You are on page 1of 50

Data Communication & Computer Networks

தரவு தொடர்பாடலும் கணினி வலையமைப்பும்

S. M. Mohammed Mafaz
Computer Network (கணினி வலையமைப்பு)
• வரைவ ில க்கணம்
– கணின ிகளையும் அ வற்ற ின் வளங்களையும் இணைப ்ப தற்க ாக த ொட ர்ப ாட ல்
ச ாதனங்களை உ ப ய ோக ிக்கும் அ மைப ்பு
• வகைகள்
– Local area network (LAN) – connects computers in
close proximity
– Metropolitan area network (MAN) – connect
computers between buildings in the same
geographic area
– Wide are network (WAN) – connects computers
over great distances
Home Connectivity

• Connect home PC to other computers

• Use modem to convert signals between electronic (computer)


and analog (voice) formats
Internet (இணையம்)

• Collection of networks (வலையமைப ்பு க்கள ன


ி ் த ொகுப ்பு )
• உ ர ிமைக்க ோர ல் இல்லை
• சேவைகளுக்க ான மத்த ிய மூலம் ஒன்ற ில ்லை
• தகவல்கள் சம்ப ந்தப ்ப ட ்ட ப ரந்த அ கர ாத ிஒன்று இல்லை

Connects Everyone!
Individuals Libraries
Businesses Research labs
Organizations Government
Getting Connected

• User’s computer must connect to a server


• Server must communicate using TCP/IP
• The user can purchase access to a server from an ISP (Internet
Service Provider)
Internet – What Can You Do?

• WWW – World Wide Web


• FTP – File Transfer Protocol
• E-mail
• UseNet
• IRC – Internet Relay Chat
• Bulletin Boards
World Wide Web
• Browser (மேலோடி) – program that allows
the user to move around and explore
the Internet
• Use the mouse to point and click on
text and graphics
• Web page
• Web site
• Home page
Classifications of Computers
• Use the computer that fits your needs
• Based upon
– Size (ப ருமன்)
– Speed (வே கம்)
– Cost (வ ிலை )
– Portability (எ ள ித ில ் தூக்க ிசெல்ல க்கூடி ய )
– Number of simultaneous users supported (ஒரும ித்த
ப யனர்கள ின் எ ண்ண ிககை ் )
– Available software (இருக்க ின்ற மென்ப ொரு ள்)
– Typical use (ப ொதுத்தே வை)
Personal Computers
• Other names
– PC
– Microcomputer
– Home computer
• Categories
– Low-end functional
– Fully powered
– Workstations
– Net computer or net box (Web TV)
• Desktop Models
Notebook Computers

• Portable
– Lightweight
– Fits in a briefcase
– Battery operated

• Laptop
– Larger
– Heavier

• More expensive that desktop models


Handheld Computers
• Personal Digital Assistant (PDA)
– Scheduling
– Addresses
– Handwritten input
– May offer wireless e-mail and fax

• PDA Phone
– More power than PDA
– Cellphone, GPS, MP3/MP4, Camera,
Video, TV, Radio etc.
– Runs various type softwares, serving various
applications
Other Types of Computers

Mainframes
– High speed
– More expensive
– Used to process large amounts of data quickly
– Support multiple users
– Does server tasks

Supercomputers
– Fastest speed
– Most expensive
COMPUTER NETWORKING

Network : தமக்குள்ள தொடர்பாடலை


நிகழ்த்துவதற்காக இணைக்கப்பட்ட கணினிகள்

Resource Sharing (வளங்களை பகிர்தல்)


File Sharing (கோப்புக்களை பகிர்தல்)
Communication (தொடர்பாடல்)
PCs’ Administration and Security
(நிர்வகிப்பும், பாதுகாப்பும்)
COMPUTER NETWORKING –cont.

- Computer network technology can be classified by the distance


the network technology is designed to span

- There are three types of networking :

Local Area Network (LAN)


Metropolitan Area Network (MAN)
Wide Area Network (WAN)
COMPUTER NETWORKING –cont.

Local Area Network (LAN)

- Relatively small refers to the transmission media and


computer hardware
- The area is not exceeding 10 KM
- It only uses one type of transmission medium
- It share resources within building or campus
COMPUTER NETWORKING –cont.

Metropolitan Area Network (MAN)


- The network is larger compared to LAN
- The area covers a city of 10 to 100KM
- It requires efficient hardware and transmission media
to cover these areas
COMPUTER NETWORKING –cont.

Wide Area Network (WAN)


- The network is larger than MAN and LAN
- It interconnect LAN of opposite sides of country or around
the world
- It covers huge geographical area in the world
Modem

Local Area Network

Modem

Router Multiplexer Host Computer

Local Area Network Front end


Processor

Multiplexer
LAN COMPONENTS

Every LAN is made up of a standard set of components:


LAN TOPOLOGIES

Network Topology (வலையமைப்பு இணைவு): The


physical connection among computers within a network.
வலையமைப்புக்குள் இருக்கும்
கணினிகளுக்கிடையிலான பௌதீக தொடர்பு
- the topology is the configuration of the hardware
(வன்பொருளின் உருவமைப்பு) and shows which pairs of
nodes (கணுக்கள்) can communicate
-there are three common types of topologies :-

Star topology
Ring topology
Bus topology
Star

Ring

Bus
LAN PROTOCOLS

Protocol : A set of rules to access the network to send


data.
வலையமைப்பை அணுகி தரவுகளை அனுப்ப
தேவையான கட்டளைகளின் தொகுப்பு
Two common LAN protocols
TRANSMISSION MEDIA

Transmission Media : The physical medium used for


transmission.

Twisted Types of TM
Pair Cable
Microwave
Transmission
Coaxial
Cable
(அச்சு ஒன்றிய வடம்) Satellite
Fiber Optic Transmission
Cable (துணைக்கோள் தொடர்பு)
(இழை ஒளியியல் வடம்)
TRANSMISSION MEDIA - Twisted Pair
Cable

Jacket

Copper wire conductor

Colour-coded insulation
TRANSMISSION MEDIA – Coaxial Cable

Insulation

Outer plastic covering

Inner conductor
TRANSMISSION MEDIA – Fiber Optic
Cable
Optical fiber
Protective outer
sheath

Glass covering
Strength wires
TRANSMISSION MEDIA – Microwave
TRANSMISSION MEDIA – Satellite
Section 2

OTHER TOPICS
Importance of Backup – cont.
Data is exposed to several threats.
Importance of Backup – cont.

Uninterruptible Power Supply (UPS)

How does UPS works?

- it is connected in series with the computer system


- when power is interrupted, this result the UPS to function as a
backup supply of power to the computer system
- depends on the type of UPS, it will operate in 20 minutes or more
- it is advisable to backup important data within the time limit to
prevent any lost of data
Importance of Backup – cont.

Components of UPS

- one rectifier (charger) to convert AC to DC and to fully charge


the battery
- one battery to supply DC power to the inverter and the supported
time are based on the number and size of batteries
- one inverter to convert DC to AC
- one static bypass switch to control the load from/to the power
source to/from the battery and allows certain load to transfer
tolerances needed by the computer and its peripherals
Virus Basics
நச்சு நிரல்
அடிப்படைகள்
Agenda
 Virus basics
 What to be concerned about
 Office protection
 Anti-virus messages
What is a virus?
 A virus is a program that self-replicates
 தன்னைத்தானே நகல் பண்ணும் ஒரு நிரல்
 It is not data
 You can only catch a virus by running a
program
 Your computer runs all kinds of programs
Basic virus terminology
 Virus
• Self-replicating
• Also called a worm
 Trojan Horse
• A program which appears to be valuable but has an
unexpected consequence
• பார்ப்பதற்கு
பெறுமதியாக தோன்றும் நிரல், ஆனால் எதிர்பாராத
விளைவுகளை உண்டு பண்ணும்
How viruses get into computers
 The four most common virus infections come from:
• File – A virus type that infects existing files on the computer
(~40%)
• Macro – A virus that runs as a macro in a host application
such as the MS Office applications (~35%)
• VBScript – A virus that uses Windows VisualBasic Script
functionality (~10%)
• Internet Worm – A virus that is primarily characterized by
it’s replication across the Internet (~5%)
The impact of viruses
 ICSA Labs estimates that the cost of a virus
disaster is between $50,000 and $500,000
 Average server downtime for a virus
is 14 hours

Source: ICSA Labs Computer Virus Prevalence Survey 2001


The Computer Virus Crisis
The elements of a computer virus :

1. A set of instructions - a program being made to disrupt or


interfere other programs
2. Deliberately created - purposely created by humans or by itself
3. Actively propagates - reproducing itself
4. Infects other programs - contaminate or polluting different types
of programs
5. Able to do harm - can cause damage to others
6. Able to evolve - developing, growing and changing in
programs or systems
The Computer Virus Crisis – cont.
What are the damages of the virus to a computer system :

1. Creates garbage in your computer system that takes up space


in the memory and into your diskettes

2. Messing up files in their normal standard and altering some


of the files

3. Messing up the FAT (File Allocation Table) which contains


information of where are the other data's stored on your disk

4. Messing up the boot sector that can restrict your computer


from being able to execute at all
The Computer Virus Crisis– cont.
Types of anti-virus software
 
The Computer Virus Industry Association (CVIA) in the USA has developed
three basic categories of anti-virus software.

To prevent initial To identify and


infection remove viruses

To detect
infection
Basic virus defense
 Don’t open files that you are not expecting
• Many viruses automatically send files without the e-
mail account owner’s knowledge.
• Ask the sender to confirm unexpected files.
 Suspect messages that appear more than once
in your Inbox
• You may receive the same e-mail from a virus
repeatedly.
Basic virus defense (cont.)
 Learn file extensions
• Your computer will display both an icon and a file
extension for files you receive. Open only file
extensions you know are safe.
• When in doubt, call the help desk.
Examples of risky file types
 The following file types should never be
opened:
• .EXE
• .PIF
• .BAT
• .VBS
• .COM
Office protection
 Office files are mostly data with some
program code
 Office macros are programs, which can be
viruses
 Office will prompt you to enable macros
• Enable macros only when you know why office is
asking
Outlook file security
 Outlook will automatically block some kinds
of executable files, but not all
 If you need a file that Outlook blocked, call the
help desk
 Do not assume that because the file made it
through Outlook that it is safe
Anti-virus warnings
 Notify the help desk when you receive a virus
warning from Norton Antivirus, Symantec
Antivirus, Trend Micro, etc.
 Most of the time, the virus software will detect
and prevent the infection. However, the help
desk can better tell you what to do.
The End

You might also like