.7 Routers
5.4.8 MODEM (56KBPS Internal/External, DSL/ADSL Modems etc.)
5.4.9 Access Point
5.5 Explain WLANs (Wireless LAN)
5.6 State the need for protocols in computer networks.
5.7 Know about protocols
5.7.1 Hyper Text Transfer Protocol (HTTP)
5.7.2 Hyper Text Transfer Protocol Secure (HTTPS)
5.7.3 File Transfer Protocol (FTP)
5.7.4 Simple Mail Transfer Protocol (SMTP)
5.7.5 Telnet
6.0 Network Addressing and Management
6.1 Introduction to Network Addressing.
6.2 Know about TCP/IP Addressing Scheme.
6.2.1 Components of IP Address.
6.2.2 IP Address Classes.
6.2.3 Classify the Internet Protocol addressing IPv4
6.2.4 Explain classful addressing and classless addressing in IPv4.
6.2.5 Know about IP Subnetting
6.2.6 State the need for IPv6.
6.2.7 Describe Internet protocol version-6 (IPv6) addressing.
6.3 Know about Wi-fi networking standards and encryption types.
6.4 Understand the Overview of Network Management.
6.5 Understand the Model of ISO Network Management
6.6 Understand the Network Monitoring and Troubleshooting.
6.7 Networking troubleshooting tools
6.8 Learn about Simple Network Management Protocol (SNMP).
6.9 Explain how SNMP works.
6.10 Know about Remote Monitoring (RMON).
1
PC hardware and its Components
OBJECTIVES
1.0 Components of a Computer
1.1 Explain PC Hardware and software
1.2 BIOS
1.3 Importance of BIOS
1.4 Describe the BIOS hardware interaction
1.5 Explain the BIOS functions (i) POST, (ii) Bootstrap loading
1.6 State the configuration of a general purpose computer.
1.7 Identify Mother board, Processor, Chipset, SMPS, Disk Drives, RAM, ISA/EISA, PCI,
IDE slots, RAM slots, AGP Slot, Mouse, Keyboard connector, Monitor connector (VGA
Port), Printer connector, Speaker connector, USB ports, Parallel port, Serial Port, and
Modem of the system.
1-2 PC hardware and its Components
a) System Software
• The system software is a collection of programs designed to operate, control, and
extend the processing capabilities of the computer itself.
• System software is generally prepared by the computer manufacturers.
• The purpose of the system software is to improve the performance of the system.
• These software products comprise of programs written in low-level languages,
which interact with the hardware at a very basic level.
• System software serves as the interface between the hardware and the end users.
• Some examples of system software are operating system, compilers, interpreter,
assemblers, etc.
3 Has four main categories: Input Mainly divided into system software
devices, output devices, secondary and application software.
storage devices and internal
components.
4 Examples: Examples:
Monitor, mouse, keyboard, hard Chrome browser, antivirus,
drives, routers, printers, scanners, windows, adobe photoshop,
8 User cannot make new duplicate User can make many new duplicate
copies of the hardware. copies of the software.
1.2 BIOS
• The operating system is a system software and an essential component of every
computer system. The operating system acts as an interface between computer
hardware components and the application programs. And therefore, the user
cannot operate the computer system, till the time operating system is completely
loaded into the main memory RAM and fully operational
• The CPU (Central Processing Unit) is the brain of the computer system. The CPU's
first job is to locate and initiate the process of loading the operating system, every
time the computer system is switched on.
• This is done with the help of system utility program called BIOS - Basic Input
Output System.
• The BIOS is the first start-up program executed by the CPU when the computer
system is switched on.
• The main job of the BIOS is to locate and load the operating system in to the
main memory RAM (Random Access Memory).
1.3 ImportanceMicrosoft
of BIOS Word
9 Primary and Secondary IDE • Primary and Secondary IDE interfaces are
Connectors also called as IDE connectors or PATA
connectors.
• IDE full form is Integrated Device
Electronics.
• It supports IDE devices, such as Hard
disks and CD and DVD.
Microsoft Word
round shape socket.
• The PS2 ports are color-coded.
• The purple connector is for the
keyboard.
• The green connector is for the
mouse.
16 VGA port • This port is used to connect a monitor or
other VGA-compatible devices.
18 Universal serial bus (USB) • USB (Universal Serial Bus) port is a plug-
port and-play hardware interface for
connecting peripherals such as the
keyboard, mouse, joystick, scanner, printer
and modem. Without adding an adapter
card.
• These ports are replacement for parallel
and serial ports.
19 Ethernet Port • Ethernet port is used to connect a
computer on network through RJ-45
connector.
OBJECTIVES
2.1 Mother Board
2.1.1 Explain various motherboards based on the form factor : such as AT, ATX, micro ATX, mini ATX, Baby AT,
BTX, NLX etc.,
2.1.2 List various components on motherboard.
2.1.3 List the I/O ports available on motherboard
2.1.4 Explain SMPS
2.1.5 State the importance of SMPS over linear voltage power supply
2.1.6 Know the connectors from SMPS and list the voltage levels of each wire in various connectors based on the
standard color of the wire
2.2 Processors
2.2.1 Describe various processors used in the system: INTEL P4, Celeron, XEON, Itanium processors, AMD
Athlon, Dual core, Core 2 Duo, Quad core, Octa core and i-series (i3, i5, i7 and i9).
2.2.2 Define chipset.
2.2.2.1 Explain the INTEL chipsets 915,945,955, 965, 975
2.2.2.2 List the AMD chipsets
2.2.3 State different processor sockets Like ZIF, SEC, LGA, PGA, BGA.
2.3 Memories
2.3.1 Define the static and dynamic RAM.
2.3.2 Explain RAM types - SDRAM (Synchronous DRAM), Asynchronous DRAM, DDR1, DDR2, DDR3 and DDR4 (1-4)
RAM, Rambus RAM
2.3.3 Know about SIMM and DIMM
2.3.4 Explain RAM Slots
2.3.5 Explain the procedure to upgrade RAM capacity of the system by adding additional RAMs
2.3.6 Define Cache memory and explain how it improves the performance of memory.
2.3.7 Define L1, L2 and L3 cache and their locations.
2.4 Mass storage devices
2.4.1 List the different Mass Storage devices.
2.4.2 Give the constructional details and working of a Hard disk Drive
2.4.3 Explain the importance of jumper settings of Hard Disk drive and give details of it
2.4.4 Familiarize with hard disk interfacings standards like IDE / EIDE / PATA /
2.4.5 SCSI / SATA
2.4.6 Know about various optical disk drives like CD-ROM, CD-RW, Combo Drive, DVD-ROM, DVD-RW, and Blu-ray
drives.
2.4.7 Explain the process of reading and writing of data on various disk drives like CD- ROM, CD- Writer, DVD
Drive and Blu-Ray Disk drive etc.
2.4.8 Explain the working principle of a Pen drive
2.4.9 Know about Solid-State Drives (SSD)
2-2 System Board, Processors, Memories and Mass Storage Devices
• In the initial days of computing, a computer was built in a case or Mainframe with
a series of wired together connectors called a backplane into which the CPU,
memory and I/O on separate cards was plugged.
• With the arrival of the microprocessor, it became more cost-effective to place the
backplane connectors, processor and logic onto a single 'mother' board, and have
the video, memory and I/O on 'child' cards hence the terms 'Motherboard' and
Daughterboard.
Fig. (a)
• The motherboard serves as a single platform to connect all of the parts of a
computer together. All of the basic circuitry and components required for a
computer to function are either contained in or attached to the motherboard.
• A motherboard connects CPU, memory, hard drives, optical drives, video card,
sound card, and other ports and expansion cards directly or via cables.
• In other words, for all the PC’s external devices, the motherboard functions like a
central railway station. All traffic originates from or ends up in the motherboard.
• Layout diagrams of a Baby AT motherboard and an ATX motherboard are shown in
the figures (b) and (c) respectively.
Microsoft Word
2.1.6 Know the connectors from SMPS and list the voltage levels
of each wire in various connectors based on the standard color
of the wire
a) Connectors from SMPS
• SMPS or PSU is the component that supplies power to the major computer
components.
• There are different types of connectors or cables of an SMPS that supply power to
various computer components and devices.
Microsoft Word
2.2 Processors
• The processor is commonly known as Central Processing Unit or CPU. It is an
electronic circuit which executes computer programs containing a processing unit
and a control.
• A processor (CPU) is the logic circuitry that responds to and processes the basic
instructions that drive a computer.
• The CPU is seen as the main and most crucial integrated circuitry (IC) chip in a
computer, as it is responsible for interpreting most of computers commands.
• A central processing unit (CPU) processes the instructions by performing the basic
arithmetical, logical, and input/output operations of the system.
• Every motherboard supports either an AMD or an Intel processor. They are not
interchangeable. If a motherboard requires an AMD processor, it cannot use an Intel
and vice-versa.
• A computer's CPU handles all instructions it receives from hardware and software
running on the computer.
• Processors can be found in PCs, Laptops, Smart phones, tablets and other computers.
Microsoft Word
2.3 Memories
• Computer memory is any physical device capable of storing information
temporarily or permanently.
• Computer memories are primarily of three types
1. Cache Memory
2. Primary Memory/Main Memory
3. Secondary Memory
Fig. ROM
• ROM stores the instructions requires during a process of booting up of the
computer (bootstrapping). The content in ROM cannot be modified and the data
inside the ROM is retained even after the CPU is switched off.
• The capacity of ROM is comparatively smaller than that of RAM, it is slower and
cheaper than RAM. There are many types of ROM as given below:
• PROM (Programmable read-only memory): It can be programmed by an user.
Once programmed, the data and instructions in it cannot be changed.
• EPROM (Erasable Programmable read-only memory): It can be
reprogrammed. To reprogram it, one has to erase all the previous data. Data can be
erased by exposing it to ultraviolet light
• EEPRO EEPROM (Electrically Erasable Programmable read only
memory): Only portions of this chip can be erased by applying an electric field.
b) RAM
• It is random access memory; it means the CPU can directly access any address
location of RAM memory.
• The read and write (R/W) memory of a computer is called RAM.
• It is quickly accessible memory of the computer and its speed is measured in
nanoseconds (billionths of a second).
• It is a read-write memory of the computer, the processor can read the instructions
from RAM and write the result to the RAM.
Fig. DIMM
Maanya’s M.G.B Publications Computer Hardware & Networking
2-36 System Board, Processors, Memories and Mass Storage Devices
• The memory chips of DIMM are DRAM (Dynamic Random Access Memory),
Microsoft
which is the most commonWord
category of main memory.
• As compared to SIMM (single in-line memory module), it has a 64-bit data path,
which allows DIMMs to transfer data at a fast speed. DIMM is a module which
comes in the replacement of SIMM.
• This memory module consumes 3.3 volts, which are comparatively lower.
• The dual in-line memory module stores each bit of data in the separate memory
cell.
• The following are the types of DIMM
1. Unbuffered DIMM
2. Fully-buffered DIMM
3. Registered DIMM
4. Load-reduced DIMM
5. SODIMM
6. Micro DIMM
S. No DIMM SIMM
1 DIMM is a short form of SIMM is an abbreviation of the Single In-Line
Dual In-Line Memory Memory Module.
Module.
2 The pins of this memory The pins in this memory module present on
module are independent. either side are connected.
3 DIMM memory module SIMM memory module supports a 32-bit channel
supports a 64-bit channel for transmitting the data.
for transmitting the data.
4 Dual In-Line memory Whereas, Single In-Line memory module
module consumes only 3.3 consumes 5 volts of power.
volts of power.
5 The storage provided by The storage provided by SIMM is 4 MB to 64 MB.
DIMM is 32 MB to 1 GB.
6 As compared to SIMM, As compared to DIMM, its performance is not
the performance of DIMM good.
is good.
7 Modern Pentium This memory module is used by both 486 CPU
computers use this and early Pentium computers.
memory module.
8 Two notches are present A single notch is present in SIMMS.
in DIMMs.
• The memory connected between the CPU and the main memory is called as cache
memory.
• Cache memory is a very high-speed semiconductor memory which can speed up
CPU.
• It acts as a buffer between the CPU and main memory.
• The frequently used data is placed in the cache memory.
• The main advantage of cache memory is its very fast speed.
• It can be accessed by the CPU at much faster speed than main memory. So cache
memory is to improve the performance of the system.
• It is a static RAM and therefore has much smaller access times as compared to
main memory which is DRAM.
• Capacity of the Cache Memory is too low in compare to Memory and Hard Disk.
b) Importance of Cache
• The cache memory lies in the path between the processor and the memory. The
cache memory therefore, has lesser access time than memory and is faster than the
main memory.
• Cache built into the CPU itself is referred to as Level 1 (LI) cache or internal cache.
• Cache that reside on a separate chip next to the CPU is called Level 2 (L2) cache or
External cache.
• Some CPUs have both L1 and L2 cache built in and designate the separate cache
chip as Level 3 (L3) cache.
• Cache that is built into the CPU is faster than separate cache, running at
microprocessor itself.
• A hard disk drive (sometimes abbreviated as a hard drive, HD, or HDD) is a non-
volatile data storage device.
• It is usually installed internally in a computer, attached directly to the disk
controller of the computer's motherboard.
• It contains one or more platters, housed inside of an air-sealed casing.
• Data is written to the platters using a magnetic head, which moves rapidly over
them as they spin.
• A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-
mechanical data storage device that uses magnetic storage to store and retrieve
digital data using one or more rigid rapidly rotating platters coated with magnetic
material.
• The platters are paired with magnetic heads, usually arranged on a moving
actuator arm, which read and write data to the platter surfaces.
• Data is accessed in a random-access manner, meaning that individual blocks of
data can be stored and retrieved in any order.
• HDDs often store operating system, software programs and other files, and can be
found in desktop computers, mobile devices, consumer electronics and enterprise
storage arrays in data centres.
• In a computer, an HDD is commonly found in the drive bay and is connected to
the motherboard via an ATA, SATA or SCSI cable.
• There are many different types and styles of hard disks on the market, all of which
have roughly the same physical components.
• The differences among the different drive styles and types are usually in the
components-the materials used and the way they are put together. But essentially
one disk drive operates like all others.
• The major components in a typical hard disk drive are as follows.
1. Disk platters, spindle and spindle motor
2. Read/write heads
3. Head actuators
4. Air filter
5. Connectors and jumpers
• Of this list, only the connectors and jumpers are accessible outside of the enclosure
that houses all of the other components of the disk drive.
• The metal case and the components it encloses form what is called the Head Disk
Assembly (HDA). The HDA is a sealed unit that is never opened.
2) Read/Write Heads
• Each side of a disk platter has media applied to it that allows it to store data.
Accordingly, each side of a disk platter also has at least one read/write head, as
illustrated in Fig.
• As shown, a disk drive that has two disk platters has four read/write heads. There
are exceptions to this rule, but generally a disk drive has two heads for each
platter, one to read and write data to the top side and one for the bottom side.
• The read/write heads are all connected to the same actuator mechanism, as
illustrated in Fig, which moves the heads in unison in and out, from the spindle to
the edge of the platter.
• In most disk drive designs, only one read/write head is active at a time.
Fig: Top view and front view of a hard disk platter assembly showing Tracks, sectors and cylinders
• The circular platter is divided into concentric circles known as tracks.
• Each track is divided into several partitions known as sectors.
• Each sector holds 512 bytes of data.
• Sector is the smallest accessible unit of a platter.
• A group of sectors is termed as a cluster.
• The number of sectors available on the inner track is less than that of the outer
tracks.
• A combination of sectors and tracks of all vertical platters is known as a cylinder.
• Data is stored in sectors, tracks and cylinders and in both sides of the platters.
• The process of reading from or writing to the sectors involves two steps.
1. First the read/write head is moved to the desired track. The position of the
head is controlled by the head actuator. The head waits until the required
sector comes under it.
Maanya’s M.G.B Publications Computer Hardware & Networking
2-50 System Board, Processors, Memories and Mass Storage Devices
2. In second step, the spindle is rotated by the electric motor (stepper motor)
that makesMicrosoft Word
the sector to take position below the head correctly. When the
desired sector comes under the head, the reading or writing takes place.
Note:
1) IDE is different from the Small Computer Systems Interface (SCSI) and Enhanced
Small Device Interface (ESDI) because its controllers are on each drive, meaning the
drive can connect directly to the motherboard or controller.
2) IDE and its updated successor, Enhanced IDE (EIDE), are the most common drive
interfaces found in IBM compatible computers today.
2. Small Computer System Interface (SCSI)
• "SCSI stands for Small Computer System Interface and is a standard for
Communication between a sub-system of peripherals and the system bus.
• SCSI is like a small LAN inside a computer.
• SCSI is a kind of bus.
• The SCSI bus can contain up to 15 devices. The number of devices the SCSI bus can
support depends on the type of SCSI being used.
❖ Advantages
✓ Low costs
✓ Very faster transfer rates.
✓ Smaller cables for better heat dissipation.
❖ Disadvantages
✓ Not supported in older systems without the use of additional components.
2.4.5 Know about various optical disk drives like CD-ROM, CD-
RW, Combo Drive, DVD-ROM, DVD-RW, and Blu-ray drives.
• An optical drive is an internal or external computer disk drive that uses laser beam
technology to read and write data.
• Optical disk drives are associated with CDs, DVD and Blue-Ray technology.
• Optical drives work by rotating the inserted disc at a constant speed, calculated in
revolutions per minute (RPM).
• The rotating disc in an optical drive is read with a laser beam using a lens embedded
within the optical drive's head.
• Optical drives mainly use an Advanced Technology Attachment (ATA) bus or a
Serial
• ATA (SATA) bus, along with Small Computer System Interface (SCSI) to send and
receive data from a computer.
A) CD-ROM
• CD-ROM is an acronym for Compact Disc-Read Only Memory.
• CD-ROM is an optical storage device for computer data and programs.
• It is a type of compact disc that has read-only data, meaning that once data has been
recorded onto the disc, it can only be read or played and cannot be altered or erased.
• A CD-ROM is a type of optical disc and can be read by a computer with an optical
drive, or CD-ROM drive, and a DVD/Blu Ray Drive.
Microsoft Word
1. USB Connector
• The USB connector is the interface between the computer (where the pen drive is
attached) and the NAND flash memory chip.
• It is secured by a removable cap.
• Mostly, the pen drives consist of a standard type-A USB connection that is
connected to the port of the device, but nowadays, a faster version, i.e., USB Type-
Maanya’s M.G.B Publications Computer Hardware & Networking
2-62 System Board, Processors, Memories and Mass Storage Devices
C connector is gaining more popularity. The electric power from the computer is
consumed by theMicrosoft Word
pen drive through the USB connector.
2. USB Mass Storage Controller/Controller Chip
• The controller chip is called the brain of the pen drive.
• This chip helps to read or record the information/data on the NAND flash
memory.
• It also helps to recover the data from the pen drive.
3. NAND Flash Memory Chip
• The purpose of the NAND flash memory chip is to store the data.
• It also allows the users to erase the data stored in the pen drive so that new
information can be transferred into it.
• The memory stored by the NAND flash chip is of non-volatile type, i.e., it does not
need any power to retain the information.
4. Crystal Oscillator
• The crystal oscillator is a small piece of quartz fitted in the pen drive, which
vibrates at a specific frequency.
• It acts as a small clock inside the Pendrive, which manages the functioning/timing
of each component inside the pen drive by providing accurate timings.
5. LED
• It is used to indicate the working condition of the Pendrive.
6. Write Protect Switch
• It is an optional component and is generally installed in pen drives if the user
demands high data security.
• It is a tiny switch, which safeguards the data stored on the pen drive from the host
devices.
Fig. SSD
• SSDs replace traditional hard disk drives (HDDs) in computers and perform the
same basic functions as a hard drive. A solid-state drive (SSD) is a new generation
of storage device used in computers
• Upgrading to an SSD is one of the best ways to speed up your computer
• Sometimes referred to as semiconductor storage devices, SSDs are more commonly
known as solid state drives, because they don't have the moving parts found in
hard-disk drives (HDD).
OBJECTIVES
➢ Input Devices
3.1 List the various Input devices used with a general-purpose
computer
3.2 Explain the working principle of Keyboard (Wired &
Wireless Keyboard)
3.3 Discuss the working principle of Opto-mechanical mouse and
Optical Mouse (Wired & wireless Mouse)
3.4 List the various scanners
3.5 Explain the working of flatbed scanner and hand-held
scanner.
3.6 Explain the working of a Webcam
➢ Output Devices
3.7 List the various Output devices used with a general-purpose
computer
3.8 Describe the working principle of CRT Monitor
3.9 Describe the working principle of LCD/TFT/LED/OLED
Monitors
3.10 Describe different categories of printers (Impact and Non-
Impact)
3.11 Describe the working principle of Dot matrix printer
3.12 Describe the working principle of inkjet printer
3.13 Describe the working principle of Laser printer
3.14 Know about Multi-Function printer
3-2 Study of Input and Output Devices
3.0. Introduction
• Input devices are hardware that allows data to be entered into a computer. They
use either manual entry (such as a keyboard or a mouse) or direct data entry (such
as sensors or optical character readers).
• Essentially, these devices turn input into a form the computer can understand - for
example, a mouse turns hand movements into cursor movements on the screen.
• When a computer processes data, and the human operator wants to see the results
of the processing, then the computer sends the data to an output device.
• An output device shows the computer's output in a form that is understood by a
human - for example, as text on a printer or moving images on a monitor.
• Some devices can act as both input and output. For example, a touch screen can do
both, as can a DVD writer/player; but most devices are only capable of either
inputting data into a computer or displaying the results of computer processing
(output device).
3.0.1 Differences between input and output devices
S. No Input Devices Output Devices
1 An input device is any hardware An output device is any hardware
device that allows a user to enter device that takes the output data
data or instructions into a from a computer and puts it into a
computer directly. human-readable format or uses it to
control another device.
2 An input device can send data to An output device is capable of
another device, but it cannot receiving data from another device in
receive data from another device. order to generate an output, but it
cannot send data to another device.
3 Input devices are necessary for a Output devices are needed by a
computer to receive commands computer so it can share the results
from its users and data to process; of its processing with a human,
the devices are under the control output devices are under the control
of the user or can be direct data of the computer.
entry
4 Input devices can be fairly Output devices are less complex than
complicated because they have to input devices because they only have
ensure that the user can interact to turn computer signals into an
with the computer correctly. output.
9. Magnetic Ink Card • MICR input device is generally used in banks used in
Reader (MICR) banks as there are large number of cheques to be
processed every day.
• The bank’s code number and cheque number are
printed on the cheques with a special type of ink that
contains particles of magnetic material that are
machine readable.
• This reading process is called magnetic ink character
recognition (MICR).
10. Optical Character • OCR is an input device used to read a printed text.
Reader (OCR) • OCR scans the text optically character by character,
converts them into a machine-readable code and
stores the text on the system memory.
11. Bar Code Reader • Bar Code Reader is a device used for reading bar code
data (data in the form of light and dark lines) Bar
coded data is generally used in labelling goods,
Fig. Keyboard
• Most keyboards use the QWERTY layout, named for the first six keys in the top
row of letters.
• Alphanumeric keys: Alphanumeric are divided into two parts, alphabets, and
number keys and this includes letters, numbers, punctuation, and symbol keys.
Fig. (a)
• The computer keyboard is very simple. You push a key, and it puts a letter on the
screen.
• When you press a key, the upper and lower conducting layers come together which
allows a current to flow to the computer. The computer measures the voltage and
transforms the amount of volts in to binary.
• The computer compiler reads the binary, and a letter appears on a screen.
Fig. (b)
Fig.(a)
b) Working:
• When mouse is moved, the ball of the mouse moves and it turns two separate
rollers fixed at 90° angle to each other.
• One roller is used for vertical movement and other is used for horizontal movement
of the roller cursor on a screen.
• Each roller connected with a wheel, these wheels are rotated by the corresponding
movement of the rollers.
• These are small opening on the rim of each wheel. As the wheel rotates, a pair of
LED and photo detector detects the number of opening passed between them and
generate an electrical signals.
• These signals are passed to the PC through the wire connecting mouse to the main
system.
• Mouse driver which then convert these signal into distance, direction and speed of
mouse. Pressing any mouse button also produce a signal.
3.3.3. Working principle of Optical mouse
a) Construction
• Optical mouse consists of a light source and photo detector, with a special mouse
pad with a grid is used and a small camera.
• Inside each optical mouse a camera that takes more than a thousand snapshot
picture every second and the reflected light is sense by photodiode is inputed to the
digital signal processing.
• First the LED produces a red light that is emitted onto the surface.
• The light is reflected off the surface back to the CMOS sensor.
• The CMOS sensor sends each image that is reflected back to a DSP (Digital Signal
Processor) for analysis.
• Using the thousands of images that the CMOS is sent to the DSP for analysis, the
DSP is able to detect both pattern and imager and can determine if mouse moved,
at what speed and distance.
• Determine co-ordinates which are then sent to computer.
• Mouse co-ordinates are updated more than hundreds of times per second.
Fig. Webcam
• Many laptops have a webcam built into the display for purposes like for attending
video conferences and business calls etc.
3.6.1. Working
• A webcam is a compact digital camera that can be attach to the computer for
capturing images and videos.
• It works like a conventional digital camera, but it is designed to communicate with
the internet pages and other web pages.
• It broadcasts video images in real-time through a tiny grid of light-detectors that is
known as charge-coupled device from the location where it is placed.
• First, the charge-coupled device (CCD) converts the image into a digital format;
then the computer would be capable of accessing this data.
Output Devices
3.7 List the various Output devices used with a general
purpose computer
• The output devices take care of displaying the result after data processing by the
input device. It may be in image, graphic, textual or audio form.
• These devices show the visual elements on the display. The information on the
screen is soft copy and some of the important output devices are
6. Braille Reader • Made for the blind users, this device is to process
computer data in braille format.
• It allows users with low or no vision to recognize the data
as the braille reader put data on the paper in embossed
format. They can run their fingers over it to understand
everything easily.
7. Television • A very common output device present in most of the
households is a display output device.
• It portrays video and audio files on the screen according
to the user’s needs. Before we had CRT screens but now
most of us use plasma displays.
Fig. 3.9.1(a)
• Consider a single pixel area in LCD, in which there are two polarization
filters oriented at 900 angle to each other as shown in fig. 3.9.1(a).
Fig. 3.9.1(b)
• Now, the vertically polarized light passes through rotation of the liquid
crystal molecules and twisted to 90 degrees.
• Thus, the orientation of light matches with the Horizontal (outer)
polarization filter. Therefore, the light will pass through it and brightens the
screen.
Case 3:
• The orientation of the molecules in the liquid crystal can be altered by
applying an external electric field.
Fig. 3.9.1(c)
Fig. 3.9.1(d)
• Consider the figures 3.9.1(c) and 3.9.1(d). Here, two glass transparent
electrodes are aligned front and back of the liquid crystal in order to change
the orientation of the crystal molecules by applying voltage between them.
• If there is no voltage applied between the electrodes, the orientation of
molecules will remain twisted at 90 degrees and the light passes through the
outer polarization filter, thus pixel appears as complete white.
• If the voltage applied reaches a threshold limit, then the molecules in the
liquid crystal completely untwists and become vertical as shown in the fig.
3.9.1(d). Now the light coming out of the liquid crystal is vertically polarized
and thus blocked by the outer polarization filter. Thus the pixel appears
black. In this way, black and white images or characters are produced.
• By controlling the voltage applied between liquid crystal layers in each pixel,
light can be allowed to pass through outer polarization filter in various
amounts, so that it can possible to produce different grey levels on the LCD
screen.
Maanya’s M.G.B Publications Computer Hardware & Networking
3-22 Study of Input and Output Devices
• By arranging these small LCD pixels together as a matrix, we can make a
LCD monitor which will produce different sizes of images and characters.
Case 4:
• In order to produce color images a color filter is placed in front of the outer
polarization plate as shown in fig. 3.9.1(e).
• The red, green and blue are the three standard colors filters that are placed
for every three pixels to produce different color images by varying the
intensity of each color.
Fig. The Arrangement of Molecules in the Nematic, Smectic, and Cholesteric Liquid
Crystal Phases
• OLED panels consist of six layers. The outside most layers are the seal and the
substrate. These are made out of either plastic or glass. The substrate is the
foundation of the OLED and the seal protects the outside.
• In between those two layers are the cathode and the anode. In the very center are
the two layers of organic molecules, the emissive layer and the conductive layer.
C) Working
• OLEDs work in a similar way to conventional diodes and LEDs, but instead of
using layers of n-type and p-type semiconductors, they use organic molecules to
produce their electrons and holes. A simple OLED is made up of six different
layers.
• On the top and bottom there are layers of protective glass or plastic. The top layer is
called the seal and the bottom layer the substrate.
• In between those layers, there's a negative terminal (sometimes called the cathode)
and a positive terminal (called the anode).
1. PC sends a series of ASCII code to the printer through serial or parallel cable, it
also sends some printer movement which controls the position of the print head
and print carriage.
2. The ASCII code received by printer are stored inside a buffer.
3. Then processor select a particular dot pattern for the ASCII code received from PC,
dot pattern store in ROM.
4. According to dot pattern information processor sends the signal to the print head.
5. Based on this information print head fire different pins on the print head.
6. Processor also control movement of print head and platen to move paper.
7. The print head contains 9, 18 or 24 wires, to fire against the ribbon and paper.
Fig. Multifunction Printer that can print, scan, copy, and fax
• An MFP (multi-function product/printer/peripheral), multi-functional, all in
one (AIO), or multi-function device (MFD), is an office machine which incorporates
the functionality of multiple devices in one.
OBJECTIVES
4.6 Understand the basic Network Topologies such as Bus, Ring and Star and
(OR)
11. Used for College, School, Small towns, City State, Country,
Hospital Continent
5. Node failure Network can still run Network will fail Network can still
run
Additional Information
Tree Network
• Tree topology is a combination of bus topology and star topology.
• In bus topology, different nodes are connected to a single cable while in a star
topology, all nodes are connected to a central hub.
• Tree topology is made by connecting various star topologies via central bus
backbone cable.
• It is used for expansion of the network.
1. Application Layer
• It provides end user for processing of data and supports for services such as e-mail,
file transfer, shared data management, network software services and other types of
distributed information services.
• This layer acts as an interface between end user and network. This layer mainly
allows access to network resources.
2. Presentation Layer
• Presentation layer is concerned with the syntax and semantics of the information
exchanged between two systems.
• It translates the Application into network format and vice versa. It provides format
and encrypt / decrypt data to be send across a network.
Microsoft Word
Microsoft Word
Additional Information
Comparison of OSI & TCP/IP Reference Model
4 In the OSI model, the transport The transport layer does not provide the
layer provides a guarantee for the surety for the delivery of packets. But still,
delivery of the packets. we can say that it is a reliable model.
6 In this model, the session and In this model, the session and presentation
presentation layers are separated, layer are not different layers. Both layers
i.e., both the layers are different. are included in the application layer.
8 In this model, the network layer The network layer provides only
provides both connection-oriented connectionless service.
and connectionless service.
9 Protocols in the OSI model are In this model, the protocol cannot be easily
hidden and can be easily replaced replaced.
when the technology changes.
OBJECTIVES
• In data communication, transmission media are the links that carry messages
between two or more communicating devices. Transmission can be classified as
guided or unguided. Fig. 5.2 shows the classification of communication media.
• The types of wiring connectors used depends on the network cable types. There are
different connectors for Ethernet or twisted-pair, coaxial, USB and fiber optic cables.
(a) Ethernet Cable Connectors
• RJ45 connectors are used for CAT6 cables and CAT5e cables. These connectors for
twisted-pair Ethernet cables are similar in appearance to a standard telephone cord
connector.
• Fiber optic connectors require different types of connectors from those used with
coax or twisted-pair cables, such as CAT5e. These types of connectors in networking
must align glass fibers with precision to allow for communication.
• If you choose to use optical cable over twisted pair Ethernet, you may need to install
a special adapter in your computer to utilize various fiber optic cable connector
types.
Side A Side B
Green Green
Blue Blue
Orange Orange
Brown Brown
Green Orange
Green Orange
Blue Blue
Orange Green
Brown White Brown White
Brown Brown
• The cross-over cable is used to connect the following devices.
1. Two computers
2. Two hubs
3. A hub to a switch
4. A cable modem to a router
5. Two router interfaces
5.4.1 Repeaters
• Data are carried in the form of signals over the cable. These signals can travel a
specified distance (usually about 100 m). Signals lose their strength beyond this limit
and become weak. In such conditions, original signals need to be regenerated.
• A repeater receives a signal and before it becomes too weak or corrupted,
regenerates the original bit pattern. The repeater then sends the refreshed signal.
• A repeater does not amplify the signal; it regenerates the signal. When it receives a
weakened or corrupted signal, it creates a copy, bit for bit, at the original strength.
• The basic purpose of a repeater is to extend the distance of LAN.
• A repeater does not actually connect two LANs; it connects two segments of the
same LAN.
5.4.2 Hubs
• A hub is a networking device, which is used to connect the two segments of a wired
network.
• In star topology, every computer is directly connected with the hub. In case of any
fault in the hub, the data communication in the network computers stops.
• In an Ethernet (bus)-based network a hub is a central device that is used to connect
all the computers with each other.
Fig. Hub
• A hub has multiple ports such as 4,6, 8, 16 and 24 etc. When data packets are reached
at hub, they are broadcasted to all the computers unlike a switch and only the
destined computer receives the data.
• When you want to connect more than two computers with each other a hub or
switch is required in a local area network. Hubs operate at the physical layer.
5.4.3 Switches
• A network switch performs the same functionality in a network as a hub except a
different that switch does not broadcast the data packets to all the computers in a
network like a hub.
• A network switch has multiple ports like 4, 8, 16 and 24 etc.
Do You Know?
• Switch doesn't provide the built-in firewall capabilities like the routers.
• In the telecommunication and packet switched infrastructure switches play an
important role.
• They transmit the data towards its destination based on the IP address. Switches
work at data link layer.
5.4.4 Bridges
• In computer networks, we have multiple networking devices such as bridges, hubs,
routers, switches, etc, each device has its own specification and is used for a
particular purpose.
• The bridge is a networking device that connects the larger LAN networks with the
group of smaller LAN networks.
• Bridges are used to connect two subnetworks that use interchangeable protocols. It
combines two LANs to form an extended LAN.
• Bridges operate at the data link layer of the OSI model and hence also referred as
Layer 2 switches.
• A bridge receives all the packets or frame from both LAN (segment) A and B.
Maanya’s M.G.B Publications Computer Hardware & Networking
5-16 LAN Components and Protocols
• A bridge builds a table of addresses from which it can identify that the packets are
Microsoft
sent from which LAN Word to which LAN.
(or segment)
a) Uses of Bridges
The main uses of bridges are:
• Bridges are used to divide large busy networks into multiple smaller and
interconnected networks to improve performance.
• Bridges also can increase the physical size of a network.
• Bridges are also used to connect a LAN segment through a synchronous modem
relation to another LAN segment at a remote area.
b) Difference between Bridge and Repeater
1. Bridge operates the data link layer while repeater operates at physical layer of OSI
model.
2. Bridge understands the complete frames while repeaters do not understand
complete frames.
3. Bridge will not forward a collision from one segment to another. With repeater,
collision occurs on one segment, repeater causes the same problem to occur on all
other segment.
4. Bridge uses the destination address to determine whether to forward a frame.
Repeater cannot understand the destination address.
5. Bridge performs frame filtering. Repeater cannot perform frame filtering.
6. Bridge and repeater, both are hardware devices used to extend a LAN.
5.4.5 Gateways
• A computer that sits between different networks or applications. The gateway
converts information, data or other communications from one protocol or format to
another. A router may perform some of the functions of a gateway.
• An Internet gateway can transfer communications between an enterprise network
and the Internet.
• For simple Internet connectivity at homes, the gateway is usually the Internet
Service Provider that provides access to the entire Internet.
5.4.7 Routers
• A router is basically a device or a hardware which is responsible for receiving,
analyzing and forwarding the data packets to other networks.
• A router is a network communication device that is used to connect two or
more logically and physically different networks.
• A router can be used to connect a LAN to LAN, LAN to WAN and LAN to
Internet.
• A router acts as a post office where sorting and distribution of the posts
(packets in case of routers) is done.
• A router works on the basis of an IP address. Every router has built-in
operating system known as IOS.
• A router works on the network layer of the OS model and it routes the data
towards the optimal path.
• Router uses the header information of the packets and forwarding table to
define the best shortest possible path of the data.
Do You Know?
1. A router can be wired or wireless.
2. A wireless router can provide Wi-Fi access to smartphones and other devices.
3. Usually, such routers also contain some ports to provide wired Internet access.
4. These days, home Wi-Fi routers perform the dual task of a router and a
modem/ switch.
Maanya’s M.G.B Publications Computer Hardware & Networking
5-20 LAN Components and Protocols
5. These routers connect to incoming broadband lines, from ISP (Internet Service
Provider), andMicrosoft Wordto digital data for computing devices to process.
convert them
6. It is more expensive than the other network devices such as the hub, switch, and
many more.
Microsoft Word
Differences among Hub, Switch and Router
Hub Switch Router
• Hub sends data in the • Switch sends data in the • Router sends data in
form of binary bits form of frames the form packets
• Hub only works in half • Switch works in full • Router works in full
duplex duplex duplex
• Only one device can • Multiple devices can • Multiple devices can
send data at a time send data at the same send data at the same
time time
• Hub does not store any • Switch store MAC • Router stores IP
mac address or IP Address address
address
• Bridges divide collision domain into • Switches are used to connect the work
two parts. Bridges can create collision stations or computer systems. If there
domains but not broadcast domains. are 20 workstations connected to a
switch then there will be separate
collision domain for each of the
nodes.
• Router is use to connect the LAN and • Bridge is use to connect two different
WAN. LAN segments.
• Router transmits data in the form of • Bridge transmit data in the form
packets. frames.
• Router has more ports compare to • Bridge has only two ports.
bridge.
• Router uses routing table for sending • Bridge does not use any routing table
data. for sending data.
• Can only work with similar networks • Can work with dissimilar networks
• Routes data packet from one network • Converts the data packets protocols
to another based on internal routing from one format to another
tables
Fig. Speed mismatch between two computers can result into loss of data
• In public access mode, we can login to the system with anonymous as user name.
• In restricted access mode, we have to specify user name and password for accessing
the files. Like HTTP, FTP also works on a client-server model.
• When a user requests for a file transfer with another system, FTP sets up a
connection between the two nodes for accessing the file.
• Optionally, the user can authenticate using user ID and password. The user then
specifies the file name and location of the desired file. After that, another connection
sets up and the file transfer happens directly between the two machines.
5.7.5 Telnet
• The main task of the internet is to provide services to users. For example, users want
to run different application programs at the remote site and transfers a result to the
local site. This requires a client-server program such as FTP, SMTP. But this would
not allow us to create a specific program for each demand.
• The better solution is to provide a general client-server program that lets the user
access any application program on a remote computer. A popular client-server
program Telnet is used to meet such demands. Telnet is an abbreviation for Terminal
Network.
• Telnet provides a connection to the remote computer in such a way that a local
terminal appears to be at the remote side.
• There are two types of login:
✓ Local Login
✓ Remote Login
Do You Know?
• TELNET is also used for chat • FTP is used for downloading the files.
operation.
• The Port number in which TELNET is • The Port number in which FTP is work
work is 23. is 20 and 21.
• TELNET uses only one connection. • FTP establish two connections, one is
for control command and another is for
data transfer.
• It does not provide high security, it • It provides high security than TELNET.
provides only general security.
• It is used for remote login for a system. • It is used for transferring the files from
one system to another system.
OBJECTIVES
Microsoft Word
Fig. IP Addressing
• Example 2: For example, the 32 bit binary address
11000110.10101100.1010100.0001010 represents the IP address 198.172.168.10.
• The addressing provided by a network layer protocol to a device is called its
network address.
• 198.172.168.10 is the network address of a device.
• This is different from the MAC address which is the hardware address of the
NIC or the device (routers or switch).
• The network addresses in a TCP/IP network are also known as IP addresses.
• Therefore, 198.172.168.10 is also known as the IP address.
• The higher order bit of the first octet in class A is always set to o (Zero).
• The remaining 7 bits in first octet is used to determine network ID.
• The higher order bits of the first octet of IP addresses of class B are always set to 10.
• The remaining 14 bits are used to determine network ID. The 16 bits of host ID is
used to determine the host in any network.
• The default sub-net mask for class B is 255.255.0.0.
• Class B has a total of:
✓ Total number of networks = 214 = 16384
✓ Total number of hosts = 216 – 2 = 65534
• Class B networks use a default subnet mask of 255.255.0.0 and have 128-191 as their
first octet.
• The address 172.16.52.63 is a class B address. Its first octet is 172, which is between
128 and 191, inclusive.
3. Class C
• IP address belonging to class C are assigned to small- sized networks.
✓ The network ID is 24 bits long.
✓ The host ID is 8 bits long.
• The first octet of Class C IP address has its first 3 bits set to 110, i.e.
11000000(192) – 11011111(223)
• The higher order bits of the first octet of IP addresses of class C are always set to 110.
Microsoft Word
• The remaining 21 bits are used to determine network ID. The 8 bits of host ID is used
to determine the host in any network.
• The default sub-net mask for class C is 255.255.255.x.
• The Class C has a total of:
✓ Total number of networks address= 221 = 20,97,152
✓ Total number of hosts address= 28 – 2 = 254
• Class C networks use a default subnet mask of 255.255.255.0 and have 192-223 as
their first octet. The address 192.168.123.132 is a class C address.
• Its first octet is 192, which is between 192 and 223, inclusive.
4. Class D
Additional Information
Example - 1: Find the class of each address.
a) 00000001 00001011 00001011 11101111
b) 11000001 10000011 00011011 111111
c) 14.23.120.8
d) 252.5.15.111
Solution:
a) The first bit is 0. This is a class A address.
b) The first 2 bits are 1; the third bit is 0. This is a class C address.
c) The first byte is 14 (between 0 and 127); the class is A.
d) The first byte is 252 (between 240 and 255); the class is E.
Example - 2: For the address 24.46.8.95 identify the type of network and find the network
address.
Solution:
• Examine the first byte. Its value is 24 i.e. it is between 0 and 127. So it is a class A
network.
• So only the first byte defines the Net id. So we can find the network address by
replacing the host id with 0s.
• The process of obtaining the network address is shown in Fig.
Example - 3: For the address 132.7.21.84 find the type of network and the network address.
Solution:
• Examine the first byte. It is 132 i.e. between 128 and 192. So it is a class B network.
• So the first two bytes define the net id. Replace the host id with 0's to get the network
address as shown in Fig.
• So the network address is 132.7.0.0.
Maanya’s M.G.B Publications Computer Hardware & Networking
Network Addressing and Management 6-11
8. Time to Live: every packet is sent with some TTL value set, which tells the network
how many routers (hops) this packet can cross.
9. Protocol: Tells the Network layer at the destination host, to which Protocol this
packet belongs to, i.e. the next level Protocol. For example protocol number of ICMP
is 1, TCP is 6 and UDP is 17.
10. Header Checksum: This field is used to keep checksum value of entire header
which is then used to check if the packet is received error-free.
11. Source Address: 32-bit address of the Sender (or source) of the packet.
12. Destination Address: 32-bit address of the Receiver (or destination) of the packet.
1. Classful Addressing
• IPv4 addressing used the concept of classes. This architecture is called classful
addressing.
• In classful addressing, the address space is divided into five classes: A,B,C,D and
E . Each class occupies some part of the address space.
• Notation of IPv4 address: We can find the class of an address, there are two
notations of IP address are used.
1. Binary notation
2. Dotted-decimal notation
Fig:(1)
Fig:(2)
(i) Binary notation: In binary notation, the IP address is displayed as 32 bits. Each
octet is often referred to as byte. So it is common to hear an IP address referred to as 32
bits address or a 4 byte address.
(ii) Decimal Notation : To make the IP address more compact and easier to read,
Internet addresses are usually written in decimal form with a decimal point (dot)
separating the bytes.
• Classes of IP Address: The IP address space is divided into five classes. They
are:
1. Class A 2. Class B 3. Class C
4.Class D 5. Class E
• Each class occupies some part of the address space:
1. Class A Address: It is designed for large organizations with a large number
of attached hosts or routers.
2. Class B Address: These were designed for mid size organizations with tens
of thousands of attached hosts or routers.
3. Class C Address: These were designed for small organizations with a small
number of attached hosts or routers.
4. Class D Address: It were designed for multi casting. Each address in this
class is used to define one group of hosts on the Internet.
5. Class E Address: It is reserved for future use; only a few were used
resulting in another waste of addresses.
• In class D and class E many addresses were wasted. That is In c1assful
addressing, a large part of the available addresses were wasted.
Example - 1: Change the following IPv4 addresses from binary notation to dotted-
decimal notation.
a) 10000001 00001011 00001011 11101111
b) 11000001 10000011
Solution:
We replace each group of 8 bits with its equivalent decimal number and add dots for
separation.
a) 129.11.11.239
b) 193.131.27.255
Example - 2: Change the following IPv4 addresses from dotted-decimal notation to
binary notation.
a) 111.56.45.78
b) 221.34.7.82
Solution:
We replace each decimal number with its binary equivalent.
• The masks for classes A, B, and C are shown in Table. The concept does not apply to
classes D and E.
Example - 1: How many subnets and hosts-per-subnet you can create if the IP address
is 4.0.0.0 and a subnet mask is 255.255.255.0 ?
Solution:
• The IP address is 4.0.0.0 belongs to class A and its default subnet mask is 255.0.0.0.
• Therefore, if we use a subnet mask of 255.255.255.0, it means we borrowed 16 bits
(to convert from 0 to 1) as shown below:
Example - 3: What is the maximum number of hosts it can handle if a subnet mask is
255.255.240.0 ?
Solution:
• The default subnet mask of class B is 255.255.0.0.
• Therefore, if we use a subnet mask of 255.255.240.0, it means we borrowed 4 bit
from host id as shown below.
Microsoft Word
802.11n 2.4 GHz and 5 Up to 600 175+ feet indoors; range can
GHz Mbps be affected by building
materials
• Wi-Fi standards are the most widely used network standards, found across the
globe in homes, offices, and public places.
• They enable laptops, smartphones, and smart devices to connect to the Internet no
matter where they are- offices, homes, coffee shops, hotels, or airports.
Fig: Symmetric encryption – Using the same key for encryption and decryption
2. Asymmetric Encryption
• Asymmetric encryption uses the notion of a key pair: a different key is used for the
encryption and decryption process. One of the keys is typically known as the
private key and the other is known as the public key.
Maanya’s M.G.B Publications Computer Hardware & Networking
6-24 Network Addressing and Management
• The private key is kept secret by the owner and the public key is either shared
Microsoft
amongst authorised Word or made available to the public at large.
recipients
Fig: Asymmetric encryption – Using a different key for the encryption and
decryption process
• Data encrypted with the recipient’s public key can only be decrypted with the
corresponding private key. Data can therefore be transferred without the risk of
unauthorized or unlawful access to the data.
• Just as the seven-layer OSI model defines function but not implementation for
data communications, the ISO network management model defines five areas of
network management without specifying specific implementations. Those five
areas are as follows:
1. Fault management
• Fault management is concerned with the detection, isolation, and correction of
any and all non-normal network conditions. The architecture consists of event
collectors and event producers. Collectors consist of NMS and Syslog servers.
Producers are SNMP agents, RMON probes, etc.
2. Configuration management
• Configuration management is concerned with network configuration
consistency, change control, and documentation. Granular detail on items such
as descriptions on interfaces, IP address control, DHCP and DNS controls, and
other policies and procedures are covered. The end results are higher network
availability and reduced network operation cost.
3. Accounting management
• Accounting management targets the regulation of network resources. Network
utilization and actions can be tracked on a per-user basis, and the costs for those
resources can be allocated as well.
4. Performance management
• Performance management is the management of network response time, quality,
and consistency for all services. Baselining and trending lead to SLAs with
network “customers.” Performance management is closely related to network
capacity planning.
5. Security management
• Security management is concerned with the application of security policies
regarding network resources. The distribution of security policies, tracking of
security-related events, and accounting of access to network resources are
Fig. Crimper
BOARD DIPLOMA
Microsoft Word EXAMINATIONS
DCME III SEMESTER, CS 404
Computer Hardware & Networking MID EXAM - II
TIME: 1 HOUR MAX. MARKS: 20
Microsoft Word