Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Bld.316 1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 29

HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

IT (Information Technology) encompasses all of the technology that we use to collect,


process, protect and store information. It refers to hardware, software (computer programs),
and computer networks.

ICT (Information and Communication Technology)

This concept involves transfer and use of all kinds of information. ICT is the foundation of
economy and a driving force of social changes in the 21st century. Distance is no longer an
issue when it comes to accessing information; for example, working-from-home, distance
learning, e-banking, and e-government are now possible from any place with an Internet
connection and a computing device.

HARDWARE

HARDWARE BASICS
The concept of hardware includes computer components, the physical and tangible parts of the
computer, i.e. electrical/electronic and mechanical parts which comprise a computer.

Computer working principle:

Input devices System unit Output devices

Computer working principle: data are entered into a computer via input devices, then are
processed and stored in a system unit, and are finally displayed by the output device.

PERSONAL COMPUTER

Personal computer (PC), as the name suggests, is intended for personal use. If you do not
intend to move your computer frequently from one place to another, and at the same time you
want maximal price/performance ratio, then you should use a desktop computer. In

2
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

comparison to laptops or tablet computers, it is much larger in size, inconvenient to


carry/move, consumes more electricity but has a much better price/performance ratio. Also,
they are much easier to upgrade.

LAPTOP OR TABLET PC
Laptop or tablet PC is used by individuals who have the need to travel with a computer.
Laptop computers, as opposed to tablet PCs, Data entry is done via keyboard and mouse,
while the tablet PC data entry is done via touch screen.

Unlike desktop computers, notebooks and tablet PCs are optimized for portability, low power
requirements at the expense of performance and can be used (for a limited period of time-i.e.
until the batteries are depleted) without connection to the power grid. In order to prepare a
laptop or a tablet computer for use without a power connection, it is necessary to recharge the
batteries.

PORTABLE DIGITAL DEVICES

PDA-Personal Digital Assistant is a convenient small sized computer. It easily connects to


mobile phones and can prove a good solution for less demanding users. As the name suggests,
it is a device that fits in the user’s palm. Its name directly tells us that this computer is more of
an assistant and not a workstation-whose name suggests the superiority in capabilities and
computing power, especially in comparison with PDA.

Mobile phone is a portable electronic device used for distant communication. In recent years,
mobile phone has evolved from simple communication device into a multi-functional device.
Additional functions, such as short text messaging (SMS), electronic mail, Internet access,
contact registration, calculator, clock, alarm, recording and photograph displaying, recording
and playback of video clips, sending/ receiving multimedia messages (MMS), audio recording
and playback, etc. has turned the mobile phone into an extremely useful device, whose
absence would make active involvement and participation in a modern society not possible.

3
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

Smartphone is a device that merges functionality of phones, PDAs, cameras, camcorders and
computers. To function properly, Smart phones use operating systems, which are the basis for
application development. Some smart phones can be connected to an external screen and
keypad, which creates a working environment, similar to that of a laptop or a desktop
computer. Some operating systems for Smartphone are: Google Android, Symbian,
Blackberry, and Windows Phone.

MAIN COMPUTER PARTS

As already stated, computer's functionality can be divided into:

Input devices System unit Output devices

Basic computer working principle: data is entered into a computer via input devices,
processed and stored in a system unit, and displayed by the output device.

SYSTEM UNIT

The system unit (case) contains a computer's vital parts. There are two basic types of cases:

• Desktop casing is placed on a desk in a horizontal orientation.

• Towers come in 3 sizes (mini-tower, mid-tower and full-tower) and it is vertically


orientated.

Motherboard, MBO is computer's basic circuit, to which all computer components are
connected, directly or indirectly. Devices are connected to the motherboard through a system
bus. System bus connects all devices, ensures data flow and communication between different
devices using predefined protocols.

Central Processing Unit (CPU or processor) is a central part of a computer (and can be
referred to as the computer’s “brain”). It manages all other computer parts, monitors their
mutual communication and performs arithmetic-logical operations. Processor speed is

4
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

measured in hertz (or megahertz or gigahertz). Most famous manufacturers for personal
computer processors are Intel and AMD.

Cache is a small capacity memory which allows quick access to data. By storing data from
working memory in cache, the speed of communication between processor and RAM is
increased. Microprocessors use three levels of fast cache, L1, L2 and L3, used to store often
used data.

ROM (Read Only Memory) is a type of permanent internal memory that is used solely for
reading. BIOS (Basic Input/Output System), a program which is located in a separate ROM
on the motherboard, and defines the basic input/output system. Please note that not all BIOS
programs are stored in ROM.

RAM (Random Access Memory) is a working memory in which analyzed data and programs
are stored, while computer runs. It allows reading and writing data, and is deleted/cleared
when the computer shuts down.

Hard Disk Drive (HDD) is a device for permanent data storage (it does not delete/clear when
computer shuts down). Its features are: large capacity, faster performance in comparison to
optical devices but slower in comparison to RAM and are used for permanent data storage.
We can distinguish between internal and external hard drives.

Floppy Disk Drive is used for storing and reading data stored on a floppy disk. Disk capacity
is 1.44MB. Before memory stick and a wider usage of CD recorders, it was used as data
carrier. 'Modern memory sticks have a memory capacity measured in GB while floppy disks
only have memory capacity of 1.44MB, indicating that floppy disks are becoming obsolete.

CD-ROM drive is used for reading CD media.

DVD drive is used for reading DVD discs. DVD disc capacity ranges from 4.7 to 18GB.

Soundcard is a device used for sound creation and production by means of computer
speakers.

5
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

Graphics card is responsible for image processing and displaying it on a monitor. It has its
own graphics processor and memory. Image quality depends on the strength of these
components.

Modem enables computers to communicate via telephone lines. They connect computers to
the Internet.

Connectors/ports are slots visible in the back and the front side of a computer.

COMMON INPUT /OUTPUT PORTS

 Universal Serial Bus (USB) is used to connect various devices (mouse, keyboard, USB
memory).
 Serial port is used for example in connecting a mouse (labeled COM1 or COM2).
 Parallel port is used for connecting a local printer (LPT1 or LPT2).
 Network port is used for connecting computers to a network.

MEMORY AND STORAGE DEVICES

ROM (Read Only Memory) is a type of permanent, internal memory that is used solely for
reading. BIOS (Basic Input/output System), a program which is located in a separate ROM on
the motherboard, and defines as the name suggests, basic input/output system

RAM (Random Access Memory) is a working memory in which analyzed data and programs
are stored, while computer runs. It allows reading and writing data, and is deleted/cleared
when the computer shuts down.

Data Measurement units

Bit (binary digit) is the basic unit used to measure the amount of information. A byte contains
eight bits.

1 KB (kilobyte)- 1024 bytes

1 MB (megabyte)- 1024 KB

6
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

1 GB (gigabyte) -- 1024 MB

1 TB (terabyte) – 1024 GB

BASIC TYPES OF STORAGE DEVICES

CD (Compact Disc) is an optical disc used for data storage. The standard capacity of a CD is
700MB. CD-R is used for reading and writing data once, while CD-RW for reading and
writing data multiple times.

DVD (Digital Versatile Disc) is an optical disc which is, due to the larger capacity (about 4.7
GB), mostly used for video storage.

Blu-ray disc (BD)- the successor to DVD, is an optical disk storage, it comes in different
capacities, depending on how many layers it has and the capacity of each layer. Currently, the
capacity of one layer is between 27 GB and 33 GB, while the overall capacity is the product
of the number of layers and capacity of each layer.
Memory card is a type of flash memory used to store data in digital cameras, cell phones,
MP3 players etc.

USB Stick is a data storage device. It features small dimensions, relatively high capacity,
reliability and speed.

There is a difference between an internal hard disk drive, which is embedded in the computer
case, and an external hard disk drive, which is connected to a computer by using an
appropriate cable or USB port, and is usually used to transfer data from one computer to
another or for backup.

INPUT AND OUTPUT DEVICES


Input devices:

Mouse is an input device that facilitates work with the graphical user interface (GUI). The
mouse transmits hand movements and the screen displays the cursor (mouse pointer)
movements. They are divided into mechanical and optical (with respect to a transfer
movement), and wired and wireless (with respect to connection).

7
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

Trackball, unlike a mouse, is not movable. Hand movements are transmitted to the screen by
rolling the ball which is located on the upperside of the device.

Keyboard is used for data entry and issuing commands. They can also be wired or wireless.

Scanner is used to load data (image, text, etc.) from the printed material into a computer. The
result of scanning is an image, but with special programs, if we scan the text, we can get a text
as a result. Software used to recognize text from image is called a text recognition tool.

Touchpad is used for transmission of hand movement, but unlike working with a mouse, the
user is the one who determines the position of the cursor by touching the touchpad.

Lightpen enables handwriting on screen and can be used as a mouse. It requires an


appropriate monitor type.

Joystick: mainly used in computer games. Unlike a mouse, it has many buttons which allow
control over game objects.

Microphone is a device that converts sound into an electrical signal, which can be stored on a
computer. It is mainly used for recording sound, communication between players in online
games, in combination with a web camera in video conferencing, for converting voice into
text on a computer (speech-to-text processing (e.g., textual files or emails), etc.

Webcam is a camera that stores video signal in a format appropriate for video transfer over
the Internet in real-time.

Output devices:

Monitor displays images from the computer, it enables us to see, work and control computers.
In other words, working on a computer without a monitor would be inconceivable.

Projector is a device used to project a computer image or other images from independent
devices, such as DVD players, Blu-ray player, etc. onto canvas or a wall.

8
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

Printer is a device used for printing data from a computer onto a paper. We distinguish
between local printer (connected directly to the computer) and network printer (connected
directly to network using a network card). Also, printers also differ according to print
technology: laser, inkjet, thermal printer and plotter.

Laser printers are similar to photocopy devices when it comes to technology. They
have exceptional print quality, speed and are quiet. Downsides of laser printers are their high
price and high price of toners.

Inkjet printers have a high print quality (somewhat lower in comparison with laser
printer), they are quiet while printing, and have low initial investment. Ink price, especially
color ink, can cost as much as the printer itself. Printing technology is based on ink dispersion
from container onto paper.

Plotter is used for printing large drawings (up to A0). They are extremely expensive
and used only for professional purposes, such as in designing firms for printing technical
drawings (blueprints).

Thermal printer, as its name states, leaves a print on the paper by utilizing heat. They
use paper sensitive to heat, feature small dimensions; they are quiet while printing and
relatively cheap. They are usually used for printing receipts, and owing to that they are called
POS printer (printer of sale). Also, they are used as calculator printers and due to their small
dimensions, as portable printers.

Input and output devices:

Storage devices due to necessity for writing and reading data, they are classified as
input/output devices. Touch screen (i.e. monitor sensitive to touch) is an output device while
displaying computer image, and at the same time input device while receiving manual orders.

SOFTWARE
Software is, unlike hardware, intangible part of the computer. It consists of a sequence of
commands, written according to strict rules. Programs are written by programmers, in various
programming languages.

9
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

Software types:

System Software (Operating system) is a program which manages computer hardware. First
computers did not have operating systems; they had programs that were directly loaded into
the computer (e.g. punchcards). Today, computers have an operating system which loads into
the computer's memory during its startup. Computer functions are based on its operating
system. Within operating system, drivers (responsible for the functioning of a computer) and
various utility programs (responsible for the functionality of a computer) are installed. The
most famous operating systems are:

1. Linux (Debian, Ubuntu, Fedora, Knoppix,...) - open source software

2. Microsoft Windows (XP, Vista, 7,...) - proprietary software

3. Mac OS X (Cheetah, Panther, Snow Leopard,...) - proprietary software

Application Software (Utility programs) are all programs that users use to perform different
tasks or for problem solving. Users, according to his/her needs, install the appropriate utility
software. Computer functions and tasks that computers can perform are defined by the
installed utility software. Utility software can often cost more than computer hardware unless
the software is open source.

Common utility softwares are:

Text processing software is used for creating and forming text documents and nowadays,
they can contain images, charts and tables. Examples of such programs are OpenOffice.org
Writer (open source software) and MicrosoftWord (proprietary software).

Spreadsheet calculations software is used for performing various calculations and


presentation of results in charts. Examples of such programs are OpenOffice.org Calc Writer
(open source software) and MicrosoftExcel (proprietary software).

Software for presentations is used to create professional presentations that consist of


slides with graphical and textual elements. Such a presentation can afterwards be displayed as

10
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

a "slide show” by using a projector. Examples of such programs are OpenOffice.org Impress
(open source software) and MicrosoftPowerPoint (proprietary software).

Software for creating and managing database helps to manage a collection of structured
data. Examples of such programs are OpenOffice.org Base (open source software) and
MicrosoftAccess (proprietary software).

Common utility software installed on a computer:


- office programs - OpenOffice.org, Microsoft Office

- antivirus programs – Avira, Sophos, Kaspersky, Antivir etc.

- Internet browser: Mozilla Firefox, Microsoft Internet Explorer, Opera, Safari etc.

- programs for image editing: Adobe Photoshop, Canvas, CorelDraw, Draw etc.

3. NETWORK

The term “computer network” can be define as an interconnected collection of autonomous


computers. Two computers are said to be interconnected if they are able to exchange
information through communication media such as copper wire fiber optics, microwaves and
communication satellite.

Computer network falls into two main architectures: client/server network architecture and
peer-to-peer network. A client/server network uses one or more dedicated computer as server
to share the files, printers, and applications. A peer-to-peer network allows any user to share
files with any other user and doesn’t require a central, dedicated server.

11
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

A Simple Network

Network Classification
The major categories used for classifying networks are geographical coverage,
internetwork connection method and functional relationship (network architectures)

Classification of Networks by Internetwork


 When two or more networks or network segments connected using devices that
operate at layer 3 (the 'network' layer) of the OSI(Open System Interconnection)
Basic Reference Model, such as a router.
 Any interconnection among or between public, private, commercial, industrial,
or governmental networks may also be defined as an internetwork.
 In modern practice, the interconnected networks use the Internet Protocol.
 There are at least three variants of internetwork, depending on who administers
and who participates in them:
 Intranet
 Extranet

12
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

 Internet
Classification of networks by Connection method
 Computer networks can also be classified according to the hardware technology
that is used to connect the individual devices in the network such as Optical
fibre, Ethernet, Wireless LAN, Home PNA, or Power line communication.
 Ethernet uses physical wiring to connect devices. Often deployed devices are
hubs, switches, bridges, and/or routers.
 Wireless LAN technology is designed to connect devices without wiring. These
devices use radio waves as transmission medium.

Classification of Networks by Functional relationship (network architectures)


 Computer networks may be classified according to the functional relationships
which exist between the elements of the network, e.g., Active Networking,
Client-server and Peer-to-peer (workgroup) architecture.
Peer-to-Peer
 Peer-to-Peer networks (P2P) are the simplest of all LAN set-ups.
 Not only are they easy to configure and require few resources, they are also
inexpensive to implement.
 Peer-to-Peer, also called P2P networks, are the most direct method of
connecting computers, requiring only a network cable for the simplest of
networks,
 A simple Peer-to-Peer network can be a simple collection of two computers and
a printer. Computer 1 will be able to print on the printer connected to Computer
2, if Computer 2 sets up the sharing permissions for the printer.
 Already we can see the advantages of building a small LAN: Files can be
shared between the two computers and there is only one printer that must be
purchased and maintained. A LAN like this is very simple to set up. In fact,
many households may have LANs just like this.

Advantages of a peer-to-peer Network

13
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

 Less initial expense - No need for a dedicated server.


 Setup - An operating system (such as Windows XP) already in place may only
need to be reconfigured for peer-to-peer operations.
Disadvantages of a peer-to-peer Network
 Decentralized - No central repository for files and applications
 Security - Does not provide the security available on a client/server network.
 Client/Server LANs are generally much larger in scope than P2P networks.
 A file server is the most common server used.
 It frees up hard drive space on all the client machines and provides a single
place to store files for everyone to access.
 Other popular servers include mail servers to send and deliver email, web
servers to host Internet sites, database servers, and print servers.
 The complexity of client/server LANs can range from fairly simple networks to
networks comprised of thousands of client machines and numerous servers that
require an entire staff dedicated to keeping the network up and running.

Client/Server Network
Advantages of a client/server Network
 Centralized - Resources and data security are controlled through the server.
 Scalability - Any or all elements can be replaced individually as needs increase.
 Flexibility - New technology can be easily integrated into system.
 Interoperability - All components (client/network/server) work together.
 Accessibility - Server can be accessed remotely and across multiple platforms.

14
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

Disadvantages of a client/server network


 Expense - Requires initial investment in dedicated server.
 Maintenance - Large networks will require a staff to ensure efficient operation.
 Dependence - When server goes down, operations will cease across the network

Classification of Networks by Geographical Coverage or scale


Computer networks may be classified according to scale as follows:
Personal Area Network (PAN)
A Personal Area Network (PAN) is a computer network used for communication
among computer devices close to one person.
 Some examples of devices that are used in a PAN are printers, fax machines,
telephones, PDAs or scanners.
 The reach of a PAN is typically within about 20-30 feet (approximately 6-9
metres).
 Personal area networks may be wired with computer buses such as USB and
FireWire.
 A Wireless Personal Area Network (WPAN) can also be made possible with
network technologies such as IrDA and Bluetooth.

Local Area Network (LAN)


A network covering a small geographical area, like a home, office, or building is a
LAN.
 Current LANs are most likely to be based on Ethernet technology. For example, a
library may have a wired or wireless LAN for users to interconnect local devices
(e.g., printers and servers) and to connect to the internet.
Campus Area Network (CAN)
A network that connects two or more LANs but that is limited to a specific and
contiguous geographical area such as a college campus, industrial complex, or a
military base.
 A CAN may be considered a type of MAN (metropolitan area network), but is
generally limited to an area that is smaller than a typical MAN.

15
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

 This term is most often used to discuss the implementation of networks for a
contiguous area. This should not be confused with a Controller Area Network.
 A LAN connects network devices over a relatively short distance.
 A networked office building, school, or home usually contains a single LAN,
though sometimes one building will contain a few small LANs (perhaps one per
room), and occasionally a LAN will span a group of nearby buildings. In TCP/IP
networking, a LAN is often but not always implemented as a single IP subnet.

Metropolitan Area Network (MAN)


A Metropolitan Area Network is a network that connects two or more Local Area
Networks or Campus Area Networks together but does not extend beyond the
boundaries of the immediate town/city. Routers, switches and hubs are connected to
create a Metropolitan Area Network.

Wide Area Network (WAN)


A WAN is a data communications network that covers a relatively broad geographic
area (i.e. one city to another and one country to another country) and that often uses
transmission facilities provided by common carriers, such as telephone companies.
 WAN technologies generally function at the lower three layers of the OSI reference
model: the physical layer, the data link layer, and the network layer.

Global Area Network (GAN)


Global Area Networks (GAN) specifications are in development by several groups, and
there is no common definition.
 In general, however, a GAN is a model for supporting mobile communications
across an arbitrary number of wireless LANs, satellite coverage areas, etc.
 The key challenge in mobile communications is "handing off" the user
communications from one local coverage area to the next.

NETWORK DEVICES

16
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

Computer network devices also known as communication devices and they comprise a data
communication network. These devices are routers, switches, hubs, LAN cards, modems. In an
Ethernet or WAN network, the data communication cannot be performed without these
devices. Being an IT/Business professional or a network administrator, you must have the
good understanding of these devices.
1. LAN Cards
LAN cards or network adapters are the building blocks of a computer network. No computer
can communicate without a properly installed and configured LAN card. Every LAN card is
provided with a unique MAC address. An UTP/STP cable connects a computer with the hub or
switch. Both ends of the cable have the RJ-45 connectors one is inserted into the LAN card
and one in the hub/switch.

A LAN Card

2. Hub
The central connecting device in a computer network is known as a hub. Every computer is
directly connected with the hub. When data packet arrives at hub, it broadcast them to all the
LAN cards in a network and the destined recipient picks them and all other computers discard
the data packets. Hub has five, eight, sixteen, thirty-two and more ports and one
port is known as uplink port, which is used to connect with the next hub.

3. Switch

17
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

A switch is an intelligent device that maps the IP address with the MAC address of the LAN
card. Unlike the hubs, a switch does not broadcast the data to all the computers, it sends the
data packets only to the destined computer. These are used in the LAN, MAN and WAN. In an
Ethernet network, computers are directly connected with the switch via twisted pair cables.
4. Router
A router is a communication device that is used to connect two logically and physically
different networks, two LANs, two WANs and a LAN with WAN. Routers provides the
connectivity between the enterprise businesses, ISPs and in the internet infrastructure.
5. Modem
A modem is a communication device that is used to provide the connectivity with the internet.
Modem comes in two shapes: Internal Modem (which is a card, installed in a slot, inside the
computer), and External Modem (which is a hardware device, found outside the case of
computer).

NETWORK TOPOLOGY

The way in which devices are interconnected to form a network is called network topology.
Some of the factors that affect choice of topology for a network are −
 Cost − Installation cost is a very important factor in overall cost of setting up an
infrastructure. So cable lengths, distance between nodes, location of servers, etc. have
to be considered when designing a network.
 Flexibility − Topology of a network should be flexible enough to allow
reconfiguration of office set up, addition of new nodes and relocation of existing
nodes.
 Reliability − Network should be designed in such a way that it has minimum down
time. Failure of one node or a segment of cabling should not render the whole network
useless.

18
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

 Scalability − Network topology should be scalable, i.e. it can accommodate load of


new devices and nodes without perceptible drop in performance.
 Ease of installation − Network should be easy to install in terms of hardware,
software and technical personnel requirements.
 Ease of maintenance − Troubleshooting and maintenance of network should be easy.

Bus Topology
Data network with bus topology has a linear transmission cable, usually coaxial, to which
many network devices and workstations are attached along the length. Server is at one end
of the bus. When a workstation has to send data, it transmits packets with destination
address in its header along the bus.

Bus Topology

The data travels in both the directions along the bus. When the destination terminal sees the
data, it copies it to the local disk.

Advantages of Bus Topology


These are the advantages of using bus topology −
 Easy to install and maintain
 Can be extended easily
 Very reliable because of single transmission line

Disadvantages of Bus Topology


These are some disadvantages of using bus topology −

19
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

 Troubleshooting is difficult as there is no single point of control


 One faulty node can bring the whole network down
 Dumb terminals cannot be connected to the bus.

Ring Topology
In ring topology each terminal is connected to exactly two nodes, giving the network a
circular shape. Data travels in only one pre-determined direction.

When a terminal has to send data, it transmits it to the neighboring node which transmits it to
the next one. Before further transmission data may be amplified. In this way, data reverses the
network and reaches the destination node, which removes it from the network. If the data
reaches the sender, it removes the data and resends it later.

Advantages of Ring Topology


These are the advantages of using ring topology
 Small cable segments are needed to connect two nodes
 Ideal for optical fibres as data travels in only one direction
 Very high transmission speeds possible

20
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

Disadvantages of Ring Topology


These are some the disadvantages of using ring topology −
 Failure of single node brings down the whole network
 Troubleshooting is difficult as many nodes may have to be inspected before faulty one
is identified
 Difficult to remove one or more nodes while keeping the rest of the network intact.

Star Topology
In star topology, server is connected to each node individually. Server is also called the
central node. Any exchange of data between two nodes must take place through the
server. It is the most popular topology for information and voice networks as central
node can process data received from source node before sending it to the destination
node.

Advantages of Star Topology


These are the advantages of using star topology
 Failure of one node does not affect the network.
 Troubleshooting is easy as faulty node can be detected from central node immediately.
 Simple access protocols required as one of the communicating nodes is always the
central node.

21
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

Disadvantages of Star Topology


These are the disadvantages of using star topology
 Long cables may be required to connect each node to the server
 Failure of central node brings down the whole network

Tree Topology
Tree topology has a group of star networks connected to a linear bus backbone cable. It
incorporates features of both star and bus topologies. Tree topology is also called hierarchical
topology.

Advantages of Tree Topology


These are some of the advantages of using tree topology −
 Existing network can be easily expanded
 Point-to-point wiring for individual segments means easier installation and
maintenance
 Well suited for temporary networks

Disadvantages of Tree Topology


These are some of the disadvantages of using tree topology
 Technical expertise required to configure and wire tree topology
 Failure of backbone cable brings down entire network
 Insecure network
 Maintenance difficult for large networks

22
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

Benefits of A Computer Network


The following are the important benefits of a computer network:
File sharing: Networking of computers helps the users to share data files. Users can share any
information via networks.
Hardware sharing: Users can share devices such as printers, scanners, CD-ROM drives, hard
drives etc.
Application sharing: Applications can be shared over the network, and this allows
implementing client/server applications
User communication: Networks allow users to communicate using e-mail, newsgroups, and
video conferencing etc.

THE INTERNET
It is difficult to define the internet simply because it is not a single entity. Instead, it is an
immensely complex combination of thousands of technologies and dozens of services used by
tens of millions of peoples around the world each day. While overly simplistic definition like
“Internet is a network of networks” is technically accurate. Internet mean INTERnation
Network, a network of all the computer networks above the globe. So, Internet is a network of
networks, made by joining computer networks together. These different computers and
networks are united with the common thread of protocols like Internet Protocol (IP) and
Transmission Control Protocol (TCP).

INTRANET
An intranet is a computer network that uses Internet Protocol (IP) technology to securely
share any part of an organization’s information within that organization. It is the connection of
computer networks in a local area. Sometimes, the term refers only to the organization’s
internal Website, but may be a more extensive part of the organization’s information
technology infrastructure. It may host multiple private websites and constitute an important
component and focal point of internal communication and collaboration. Any of the well-
known Internet protocols may be found in an intranet, such as HTTP (web services), SMTP (e-
mail), and FTP (file transfer protocol). Internet technologies are often deployed to provide

23
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

modern interfaces to legacy information systems hosting corporate data. An intranet can be
understood as a private analog of the Internet, or as a private extension of the Internet.
EXTRANET
An Extranet is the extension of an Intranet to include public access. An Extranet can allow
public access to employees, customers, clients or partners. The Extranet uses Internet protocols
so users can navigate with a browser, but resides on the company’s private server rather than
on a public Internet server. Extranet access from the Internet can be controlled through various
architectures that are password or username specific. In other words, areas of the Extranet will
be available according to password credentials. This limits users to Extranet pages relevant to
the business they might be conducting, while keeping other areas of the Extranet private and
secure.
World Wide Web (WWW)
Is one of the services that can be used on Internet which enables us to view and search contents
in a form of web-pages
DATA TRANSER
Download is a term that implies taking a copy of digital data from a network computer to a
local computer, and upload means placing digital content on a network computer from a local
computer. For example, when you saved a copy of a document from a web site to your
computer (download). Likewise, when you finish preparing a document and placed it on the
network computer (upload).
Bitrate represents speed at which data is transferred through a network. It is measured in bps
(bit per second). The number of bits transferred in one second tells us how many bits can be
transferred through a network in one second.

1,000 bit/s rate = 1 kbps (one kilobit or one thousand bits per second)

1,000,000 bit/s rate = 1 Mbps (one megabit or one million bits per second)

1,000,000,000 bit/s rate = 1 Gbps (one gigabit or one billion bits per second)

Ways to connect to the Internet:

 Dial-up: Internet access method uses a modem (56k) and a telephone line.

24
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

 Mobile: Connecting by using a mobile network (GPRS, EDGE, UMTS, HSPA)


 Satellite: Commonly used in parts of the world where there is no proper infrastructure
and there is no other way of accessing the Internet
 Wireless (Wi-Fi): Data is transferred between computers by using radio frequencies
(2,4 GHz) and the corresponding antennas

E-MAIL, IM, VOIP, BLOG


E-mail is the transmission of text messages via Internet. Using attachment, users can
exchange files like images, multimedia, documents, etc. E-mail addresses consist of a
username, @ sign ("at") and a domain name, e.g. mark.marich@ITdesk.info, where
“mark.marich” is the username and “ITdesk.info” is the domain name.

IM (Instant Messaging) service is used for instant message exchange and real time
communication. Besides textual communication and video conferencing, they allow file
transfer as well. Some of the popular IM services are: WindowsLiveMessenger, Skype, and
GoogleTalk.

VoIP (Voice over Internet Protocol) is a term for technology that enables digitalization and
transfer of sound (and multimedia sessions) over the Internet. Therefore, it enables sound
communication much like the telephone call. In short, VoIP protocol enables audio/video
communication between users.

Blog (web log) is a form of Internet media in which users can re-post or write their opinion on
any topic. It can be personal (a form of Internet diary), thematic, or in the form of journals.
Blogs are popular because end-users do not need to have advanced computer knowledge, or
knowledge of webpage creation, in order to be present on the Internet and write about various
topics, i.e. state their opinion. Blogging has greatly facilitated the exchange of interests, ideas,
opinions, and contributed to realization of human right to free expression. Some use blogs to
share their art, personal aesthetic, or to collect virtual clippings from websites online.

25
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

Entries published on blogs are called posts, which may allow a space below for visitors to
leave their comments. Besides text, it is possible to exchange multimedia files, such as photos
or videos. In order to share your texts, pictures, video clips, etc., it is necessary to create a
personal account on websites that offer this type of service. In case you simply wish to
browse the content, it is not necessary to open a personal account.

4.5 VIRTUAL COMMUNITIES


The term "virtual community" encompasses a group of people who communicate via social
networks, forums, IM service, blogs. We call it a community, since they are a collection of
people who participate in a group of their interests, thus forming a virtual community, because
it does not involve physical contact, but is carried out by means of ICT technologies.

Social Networks are free online services that provide users with various forms of presentation
and communication. Some of the more popular social networks are: Facebook, Twitter,
Google+, Whatsapp etc.

Forum is a service that allows users to exchange opinions. It can be compared to bulletin
boards on which participants leave their messages, while others leave their comments.
Examples of forums are: Reddit, TED Conversations.

Chatroom is a webpage or part of a webpage which allows a real-time information exchange.


Unlike the instant messaging writing software, it does not require computer installation, only
a web browser and Internet connection.

PROTECTION WHEN USING ICT


INFORMATION SECURITY

Information security is defined as preservation of information confidentiality, integrity and


availability. Its measures are the rules of data protection on physical, technical and
organizational level.

26
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

User authentication involves user identification, so individuals can gain access to a certain
content (data). For example, to check e-mail via browser, i.e., access an account, it is
necessary to enter a username and password. If the required information is entered correctly,
access is granted. Passwords should, for security reasons, be kept confidential. Password is a
key (like a key to access your home or a car) that allows access. As you would not share your
apartment or car keys with just anyone, you should not share your password either.
Nowadays, many people have home security doors with locks whose keys are difficult to
copy, with the aim of blocking unauthorized home intrusion. Passwords should be created
with the same caution. The more complex your password is, the harder it will be to break
through (crack it), therefore it is less likely that someone will gain unauthorized access to
your data.

When choosing a password, it is advisable to use punctuation, numbers and a mix of


uppercase and lowercase letters. A minimum length of 8 characters is recommended (shorter
passwords are easier break through). From time to time, it is necessary to change the
password. That way, the possibility of its detection decreases. Some of the most common
mistakes when choosing passwords are:

• using words from a dictionary

• passwords based on personal information, such as name or birth date, employment


place etc.

• characters that follow the order given on a keyboard: 123, qwert, etc.

How to choose a good password:

• Select a sentence:

• Take first letters:

• Add numbers:

27
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

By choosing a password, such as: 7I.iPoCEwOA3, you will have a secure password, which is
difficult to break through and one you can easily remember. It is a combination of numbers,
uppercase and lowercase letters, and has 12 characters.

DATA SECURITY

The term backup signifies the process of making a copies of the original data (files,
programs). This help protect data in the event of damage to the original data source or its loss.
Data can be stored on another server, magnetic tape, hard disk, DVD or CD, etc.

Firewall is a software (or network device) that is used to control authorized access and protect
against unauthorized access to your computer. Figuratively speaking, computers are
connected via network port. In the computer world, the term port is used to describe the
network of connections through which computers can connect to a computer network, or
someone can connect to your computer from outside of your network. All data traffic between
a computer and the rest of network is done through ports. Control port controls data flow from
our computers to the network and vice versa. Control is done through a firewall; some ports
are opened, some closed, and some allow temporary traffic.

To protect data from unauthorized access and theft, we use a username and password to
confirm our identity, and prevent unauthorized data access. Similarly, in case we need to
briefly step away from a computer, it is necessary to lock it. Computers can be locked by
opening the Start menu, clicking the arrow next to the Shut Down button and selecting the
Lock command.

MALICIOUS PROGRAMS
Malware (malicious + software) is a software which infiltrates an operating system in a
seamless manner, whether by human mistake or due to shortcomings of the operating system
and software support with malicious intentions. Malicious software includes:

Virus: is a malicious program with the possibility of self-replication. In a computer, it seeks


other files, trying to infect them and the ultimate goal is to spread to other computers.

28
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

Depending on what malicious code it contains, it may cause more or less damage to your
computer.

Worms: like viruses, they possess the ability of self-replication, however they cannot infect
other programs. Their usual intent is to take control of your computer and allow remote
control by opening, the so-called, 'backdoor'.

Trojan horses: can be presented in the form of games or files in e-mail attachments, with
different purposes, such as to allow remote control to your computer, delete data, allow
spreading of viruses, send spam from the infected computer, etc. Unlike viruses and worms, it
does not replicate and it needs to be executed, that is, it is not autonomous.

Spyware: is a program that secretly collects data about computer users (passwords, credit
card numbers, etc.), therefore it spies on users. The most common spyware infections usually
occur while visiting suspicious sites with illegal or pornographic content.

Adware: is a program that uses collected data about a user in order to display advertisements
in a way regarded as intrusive. It usually manifests itself in the form of many pop-up windows
that display ads.

Hoax: is a false message being spread by e-mail in order to deceive users. Their goal is to
obtain data of, for instance, a bank account, or persuade users to pay some fees in order to win
the lottery (which they never applied for), or pay costs of money transfers from an exotic
prince to help him withdraw money from a country that is falling apart and, in return, will
receive an impressive award, etc.

In order to demystify malicious programs, it is necessary to explain that malicious software is


nothing more than a computer program. Like any other computer program, it must be installed
on your computer (operating system) to act.

LEGAL REGULATIONS
Copyright is a right which is used to protect the author's intellectual property. If someone
wants to use such copyrighted work, they must respect the conditions under which the author,

29
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB

as the owner, has allowed the use of his/her work (payment of fees, referencing the original,
etc.). The use of copyrighted works is defined by the license and the user is bound by EULA.

EULA (End User License Agreement) is a software license agreement for end users. EULA
will be displayed during program installation and by pressing an "I agree" button you agree to
terms of use and are legally bound to respect contract conditions.

• Q: How to be sure that legal software is used?


• A: For example, after installation of the Windows operating system, it must
be activated. Activation verifies whether the serial number/ identification
number is valid, that is, whether the operating system is genuine.

Product identification number (PID) is a number that comes with legally purchased software
and it certifies the origin of the program.

Every software publisher has a specific method of verifying the legality of a piece of software
you purchased. It mostly comes down to checking via the Internet, i.e., activation and/or
registration, updates via the Internet etc. One of the advantages of legally purchased or
acquired software is quality customer service that people with unlicensed software cannot
have.

Proprietary software is software licensed under the exclusive legal right of the copyright
holder. The licensee is given the right to use the software under certain conditions, but
restricted from other uses, such as modification, further distribution etc.

Shareware is a term that implies free software use (trials) for a specified time period, after
which it is necessary to buy the product.

Freeware is software free for personal use.

Open Source is software whose code is available to users; it can be freely used, modified and
distributed.

30

You might also like