You are on page 1of 12

What is computer network?

A computer network, is a collection of computers and devices connected by communications channels that
facilitates communications among users and allows users to share resources with other users. ...

Two or more computers that are connected together to share resources such as hardware, data, and software. Most
common are the local area network (LAN) and the wide area network (WAN). ...

Example Of Computer Network

Computer networks can be used for several purposes:

• Facilitating communications. Using a network, people can communicate efficiently and easily via email,
instant messaging, chat rooms, telephone, video telephone calls, and video conferencing.
• Sharing hardware. In a networked environment, each computer on a network may access and use hardware
resources on the network, such as printing a document on a shared network printer.
• Sharing files, data, and information. In a network environment, authorized user may access data and
information stored on other computers on the network. The capability of providing access to data and
information on shared storage devices is an important feature of many networks.

Which Devices are used in computer networks?

The following devices are required for communication take place.

1. Sending Device

A computer or device that sends data or information is called sending device. It also called sources
device. Sending device can b computer or a telephone.

2. Receiving Device
A computer or device that Receive data or information is called sending device. It also called sink.
receiving device can b computer , telephone or a television.

3. Transmission Medium

The means through which data is sent from one location to another location is called transmission
medium. It can be twisted pair cable, coxical cable, fiber optic cable or microwave etc.

4. Communication Devices.

The device that help in communication of sending and reciving devices are called communication
devices. It can be modems or Network interface card.

Server

The term server is used quite broadly in information technology. A server computer is a computer that link
other computers or electronic devices together. They provide services across a network, either to private users
inside a large organization or to public users via the internet. For example, when you enter a query in a search
engine, the query is sent from your computer over the internet to the servers that store all the relevant web pages.
The results are sent back by the server to your computer.

Client

A client is the requesting computer, in a client / Server relationship that accesses a remote services from a
server, by way of a network.

Server / Client Model

Different Types of Computer Networks


There are three common types of computer networks

Lan – Local Area Network.

A local area network (LAN) is a computer network that connects computers and devices in a limited sarea such as
home, school, computer laboratory, office building. Local Area Networks implement shared access technology.
This means that all of the devices attached to the LAN share a single communications medium, usually a coaxial,
twisted-pair, or fiber-optic cable. physical connection to the network is made by putting a network interface card
(NIC) inside the computer and connecting it to the network cable. Once the physical connection is in place, the
network software manages communications between stations on the network. LANs offer computer users many
advantages, including shared access to devices and applications, file exchange between connected users, and
communication between users.

Wide Area Network

Wide Area Network (WAN) covers a large Area like bildings, cities and even countries. Offices in different areas
might be connected by a WAN. This term is also used to refer to the Internet. Computers connected to a wide-area
network are often connected through public networks, such as the telephone system. The largest WAN in existence
is the Internet.

Man- metropolitan area network

. A metropolitan area network (MAN) is a network that interconnects computers in a geographic area or region
larger than that covered by local area network (LAN) but smaller than the area covered by a wide area network
(WAN).. A MAN usually interconnects a number of local area networks (LANs) using a high-capacity technology,
such as fiber-optical links

Dialup Modem:

A modem is a device that enables a computer to transmit data over, telephone line . Computer information is stored
digitally, whereas information transmitted over telephone lines is transmitted in the form of analog waves. So
modems convert the analog signal into digital and digital into anlog so communication between two computers can
take place.

dial-up modems typically have a maximum theoretical transfer speed of 56 kbit/s (using the V.90 or V.92 protocol)
Factors such as phone line noise as well as the quality of the modem itself play a large part in determining
connection speeds. Some connections may be as low as 20 kbit/s in extremely "noisy" environments.

Dial-up modems use copper phone lines to connect with the Internet. All modem communications take place over
some kind of communication line or cable. What type of cable it is, and who provides it and its related services,
makes a difference in network performance and cost.

Network Interface Card (NIC)


This is most important device in building networks. These are the most common part of computers that are used in
our homes and offices. It also referd as Local area network card (lan card).

An Ethernet network interface card is installed in an available slot inside the computer. The NIC assigns a unique
address called a MAC (media access control) to the machine. The MACs on the network are used to direct traffic
between the computers. The back plate of the network interface card features a port that looks similar to a phone
jack, but is slightly larger. This port accommodates an Ethernet cable. Ethernet cable must run from each network
interface card to a central hub or switch.

Physical Transmission media

There are the types of the physical transmission media.

Twisted Pair cable

Twisted Pair cable is popular methods of transferring data. There especially prevalent in the lan environment. A
pair of wires forms a circuit that can transmit data. The pairs are twisted to provide protection against crosstalk, the
noise generated by adjacent pairs. Twisted Pair cable is the least expensive type of local-area network (LAN) cable,
most networks contain some twisted-pair cabling at some point along the network. Two basic types of twisted-pair
cable exist are unshielded twisted pair (UTP) and shielded twisted pair (STP).

Coaxial Cable

A type of wire that consists of a center wire surrounded by insulation and then a grounded shield of braided wire.
The shield minimizes electrical and radio frequency interference. Coaxial cabling is the primary type of cabling
used by the cable television industry and is also widely used for computer networks. Although more expensive than
standard telephone wire, and can carry much more data.

Fiber Optic Cable


An optical fiber is a thin, flexible, transparent fiber that acts as a waveguide, or "light pipe", to transmit light
between the two ends of the fiber. With Fiber Optic data can transmit over longer distances and at higher
bandwidths (data rates) than other forms of communication. Fibers are used instead of metal wires because signals
travel along them. Light stay within the fiber line because of angle at which the light hits the surface of fiber line
and it bounce of it like a mirror.

Cutting Edge Technology

What is a Bluetooth?

Bluetooth is an open wireless technology standard for exchanging data over short distances (using short
wavelength radio transmissions) from fixed and mobile devices, creating personal area networks (PANs). It can
connect several devices, overcoming problems of synchronization. Bluetooth is a standard communications
protocol primarily designed for low power consumption, with a short range (power-class-dependent: 100 m, 10 m
and 1 m, but ranges vary in practice based on low-cost transceiver microchips in each device.[6] Because the devices
use a radio (broadcast) communications system, they do not have to be in line of sight of each other.
What is a GPS?
Global Positioning System: a navigational system involving satellites and computers that can determine the
latitude and longitude of a receiver on Earth by computing the time difference for signals from different satellites to
reach the receiver. It provides reliable location and time information in all weather and at all times and anywhere on
or near the Earth. It is a freely accessible by anyone with a GPS receiver. The 24 satellites that make up the GPS
space segment are orbiting the earth about 12,000 miles above us. They are constantly moving, making two
complete orbits in less than 24 hours. These satellites are travelling at speeds of roughly 7,000 miles an hour. GPS
satellites are powered by solar energy. They have backup batteries onboard to keep them running in the event of a
solar eclipse, when there's no solar power.
Communications Satellite
A communications is an artificial satellite stationed in space for the purpose of telecommunications. The satellite
communication means communication through satellites. Satellites forms an essential part of telecommunication
system worldwide carrying large amount of data (internet e-mail) and telephone traffic in addition to TV signals. It
is capable of transmitting signal long distance without using with higher capacity. Statllite circuits can be installed
rapidly. The mobile communication can be easily achieved by statlite system as it has an unique degree of
flexibility in interconnecting mobile vehicles.

Cellular Communications:

Cellular communication is a method of wireless communication that utilizes the 824 to 849 MHz and 869 to 894
MHz band of the radio spectrum. The name cellular is derived from the method of dividing a geographical area into
a grid each section of the grid being a cell. Frequency ranges are designated to each cell without any overlapping
frequencies within the geographical area. This allows for ranges to be used again in different cells. each cell in the
grid has transmission tower which connects the Cellular user to MTSO (Mobile Telephone Switching Office)

All Cellular communications require a mobile communication device (mobile phone), a base station containning a
radio transceiver and controller and a MTSO.
Virus: A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is
also commonly used to refer to other types of malware, including adware and spyware programs. A virus might
corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase
everything on your hard disk. Computer viruses are often spread by attachments in e-mail messages or instant
messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's
from and you are expecting it. Viruses can be disguised as attachments of funny images, greeting cards, or audio
and video files. Computer viruses also spread through downloads on the Internet. They can be hidden in illicit
software or other files or programs you might download. To help avoid computer viruses, it's essential that you
keep your computer current with the latest updates and antivirus tools, stay informed about recent threats, run your
computer as a standard user (not as administrator), and that you follow a few basic rules when you surf the Internet,
download files, and open attachments.

Worms: A computer worm is a self-replicating malware computer program. It uses a computer network to
send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This
is due to security shortcomings on the target computer. Unlike a virus, it does not need to attach itself to an existing
program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas
viruses almost always corrupt or modify files on a targeted computer. Some worms spread very quickly. They clog
networks and can cause long waits for you (and everyone else) to view Web pages on the Internet.

Adware: Adware, or advertising-supported software, is any software package which automatically plays,
displays, or downloads advertisements to a computer. These advertisements can be in the form of a pop-up.[1] The
object of the Adware is to generate revenue for its author. Adware, by itself, is harmless; however, some adware
may come with integrated spyware such as keyloggers and other privacy-invasive software. some adware can also
be classified as spyware, a type of malware (malicious software) which steals information. For example
BonziBUDDY, an application marketed as an "Intelligent software agent", corrupted many of the user's system
files, forcing the display of many obscene advertisements (composed mostly of infected Flash coding); these and
the main application logged browsing details and sent them to various third parties.

Hacker: in common usage, a hacker is a person who breaks into computers and computer networks, either
for profit or motivated by the challenge. People who engage in computer hacking activities are often called hackers.
Computer hackers are people who gain remote access (typically unauthorized and unapproved) to files stored in
another computer, or even to the operating system of the computer. An expert computer programmer who enjoys
figuring out the inner workings of computer systems or Networks. Some have a reputation for using their expertise
to illegally break into secure programs in computers hooked up to the Internet or other networks. This sense,
however, has now been taken over by the term cracker, and hacker is again a title to be proudly claimed.

How Viruses Spread

Infected Flash Drives or Floppy Drives.


The virus is carried and spread through the use of flash drives inserted into the USB ports of the infected
computers. When a flash drive is inserted into an infected computer, it infects the flash drive as well. The next
computer that flash drive goes into will then also develop infected files. Much of the malware in circulation today
has been designed to distribute through USB devices. The worm not only copies itself to the USB device itself but
it also replicates to every system on the network whether it’s a server or a workstation. Most households have
wireless capabilities now, and if you have 3 or 4 computers connected to that wireless router the malware can
spread to each one of those as well if you don’t have the security set up right.

E-Mail Attachments:
Most of the viruses that spread on your computer are delivered through attachments. These attachments are sent via
email most often from people you know who are unaware of the virus or through spam mail that wants to advertise
a message to you.

So, what happens once you receive an email infected with a virus? Emails infected with a virus usually appear like
any normal email in your inbox. When the unsuspected user opens the email and the attachment, the virus executes
itself and will begin to infect your computer system and other files on the computer and will erase or change
information. Some viruses may do very little harm or may cause no harm at all to your computer. But other viruses
may damage your computer greatly. Therefore, it is important that you install anti-virus software programs and take
other security measures before a virus attacks your computer.

To avoid your computer from getting a virus, follow these suggestions:

• Do not open an email attachment unless you know whom it's from and whether or not you were expecting it.
• Delete emails immediately if you do not know the person who sent you the email.
• Upload anti-virus software on your computer and update it regularly.
• Use email programs that have built in spam filters.

Installing Pirated Software:


Computer viruses can be hidden in pirated software or in other files or programs that you may download. When you
install any pirated software downloaded from internet or copy from cd / dvd the virus can also install or copy it self
to your computer because virus is attached to that file and when you copy it to your computer virus also get copied
and that can damage your data and information. So always download software’s from trusted sites. It can eliminate
the risk of viruses

Surfing Insecure Websites:


Due to insecure Internet browsing your PC can easily get infected with viruses, worms and Trojans without your
knowledge and that can lead to system slowdown, freezes and crashes. Also insecure Internet activity can result in
revealing your personal information. To get full advanced real-time protection for PC and Internet activity. Make
our surfing secure by using upgrade antivirus plus firewall and also use new Internet explorer.

Antivirus:
Antivirus (or anti-virus) software is used to prevent, detect, and remove malware, including computer viruses,
worms, and trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of
malware. A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other
computers, or even erase everything on your hard disk. Computer viruses are often spread by attachments in e-mail
messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless
you know who it's from and you are expecting it. Therefore, any computer connected to the Internet runs the risk of
of being infected with a computer virus. To protect computers from being infected with a virus, anti virus software
should be used. Anti virus software runs in the background of a computer, preventing viruses and other malware
from causing harm.

Virus definitions / updates:


The term "virus definitions" typically refers to the database of all current virus signature
files used by a particular anti virus software for virus detection. Virus definitions are the
primary method of detection for most anti virus software programs. During a virus scan,
anti virus software compares the content on a computer (including the hard disk, boot
sectors, RAM, and removable drives) against its virus definition database. In the virus
definition database, each definition, or pattern of binary code is unique to each variant of a
virus. This enables anti virus software to effectively detect viruses upon the discovery of
any of the code included in the virus definition database. For anti virus software to provide
effective protection, it is essential that the virus definition database used is comprehensive
and frequently updated. Virus authors are constantly creating new variants and new viruses
in attempt to exploit vulnerabilities in user’s systems.

Symantec:
Norton AntiVirus, developed and distributed by Symantec Corporation, provides malware prevention and removal
during a subscription period. It uses signatures to identify viruses. Other features include e-mail spam filtering and
phishing protection. Norton AntiVirus and Norton Internet Security, a related product, held a 61% US retail market
share for security suites as of the first half of 2007.
Define Spread Sheet:
A type of software in which data is arranged in table form, ie as rows and columns. It is closely related to
the database.

A computer program that allows the user to enter numbers and text into a table with rows and columns, and
then maintain and manipulate those numbers using the table structure.

Each cell containing alphanumeric text, numeric values or formulas. A formula defines how the content of that cell
is to be calculated from the contents of any other cell (or combination of cells) each time any cell is updated.
Spreadsheets are frequently used for financial information because of their ability to re-calculate the entire sheet
automatically after a change to a single cell is made.

Purpose of Spread Sheet:


A spreadsheet is a computerized table consisting of individual cells arranged into rows and columns.
Information can easily be entered into, modified at, and deleted from the cells. Following are some purpose of
spread sheets.

Displays
A spreadsheet displays text and numbers in a table, making the relationships among information easy to understand.
Different fonts, borders, colors, and pictures can further enhance viewing.

Automatic calculation
Formulas and functions can quickly and automatically calculate solutions, making it convenient to try various
scenarios of complex problems

Graphing

A jumble of numbers often hides a trend that is visible only in the graphics of a pie, column, bar, line, area, bubble
or cylinder chart. You can control the chart's color, fonts and graphics to help you make a decision about the trend.

Sorting and filtering


A spreadsheet processes and displays needed information by sorting and filtering entries according to established
criteria. (Unnecessary information is never deleted but rather hidden from view).

Transferring information
To prevent entering text that already exists in electronic form, a spreadsheet can easily import and export
information in various formats

Spread Sheet Software MS Excel:


Microsoft Excel is an Office program used to construct and configure spreadsheets. This program organizes data in
a way that is easy to read and sort for personal or business needs. The program also includes additional features to
enhance or clarify information on the spreadsheets. To define MS Excel, the different aspects of the program needs
to be outlined.
Columns and Rows

MS Excel spreadsheets have the capacity to organize information into approximately 1 million rows and 16,000
columns.

Formatting Cells and Tables

MS Excel has a variety of elements that help format tables and cells such as cell styles, table styles and
autofilters. These features assist in the creation of personalized spreadsheets and a consistent appearance
throughout the document.

Charts

MS Excel's chart layouts and chart styles help people create a variety of charts such as bars, pies and lines.
People can add effects to their charts like 3-D and shadowing to emphasis particular parts of the document.

Interaction with Other Office Programs

MS Excel spreadsheets can be combined with other Office programs such as Microsoft Word and Microsoft
PowerPoint. This is especially important when compiling business documents for presentations or brochures.

Sorting and Calculations

MS Excel has applications that assist in the sorting and calculations of data presented on the spreadsheet. People
can even create formulas to automatically calculate information.

Microsoft Excel Worbook: In Microsoft Excel, a workbook is simply an Excel file that stores entered
related data. Workbooks are capable of holding an almost infinite number of worksheets, depending on the size and
the relevance of the data. It is, essentially, a book filled with the data from multiple worksheets. Workbooks are
usually labeled by the data which is on each worksheet – if all the pages of the workbook hold the same type of
data, that workbook will be named for the relevant data that it holds. By default, each workbook automatically
contains three worksheets. When a user opens Excel initially, the project on which they are going to begin work is
entitled ‘Book 1′ until later renamed to fit the type of data being entered into each respective sheet. Essentially,
when a user opens Excel, they are beginning creation on a workbook – a book that contains multiple pages of
entered data. These pages fill the book and are, therefore, a part of the overall summation of information that the
book is attempting to convey.

Microsoft Excel Worsheet: In Excel, a worksheet is Consist of a number of cells that hold data &
information. It is also known as a spreadsheet. A user is able to enter, modify, and manipulate the data that is
entered in the spreadsheet. With a spreadsheet, a user is essentially entering information onto a page of a workbook.
A worksheet, then, is nothing more than a page in the workbook. Each page is filled with a specific amount of data.
Within a worksheet, the data can be manipulated to create charts, graphs, or arrays that visually project the main
purpose of the data that was initially entered. The worksheet is what defines what the workbook is – without the
worksheets the workbook would be without form or purpose. The worksheets are what make the workbook what it
is, and holds all the data for the workbook.

You might also like