ece353 notes

Upload: lawlietll

Post on 04-Jun-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 Ece353 Notes

    1/72

    PC HARDWARE

    AND SOFTWAREECE353

    SHAHIDAH SADIMIN

    MAHIZAN AB MANAN

    SOLAHUDDIN YUSUF FADHLULLAH

  • 8/13/2019 Ece353 Notes

    2/72

    2

    Table of Contents

    1 Computer operations and installation .................................................................................................. 4

    1.1 Introduction to various hardware of a PC ..................................................................................... 5

    1.1.1 Input devices ......................................................................................................................... 5

    1.1.2 Output devices ...................................................................................................................... 5

    1.1.3 System Unit ........................................................................................................................... 7

    1.2 Installing PC hardware and software .......................................................................................... 17

    1.2.1 Motherboard Installation .................................................................................................... 17

    1.2.2 Install a processor ............................................................................................................... 18

    1.2.3 Installing memory ............................................................................................................... 19

    1.2.4 Hard Disk Drive (HDD) Installation ...................................................................................... 20

    1.2.5 Floppy disk drive (FDD) installation .................................................................................... 25

    1.2.6 CD-ROM/DVD-ROM Installation ......................................................................................... 27

    1.2.7 Graphics card installation ................................................................................................... 29

    2 Operating system fundamentals and administration ......................................................................... 31

    2.1 Operating system components, functions and types ................................................................. 31

    2.2 Understanding the characteristics of the Microsoft Windows operating systems .................... 32

    2.3 System administration and security ........................................................................................... 34

    2.3.1 System administration ........................................................................................................ 34

    2.3.2 Security ............................................................................................................................... 34

    2.4 Installation of operating system ................................................................................................. 37

    3 PC Multimedia capabilities ............................................................................................................... 37

    3.1 Sound .......................................................................................................................................... 37

    3.2 Video ........................................................................................................................................... 38

    3.3 Applications ................................................................................................................................. 38

    3.4 Getting the Right Sound Card ..................................................................................................... 38

    3.4.1 Speaker support .................................................................................................................. 38

    3.4.2 Recording Quality ................................................................................................................ 38

    3.5 Installation of various multimedia components and peripherals ............................................... 39

    3.5.1 Installing Sound in a Window System ................................................................................. 39

    3.5.2 Installing Sound Programs .................................................................................................. 39

  • 8/13/2019 Ece353 Notes

    3/72

    3

    3.6 Troubleshooting sound ............................................................................................................... 39

    3.7 Videoconferencing ...................................................................................................................... 40

    4 PC networking and network services .............................................................................................. 41

    4.1 Introduction to networking ......................................................................................................... 41

    4.1.1 Client/Server Network ........................................................................................................ 42

    4.1.2 Peer-to-peer (P2P) .............................................................................................................. 43

    4.2 TCP/IP Networking Fundamentals .............................................................................................. 44

    4.2.1 IP addresses and domain name .......................................................................................... 44

    4.2.2 IP Address Classes ............................................................................................................... 46

    4.3 Network Security ........................................................................................................................ 48

    4.3.1 Firewall ................................................................................................................................ 48

    5 Server hardware and print sharing ..................................................................................................... 49

    5.1 Networked server requirements, hardware and installation ..................................................... 49

    5.1.1 Servers ................................................................................................................................. 49

    5.2 Printer and print sharing ............................................................................................................. 49

    5.2.1 Types of printers ................................................................................................................. 50

    5.2.2 Create a perfect print .......................................................................................................... 52

    5.2.3 Printer Sharing .................................................................................................................... 53

    6 Maintenance and troubleshooting ..................................................................................................... 58

    6.1 Hardware and software maintenance issues .............................................................................. 58

    6.2 Hardware and software troubleshooting ................................................................................... 59

    7 LABORATORYATTACHMENT ............................................................................................................... 66

  • 8/13/2019 Ece353 Notes

    4/72

    4

    1 Computer operations and installationA computer is a machine that manipulates data according to a list of instructions. The first modern

    computers developed in the mid-20th century (19401945) were the size of a large room. Modern

    computers based on tinyintegrated circuits are millions to billions of times more capable than the early

    machines, and are smaller in size. In a computer system, there are connections between hardware andsoftware to make the system work.

    Hardware

    Hardware are physical pieces of the computer system. They include cables, printers, monitors,

    keyboards, and so on.

    Main Hardware Component Function

    Central processing unit (CPU) - "The brain of a computer.

    - It performs all the fundamental processing

    in a computer.

    Main memory - Also known as Random Access Memory(RAM).

    - It is made up of small consecutive memory

    locations where each has unique number

    known as address.

    - Data is stored in these locations. It is

    usually volatile (i.e., if power is lost

    information is lost as well).

    Secondary memory devices - It is used to store data.

    - Example: Hard disk, floppy disk, CD. They

    are usually nonvolatile.

    Input/Output - It is used to get data and output data.

    - Examples: mouse, keyboard, monitor,

    printer

    Software

    Software is a collection of programs and a program is a collection of instructions that the computer

    hardware executes. Software is divided into two forms.

    Software Function

    Operating system (OS) software An operating system, or OS, is a software program

    that enables the computer hardware to

    communicate and operate with the computer

    software.It enables users to start and stop an application,

    copy data, delete data, translates keyboard strokes

    into codes and perform lots of other job.

    http://en.wikipedia.org/wiki/Machinehttp://en.wikipedia.org/wiki/Data_(computing)http://en.wikipedia.org/wiki/Code_(computer_programming)http://en.wikipedia.org/wiki/Integrated_circuithttp://en.wikipedia.org/wiki/Integrated_circuithttp://en.wikipedia.org/wiki/Code_(computer_programming)http://en.wikipedia.org/wiki/Data_(computing)http://en.wikipedia.org/wiki/Machine
  • 8/13/2019 Ece353 Notes

    5/72

    5

    Examples of OS:

    Windows XP

    Apple Macintosh OS X

    Linux

    Applications software Software other than the operating system that get

    work done.Examples of application software:

    Word processors

    Web browsers

    Games

    1.1 Introduction to various hardware of a PCA computer functions through four stages, which are input, processing, output and storage. All the

    processing and storage takes place in the system unit. System unit is a device where all the other parts

    are connected to.

    All of the other parts of the PC that are connected to the system unit are called peripherals. Every

    peripheral connects to the system unit through one of the many types of ports. The next section will

    discuss about the input and output devices, the hardware that make up the system unit and the storage.

    1.1.1 Input devices

    Input devices are hardware or peripherals that send information to CPU. The most common input

    devices are the keyboard and mouse.

    The keyboard connects into PS/2 keyboard port or a USB port. Most keyboard and PS/2 ports are

    coloured purple. The mouse uses either a USB port or light green coloured mini-DIN port.

    1.1.2 Output devices

    Output devices are hardware or peripherals used to get information out of a computer. Monitor, printer

    and speaker are examples of output devices.

    Monitor

    A monitor connects to the video connector on the system unit.Figure 1.1 shows 15 pin female VGA port

    that can be found on a video card, where the video connector connects to the system unit. Video cards

    with two connectors can support two monitors. Some motherboards have on board VGA ports as shown

    inFigure 1.3.There is no need for a video card if the motherboard has on board VGA port.

    Figure 1.1: 15 pin female VGA port

  • 8/13/2019 Ece353 Notes

    6/72

    6

    Figure 1.2: A Video card

    Figure 1.3: A motherboard with on board VGA port

    LCD Monitor

    A LCD monitor is more preferable due to their shape compared to CRT. It uses less than half the

    electricity that a CRT uses. But it lacks the colour saturation and contrast of a CRT. Dead pixel is also one

    problem in LCD. Dead Pixels are not repairable hence they stay there for good. Dead Pixels can be

    spotted in the same place every time you switch on your system.

    CRT Monitor

    Screen flicker as shown inFigure 1.4 is one problem in CRT which can cause eye strain and headaches.

    To minimize that problem, the screen refresh rate need to be adjusted higher. You should select a

    refresh rate of at least 75 Hertz or as maximum as possible. Compared to LCD, LCDs offer high refresh

    rates and thus less eye strain.

    Figure 1.4: Screen Flicker

    http://upload.wikimedia.org/wikipedia/commons/c/c5/Gpu-connections.pnghttp://upload.wikimedia.org/wikipedia/commons/c/c5/Gpu-connections.pnghttp://upload.wikimedia.org/wikipedia/commons/c/c5/Gpu-connections.png
  • 8/13/2019 Ece353 Notes

    7/72

    7

    To adjust the screen flicker:

    Go to control panel

    Adjust the monitor setting- screen refresh rate

    Adjust to the maximum frequency possible (to minimum 75 Hertz )

    The colour quality in the display settings is measured in bits. The higher the bit, the broder the colour

    array will be produced from red, green and blue light (RGB) when they are added together. 1 bit will

    produce 21colours. 2 bits will produce 22 colours.

    Bit Number of colours

    1 2 (mono)

    2 4

    4 16

    8 256

    16 64K

    32 16.7 million

    Printer

    Almost all printers nowadays use USB connector. Some better models even use FireWire connections.

    Older models use parallel connector.

    Speaker

    Speaker is connected to the port on a soundcard. The port is usually green in color. This is the universal

    color of ports connecting to the sound card.

    Figure 1.5: Speaker chords and a sound card

    1.1.3 System Unit

    A system unit is encapsulated in a case. Inside the case are the motherboard, CPU, RAM, power supply

    and hard disk drive. The floppy disk drive connects to a computer system via a ribbon cable. CD writer is

    also a typical device that is attached to the system via cable.

  • 8/13/2019 Ece353 Notes

    8/72

    8

    Case

    The case comes in various size depends on user requirement ranging from Desktop, Mini, Midi and Full

    tower. A bigger case provides more bays for drives and peripherals than a smaller case. If the case is

    really small and cramped then it will have less air flow, which means the case temperature would be

    higher than having a larger case with good air flow. This could lead to an unstable PC. The type of case

    to be chosen depends on the form factor. The form factor determines the physical size of the

    motherboard and the location of components and ports. There are several form factors and the most

    common is the Advanced Technology Extended (ATX) form factor. Balanced Technology extended (BTX)

    is a new form factor which can provide better ventilation than ATX. However, BTX has not yet made

    much of impact on the industry, and the BTX motherboards, cases and thermal units are still rare.

    Figure 1.6 : ATX Midi Tower case

    Figure 1.7 : Desktop, Mini-Tower, Midi-Tower, and Full Tower

    Motherboard

    A motherboard is a Printed Circuit Board (PCB) that connects the processor, memory and all

    expansion cards together to assemble a PC. A motherboard contains a number of special sockets

    that accept various PC components. The CPU and RAM, for example, are plugged directly into the

    motherboard. Floppy drives, hard drives, CD drives are connected to the motherboard through short

  • 8/13/2019 Ece353 Notes

    9/72

    9

    cables. It also provides onboard connectors for a mouse, printer or keyboard. Popular motherboard

    manufacturers include Intel, Asus, Abit, Biostar, Gigabyte, MSI and Shuttle.

    A motherboard is defined by its form factor, chipset and components. Most motherboards made

    nowadays are ATX. An ATX motherboard has the standard I/O (Input/Output) connectors such as

    PS/2 ports, USB ports, parallel port, serial port, etc, built onto the motherboard. ATX motherboardfits into a standard ATX case.

    Figure 1.8 : A standard ATX motherboard

    Figure 1.8 shows a standard ATX motherboard. It comes with four different expansion slots, two PCI

    buses and two PCI Express slots. The PCI slot is where cards such as sound card, modem, tv card would

    be connected. The PCI Express slot is where a PCI-E graphics card would be connected. The other

    connectors include Intel LGA 1366 Socket for processor, DDR3 Memory slots for RAM and ATX 2.0 24pin

    power connector.

    Chipset

    Every motherboard has a chipset. The chipset determines the type of processor the motherboard

    accepts, the type and capacity of RAM and what sort of internal and external devices the motherboard

    supports. The chipset facilitates the communication between the CPU and other devices in the system.

    Most chipsets are composed of two primary chips, the Northbridge and the Southbridge; terms used by

    AMD based motherboards. Some chipset manufacturers named the Northbridge chip as Memory

    Controller Hub (MCH) and Southbridge chip as I/O Controller Hub (ICH).

    The AMD based motherboards have the Northbridge chip to work with video card. The Intel based

    motherboards have the Northbridge chip to help the CPU work with RAM. Current Northbridge chips do

    a lot of work that they produce a lot of heat, so they get their own heat sink and fan assembly. The

    Southbridge handles some expansion devices and mass storage drives, such as hard drives. Most

  • 8/13/2019 Ece353 Notes

    10/72

    10

    Southbridge chips do not need extra cooling and there are usually left exposed on the motherboard.

    Popular chipset manufacturers include Intel, AMD, NVIDIA and VIA.

    Motherboard Components

    a) Central Processing Unit (CPU)

    The processor also known as CPU is the brain of a computer. It performs calculations on binary numbers

    to make the computers work. The commands a CPU knows how to perform are dictated from instruction

    sets. The faster the processor, the faster it will execute instructions and run the programs. CPU contains

    several areas of internal memory known as registers. The register is a small set of data holding places

    that are part of a computer processor. A register may hold a computer instruction, a storage address, or

    any kind of data. Data and addresses are stored in registers while processing.

    CPU Cache

    Modern CPUs contain small amount of high speed Static RAM (SRAM) called cache. A cache is a block ofmemory for temporary storage of data likely to be used again. Once the data is stored in the cache, it

    can be used in the future by accessing the cached copy rather than re-fetching or recomputing the

    original data. Data and instructions are stored in cache while they await processing. This increases

    performance, as the CPU can access data in cache more rapidly than data in motherboard RAM. As CPU

    advanced, the capacity of the cache increased. CPU cache is also known as L1, L2 or L3 cache. The L1

    cache performs faster than the other.

    CPU is dependable on PC usage. The list below suggests the type of suitable processor for different

    usage.

    i) Word-processing, browsing the web or other basic tasks

    A processor also determines what the system is going to be used for. For word-processing, browsing

    the web or other basic tasks, it may be sufficient to use an Intel Celeron or AMD DURON. They are

    low-end processors and are available at a very competitive price. The new CPUs are judged on the

    number of core a processor can have, that is how many cores can fit in each CPU. Dual core for

    example is a CPU with two layers of CPU core. The more cores it has the better it is. So having a 3

    GHz single core CPU is not better than having 2.4 GHz Dual Core CPU.

    ii) Spreadsheet, databases, graphics and moderate video game

    If the system is going to be used for spreadsheet, databases, graphics and playing some moderate

    video games then an Intel Core 2 Duo or an AMD Athlon 64 X2 processor should be considered.

    Intel Core 2 Duo and Athlon 64 X2 are both Dual Core, which means they have two CPU cores in one

    Chip. Each core works separately hence the CPU can process two intensive tasks at the same time

    without slowing down the system. For example a user may be running a virus checker in the

    background while playing games without slowing the system down. They are also 64 Bit and support

    64 bit Operating System, which means they can execute 64 bit instructions and run 64 bit operating

    systems.

  • 8/13/2019 Ece353 Notes

    11/72

    11

    iii) Advanced workstation for Video Editing, CAD or 3D games

    If the system is going to be used as an advanced workstation for doing work such as Video Editing,

    CAD, or playing the latest 3D video games or other CPU intensive tasks then a higher end quad-core

    or multi-core processor such as AMD Phenom X4, Intel Core 2 Quad or Intel i7 would be needed.

    AMD Phenom X4 and Intel Core 2 Quad has four cores. Intel i7 has 4 cores but each core can processtwo threads so your operating system will treat it as 8 different processors. All of these modern

    processors are 64 bit. They are all very fast and are capable of handling most of computing needs.

    Figure 1.9 : A processor manufactured by Intel

    iv) Server or power-user

    Intel Xeon and AMD Opteron are high-end processors aimed at the serve or power-user market.

    They are intended to be used in a PC with multiple processors.

    Difference between Intel Dual Core and Core 2 Duo:

    Intel Core 2 Duo works faster than Intel Dual Core because:

    Intel Core 2 Duo processors:

    have two cores in one package, but each core has one cache memory. This makes it work faster than

    Dual Core.

    Intel Dual Core processors:

    have two cores in one package, but they are using one cache memory for the two cores.

  • 8/13/2019 Ece353 Notes

    12/72

    12

    b) Random access memory (RAM)

    Figure 1.10 : RAM stick

    RAM stores data and programs currently being used by the CPU. The amount of data or programs it can

    store is measured in units called bytes. 1 byte consists of 8 bits.

    RAM modules are either single- sided or double- sided. Single sided sticks have chips only on one side,

    whereas both-sided have chips on both sides. Most RAM is single-sided.

    RAM speed must match or exceed the speed of the system. For example, PC66 RAM can only be used on

    a motherboard running at or below 66MHz. A motherboard with a frontside bus of 100MHz needs at

    least PC100 RAM.

    RAM comes in many forms. The older systems use SDRAM, while the current systems use DDR2 or DDR3

    SDRAM (Double Data Rate Synchronous Dynamic Random Access Memory) which is faster than the old

    SDRAM and use less power.

    The type of RAM to be chosen depends on the compatibility with the motherboard. For example for an

    Intel motherboard with Intel Core 2 Duo CPU, then it will support Dual-channel DDR2 800, 667 or 533.It

    is recommended to get the highest memory speed the motherboard can support in order to get the

    maximum performance. For the latest Intel i7 motherboard then a triple-channel DDR3 1600, 1333, or

    1066 will be needed.

    System RAM Recomendations

    Operating System Minimum Solid Performance Power User

    Windows 2000 32 MB 256 MB 512 MB

    Windows XP 64 MB 512 MB 1 GB

    Windows Vista 512 MB 1 GB 2 GB

  • 8/13/2019 Ece353 Notes

    13/72

    13

    Latency

    RAM responds to electrical signals at varying rates. There is a slight delay when the memory controller

    starts to grab a line of memory. This delay in RAMs response is called latency.RAM with a lower latency

    is faster than RAM with higher latency. For example DDR 3200- CL2 is faster than DDR 3200 - CL3.

    c) Power Supply Unit

    A power supply unit (PSU) is the component that supplies power to a computer. More specifically, a

    power supply unit is typically designed to convert 220-240 V AC power from the mains to usable low-

    voltage 3.3V12 V DC power for the internal components of the computer.

    d) Floppy Disk Drive

    Floppy Disk Drive (FDD) is extinct due to the development of modern type high density data storage like

    USB Flash drives. It is used to access floppy disks. Floppy drives are connected to the motherboard

    through a ribbon cable. Floppy disk is ideal for storing small files and documents, creating boot disks up

    to 1.44 Mb only.

    Figure 1.11: A floppy disk

    e) Hard Disk Drive

    Hard disk drive (HDD) stores programs and data that are not currently being used by the CPU,including

    the operating system, applications, user files and documents. It is a non-volatile storage, which means

    the contents of the HDD is not lost if the PC is switched off.

    It stores much more data than a typical PCs RAM, which is up to hundred of gigabytes. An average PC

    has one hard drive, but special PCs that need to store large amount of data, such as a large corporations

    main file storage can have 8 to 16 hard drives. Most type of hard drive fall under the AT Attachment

    (ATA) standard. Two types of ATA hard drive:

    i) Parallel ATA (PATA)

    Older type of hard drive.

    Use a ribbon cable for its connection.

  • 8/13/2019 Ece353 Notes

    14/72

    14

    Figure 1.12: PATA Cable and Port

    ii) Serial ATA (SATA)

    Modern type of hard drive.

    Use a narrow cable.

  • 8/13/2019 Ece353 Notes

    15/72

    15

    Figure 1.13: SATA Cable and Port

    Most motherboards have connection for both type of hard drives.The major HDD manufacturers are

    IBM, Seagate, Maxtor, Western Digital and Fujitsu.

    Figure 1.14 : IBM ATA100 drive

    f) CD WriterCD Writer is a very good option for a backup device. It allows user to backup the contents of HDD onto a

    CD-R, CD-RW & DVD-R disc. It also allows user to backup the existing application CD's. As blank CD's are

    very cheap, it is an affordable backup device.

    Like all other PC hardware a CD Writer comes in various speeds. A 32 speed drive can write a full 650MB

    CD in around 4 mins and a 52 speed drive can write it in around 3 mins and so on.

    Figure 1.15 : CD Writer

    Difference between CD-R and CD-RW

    CD-R:

    CD-R will only allows user to write data onto it once.

    CD-RW:

    CD-RW disc allow data to be written, rewritten and erased.

  • 8/13/2019 Ece353 Notes

    16/72

    16

    How data is stored on a CD

    i) On a blank CD-R disc, the dye layer is completely translucent, so all light reflects.

    ii) The write laser of a CD burner is used to burn the dye layer.

    iii) To record the data, the burner simply turns the laser writer on and off in synch with the pattern

    of 1s and 0s od the data to be stored.

    iv) The write laser darkens the material forming non-reflecting spot to encode a 0 and leaves the

    unburnt area translucent to encode a 1.

    g) External Connectors

    Below are some external connectors that can be found on the motherboard.

    Plugs, Ports, Jacks and connectors

    Mini-DIN connectors

    USB connectors

    FireWire connectors

    HDMI connectors

    DB connectors

    RJ connectors

    Audio connectors

    High-definition Multimedia Interface (HDMI) connector

    Figure 1.16: HDMI connector

    HDMI is a Digital audio/video connector for transmission of digital data. The transmission of digital audio

    and video is accomplished through one single HDMI cable. Whereas VGA connectors are used solely to

    carry analog video signals. HDMI is a cable simplification compared to older technologies. It allows the

    transmission of uncompressed data. Hence, there will be no deterioration of video quality due to

    "Digital -> Analogue -> Digital" conversions that were necessary using older interfaces to connect a DVD

    player to a Digital TV set for example.

    For PCs that will be used solely as a computer to a standard computer monitor, it is not necessary to

    look for one with an HDMI connector. Those looking to use the computer in a home theater

    environment with a high definition TV set can greatly benefit from the single cable that can carry both

    the audio and the video.

    http://en.wikipedia.org/wiki/File:HDMI.jpg
  • 8/13/2019 Ece353 Notes

    17/72

    17

    HDMI can be found on many common devices such as DVD players, HD DVD players, Blu-ray Disc

    players, Camcorders, Gaming Consoles (PlayStation 3) & Digital Cameras.

    1.2 Installing PC hardware and software

    Before unpacking all components from the original anti-static bags, put on the anti-static wrist strap,

    which will discharge yourself. It is important to discharge yourself to avoid damaging your components

    by anti-static shock by touching the components. If you do not have an anti-static wrist strap you can

    discharge yourself by touching the metal edges of your PC case, although this is not recommended.

    Have all the mounting screws that come with the motherboard and a screw driver handy as you would

    need them during the later stages.

    1.2.1 Motherboard Installation

    The first thing you should do is unpack your ATX case. Take off the cover of your ATX case so that you

    can access the inside. Place the ATX case on a desk so that you are looking down towards the open case.

    Your case should come with motherboard mounting screws.

    Now place your motherboard on top of the mounting screw holes. Make sure your ATX devices on the

    motherboard such as PS/2 and parallel port are facing towards ATX back plate cut out. Gently push your

    motherboard towards the cut out, every devices should fit easily into its corresponding cut out, as

    shown below.

    Figure 1.17: External ports must face towards back plate cut out.

    The screw holes on your motherboard should align with the screw holes on your case. Place

    your screws that came with the case into the appropriate holes and gently screw it on using a

    screw driver.

    The motherboard is now securely mounted to the case. You can now place the ATX power

    connector to the motherboard. Your ATX case should come with a power supply unit (PSU) and

    should already be mounted to the case. The ATX power connector is shown on image below.

  • 8/13/2019 Ece353 Notes

    18/72

    18

    Place the ATX power connector on top of the power socket on the motherboard. Push down the power

    connector and it should clip onto the socket.

    1.2.2 Install a processorLocate the processor socket on your motherboard. Figure 1.18 shows a socket 370 (Intel PIII 866

    processor). The installation would be slightly different if you have a different processor i.e. Slot1 PIII

    CPU, P4 Socket 478, Core 2 Duo Socket 775, AMD Slot A / Socket A, Socket AM2 CPU etc.

    Raise the brown lever on the socket and slowly put the processor in place. You have to make sure the

    pin 1 of your CPU goes into the pin 1 of your CPU socket otherwise the CPU would not get into the

    socket. Do not try to force it in. It will go in gently if you fit it correctly. Now close the brown lever which

    will securely hold the CPU in place.

    Figure 1.18: Processor socket

    Make sure the fan for the CPU has the correct speed, otherwise your CPU will get overheat and behave

    abnormally or could be damaged. Take off the plastic cover from the bottom of the CPU fan that covers

    the heat transfer pad. Now place the CPU fan on top the CPU and push down the metal clips on the fan

    so that it clips onto the CPU socket.

  • 8/13/2019 Ece353 Notes

    19/72

    19

    Figure 1.19: A CPU fan placed on top of processor socket

    CPU fan has a power connector which needs to be connected to CPU fan power socket on your

    motherboard as shown inFigure 1.19.

    Finally, you have to specify what frequency (speed) your CPU is running at. This can be done using

    jumper settings, or on some modern motherboard it can be done in the BIOS, or your motherboard may

    have automatic detection for your CPU frequency. Please refer to your motherboard manual for more

    details. For example, the motherboard Abit BX133 has a dip-stick jumper setting and it can be setup in

    the BIOS. The jumper is set to default, since the BIOS will be used to specify the CPU frequency. The CPU

    runs at the bus speed of 133Mhz therefore the setting to use is 133 * 6.5(multiplier) under the BIOS,

    which will the run the CPU at 866Mhz.

    1.2.3 Installing memory

    Installing memory is quite simple. This is a guide to install a SDRAM. Find the SDRAM banks on the

    motherboard; they should look similar to the banks below. Notice the memory banks have a white clip

    on each side. Make sure you release the clips so it bends to each side.

    Figure 1.20: Gently fit the SDRAM into the memory bank.

    Hold each corner of the SDRAM placing it on top of the bank 1. You will notice that the SDRAM has a cut

    at the bottom side, it is there to prevent the memory going in the wrong way round. If you are holding

  • 8/13/2019 Ece353 Notes

    20/72

    20

    the SDRAM the incorrect way you will not be able to insert it. Gently push down the SDRAM and it

    should clip on to the memory bank. The two white clips will now become straight holding each corner of

    the memory. If you have more than one SDRAM perform same steps as above but placing the SDRAM in

    memory bank 2 and so on.

    1.2.4 Hard Disk Drive (HDD) Installation

    Install IDE Hard Drive

    The rear side of an IDE hard drive should look similar to the image below.

    Figure 1.21: IDE HDD

    The IDE/ATA connector is on the left hand side which consists of many pins. Next to the IDE connector is

    the jumper setting for the drive. The HDD jumper should be set to Master, which is the default setting

    for a new HDD. If there are two HDDs, set the second HDD to slave. Any other device sharing the sameIDE cable should be set to Slave. Different HDD has different jumper settings; .Figure 1.22 shows the

    example of jumper connection for Seagate ATA drives. Please refer to your HDD manual for more

    information. On the right hand side, next to the jumpers is the power connector.

  • 8/13/2019 Ece353 Notes

    21/72

    21

    Figure 1.22: Connection for Seagate ATA drives

    Figure 1.23 andFigure 1.25 shows how an ATA 66 , ATA 33 and a power cable looks like. The ATA 66

    cable which is also known as UDMA 66 cable is an advanced IDE cable, which offers higher performance

    and data integrity than the standard IDE cable. ATA 66 cable consists of 80 conductors cable whereas

    the standard IDE cable such as ATA 33 consists of 40 conductors cable.

  • 8/13/2019 Ece353 Notes

    22/72

    22

    Figure 1.23: ATA Cables

    Figure 1.24: Connection of ULTRA ATA cable

    Figure 1.25: Power Cable

    Place your hard drive into the HDD mounting slot of your case, make sure the IDE/ATA connector is

    facing outwards. Screw the HDD to the case using screws provided with the HDD or the ATX case.

  • 8/13/2019 Ece353 Notes

    23/72

    23

    Figure 1.26: Hard Drive is placed into the HDD mounting slot

    Insert the ATA 66 cable into the ATA connector of the HDD. Make sure the pin 1 on the cable is

    connected to pin 1 on the HDD connector. Pin 1 is the red or pink strip on the edge of an ATAcable.

    Most new IDE/ATA cables are designed so that it will only go in one way which will correspond to pin 1.

    Figure 1.27 : Inserting ATA 66 cable into the ATA connector of the HDD

    Push the power cable into the power connector as shown below. The power cable is designed to go in

    one way, so there should not be any problems.

    Figure 1.28: Push the power cable into the power connector

  • 8/13/2019 Ece353 Notes

    24/72

    24

    Connect the other end of the ATA 66 cable to the primary ATA socket of the motherboard as shown

    below. Make sure the pin 1 on the cable connects to the pin 1 on the ATA socket.

    Figure 1.29: Connect the other end of the ATA 66 cable to the primary ATA socket of the motherboard

    Install SATA Hard Drive

    Installing SATA HDD is easier than installing IDE/PATA HDD. There is no Master-Slave relationship. Only

    SATA HDD, SATA interface cable and power adapter are needed for the installation. There is no need for

    jumper setting.Figure 1.30 shows the difference of cabling between PATA and SATA HDD.

    Figure 1.30: Different cabling connection between IDE/PATA (above) and SATA HDD (below)

    The magnetic space on the hard drive is divided into small storage areas. These storage areas are knownas 'sectors', however for efficiency purposes the sectors can be grouped together into 'clusters'. A sector

    is the smallest addressable unit of a hard disk. A cluster is a fixed number of contiguous sectors (but not

    necessarily physically contiguous).

  • 8/13/2019 Ece353 Notes

    25/72

    25

    If you save a very small file to your computer it will all fit within 1 storage cluster on the hard drive. If

    you save a very large file it may fill up many clusters, that is, as many clusters as it takes to hold all the

    content of the file.

    Hard Drive Partitioning;

    i) To organize a hard disk drive.

    ii) Enable a single HDD to store more than one OS.

    Hard Drive Formatting:

    After a HDD has been partitioned, it must be formatted to enable it to hold data.

    1.2.5 Floppy disk drive (FDD) installation

    The rear side of a floppy drive looks similar to the one shown inFigure 1.31.

    Figure 1.31: Rear side of a floppy drive

    The black connector on the left hand side is the floppy disk connector. It is different from the IDE

    connector and uses a different cable. The small white connector on the right hand side is the power

    connector for the floppy drive.Figure 1.32 andFigure 1.33shows what a floppy drive cable and floppy

    drive power connector looks like.

  • 8/13/2019 Ece353 Notes

    26/72

    26

    Figure 1.32: Floppy drive cable

    Figure 1.33: Floppy drive power cable

    Place the floppy drive into the FDD mounting slot as shown. Screw the drive securely into place.

    Figure 1.34: Placing the floppy drive into FDD mounting slot

    Insert the floppy drive cable into the floppy drive connector. Make sure the pin 1 on the cable connects

    to the pin 1 on the floppy drive connector. As you already know by now that pin 1 is the red or pink strip

    on the edge of the floppy drive cable. Most floppy drive cables are designed so that it will only go in on

    way.

  • 8/13/2019 Ece353 Notes

    27/72

    27

    Figure 1.35: Connected cables

    Push the floppy drive power cable to the power connector. This will only go in on way.

    Figure 1.36: Connecting the other end of floppy drive cable to floppy drive connector on the motherboard

    Finally connect the other end of the floppy drive cable to floppy drive connector on the motherboard.

    Make sure pin 1 on the cable connects to pin 1 on the connector.

    1.2.6 CD-ROM/DVD-ROM Installation

    The rear side of a CD / DVD-ROM should look similar to image shown onFigure 1.37.

    Figure 1.37: The rear side of a CD/DVD-ROM

    On the right hand side you have the power connector. Next to power connector you have the IDE

    connector. On the left hand side near the IDE connector you have the jumper settings for the DVD-ROM.

  • 8/13/2019 Ece353 Notes

    28/72

    28

    The jumper is set to Master by default. However if the IDE cable is shared with another device like HDD,

    then you would have to set the jumper to Slave, as your HDD would be set to Master.

    Next to the jumpers you have the CD Audio-Out socket. One side of your audio cable connects to this

    socket and other side connects to the sound card cd-in socket. This would allow you to listen to Audio

    CD's on your computer.

    Figure 1.38: Mounting the CD/DVD-ROM drive into its mounting socket

    Mount your CD/DVD-ROM drive into its mounting slot. Use the supplied screws to screw the drive into

    position.

    Connect the IDE cable to the drives IDE connector. Make sure the pin 1 on the cable is connected to pin

    1 on the drives IDE connector. Pin 1 is the red or pink strip on the edge of an IDE cable. Connect the

    other end of the IDE cable to the IDE socket on your motherboard as shown inFigure 1.39.Again, make

    sure you connect the cable to pin 1. The IDE socket could be your primary or secondary socket

    depending which socket you choose. If your HDD is on the primary IDE socket and your secondary IDEsocket is free, then it is better to use your secondary IDE socket for the CD/DVD-ROM.

    Figure 1.39: Connecting the other end of the IDE cable to the IDE socket on your motherboard

    Finally connect the power cable to power connector.Connect one end of the audio cable to the CDAudio-Out socket and the other end to the sound card (audio card) cd-in socket as shown onFigure 1.40.

  • 8/13/2019 Ece353 Notes

    29/72

    29

    Figure 1.40: Connecting the power cable and the audio cable

    1.2.7 Graphics card installation

    Most modern graphics cards are AGP based and connects to the AGP bus of the motherboard. An AGP

    bus (slot) looks like the following image. The brown slot is where you connect your AGP graphics card.

    Figure 1.41: Graphics card slot

    Place your AGP card on top of the slot and gently push it down. The card should firmly sit into position.

    Figure 1.42: Placing the graphics card into the slot

    All you need to do now is to screw the metal plate on the front of the card to the ATX case. Use the

    screws supplied with case and screw the card to the case.

  • 8/13/2019 Ece353 Notes

    30/72

    30

    Figure 1.43: Screwing the graphics card to the case

  • 8/13/2019 Ece353 Notes

    31/72

    31

    2 Operating system fundamentals and administration

    2.1 Operating system components, functions and types

    Operating System Components

    The operating system comprises a set of software packages that can be used to manage interactionswith the hardware. The following elements are generally included in this set of software:

    Component Function

    Kernel Represents the operating system's basic

    functions such as management of memory,

    processes, files, main inputs/outputs and

    communication functionalities.

    Shell Allows communication with the operating system

    via a control language.

    Lets the user to control the peripherals withoutknowing the characteristics of the hardware

    used, management of physical addresses, etc.

    File System Allows files to be recorded in a tree structure.

    Operating System Functions

    An operating system performs four basic functions:

    i. Communicate with hardware

    OS provides a method for other program to communicate with the hardware of the PC.

    ii. Provide user interfaceProvide a visual representation of the computer of the computer on the monitor that makes

    sense to the people using the computer.

    iii. Provide a structure for accessing applications.

    User can run, use and shut down the programs of their choice via the user interface.

    iv. Enable user to manipulate programs and data.

    User can add, move and delete the installed programs and data.

    Operating system accomplish all tasks above with two user interfaces; text based and graphical. A text-

    based or command line interface (CLI), enable user to type commands directly to the OS, the OS will

    responds to the commands. Whereas, Graphical User Interface (GUI) draws pictures on the screen with

    which user interact using a mouse or similar device.

    Operating System Types

    Below is a basic list of the different types of operating systems. Many computer OS will fall into more

    than one of the below categories.

  • 8/13/2019 Ece353 Notes

    32/72

    32

    i. Multi-user

    A multi-user operating system allows multiple users to use the same computer at the same time and/or

    different times.

    ii. MultiprocessingAn operating system that is capable of supporting and utilizing more than one computer processor.

    iii. Multitasking /Multiprogramming

    An operating system that is capable of allowing multiple software processors to run at the same time.

    For example, a user can open MS Word and browsing at the same time.

    iv.Multithreading /Time-sharingA program that is capable of doing multiple things simultaneously. A browser, for example, might want

    to download one file in one window, while it is trying to upload another and print some other file. This

    ability of a program to do multiple things simultaneously is implemented through threads.

    2.2 Understanding the characteristics of the Microsoft Windows operating systemsWindows is the trade name for a very large family of Microsoft operating systems created over 20 years

    ago. Windows as a full-blown OS really got its start with Windows NT 3.1 in 1993. It came in two

    versions, Workstation and Advanced Server. Windows NT went through a number of upgrades. The only

    problem with NT was that it had high hardware requirements and did not get along well with the older

    version of Windows.

    Windows Versions

    Windows 9x includes windows 95, 98 and Me. Windows NT, 2000, XP and Vista are all based on

    Windows NT and offer substantial benefits over Windows 9x editions.

    Windows 2000 comes in two basic varieties, Professional and Server. Professional was aimed at the

    business workstation user while Server was meant for Servers. There are several different versions of

    Windows 2000 Server.

    Windows XP comes as a workstation OS only. There is no XP Server. The two main version of XP are XP

    Home designed for home users, and XP Professional designed for business environments and power

    users.

    Windows 2003 comes only in a server version.

    The newest version of Windows is Windows Vista. It comes in five varieties, each targeting at different

    users.

  • 8/13/2019 Ece353 Notes

    33/72

    33

    Characteristics of Windows 2000/XP

    Windows 2000 was basically Windows NT with several improvements, such as support for plug and play

    and an improved interface. Windows XP is based on Windows NT/2000 and support NTFS file system.

    Windows 2000/XP takes an object oriented approach, separating the OS into three distinct parts: the

    drives, the NT Executives and the subsystems.

    Microsoft designed and optimized every aspect of Windows 2000/XP for multiuser, networked

    environments. This is most evident in the file system 2000 and XP use a powerful and robust file

    system called NT- File System (NTFS).

    NTFS offers the following excellent features:

    Long filenames

    Redundancy

    Backward compatibility

    Recoverability

    Security

    NTFS filenames can be up to 255 characters. NTFS has powerful security functions. The three major

    features of NTFS security are accounts, groups and permissions. Every Windows 2000/XP has a super

    account called administrator that has access to everything.

    Improvement of Windows Vista over Windows XP

    a) Windows Aero (Graphical Interface)

    Windows Vista features a totally different look for its interfacea cleaner, transparent look with

    impressive graphic quality.

    b) Windows Sidebar

    Windows Vista offers a panel (transparent, if you're using Windows Aero) that displays your selection of

    Windows gadgetsmini-applications that perform useful functions, such as a clock, a calendar, a

    Microsoft Office Outlook inbox representation, and currency exchange.

    c) Microsoft Windows Media Player 11

    Media Player 11 has a new graphics-oriented interface.

    d) Windows Search

    One of the most helpful new features in Windows Vista, you can now search for files or applicationsfrom almost anywhere. Unlike in Windows XP, with Window Search, you can simply type a few letters of

    your search request, and the results appear on the flya helpful feature when looking for a file or

    application from the Start menu.

  • 8/13/2019 Ece353 Notes

    34/72

    34

    2.3 System administration and security

    2.3.1 System administration

    Control over local resources must be established to create a secure computing environment. Access

    control is about physical security, authentication, the file system, users and groups and security policies.

    Physical security

    The first order of security is to block access to physical hardware from people who should not have

    access.

    Authentication

    i) Something you know:

    The type of authentication that falls into this category is the password. This is not a good type of

    authentication since password can be guessed.

    ii) Something you have:

    Using Smart Card can reduce the risk of someone guessing a password. But the cost is high and the risk

    also can arise when the card is stolen.

    iii) Something you are:

    Using Biometrics is the type of authentication that make use of our physical traits. It may be using the

    fingerprints, retina identification, voice or facial geometry. Again, this type of authentication is quite

    costly.

    File system

    On a Windows machine with multiple users, NT file system (NTFS) must be used.

    Users and Groups

    Windows uses user accounts and groups as the bedrock of access control. A user account gets assigned

    to a group such as User or Administrator, gets certain permission and password.

    2.3.2 Security

    Malware includes viruses, worms, Trojan Horses and spyware.

    A virus is a part of malicious software that gets passed from computer to computer and is designed toattach itself to another program on a computer, leaving infections as it travels. Some viruses cause only

    mildly annoying effects while others can damage your hardware, software, or files. Almost all viruses are

    attached to an executable file, which means the virus may exist on your computer but it cannot infect

    your computer unless you run or open the malicious program. It is important to note that a virus cannot

    be spread without a human action, (such as running an infected program) to keep it going. People

  • 8/13/2019 Ece353 Notes

    35/72

    35

    continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-

    mails with viruses as attachments in the e-mail.

    A worm is a freestanding program that takes advantage of security flaws and copies itself over and over

    again which can slow the network. One example would be for a worm to send a copy of itself to

    everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyonelisted in each of the receivers address book, and the manifest continues on down the line. Due to the

    copying nature of a worm and its ability to travel across networks the end result in most cases is that the

    worm consumes too much system memory (or network bandwidth), causing Web servers, network

    servers, and individual computers to stop responding. In more recent worm attacks such as the much

    talked about Blaster Worm, the worm has been designed to tunnel into your system and allow malicious

    users to control your computer remotely.

    Trojan are freestanding programs that do something other than what a user expects it to do when run,

    such as expecting a game to run but erasing CMOS Settings instead. The Trojan horse itself would

    typically be a Windows executable program file, and thus must have an executable filename extension

    such as .exe, .com, .scr, .bat, or .pif. Some Trojans are designed to be more annoying than malicious (like

    changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting

    files and destroying information on your system. Trojans are also known to create a backdoor on your

    computer that gives malicious users access to your system, possibly allowing confidential or personal

    information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other

    files nor do they self-replicate.

    Spyware can capture keystrokes to steal password. It disguises itself as useful utilities. It can reconfigure

    dial-up settings to use different phone number at higher connection charge.

    To help protect the computer from malware, the following should be used:

    i. Run up to date antivirus software

    Download updates frequently to ensure your software has the latest fixes for new viruses, worms,

    and Trojan Horses. Additionally you want to make sure your anti-virus program has the ability to

    scan e-mail and files as they are downloaded from the Internet.

    ii. Use firewall

    A firewall is a system which prevents unauthorized use and access to your computer. A firewall can

    be either hardware or software. Hardware firewalls provide a strong degree of protection from most

    forms of attack coming from the outside world and can be purchased as a stand-alone product or in

    broadband routers.iii. Apply all security patches/security updates

    iv. Run Windows update automatically

    Antivirus program

    Antivirus programs use different techniques to combat different type of viruses.

  • 8/13/2019 Ece353 Notes

    36/72

    36

    Boot sector viruses

    The detect boot sector viruses by comparing the drives boot sector to a standard boot sector.

    Some antivirus programs make a backup copy of the boot sector. If they detect viruses, the will

    use the back up copy to replaced the infected boot sector.

    Executable viruses

    These viruses are difficult to find because they can be on any file in the drive. Antivirus programs

    will use their library of signature to detect the viruses. A signature is the code pattern of a

    known virus. The programs will compare the executable file with the list of signatures.

    Macro viruses

    Antivirus program detects macro viruses through the presence of virus signatures or certain

    macro commands that indicate a known macro virus.

  • 8/13/2019 Ece353 Notes

    37/72

    37

    2.4 Installation of operating system

    There are several types of OS installation:

    a) Clean Installation

    Clean installation is installing OS onto a completely empty hard drive. Clean installation is performed by

    resetting the CMOS to tell the system to boot from the CD-Media drive before the hard drive. There isalways opportunity to partition and format the hard drive and then install Windows.

    b) Upgrade Installation

    The new OS installs into the same folder as the old OS; the new OS replaces the old OS but retains all

    saved data inherits the previous settings such as the font style, desktop colours, background and so on.

    To begin upgrading, just insert the upgrade version CD-ROM and the installation will start automatically.

    If not , locate WINNT32.EXE on the CD-ROM, and run it manually.

    c) Multiboot Installation

    For example a PC can have both Windows 2000 and Windows XP as its OS. This installation allows userto choose which Windows version to boot.

    3 PC Multimedia capabilities

    3.1 Sound

    A number of software can play sounds on Windows computer. Commonly a Windows PC comes with

    Windows Media Player. However, it may be better to download more player since not all players can

    play all sounds. InTable 3.1 is a list of common sound file formats.

    Table 3.1: Sound file formatsSound File Format Description

    WAV

    The first sound format , the pulse code modulation

    (PCM) which was modified to suit the use in PC, and

    known as WAV format.

    But WAV file can be huge in size.

    Recorded file.

    MP3

    A new format was introduced to

    compress/decompress the WAV file.

    This new format is known as MPEG-1 Layer 3 codec,

    called by its extension, MP3. The newer version of MP3 is known as MP4.

    MP4 support audio and video

    Recorded file.

    MIDI

    Better than WAV in term of file size.

    MIDI file is a text file.

    The sound card will play the notes according to the

  • 8/13/2019 Ece353 Notes

    38/72

    38

    text file.

    3.2 Video

    Recorded audio files and MIDI files are not the only files that play sounds on the computer. Video files

    also have sound built into them. To play the sound that accompanies the video, the video player

    program must support the particular video file format. Below are the most common video formats inthe PC world:

    a) AVI - Audio Video Interleave

    b) MPEG - Moving Pictures Expert Group

    c) MOV - Quick Time

    d) ASF - Advanced Streaming Format

    e) RM - Real Media

    f) Flash

    g) WMV - Windows Media Video

    3.3 Applications

    Many other applications, especially games, play sound too. Most applications, including games use

    standard WAV, MP3 or MIDI files.

    3.4 Getting the Right Sound Card

    All sound cards can play music and drive a pair of speaker. They differ in five basic areas: processor

    capabilities, speaker support , recording quality, jacks and extra features. Sound cards come with many

    built-in features and basically they have:

    a) Two separate processors (one for recorded sound likes WAV file and one for MIDI file format)b) Support chips for joysticks and other pointing devices that plug into the game port.

    But the sound card itself is just not enough. You need good quality speakers to hear good quality sound

    or music.

    3.4.1 Speaker support

    Every sound card supports two speakers or or a pair of headphones, but better sound cards support

    multiple speakers up to eight speakers to provide surround sound. A popular speaker addition is a

    subwoofer which provides the amazing low frequency sounds.

    3.4.2 Recording Quality

    Almost sound card has input for a microphone. The quality of the input port is measured by signal-to-

    noise ratio (SNR) and expressed in decibels. The smaller the number, the worse the card is for recording.

    Low- end and mid-range soundcard have SNR, 30 to 50 decibels which make them unacceptable for

    recording. High-end sound card offers a 96 to more 100+ SNR, a level near to what professional

    musicians use.

  • 8/13/2019 Ece353 Notes

    39/72

    39

    3.5 Installation of various multimedia components and peripherals

    3.5.1 Installing Sound in a Window System

    There are two choices available for sound hardware on PC nowadays: onboard sound built into the

    motherboard or a separate sound card. To install a sound card, just snap the card into a slot, plug some

    speakers into the card, load a driver and you are done. With onboard sound , you need to make sure the

    sound is enable in your CMOS and then load the driver. The same with most devices, the installation of

    sound card include three major parts: Physical installation, device driver installation and configuration.

    Physical Installation

    1) Shut down your computer, unplug it and open the case

    2) Find an open PCI slot and snap in the sound card

    3) If installing into an older system, connect the CD audio cable to the back of the optical drive, and

    plug the other end into the CD audio port.

    Device Driver Installation

    Once the sound card is installed, start the system and let Windows install the cards driver. This applies

    to expansion cards and onboard sound. It is always best to install the driver that comes in on a CD ROM

    with your sound card. After the sound card and the driver are installed, check the Device manager to

    ensure that the driver was installed correctly.For USB sound card, you must install the driver first before

    connecting the USB sound card.

    Configuration

    Your final step is to configure the sound card using configuration programs and test it using an

    application. You may adjust the volume of the sound.

    3.5.2 Installing Sound Programs

    A program is needed to play sound on your PC. Examples are Windows Media Player,Winamp or

    something similar.

    3.6 Troubleshooting sound

    a) Volume

    Check the volume controls on the speakers. If the speaker volume is ok, check the volume control in

    Windows by clicking on the speaker icon on the system tray.

    b) Speakers

    Make sure the speakers are turned on and getting the power.

    Make sure the speakers are plugged into the proper connection of the sound card.

  • 8/13/2019 Ece353 Notes

    40/72

    40

    c) Configuration Problems

    Check the Device Manager. If a question mark appears as shown inFigure 3.1 , reinstall the driver.

    Figure 3.1: Device manager panel

    3.7 Videoconferencing

    A videoconference is an interactive telecommunication technologies which allow two or more locations

    to interact via two-way video and audio transmissions simultaneously. It uses telecommunications of

    audio and video to bring people at different sites together for a meeting. This videoconference involves

    equipment like camera, microphone and PC.

  • 8/13/2019 Ece353 Notes

    41/72

    41

    Figure 3.2: Videoconferencing

    Advantages

    1. No need to travel long distances for the conference.

    2. Allows large number of people at different locations to interact with one another effectively.

    3. PowerPoint and other visual displays can be shared with everyone attending the conference at

    the same time.

    4. Virtual whiteboards allow people from different locations to add in their own thoughts or ideas

    into one collaborative space.

    5. It is possible, with some services, for everyone to gain access to another computer, seeing

    whatever is on that computer screen. With more advanced services, a document can even be

    changed and typed into directly from other computers connected into the conference.

    Disadvantages

    1. Expensive

    2. No eye contact

    4 PC networking and network services

    4.1 Introduction to networking

    A network is simply a collection of computers or other hardware devices that are connected together,

    either physically or logically, using special hardware and software, to allow them to exchange

    information and cooperate. Some advantages of networking are:

    a) File sharing

    File sharing is the most common function provided by networks and consists of grouping all data

    files together on a server or servers. When all data files in an organization are concentrated in

    one place, it is much easier for staff to share documents and other data. It is also an excellent

    way for the entire office to keep files organised according to a consistent scheme. Network

    operating systems such as Windows Server 2003 allow the administrator to grant or deny

    groups of users access to certain files.

  • 8/13/2019 Ece353 Notes

    42/72

    42

    b) Hardware Sharing

    An example of hardware sharing is the Print Sharing. When printers are made available over the

    network, multiple users can print to the same printer. This can reduce the number of printers

    your organization must purchase, maintain and supply.

    c) Internet Access

    Allow for access to the outside world.

    There are several types of network. Among them are client/server network and peer to peer network.

    4.1.1 Client/Server Network

    Client / Server network contains servers as well as client computers. Servers are powerful computers

    dedicated to provide certain services. These services can consist of many different roles, including file

    services, web services, email services, domain name lookup services, Internet sharing services, etc.Clients are PCs or workstations on which users run applications. Clients rely on servers for resources,

    such as files, devices and sometimes even processing power. A great example of the Client-Server

    network model is actually the World Wide Internet. On the Internet clients, or computer with web

    browsers, access web sites that are hosted on servers.

    This model differs from the Peer-to-peer network model in that the servers usually do not dually act as a

    workstation, and the workstations usually do not act as servers.

    Characteristics of Client/Server networkOne machine is dedicated as a server.

    It is designed for large number of computer.

    The server has Network Operating System (NOS) optimized for sharing files, with powerful caching

    software that enable high speed file access, high level of protection and organization that permits

    extensive control of the data.

    Advantages of a Client-Server network

    a) Centralized - Resources and data security are controlled through the server.

    b) Scalability - Any or all elements can be replaced individually as needs increase.c) Flexibility - New technology can be easily integrated into the system.

    d) Accessibility - Server can be accessed remotely and across multiple platforms.

    e) Security - Server can manage access lists and restrict certain areas and/or files.The username and

    password can be configured at the server side. Once done, it will be set for the entire network.

  • 8/13/2019 Ece353 Notes

    43/72

    43

    Figure 4.1: Client/Server network

    4.1.2 Peer-to-peer (P2P)

    Basically, a P2P network is an ad hoc network that connects participants directly, rather than through a

    central point. The combined bandwidth of participants is used to transfer data. Many P2P network are

    set up to share music, video, and text files.

    Characteristics of P2P

    a) Enable any of the machines to act as a server.

    b) Every server can perform both server and client functions.

    c) Not designed for a large number of computers, maximum is 15 PCs.

    d) Weak security

    Advantages of a peer-to-peer network

    a) Less initial expense since there is no need for a dedicated server.b) No need for a network administrator.

    c) Network is fast and inexpensive to setup and to maintain.

    d) Each PC can make backup copies of its data to other PCs for security.

    e) Easiest type of network to build.

  • 8/13/2019 Ece353 Notes

    44/72

    44

    Figure 4.2: Peer to peer network

    4.2 TCP/IP Networking Fundamentals

    TCP and IP were developed by United States Department of Defense (DOD) research project to connect

    a number different networks designed by different vendors into a network of networks (the "Internet").

    It was initially successful because it delivered a few basic services that everyone needs (file transfer,

    electronic mail, remote logon) across a very large number of client and server systems. Several

    computers in a small department can use TCP/IP (along with other protocols) on a single LAN. The IP

    component provides routing from the department to the enterprise network, then to regional networks,

    and finally to the global Internet. TCP/IP is made up of two acronyms, TCP, for Transmission Control

    Protocol, and IP, for Internet Protocol. TCP handles packet flow between systems and IP handles the

    routing of packets.TCP/IP is the protocol used for communication over the Internet and on most

    computer networks today.

    4.2.1 IP addresses and domain name

    4.2.1.1 IP addressesIP addresses are normally expressed in decimal format as a "dotted decimal number" like 216.27.61.137.

    Butcomputers communicate inbinary form. Look at the same IP address in binary:

    11011000.00011011.00111101.10001001

    http://computer.howstuffworks.com/pc.htmhttp://computer.howstuffworks.com/bytes.htmhttp://computer.howstuffworks.com/bytes.htmhttp://computer.howstuffworks.com/pc.htm
  • 8/13/2019 Ece353 Notes

    45/72

    45

    The four numbers in an IP address are called octets, because they each have eight positions when

    viewed in binary form.

    If all the positions are add together, you get 32, which is why IP addresses are considered 32-bit

    numbers. Since each of the eight positions can have two different states (1 or 0) the total number of

    possible combinations per octet is 28or 256. So each octet can contain any value between 0 and 255.

    Combine the four octets and you get 232

    or a possible 4,294,967,296 unique values. Out of the almost

    4.3 billion possible combinations, certain values are restricted from use as typical IP addresses. For

    example, the IP address 0.0.0.0 is reserved for the default network and the address 255.255.255.255 is

    used for broadcasts.

    The octets serve a purpose other than simply separating the numbers. They are used to create classes of

    IP addresses that can be assigned to a particular business, government or other entity based on size and

    need. The octets are split into two sections: Net and Host. The Net section always contains the first

    octet. It is used to identify the network that a computer belongs to. Host (sometimes referred to as

    Node) identifies the actual computer on the network. The Host section always contains the last octet.

    There are five IP classes plus certain special addresses.

    There are two ways of assigning IP addresses:

    a) Static addressing

    The IP address for a computer never changes and is assigned manually by a network

    administrator.

    b) Dynamic addressing

    A computer is assigned an address from an available pool of IP addresses. This is handled by the

    Dynamic Host Configuration Protocol (DHCP). This IP address is temporary and may or may not

    be the same from session to session. This type of addressing is better than static addressing

    because it provides better security measures to keep hackers out of the computer system.

    4.2.1.2 Domain namesDomain names were born to enable people to work with names rather than numbers. It takes the place

    of an IP addresse, making it easier for people to remember it. Consider this URL, www.yahoo.com. The

    domain name is yahoo.com. The server where Yahoo!s main website is deployed has an IP address,

    such as 123.45.67.89, but it is rather easier to recall yahoo.com instead of the IP address.

  • 8/13/2019 Ece353 Notes

    46/72

    46

    4.2.1.3 DNS serversURL is not important to a computer. What important is only the IP address of the computer hosting that

    URL. When you enter a URL in a browser, your computer converts the URL into an IP address. To do this,

    your computer consults a database that is maintained on a DNS server, which functions like a phone

    book for the internet.

    4.2.2 IP Address Classes

    a) Default Network- The IP address of 0.0.0.0is used for the default network.

    Class A

    This class is for very large networks, such as a major international company might have. IP

    addresses with a first octet from 1 to 126 are part of this class. The other three octets are used to

    identify each host. This means that there are 126 Class A networks each with 16,777,214 (224

    -2)

    possible hosts for a total of 2,147,483,648 (231

    ) unique IP addresses. Class A networks account for

    half of the total available IP addresses. In Class A networks, the high order bit value (the very first

    binary number) in the first octet is always 0.

    Loopback- The IP address 127.0.0.1is used as the loopback address. This means that it is used by the

    host computer to send a message back to itself. It is commonly used for troubleshooting and network

    testing.

    Class B

    Class B is used for medium-sized networks. A good example is a large college campus. IP addresses

    with a first octet from 128 to 191 are part of this class. Class B addresses also include the second

    octet as part of the Net identifier. The other two octets are used to identify each host. This means

    that there are 16,384 (214

    ) Class B networks each with 65,534 (216

    -2) possible hosts for a total of

    1,073,741,824 (230

    ) unique IP addresses.

  • 8/13/2019 Ece353 Notes

    47/72

    47

    Class B networks make up a quarter of the total available IP addresses. Class B networks have afirst bit value of 1 and a second bit value of 0 in the first octet.

    Class C

    Class C addresses are commonly used for small to mid-size businesses. IP addresses with a first

    octet from 192 to 223 are part of this class. Class C addresses also include the second and third

    octets as part of the Net identifier. The last octet is used to identify each host. This means that

    there are 2,097,152 (221

    ) Class C networks each with 254 (28-2) possible hosts for a total of

    536,870,912 (229

    ) unique IP addresses. Class C networks make up an eighth of the total available IP

    addresses. Class C networks have a first bit value of 1, second bit value of 1 and a third bit value of

    0 in the first octet.

    Class D

    Used for multicasts, Class D is slightly different from the first three classes. It has a first bit value of

    1, second bit value of 1, third bit value of 1 and fourth bit value of 0. The other 28 bits are used to

    identify the group of computers the multicast message is intended for. Class D accounts for 1/16th

  • 8/13/2019 Ece353 Notes

    48/72

    48

    (268,435,456 or 228

    ) of the available IP addresses.

    Class E

    Class E is used for experimental purposes only. Like Class D, it is different from the first three

    classes. It has a first bit value of 1, second bit value of 1, third bit value of 1 and fourth bit value of

    1. The other 28 bits are used to identify the group of computers the multicast message is intended

    for. Class E accounts for 1/16th

    (268,435,456 or 228

    ) of the available IP addresses.

    Broadcast

    Messages that are intended for all computers on a network are sent as broadcasts. These

    messages always use the IP address 255.255.255.255.

    4.3 Network Security

    Network security is generally taken as providing protection at the boundaries of an organization,

    keeping the potential hackers out. Network security starts from authenticating any user, commonly

    with a username and a password. Once authenticated, a stateful firewall enforces access policies such as

    what services are allowed to be accessed by the network users.

    4.3.1 Firewall

    It is a software or hardware used to prevent unauthorized access to your network, and is the front line

    of defense against viruses, worms, Trojan Horse attacks and hackers. Todays firewall can even deliver

    web content filtering, intrusion prevention services and antivirus protection. Using a combination of

    hardware and software solutions, the Firewall enables you to:

    a) Control incoming and outgoing traffic between the Internet and your protected networks

    b) Hide your internal IP addresses from the external network

    c) Control User Authentication

    d) Configure access rules by user or group

    e) Filter by user, group, time-of-day or content category

  • 8/13/2019 Ece353 Notes

    49/72

    49

    Figure 4.3: Firewall hardware

    5 Server hardware and print sharing

    5.1 Networked server requirements, hardware and installation

    5.1.1 Servers

    Servers serve many different network users and assist them with accomplishing a variety of task. The

    number and types of servers on client/server network depend on the networks size an workload. As

    more users are added to a network, dedicated servers are also added to lessen the burden of the main

    server.

    5.1.1.1 Dedicated serversDedicated servers are used to fulfill one specific function such as handling e-mail. Any repetitive tasks

    requested by users is a good candidate to relegate to a dedicated server. Common types of dedicated

    servers are :

    i) Print servers

    ii) Application servers

    iii) Database servers

    iv) e-mail servers

    When dedicated servers are deployed, the main server becomes an authentication server and/or a file

    server.

    5.1.1.2 Authetication serversAuthetication servers keep track of who is logging on to the network and which services on the network

    are available to each user.

    5.1.1.3 File serversFile servers store and manage files for network users.

    5.2 Printer and print sharing

    A printer is a peripheral device, which is attached to the computer to produce written material or

    graphics on paper or other print material. When you write a word document you send input and when

  • 8/13/2019 Ece353 Notes

    50/72

    50

    you take a printout of this document via the printer you get a hard copy output. Choosing a printer may

    be based on some of the following:

    a) Speed

    A printers speed determines how many pages it can print per minute (ppm). Many inkjet printers have

    the speed of those of laser jet printers. Printing speeds vary by model and range from 8 to 30 ppm for

    both inkjet and laser printers.

    b) Resolution

    A printers resolution is measured in dot per inch(dpi) or number of dots of ink in one-inch line. Higher

    dpi produces higher quality printing. The dpi may be represented as 600 x 600, or some just stated by

    600 dpi. For general-purpose printing 300 dpi is already enough. For photo printing 1200 dpi or higher is

    better.

    5.2.1 Types of printers

    Printers are made by using different technologies. The following are several types of printer that are

    available in the market.

    a) Dot matrix printers

    These printers consist of print head, pins and ribbon. As the head moves across the paper, pins hit the

    ribbon to insert ink on paper to create text.

    b) Characters printer

  • 8/13/2019 Ece353 Notes

    51/72

    51

    You cannot print graphics by these printers. Just like the typewriter, it consists of alphabets or

    characters. Each character strikes the ribbon to insert a character on the paper.

    c) Ink jet printers

    This type of printer is popular among home PC users because of high quality, less expensive and

    photo quality output copy. It consists of inkjet print cartridges or ink boxes. Your colour ink jet

    printer needs two ink jet cartridges one black and other tri or four colour to produce a colour

    print copy. Ink from the nozzle in the form of tiny droplets is used to create text and images on

    the paper.

    d) Laser printers

  • 8/13/2019 Ece353 Notes

    52/72

    52

    These printers give high speed and high quality output by using laser technology. It consists of

    electrostatic charge, rotating drum, laser beam and toner.

    5.2.2 Create a perfect print

    After setting up the printer your first task is to know how to create a perfect document. As youknow from the printer you can print word documents, greeting cards and envelopes, etc. Print

    icon is always seen on the tool bar of the program file. But before you click it remember that

    you must setup the page size and some other details because without completing these

    formalities you cannot print a document. Here are few points that you should keep in mind

    before you start printing.

    a) Click on page setup

    Go to the file menu option and click "Page setup". Now click the "page size" tab and if you want

    to print an envelope select envelop from the paper size list box. On the right side "preview" of

    your selection helps you to take the finale decision.

    b) Set the orientation

    At the bottom of the page size tab, two options for page orientation are given. This option gives

    you opportunity to print the text or image in portrait or landscape style.

    c) Types of printing paper

    It is very important to the choose right kind of printing paper because if you try to make a print

    of a photograph on a plain sheet of paper you are bound to get poor quality prints. To print a

    photograph you need shiny glossy paper. For double-sided printing, thick paper is used so that

    the text or image of one side of the paper cannot appear on the other side.

    d) Maintaining your printer

    To get flawless and good quality prints it is necessary that your printer should be in first-class

    condition. Following are few tips to keep your printer in good condition.

    Keep away dust and smudge from your printer.

    Never try to clean the inside of the printer with a wet cloth.

  • 8/13/2019 Ece353 Notes

    53/72

    53

    To clean colour cartridges, select your printer and right click to open-up the short cut

    menu. Select properties and then select the services tab. Now click "clean the print

    cartridges" button.

    You can get more information about your printer from the user guide.

    5.2.3 Printer SharingAt times it is necessary to connect the same printer to more than one computer in a home,

    office, or educational setting. There are several different hardware options available for sharing

    a printer, ranging from the inexpensive and simple to the more complex.

    a) USB/Parallel

    Figure 5.1: A printer connected to computer using USB and parallel cable

    This is the easiest, least expensive way of sharing a printer. However, it is limited to sharing a

    printer with no more than two computers. It also requires that one (or both) computer has a

    standard parallel port, and the other has a USB port. The printer must have ports and cables for

    connecting it to both USB and parallel ports at the same time. After proper port and driver

    configuration, this should allow both computers to send print jobs to the same printing device,

    using their separate cables.

    b) Using printer switch

  • 8/13/2019 Ece353 Notes

    54/72

    54

    Figure 5.2: A printer connected to multiple computers using switch

    Referred to under various different names, including "parallel switch", "A-B switch", or "auto

    switch", a printer switch lets multiple computers be connected to the same printer, usually via

    parallel or USB cables.

    Figure 5.3: The USB 2.0 High Speed Four Computers Device Sharing Switch with

    Manual Push Button Selector

    Unlike other options, many of these units require a knob to be turned or a button pressed each

    time a different computer is used to print. However, some are available which automatically

    connect the printer to the computer that is requesting to print. Most units are limited to either

    two or four computers. This hardware is easier to set up than a networked hardware sharing

    system, and is more likely to be compatible with different computer models. It also does not

    require any different software configuration or settings.

  • 8/13/2019 Ece353 Notes

    55/72

    55

    c) Networking

    Figure 5.4: A printer connected to a network

    One of the various types of computer network systems can be set up to enable this type of

    hardware sharing. This technique requires a router, an appropriate network interface card

    installed in each computer, and the right type of networking cables. It is usually more expensive

    than the above-mentioned options, and uses slightly more electricity. However, it makes other

    functions possible (like sharing an internet connection or easily transferring files from one

    computer to another), and allows for a much greater number of systems to be connected.

    Figure 5.5: A printer connected to a network through a router

    Enable Printer Sharing in Windows XP

    Follow these instructions to share printers connected to a Windows XP computer on a local

    network.

    1) On the computer that is wired to the printer (called the hostcomputer), open Windows

    Control Panel (from the Start menu).

    2) Open (double click) the Printers and Faxes icon from within the Control Panel window. If

    using the Category View for Control Panel, first navigate to the Printers and Other

  • 8/13/2019 Ece353 Notes

    56/72

    56

    Hardware category to find this icon. In Classic View, simply scroll down the list of icons

    in alphabetical order to find the Printers and Faxes icon.

    3) In the list of printers and faxes within the Control Panel window, select (single click) the

    icon for a printer you wish to share.

    4) From the Printer Tasks pane (left hand side of the Control Panel window), click Share

    this printer. Alternatively, you can right-click on the selected printer icon to open a pop-

    up menu and choose the Sharing...option from this menu. In both cases, a new Printer

    Properties window appears.

    However, if at this stage you receive an error message starting with Printer Properties

    cannot be displayed, this indicates the printer is not currently connected to the

    computer. You must physically connect the computer and printer to complete this step.

    5) In the Printer Properties window, click on the Sharing tab and select the Share this

    printer radio button. In the Share name field, enter a descriptive name for the printer:This is the identifier that will be shown to other devices on the local network when they

    make connections Click OK or Apply to complete this step.

    At this stage, the printer will now be accessible to other devices on the local network.

    Close the Control Panel window when finished.

    To test sharing is configured properly for this printer, attempt to access it from a different

    computer on the local network. From another Windows computer, for example, you can

    navigate to the Printers and Faxes section of Control Panel and click the Add a printer task. The

    share name chosen above identifies this printer on the local network.

    Enable Printer Sharing in Windows Vista

    Windows Vista uses a default workgroup name of WORKGROUP.

  • 8/13/2019 Ece353 Notes

    57/72

    57

    Figure 5.6: Dialog box for Printer Sharing in Windows VistaUse the 'Share name' field to give the printer a distinctive name.

    1) Select Control Panel' from the Start menu.

    2) Select Printer from the Hardware and Sound group.

    3) A list of installed printers and faxes will display.

    4) Right-click on the icon of the printer you wish to share and select Sharing from the pop-up

    menu.

    5) Click the Change sharing options button.

    6) The User Account Control system will ask for permission to continue. Click the Continue

    button.

    7) Place a check mark next to the Share this printer item.

    8) Enter a name for the printer in the Share name field.

    9) Click the Apply button.

    10)Close the printers Properties window and the Printers and Faxes window.

    http://z.about.com/d/macs/1/0/T/0/-/-/vistap