Professional Documents
Culture Documents
S. M. Mohammed Mafaz
Computer Network (கணினி வலையமைப்பு)
• வரைவ ில க்கணம்
– கணின ிகளையும் அ வற்ற ின் வளங்களையும் இணைப ்ப தற்க ாக த ொட ர்ப ாட ல்
ச ாதனங்களை உ ப ய ோக ிக்கும் அ மைப ்பு
• வகைகள்
– Local area network (LAN) – connects computers in
close proximity
– Metropolitan area network (MAN) – connect
computers between buildings in the same
geographic area
– Wide are network (WAN) – connects computers
over great distances
Home Connectivity
Connects Everyone!
Individuals Libraries
Businesses Research labs
Organizations Government
Getting Connected
• Portable
– Lightweight
– Fits in a briefcase
– Battery operated
• Laptop
– Larger
– Heavier
• PDA Phone
– More power than PDA
– Cellphone, GPS, MP3/MP4, Camera,
Video, TV, Radio etc.
– Runs various type softwares, serving various
applications
Other Types of Computers
Mainframes
– High speed
– More expensive
– Used to process large amounts of data quickly
– Support multiple users
– Does server tasks
Supercomputers
– Fastest speed
– Most expensive
COMPUTER NETWORKING
Modem
Multiplexer
LAN COMPONENTS
Star topology
Ring topology
Bus topology
Star
Ring
Bus
LAN PROTOCOLS
Twisted Types of TM
Pair Cable
Microwave
Transmission
Coaxial
Cable
(அச்சு ஒன்றிய வடம்) Satellite
Fiber Optic Transmission
Cable (துணைக்கோள் தொடர்பு)
(இழை ஒளியியல் வடம்)
TRANSMISSION MEDIA - Twisted Pair
Cable
Jacket
Colour-coded insulation
TRANSMISSION MEDIA – Coaxial Cable
Insulation
Inner conductor
TRANSMISSION MEDIA – Fiber Optic
Cable
Optical fiber
Protective outer
sheath
Glass covering
Strength wires
TRANSMISSION MEDIA – Microwave
TRANSMISSION MEDIA – Satellite
Section 2
OTHER TOPICS
Importance of Backup – cont.
Data is exposed to several threats.
Importance of Backup – cont.
Components of UPS
To detect
infection
Basic virus defense
Don’t open files that you are not expecting
• Many viruses automatically send files without the e-
mail account owner’s knowledge.
• Ask the sender to confirm unexpected files.
Suspect messages that appear more than once
in your Inbox
• You may receive the same e-mail from a virus
repeatedly.
Basic virus defense (cont.)
Learn file extensions
• Your computer will display both an icon and a file
extension for files you receive. Open only file
extensions you know are safe.
• When in doubt, call the help desk.
Examples of risky file types
The following file types should never be
opened:
• .EXE
• .PIF
• .BAT
• .VBS
• .COM
Office protection
Office files are mostly data with some
program code
Office macros are programs, which can be
viruses
Office will prompt you to enable macros
• Enable macros only when you know why office is
asking
Outlook file security
Outlook will automatically block some kinds
of executable files, but not all
If you need a file that Outlook blocked, call the
help desk
Do not assume that because the file made it
through Outlook that it is safe
Anti-virus warnings
Notify the help desk when you receive a virus
warning from Norton Antivirus, Symantec
Antivirus, Trend Micro, etc.
Most of the time, the virus software will detect
and prevent the infection. However, the help
desk can better tell you what to do.
The End