Learning&Teaching Systems Ppt

198
Outcome 1 - Contents 1 Data Representation 2 Computer Structure 3 Computer Performance 4 Peripherals 6 Using Networks 7 Computer Software 8 Supporting Software 5 Networking

Transcript of Learning&Teaching Systems Ppt

Page 1: Learning&Teaching Systems Ppt

Outcome 1 - Contents• 1 Data Representation• 2 Computer Structure• 3 Computer Performance• 4 Peripherals• 6 Using Networks• 7 Computer Software• 8 Supporting Software• 5 Networking

Page 2: Learning&Teaching Systems Ppt

1 Data Representation 1.1 Introduction

• Lowest level in computer only binary numbers can be used.

• We work in base 10.

• Computer must be able to process +ive and –ive, very large and very small numbers.

• We look at how the computer uses numbers to represent text and graphics

Page 3: Learning&Teaching Systems Ppt

1 Data Representation 1.2.1 Decimal Numbers

We use base 10

When expressing large numbers in terms of powers of 10 the following abbreviations are used:

•101 = 10

•102 = 100

•103 = 1000 = 1 kilo

•106 = 1,000,000 = 1 Mega

•109 = 1,000,000,000 = 1 Giga

•1012 = 1,000,000,000,000 = 1 Tera

Page 4: Learning&Teaching Systems Ppt

1 Data Representation 1.2.1 BinaryNumbers

Computers work in number base 2 which uses 2 symbols, 0 and 1 to represent a value.

In computing systems, large numbers are expressed in terms of powers of 2 and use the following abbreviations:21 has a decimal equivalent of 2 22 has a decimal equivalent of 4 23 has a decimal equivalent of 8 24 has a decimal equivalent of 16 25 has a decimal equivalent of 32 26 has a decimal equivalent of 64 27 has a decimal equivalent of 128 28 has a decimal equivalent of 256 29 has a decimal equivalent of 512 210 has a decimal equivalent of 1024 and is abbreviated to 1 kilo 220 has a decimal equivalent of 1,048,576 and is abbreviated to 1 Mega 230 has a decimal equivalent of 1,073,741,824 and is abbreviated to 1 Giga 240 has a decimal equivalent of 1,099,511,627,776 and is abbreviated to 1 Tera

Page 5: Learning&Teaching Systems Ppt

1 Data Representation1.2.2 Decimal to Binary

2 29

2 14 R1

2 7 R0

2 3 R1

2 1 R1

2 0 R1

How to convert decimal to binary e.g. 29

Giving 11101

•Using 1 byte for storage gives 256 possible numbers.

•2 byte gives 65536, 0-65535

•Increasing the size of the storage for numeric data increases the range of numbers which can be stored.

Page 6: Learning&Teaching Systems Ppt

1 Data Representation1.2.3 Binary to Decimal

– Numbers converted to binary – number base 2– Example of 154 represented as a binary

number

128 64 32 16 8 4 2 1

1 0 0 1 1 0 1 0

128 +0 +0 +16 +8 +0 +2 +0 =154

Page 7: Learning&Teaching Systems Ppt

1 Data Representation1.2.4 Hexadecimal

Long binary numbers can be difficult to read correctly.

Computers have memory addresses of 2 or 4 bytes long which give addresses of 16 or 32 bits.

Hexadecimal is base 16 and organises the bits into groups of four.

The conversion between base 2 and base 16 is very simple. Hex needs the digits 0-9 and letters A-F.

E.g. 11010100010110010011001010010110 becomes

1101 0100 0101 1001 0011 0010 1001 0110 which in Hex is D459 3256

Page 8: Learning&Teaching Systems Ppt

1 Data Representation1.2.5 Why Binary

• Logic circuits based on two state logic – use only 0 and 1.

• We only need two voltages 0 and a voltage of any value = 1

• There are only 4 rules of arithmetic with binary (100 in base 10).

• Robust – can cope with degradation of signal.

Page 9: Learning&Teaching Systems Ppt

Data Representation1.2.6 & 1.2.7 Integers

• Positive numbers– Converted directly to binary– 2 bytes = 16 bits gives 0 to 216-1 or 0 to 65535– n bytes gives n*8 bits - 2n*8 - 1

• Negative Numbers– 216 : Same range but –32768 to 32767– Using sign bit 0 +ive and 1 –ive e.g. 011 = 3 and 111 = -3

• Sign and magnitude does not work because:• Addition does not work properly (-5+-10 gives 15)• Two 0’s (00000000 and 10000000)

Page 10: Learning&Teaching Systems Ppt

Data Representation1.2.8 Twos Complement

– Two’s Complement is another way of representing negative numbers.

– Addition works and there is only one zero

– All 0’s are converted to 1’s and 1’s to 0’s then 1 is added.

– To convert 5 to –5

0 0 0 0 0 1 0 1

1 1 1 1 1 0 1 0

+1

1 1 1 1 1 0 1 1

OR 5

OR -5

Page 11: Learning&Teaching Systems Ppt

Data Representation1.2.9 Real Numbers

• Real numbers are stored as floating point or scientific notation. Numbers stored as base and exponent.

• E.g 34008.6 is .340086*105

• In binary 1101.1001 is .11011001*2100 (the 4is 100 in binary)

• The mantissa is 11011001 and the exponent is 100

• Usually 4 bytes used for mantissa and 2 for exponent

• Increasing the size of the mantissa increases accuracy

• Increasing the size of the exponent increases the range of numbers which can be stored

Page 12: Learning&Teaching Systems Ppt

1 Data Representation1.3 Text

ASCII– Each character is stored in an 8 bit binary code called

the ASCII system.– E.g. A is stored as 65 (01000001 in Binary).– 1 byte can store 256 different characters – enough for

all the keys on the keyboard and several foreign symbols (for currency etc.).

• Unicode– Need to represent non-Latin chars e.g. Japanese and

Chinese– Characters encoded using 16 bits – 65,536 symbols.– MS Office stores documents in Unicode

Page 13: Learning&Teaching Systems Ppt

Data Representation1.4 Graphics

Most displays use Raster graphics – same as TV.

Displays store images as a matrix of pixels in the refresh buffer.

Separate images now stored in VRAM (Video RAM).

VRAM represents the entire screen area and the term bit map is used to describe the one-to-one mapping of pixels in VRAM to pixels on the screen.

Page 14: Learning&Teaching Systems Ppt

Data Representation1.4.1 Bit-mapped Graphics

• For a graphic drawn in a painting package the computer stores the data as a 2 dimensional array of pixels.

• Each pixel in a black and white image is 1 bit in memory.• 2 bits can store 4 colours or shades of grey.• 8 bits can store 256 colours.• The number of bits used for each pixel is the bit depth.• The resolution is the number of pixels in the height and width of

the image.• Bit mapped images are often generated from scanned pictures

and can create huge files.• Editing can be performed at pixel level.• When images are enlarged they can become “lumpy” and lose

definition.

Page 15: Learning&Teaching Systems Ppt

Data Representation1.4.2 Calculating Memory Requirements

• We need to know the size of the image, resolution and bit depth.– Size – usually inches e.g. 6” x 4”– Resolution – say 500 dpi (pixels per inch)– Bit Depth – e.g. 1 bytes for 256 coloursNo of bytes is

Pixels Across Pixels down Total Pixels * Bit depth

6 x 500 4 x 500 24 x 250,000 = 6,000,000

6,000,000 bytes / 1024 = 5859K = 5.7 MB

Page 16: Learning&Teaching Systems Ppt

Data Representation1.4.3 Arranging The Bytes

There are many different ways of arranging the bytes that hold image information, but one way is to map them so that the first byte represents the top left pixels, the second byte represents the pixels to the right of the first pixel, until the end of the first row is reached, when the next byte holds the information for the left hand end of the second row. For a small (24 pixel by 4 rows ) display the layout would look like this:

The image is saved as a series of bytes to a storage device, such as memory or disk.If we wish to review the image then it is a simple matter to transfer the image data back into the video memory as a direct copy. As this image is also in a bit mapped format, we can still move it to and from other storage devices without any translation.

Page 17: Learning&Teaching Systems Ppt

Data Representation1.4.4 Greyscale

A rudimentary greyscale effect provides a ’black’, ’white’ and two levels of ’grey’. As this comprises four different values we need two bits to represent each pixel (00 for black, 01 for darker grey, 10 for lighter grey and 11 for white ).

As each pixel now requires twice as many bits, we will require twice as much memory for a given screen size as a black and white image.

We can provide more levels of grey by allocating more bits to each pixel. By the time we have eight bits (one byte) to one pixel we can represent 256 different intensities.

Monochrome displays are often clearer, especially for text than colour display. The requirement to use colour for such items as colour pictures and user interface issues, dictates that colour displays are more likely to be purchased.

Page 18: Learning&Teaching Systems Ppt

Data Representation1.4.6 Compression

• A colour bit – mapped image with a high resolution and 24 bit colour needs a lot of storage (50MB for a smallish photo).

• File compression is used to reduce storage requirements.

• Different techniques – coding using and index of colours actually used and not coding differences indistinguishable to the human eye.

Page 19: Learning&Teaching Systems Ppt

Data Representation1.4.5 Colour

One colour can be represented by one byte giving 256 colours (GIF format).

Monitors etc. have 3 primary (additive) colours, Red, Blue and Green. Other colours obtained from adding light.

We use 8 bits for Red, 8 for Blue and 8 for Green which give us 256 x 256 x256 colours – over 16 million.

We need 3 bytes to describe RGB coded colours.

Codes can be used by a programmer to describe colours in Hex code.

Page 20: Learning&Teaching Systems Ppt

Data Representation1.4.7 Vector Graphics

• Objects not described pixel by pixel but by its attributes (start & end positions, thickness & colour of lines etc.)

• Sometimes called object-orientated graphics.• Vector graphics are resolution independent. Rasterisation

need for conversion to bit map for display or printing.• Editing at pixel level not possible.• Can be scaled without losing original image quality• Less storage required• Can be grouped and edited at the object level.• Can be placed over another graphic without rubbing it out

as happens with bit-mapped.

Page 21: Learning&Teaching Systems Ppt

2 Computer Structure2.1 An Introduction

This unit on Computer Structure describes in detail the function of the component parts of a processor in the manipulation of data.

This is extended to the methods of transferring data within a processor and between a processor and memory.

The concept of a stored program is considered and the steps in the fetch-execute cycle to access and run programs. Memory types are considered, from registers to backing storage and how memory is defined and addressed.

Page 22: Learning&Teaching Systems Ppt

2 Computer Structure2.2 Computer Organisation

Computers play a significant role in meeting our everyday requirements. You can now browse the Internet for:

•a new home,

•Shop on-line and have home delivery

•import a new car from abroad

•order clothes from a catalogue company

•communicate with friends overseas.

The ways in which you learn are also changing.

•On-line homework

•Computer based learning tools

Page 23: Learning&Teaching Systems Ppt

2 Computer Structure2.2 Computer Organisation

It makes sense to find out how they work and how you can make use of them.

•How are they structured?

•How do they operate?

•How is data represented?

•Why are some computers more powerful than others?

•What devices can you attach?

•How do they communicate?

Answers can be found in the following Topic

Page 24: Learning&Teaching Systems Ppt

2 Computer Structure2.2. Calculating Machines- From Babbage to VLSI

• Abacus developed about 1300 AD by Chinese• Logarithms developed by John Napier• Other manual devices developed by Pascal & Liebniz• First mechanical calculator developed by Charles

Babbage (1792 – 1871) Difference Engine and then Analytical Engine.

• Idea of stored program concept developed.• First Electrical machine Enigma codebreaker in WW2.• Vacuum tubes (40’s replaced by transistors (60’s)• From 1965 to present circuitry all on one chip Integrated

circuits.• Now we have VLSI (Very large Scale Integration)

Page 25: Learning&Teaching Systems Ppt

2 Computer Structure2.2.1 A Two State Machine

• Typical 4 box diagram

• Only 2 states used in all components and data storage, on or off, 1 or 0.

• Advantages of 2 state.– Simplicity – 2

voltage levels.– Good tolerance– Simple calculations.

InputProcessor

Memory

RAM & ROM

Output

Backing

Storage

CPU

Page 26: Learning&Teaching Systems Ppt

2 Computer Structure 2.2.2.1 The structure of the CPU (a)

Memory Processor

Control unit

ALU

Registers, A, MAR, MDR, PC, SPAddress bus – 1 way

Data bus – 2 way

Control Bus Internal buses

Page 27: Learning&Teaching Systems Ppt

2 Computer Structure 2.2.2.1 The structure of the CPU (b)

• ALU (Arithmetic & Logic Unit)– Data is processed and manipulated.– Involves arithmetic operations and logical comparisons.

• Control Unit– Manages execution of instructions.– Sends control signals around the computer.

• Registers– Storage location with the CPU– Hold calculations, store addresses etc.

• Main Memory• External Memory• Peripheral Devices

Page 28: Learning&Teaching Systems Ppt

2 Computer Structure 2.2.3 The stored program concept

All computers based on same basic design, known as the Von Neumann Architecture.

Computers carry out tasks by executing machine instructions. A series of these instructions is called a machine code program held in main memory as a stored program, a concept first proposed by John Von Neumann in 1945.

Central Processing Unit (CPU) fetches, decodes and executes the machine instructions.

By altering the stored program it is possible to have the computer carry out a different task.

Page 29: Learning&Teaching Systems Ppt

2 Computer Structure 2.2.4 The fetch execute cycle

To execute a machine code program it must first be loaded, together with any data that it needs, into main memory (RAM). Once loaded, it is accessible to the CPU which fetches one instruction at a time, decodes and executes it at electronic speed.

Fetch, decode and execute are repeated until a program instruction to HALT is encountered. This is known as the fetch-execute cycle.

Page 30: Learning&Teaching Systems Ppt

2 Computer Structure 2.2.4.1 The fetch execute cycle in detail

This is how the:

•Address bus

•Data bus

•Control Bus

•Registers

All take part in reading an instruction from memory and executing it.

Page 31: Learning&Teaching Systems Ppt

2 Computer Structure 2.2.4.3 The fetch phase

.1. The contents of the PC are copied into the MAR;

2. The contents of memory at the location designated by the MAR are copied into the MDR;

3. The PC is incremented;

4. The contents of the MDR are copied into the IR.

2.2.4.4 The Execute phase

1. Decode the instruction in the IR;

2. Execute the instruction in the IR.

Page 32: Learning&Teaching Systems Ppt

2 Computer Structure 2.2.8 Computer Components and Their Function

The components of the CPU and the connections to devices that are external to it are shown.

Page 33: Learning&Teaching Systems Ppt

2 Computer Structure 2.3 Memory

Main memory (RAM and ROM) stores programs and data while the computer is operating.

Any location in memory can be read from or written to by referring to its address.

Memory can be organised as:

• 8- bit wide (PC-8088)

• 16-bit wide (XT-8086, AT-80286)

• 32-bit wide (386DX, 486SX, 486DX)

• 64-bit wide (Pentium)

Page 34: Learning&Teaching Systems Ppt

2 Computer Structure 2.3.1 RAM

• RAM• Has same access time for all locations.• Volatile – loses contents on power off.

– 2 Types of RAM Static and Dynamic• Static – holds contents as long as there is power.• Dynamic – has to be refreshed (every 2 ms).

• Each memory location has a unique address.

Page 35: Learning&Teaching Systems Ppt

2 Computer Structure 2.3.2 ROM

• ROM• Contents permanent or non-volatile.• Software & data fixed into ROM at manufacture.• Operating systems and specialised ROMs (e.g. cameras and

CD players etc.).

– Some ROMs can be reprogrammed• EPROM – electrically programmable read only memory

(data erased by ultraviolet light and new program burned onto ROM

• EEPROM – electrically erasable programmable read only memory – selective parts can be reprogrammed & used in developmental work

Page 36: Learning&Teaching Systems Ppt

2 Computer Structure 2.3.4 Cache Memory

• Faster processors mean data is being processed before the next instructions can be read from memory (system busses slow).

• Most systems have 2nd smaller area of fast SRAM. Next instructions read into cache – much faster than RAM.

Page 37: Learning&Teaching Systems Ppt

2 Computer Structure 2.3.6 External Memory

External memory, such as the hard disk, holds quantities of data too large to store in main memory.

It is also used to keep a permanent copy of programs and data.

Examples of external memory devices are:

• hard disk;

• floppy disk;

• zip disk;

• CD-R;

• magnetic tape;

• flash drive.

Page 38: Learning&Teaching Systems Ppt

2 Computer Structure 2.4 Central Processing Unit

Central Processing Unit. The CPU coordinates and controls the activities of all other units in the computer system. It executes program instructions and manipulates data in accordance with the instructions.

It uses a standard architecture composed of the following three components:

Arithmetic and logic unit (ALU);

Control unit;

Registers.

All three components work together to form the processor.

Page 39: Learning&Teaching Systems Ppt

2 Computer Structure 2.4.1 Architecture of the microprocessor

We will now study the internal architecture of the microprocessor (CPU) itself. Because of the stored program concept, we must consider the relationship between the CPU and memory.

This is a diagram of a fairly typical microprocessor design, showing the internal structure of the CPU and its relationship to the memory of the computer.

Page 40: Learning&Teaching Systems Ppt

2 Computer Structure 2.4.2 Accessing Memory

The CPU has to access memory both for instructions and to receive and transmit data from or to memory.

Memory Address Register (MAR) - specifies the address in memory for the next read or write operation from or to memory;

The Memory Data Register (MDR) or Memory Buffer Register (MBR) - contains the data to be written to memory or receives the data read from memory.

•MAR register connected to the address bus

•MDR register connected to the data bus.

Page 41: Learning&Teaching Systems Ppt

2 Computer Structure 2.4.2 Accessing Memory (2)

To read data from memory, CPU places the address of the memory location into the MAR and activates the memory-read control line of the system bus. This will cause the required data to be transmitted from memory via the data bus to the MDR;

To write from the CPU to memory, the CPU places the data to be written in theMDR; the address of the memory location where they are to be written is placed in the MAR; and the memory-write control line is activated.

The MAR and MDR registers have a large part toplay in the fetch-execute cycle.

Page 42: Learning&Teaching Systems Ppt

2 Computer Structure 2.4.3 Functions of Control Bus

• Control bus has several lines, used singly to initiate a process.

• Read Line – initiates memory read operation.• Write Line - initiates memory write operation.• Clock – Generates pulse to synchronise components.• Interrupt – Signal to processor of an interrupt like a key press

or mouse click. Processor saves stack and deals with the interrupt.

• NMI – Non-Maskable Interrupt. Interrupt which cannot be ignored.

• Reset – Clears all registers, aborts program and gives control back to the operating system.

Page 43: Learning&Teaching Systems Ppt

• Polling– The processor checks each part of the system in turn

and if any part wants the processors attention it signals to the processor.

• Interrupts– This is how a PC works. When a key is pressed or

mouse clicked an interrupt is generated and the processor carries out that task (sometimes it is “doing nothing” and is interrupted.

– Some interrupts need not be actioned (Maskable Interrupts), others must be actioned (NMI) e.g Ctrl+Alt+Del

2 Computer Structure 2.4.3.1 Getting the processors attention

Page 44: Learning&Teaching Systems Ppt

2 Computer Structure 2.4.4 The Arithmetic Logic Unit

• ALU– Where data is processed and manipulated.– ALU involves arithmetic operations and

logical operations .– ALU uses temporary registers to hold data.– Accumulator is main register.

Page 45: Learning&Teaching Systems Ppt

2 Computer Structure 2.4.5 Registers

• memory address register (MAR) holds address of a location in main memory.

• memory buffer register (MBR) holds data that has just been read from main memory or is to be written to main memory.

• instruction register (IR) holds the current instruction that is being executed.

• program counter (PC) holds the address of the next instruction to be fetched from memory.

• Processor also has a set of general purpose registers. They are called general purpose because their role is not defined at manufacture and can be used by programmers as appropriate.

Page 46: Learning&Teaching Systems Ppt

2 Computer Structure 2.5 Buses

• Data is transferred between memory and processor by buses.

• Address Bus– Pinpoint memory location.– One-way Bus

• Data Bus– Transfers the data– Same size as Word size– Two-way Bus

• Control Bus– Initiates and controls

operations.

Inside the processor.

Mem

o ry

ProcessorAddress Bus

Data Bus

Control UnitControl Bus

Page 47: Learning&Teaching Systems Ppt

2 Computer Structure 2.5.1 Addressability

• The Word Length is the size of data, in bits, which can be manipulated as a single unit by the processor.

• In an ideal computer the size of the data pathways and the size of memory locations will match.

• Address bus determines amount of addressable memory– 8 bit address bus can access 28 = 256 locations

– 16 bit address bus can access 216 = 65,536 locations (64K)

– 24 bit address bus can access 224= 1,677,216 locations (16MB)

– 32 bit address bus can access 232 = 4294967296 locations (4GB)

– If we have 2 bytes or 4bytes for each memory location we get for a 24 bit bus 16MB of addressable locations, but 32MB or 64MB of actual storage.

Page 48: Learning&Teaching Systems Ppt

3 Computer Performance3.2 Measuring Performance

• When we measure performance we usually mean how fast the computer carries out instructions. The measure we use is MIPS, millions of instructions per second.

• MIPS affected by– The clock speed of the processor– The speed of the buses– The speed of memory access.

Page 49: Learning&Teaching Systems Ppt

3 Computer Performance3.2.1 The Clock

• Every processor has a clock which ticks continuously at a regular rate.

• Synchronises all the components.• Cycle time measured in MHz or GHz• 200 MHz (megahertz) means the clock ticks

200,000,000 times a second (P1 -1995)• 1.4 GHz (gigahertz) is 1,400,000,000 times a

second (P4 – 2001)• 2.3 – 4+ GHz on P5 in 2004

Page 50: Learning&Teaching Systems Ppt

3 Computer Performance3. 2 Measures of Processor Speed

• Clock Speed– Generally the faster the clock speed the faster the processor – 3.2

GHz is faster than 933 MHz

• Mips – Millions of Instructions per Second– Better comparison but beware of false claims e.g. only using the

simplest & fastest instructions and different processor families.

• Flops – Floating Point Operations per sec.– Best measure as FP operations are in every processor and provide

best basis.

• Benchmark Tests– Well defined standardised routine to test the performance of a

computer. • Dhrystone – tests string and frequently used functions• Whetstone – test using arithmetic functions

Page 51: Learning&Teaching Systems Ppt

3 Computer Performance3.3.1 Data Bus Width

• A WORD is the basic number of bits a processor can handle in one operation.– If word size and data bus same size then data

transfers carried out in single operation.

• Width of data bus defines how much data can be carried in one fetch.– 32 bit data bus (word length) carries twice as much

data as a 16 bit bus and a 32 bit system should be faster.

– Most modern processor 32 bit but some AMD 64 bit.

• Width of Address bus affects the amount of memory which can be accessed.

Page 52: Learning&Teaching Systems Ppt

3 Computer Performance3.3.2 Peripherals & System Performance

• Peripherals work at much slower speeds than the CPU.– Buffers and spooling can help.– Sound cards can have their own processor,

RAM and ROM.– Video cards their own RAM (up to 256Mb)

Page 53: Learning&Teaching Systems Ppt

3 Computer Performance3.3.2 Interfaces & Input/output Devices

• An interface makes the link between the processor and a peripheral (disk drive, printer etc.).

• Peripherals work at different speeds, use different formats.• Parallel to serial conversion is often needed

– Some devices are serial – 1 bit at a time is transferred. Serial used for long (over 2m) distances.

– Some are parallel (printers) – 8 bits at a time. Used for short distances problems with skewing – loss of data integrity.

• Interface transfers data so the processor is delayed as little as possible. It has buffers to store blocks of data in transit.

• Memory mapped I/O uses memory linked to peripheral.• Spool files are used when large quantities of data are sent

to a slow peripheral, like a printer. Enables background printing.

Page 54: Learning&Teaching Systems Ppt

3 Computer Performance3.3 Memory & System Performance

• Speed of access & Word size– 15-120 nanosecond but memory speed and word size

dictated by motherboard and processor

• Amount of memory– Adding memory (upgrade) usually improves system

performance esp. graphics & multimedia.– Usually 2 slots on motherboard so max memory is 2 x largest

modules (currently 512MB largest affordable.

• Cache (pronounced cash) memory– Cache exists between memory and processor– Very fast memory speeding data transfer in shorter fetch

cycle.

Page 55: Learning&Teaching Systems Ppt

4 Peripherals4.1 Introduction

• Examine a range of hardware devices which carry out typical tasks.

• We will examine devices in terms of:-– Speed– Cost– Resolution– Compatibility

• Developments and trends in storage devices• Serial & parallel interfaces and wireless

communications

Page 56: Learning&Teaching Systems Ppt

4.2 – Input & Output Devices4.2.1 Keyboards

• QWERTY keyboard – has its roots in mechanical typewriters – to slow down operators

to avoid jamming the keys.

– Key press causes a scan code to be sent to the computer.• Sent via serial coble to keyboard controller.

• Sent as ASCII Codes

• Modified Keyboards– Used to alleviate Repetitive Strain Injury (RSI)

– Customised keypads can have more (or fewer) keys all programmable to suit particular situations.

– Adjustable split keyboard in 3 parts to allow flexibility.

Page 57: Learning&Teaching Systems Ppt

4.2 – Input & Output Devices4.2.2 Scanners

• Scanners– Flat bed scanner allows for up to A4 size documents

• Document placed face downwards on glass panel and scanned.

• Light beam reflects light from the document and photocells measure the light reflected.

• Analogue data needs converted to digital (A DC)

– Modern scanners use high bit depths to allow high resolutions.

– Images must be matched to their purpose• No point in scanning at a resolution of more than 75 dpi for

a screen based display.• No point in scanning at 600 dpi for a printer rated at 300 dpi.

Page 58: Learning&Teaching Systems Ppt

4.2 – Input & Output Devices4.2.2 Scanners

• Accuracy – measured by how close the image is to the original.– Resolution is the dots per inch (dpi) that can be detected by the

scanner hardware. A 600 dpi scanner has 600 photocells per linear inch.

– Bit depth usually 24 bits (8 red, 8 green, 8 blue).

• Capacity– Little internal buffering, rely on techniques to transfer the data.– Storage can be high e.g. A4 page at 600 dpi requires 33.28MB for

8 bit and around 100MB for full colour.

• Cost– Dropped dramatically in recent years– Bundled software often the major selling point.

Page 59: Learning&Teaching Systems Ppt

4.2 – Input & Output Devices4.2.3 Sound

• Naturally Occurring Sound– Natural sound is analogue in form

– To input sound to a computer• Software samples the incoming signal

• Coverts the signal into digital form

• Usually compresses the file

– This is called ADC – Analogue to Digital Conversion

– Simplest input device is a microphone with sound card but sound files can be taken from a CD and downloaded from the Internet.

– Sound card performs the ADC and compression

Page 60: Learning&Teaching Systems Ppt

4.2 – Input & Output Devices4.2.3 Sound sampling

• Sampling

Sampler listens to sound repeatedly and stores a number representing the amplitude each time

Sampling Rate

No of times per second sampler listens to the sound e.g. 22 kHz is 22,000 times a second

Sample Size

No of bits stored per sample e.g. 8 or 16 bit samples

Compression

Reduce storage space and reduce quality

Page 61: Learning&Teaching Systems Ppt

4.2 – Input & Output Devices4.2.3 Sound

• Accuracy– Resolution – Three sampling resolutions in common use.

• 11.025 KHz (8-bit) – voice quality• 22.05 KHz (8-bit) – Quality of AM radio• 44.1 KHz (16-bit) – CD quality stereo [data sampled 44,100

times per second]– Bit-Depth

• 8-bit sample size can hold 256 amplitudes per sample• 16-bit sample size can hold 65,536 amplitudes per sample

• Capacity– No built-in cache. Depends on fast access via the sound card to

hard disk storage. 10.09MB to store 2 mins stereo audio.– Compression required e.g. reduce sample rate / size or use a

compression technique to reduce file size.

Page 62: Learning&Teaching Systems Ppt

4.2 – Input & Output Devices4.2.4 Video

• Video Digitising– is performed by special video digitising

circuitry installed on the motherboard of the computer.

– File Formats• Quick Time• MPEG• AVi

Page 63: Learning&Teaching Systems Ppt

4.2 – Input & Output Devices4.2.4 Video

To playback video on a standard computer it will need to be decompressed by hardware or software, usually on the card.StandardsAVI – (Audio Video Interleave) or Video for Windows. Being replaced by Active Movie which will playback AVI, QuickTime and MPEG.QuickTime – CODEC s/w developed by Apple but used by both Mac and PC.MPEG – Video board uses hardware to make compression much faster.

Accuracy – Depends on Compression Technique, frame rate and resolution.Speed – Hardware must be fast enough to cope with stream of data to memory and to the hard disk.Cost – Not only card but good Multiscan Monitor required (17” and 19” nowadays)

Page 64: Learning&Teaching Systems Ppt

4.2 – Input & Output Devices4.2.5 Digital Camera

• Film replaced by an array of photosensitive cells.– Images stored electronically using photosensitive

diodes called charge coupled devices (CCDs)– Intensity of light recorded in an image.– Analogue values converted to digital using ADC

• Compression usually takes place.– Bit map files turned into JPEG

• Image transferred to computer– Serial Cable– “Floppy Disk” adapter– Can then be printed, e:mailed etc.

Page 65: Learning&Teaching Systems Ppt

4.2 – Input & Output Devices4.2.5 Digital Camera

• Accuracy– Resolution– Measured in pixels or mega pixels – the more the better. E.g. 640

x 480 pixels or in megapixel mode 1280 x 960.– Accuracy depends on the array of photosensitive cells.. The more

sensors and the smaller they are the higher the resolution.– Bit Depth– Number of bits is proportional to the number of colours that can

be represented.

• Capacity– Based on resolution and memory in the device.– Compression v altering resolution

• Cost– Dropping as they become more common.– Resolution main factor and also facilities (zoom, flash etc.).

Page 66: Learning&Teaching Systems Ppt

4.2 – Input & Output Devices4.2.6 Printers – Ink Jet Printer

• Ink-jet Printers are based on one of three different types of technology: continuous flow ink-jet, liquid ink-jet or phase-change ink-jet. We will look at how a liquid ink-jet printer works.

• Liquid ink-jet or bubble-jet, operates by squirting tiny droplets of ink onto the page. The ink is first heated by passing an electric current through a coil. In milliseconds a bubble of vapour appears, forcing a tiny drop of ink from the nozzle onto the paper.

• Resolution is typically 300 to 600 dots per inch, support the printing of text and graphics, colour and a range of shades.

• Speed is pretty slow with a range of 4 pages per minute to 8 pages per minute, depending upon the model.

Page 67: Learning&Teaching Systems Ppt

4.2 – Input & Output Devices4.2.6 Printers – Laser Printer

• This type of printer uses lasers to "write" a page image onto a special drum as an electrostatic charge. The charged drum attracts toner particles which are transferred to the page and heated to set the image.

• Usually a page is composed in the printer (often PostScript).• Capacity

– On board RAM & processor needed to compose pages. The more RAM the higher quality graphics can be printed.

• Resolution

– 600 dpi quite common (300 cheaper, 1200 expensive)

• Speed

– The faster in pages per minute (ppm) the dearer ranges from 4 ppm to 20 ppm with 12 ppm being about average.

Page 68: Learning&Teaching Systems Ppt

4.2 – Input & Output Devices4.2.7 Multiscan Monitor

The CRT is the basis of most visual display technology.

The screen is arranged as a series of lines of dots and each dot is made up of three small areas of red, green and blue called a triad. The intensity of light shone on each triad determines the actual colour of the pixel.

The picture is redrawn between 50 and 100 times a second. This is the refresh rate.

A monitor which operate at different refresh rates is known as a multiscan or multisync monitor. The refresh rate is controlled by the video adapter.

Screen resolution is quantified by the dot pitch, the distance between the dots on the screen. Typically between 0.28 and 0.38mm, corresponding to 100 to 70 dpi.

Page 69: Learning&Teaching Systems Ppt

4.3 Selecting hardware to match operational requirements

• When given a scenario like setting up a library system you will have to consider:-– RAM requirements

• Memory must be enough to run the software and support all the data in the system.

– Backing Storage• Big enough to hold the O/S, Applications and data.

– Processor Performance• Usually as fast as you can afford but must be fast enough to

support all the applications recommended.– Peripherals

• Specify type of printer, monitors etc.– Communications

• Attached to a network or set up a new network. Internet connection (broadband?)

Page 70: Learning&Teaching Systems Ppt

4.4 Buffers and Spoolers4.4.1 Buffering

• Buffer• area of memory used to transfer data between the computer

and a peripheral.• Used when a fast acting part of the system exchanges data

with a slow peripheral• Buffer stores the data until peripheral can act on it.

– Peripheral Buffer• E.g. printer – very slow. Has on board RAM to store the

incoming data (laser may have 32MB)• E.g. Mass storage (disks). Data transferred in blocks so

whole block transferred, managed by buffering

– Interface Buffer• Universal Asynchronous Receiver/Transmitter (UART)

handles transfer of serial to parallel and vice versa.

Page 71: Learning&Teaching Systems Ppt

4.4 Buffers and Spoolers4.4.2 Spooling

When large amounts of data are to be sent to a peripheral device, or when the peripheral is shared across a network then spooling is a preferred method of compensating for the difference in speeds of the processor and the peripheral.

Spooling involves the input or output of data to a tape or a disk.

This, for example, allows output to be queued from many different programs and sent to a printer by a print spooler (special operating system software).

The print spooler stores the data in files and sends it to the printer when it is ready, using a print queue. Once the data has been printed it is deleted from the storage device.

Page 72: Learning&Teaching Systems Ppt

4.5 – Storage Devices4.5.1 Magnetic

Magnetic storage devices include hard disks, floppy disks, Zip disks and magnetic tape.

They are called magnetic storage devices because their recording surfaces are coated with a material that responds to magnetic fields to enable data to be stored.

Storage devices can be fixed or removable. Removable storage devices allow the user to disconnect the device and physically transport data from one computer to another.

Varieties of removable devices include the Iomega and Syquest hard disks and Jaz cartridges.

Page 73: Learning&Teaching Systems Ppt

4.5 – Storage Devices4.5.1.1 Magnetic Disk

All the sectors around the disk, equidistant from the centre, form a track. With multiple platters, the collection of tracks on each platter, equidistant from the spindle is called a cylinder. When data is to be read or written, the read and write heads are moved to the appropriate track, where they wait until the relevant sector spins past.

Speed

Rotational speed of hard disks has improved, from 3000 (rpm) of early disks, to current rotational speeds of 5,400 and even 7,200 rpm.

Performance is also measured in terms of the rate of data transfer from the disk.

SCSI - transfer rate 5Mb/sec

Ultra Fast SCSIIII transfer rates - 40 Mb/sec.

Page 74: Learning&Teaching Systems Ppt

4.5 – Storage Devices4.5.1.1 Magnetic Disk

Capacity

Hard disks have improved tremendously in their capacity to store data in the last 10 years. From the modest 10Mb disks of the early 80s to current 80 Gbyte disks on many of today’s PCs.

Access

The hard disk is a direct access device, meaning that data can be directly read or written to any portion of the disk.

Page 75: Learning&Teaching Systems Ppt

4.5 – Storage Devices4.5.1.2 Magnetic Tape

Storing data on tapes used to be the only solution to backing up hard disks of large capacity. Now, with large, removable magnetic disks and optical CR-RW technology, this is no longer the case.

However, removable storage media is comparatively expensive, costs 10 times tape. Tape, therefore, still has the edge in this market.

Tape is read and written on a tape drive. Data is written to tape in blocks with inter-block gaps between them. A single operation writes each block

Data is stored on magnetic tape as magnetised regions on the surface of the tape induced by the magnetic recording head. To read data, the tape passes under the read/write head and the stored magnetised regions produce very small voltages in the head, leading to a current in the head coil. This current can be analysed to give a representation of the stored binary data.

Page 76: Learning&Teaching Systems Ppt

4.5 – Storage Devices4.5.1.2 Magnetic Tape

Capacity

Magnetic tapes have large capacities, reaching up to several gigabytes and come in a variety of sizes and formats.

Since their introduction, tape drives have passed through many stages of improvement with extremely reliable Digital Audio Tape (44.1 kHz, 16-bit record and playback DAT) drives representing the current state of the art. A 4mm DAT tape can now store up to 24 Gbytes of data!

Access

Tapes are sequential access devices. Accessing data on tapes is therefore much slower than accessing data on disks.

They are not suitable as storage media for applications where data needs be used regularly - where a disk is a more appropriate medium. Because tapes are so slow, they are generally used only for long-term storage and backup.

Page 77: Learning&Teaching Systems Ppt

4.5 – Storage Devices4.5.2 Optical Storage

CD-ROMA plastic disk is scanned using a laser. It reflects off pits on the surface differently from lands (bumps)

Re-writeable CD-ROM becoming more common.

Capacity – About 650Mb

Speed – from single (150KB/sec) to 32x (or even 40x). The x refers to the times faster than CD Audio.

Cost – CD-ROM Drives fairly cheap.

Access – Always random

Page 78: Learning&Teaching Systems Ppt

4.5 – Storage Devices4.5.3Magneto Optical Storage

Based on a combination of magnetic and optical technologies.Active layer is magnetic material.Recording – magnetic material heated beyond a particular temperature by laser, allows magnetisation to be reversed.Reading – laser operates at much lower temp and reflected beam rotated by magnetic field and detected by read head.Capacity – 3.5” disks of 128, 230 and 384 MbSpeed – Varies as multiple of standard single speedCost – decreasing with time with different formats and capacities becoming available.

Page 79: Learning&Teaching Systems Ppt

4.5 – Storage Devices4.5.4 Solid State Storage Devices (SSSD)

Solid-state storage devices are made up entirely from electronic components i.e. they have no moving parts. They are also called RAM disks, as they take the place of a magnetic disk as a mass storage device. They can be in the form of a plug-in card or cartridge containing memory chips. The chips of a SSSD are typically static RAM or Electrically Erasable Programmable ROM (EEPROM or Flash EPROM). SSSD are used with devices where space is at a premium e.g. in a camera, or when portability is desirable e.g a USB flash drive.

Page 80: Learning&Teaching Systems Ppt

4.6 Interfacing (1)Interfacing means making the hardware connections so that two devices can communicate effectively.Data Format – data has to be consistent e.g. serial output to a serial device. Interface makes data consistent (also ADC)Parallel/Serial – time & space division. Time separates transmission of actual bits and space can be used for multiple bits in parallel. Serial can be slow but use of fibre-optic cable very fast.Voltage – different voltage levels between peripheral & computer need to be ironed out.Protocols – rules that govern transmission of data. E.g. no of bits per packet, voltage levels etc.

Page 81: Learning&Teaching Systems Ppt

4.6 Interfacing (2)

Status signals from a device indicate what the device is doing at any given moment. E.g.if a device is unable to receive data, then a transmitting device can delay transmission and retry later.

Speed - Different devices send and receive data at different rates. The devices agree a rate prior to transmission by utilising a protocol.

Wireless communications can be achieved using WAP (Wireless Application Protocol) - a specification for a set of communication rules to standardise the way that wireless devices, such as cellular telephones and radio transceivers, can be used for Internet access, including e-mail, the World Wide web, newsgroups, and Internet Relay Chat (IRC). Interconnecting devices centred around an individual person is called a wireless personal area network (WPAN). Typically, a WPAN uses technology that permits communication between devices in a

short radius of about 10 metres. One such technology is Bluetooth.

Page 82: Learning&Teaching Systems Ppt

5 Networking5.1 Introduction

• This unit on Networking considers the basic system topologies and functions that allow computers to operate on a network.

• Various types of networks are considered ranging from small peer-to-peer networks to LANs, WANs and the Internet.

• Comparisons are made between the various networks in terms of type and scale and the effects of network failures.

Page 83: Learning&Teaching Systems Ppt

5 Networking5.2 Networks

• connecting two or more computers together turns them into a computer Network.

• connecting two computer networks together creates an Internetwork.

• connecting millions of computers and computer networks together forms a huge internetwork or what we now refer to as the Internet.

• Economic and Social reasons for networks – desire to communicate probably most powerful reason.

• We take e-mail, Internet, Video conferencing for granted but none of the were obvious when networks first appeared.

Page 84: Learning&Teaching Systems Ppt

5 Networking5.2 Categorising Computer Networks

• Computer networks can be categorised by the rate at which data can be transferred between machines (Bandwidth), and the physical distance between them.

• Greater distance suggests lower bandwidth.• Local Area Networks (LANs) – high bandwidth.• Wide Area Networks (WANs) – low bandwidth

(even broadband is slow compared to typical modern LAN bandwidth)

Page 85: Learning&Teaching Systems Ppt

5 Networking5.2.1 Local Area Networks (LANs)

• LANs very popular now and the technology has become much cheaper.

• Sharing resources– LAN belongs to single organisation on a single site so a high

level of trust develops.– Share printers, scanners, hard disk space, applications and

Internet connections

• Sharing Information– Files and data. E-mail and appointments diaries, Intranet.

• Sharing Services– Centralised backup, technical support, anti-virus, software

installation and update.

Page 86: Learning&Teaching Systems Ppt

5 Networking5.2.1 (LANs) - Hardware

• Reduced Hardware costs have helped dramatic increase in LANs– Network Interface Card – every PC on network needs

a card to interface with the network. Provides the machine with a unique address on the network (MAC)

– Hubs – typically 24 ports, each PC connects to port. Can be slow and cause bottlenecks.

– Switches – intelligent hubs (24 or racks of 24 x 8) – help reduce bottlenecks.

– Software is now much cheaper. Each station needs a network licence and server software needs to be licensed for the number of stations on the network

Page 87: Learning&Teaching Systems Ppt

5 Networking5.2.1.1 Sharing Resources on a LAN

• Hardware resources– Expensive printers (laser and colour laser), plotters

and hard disks not only shared to save money but installation and maintenance cheaper and easier.

• Software Resources– Can set up an Intranet, use internal e:mail and

Newsgroups.

– Also search facilities across the network.

– Software can be shared according to licensing agreements.

Page 88: Learning&Teaching Systems Ppt

5 Networking5.2.1.2 Sharing Services on a LAN

• Network Manager– Controls the network from any location– Controls software installation and upgrades

centrally.– Control shared Internet access and Firewall

protection.– Provide automatic virus protection– Do regular full backups and frequent (daily)

incremental backups.

Page 89: Learning&Teaching Systems Ppt

5 Networking5.2.2 Wide Area Networks - WANs

• A WAN allows an organisation to maintain its management structure despite being geographically distributed around the world.

• WAN’s & Internet increasingly popular as cost of communication drops.

• Easier and cheaper to conduct business and communicate around the world.

Page 90: Learning&Teaching Systems Ppt

5 Networking5.2.2.1 Metropolitan Area Networks - MANs

• A MAN is a wide area network which has a city or metropolitan area as its geographical limit. – MANs are usually under the control of a single local

authority– typically consists of a WAN which is administered centrally,

providing networked services to local government offices, schools, libraries, community centres etc.

– advantages of a MAN are the economies of scale and the improved communications which can be achieved by connecting local government offices together.

– Local authorities usually host an Intranet for use of a staff on-line newsletter

– MANs rely on a high bandwidth and are really only suitable for Urban areas. Rural authorities have to use lower bandwidths (e.g. up to 2 Mbits/sec)

Page 91: Learning&Teaching Systems Ppt

5 Networking5.2.2.2 Improved communications on a WAN

• E:mail allows users to communicate.– Text and graphic messages

– File transfer by attaching files to e:mails

• Newsgroups are electronic bulletin boards– Organised by threads of messages

– Can be set up and accessed if you have access to a News Server

• Electronic Forums– Similar to newsgroups but controlled by a particular organisation e.g. on

the BBC website forums exist for news, sport etc.

• List Servers– Use e:mail to distribute messages rather than the user having to log onto

a forum.

Page 92: Learning&Teaching Systems Ppt

5 Networking5.2.2.2 Improved communications on a WAN -2

• File Transfer Facilities– Being able to transfer files over a WAN means that if the product

you sell can be stored or transmitted electronically, then you can sell it to anyone who is connected to the Internet without having to transfer a physical object.

– Items on sale over the Internet which can be electronically distributed are things like software, music, photographic images, video and information in the form of data files.

– Some companies are now offering services such as remote backup and data storage over the Internet.

• Distributed Processing– Different parts of a suite of programs can be run on different

machine across the network.– Allows software vendors to rent software rather than sell it.– Search for Extraterrestrial Intelligence (SETI) uses volunteers

whose computers process distributed data when idle.

Page 93: Learning&Teaching Systems Ppt

5 Networking5.2.2.3 Access to information on a WAN

• Information Services– Internet access means you have instant access any time of the

day or night without having to travel, to news, technical information and other data.

– Use a search engine on the web e.g. google

• Entertainment Services– Internet radio, music channels and network games all possible on

a low bandwidth. Information is broadcast once rather than being requested and transmitted separately for each user.

– Video on demand needs a high bandwidth and other services benefit from high bandwidth.

Page 94: Learning&Teaching Systems Ppt

5 Networking5.2.2.4 Teleworking

• Tele-working– means working from home instead of traveling to an office

every day– Use communications technology to keep in touch with your

employer. – Can work in different country. – Any job where the results of your labour can be transmitted

electronically can be classed as teleworking.

• Video conferencing– Allows people to see and hear the people they are having a

meeting with.– Need specialised equipment and a high bandwidth.

Page 95: Learning&Teaching Systems Ppt

5 Networking5.2.2.4 Teleworking – advantages and disadvantages

• Advantages– Employee saves time and money travelling, on childcare and can

live in cheaper housing away from city. Deliver your work electronically.

– Employer saves money on office space; tele-workers usually work harder – no distractions. Save wages by employing people in countries where wages are low.

• Disadvantages– Employee feelings of isolation, office chat and miss out on

promotion. May work much harder and put in more hours than being paid.

– Employer needs to pay for training and installation of communications equipment. Security issues if employees log into the company network from home

Page 96: Learning&Teaching Systems Ppt

5 Networking5.2.3 Intranets

• Intranets– Used by organisations to distribute

information on a LAN– Often used as a portal for the Internet and

difficult to tell whether you are on the LAN or WAN

– Usually private and internal– Can be used by companies with branches all

over the world as secure information service.

Page 97: Learning&Teaching Systems Ppt

5 Networking5.2.4 Mainframe Networks

• Mainframe network with “Dumb” terminals– Original communication method everyone used the same

computer.– Terminal has no processing power.– Mainframe processor, memory and disks used by each terminal

in turn.– Current mainframes combined with conventional client-server

networks. Client access mainframe via terminal emulation software

• Thin client Networks– Low power workstations run applications on the server.– Load O/S and software from the server.– Server must be very powerful high spec with lots of memory.– Useful for single application stations e.g. Internet Browser only.

Page 98: Learning&Teaching Systems Ppt

5 Networking5.3 Network Operating Systems

• Improved networking operating systems– Easier to connect computers together– Modern O/S has networking built-in– Common standards such as TCP/IP has made networking easier and cheaper.

• Main Functions of Network O/S– Allows users to treat resources on other computers

as if they were local resources• Mapping directories or drives of remote machines• Copying remote files to local drives• Managing different operating systems on the

network• Ensuring data integrity• Providing privacy and security of network

resources

Page 99: Learning&Teaching Systems Ppt

5 Networking5.3.1 Client-Server Network

• Central server or servers– Usually most powerful computers on the network.

– RAID drives and lots of memory

– Often run a different O/S to clients

– Provide access to shared resources without affecting the performance of any one machine.

– May act as mail servers, Intranet or proxy servers, networked storage or applications servers or news servers.

Page 100: Learning&Teaching Systems Ppt

5 Networking5.3.1 Client-Server Network Services

• Security– Network software allows only users with correct passwords to access the

system and files they have permission to use.

• Networked storage– You can access centrally stored files from any machine on the network.

• Communications– Internal & external e:mail, Intranet services.– Internet and Firewall services

• Applications– Applications stored centrally mean you always have access to that

application even if it is not installed on your workstation.

• Support Services– Virus checking, remote control, remote monitoring and central backup

strategy.

Page 101: Learning&Teaching Systems Ppt

5 Networking5.3.1.1 Advantages of Client-Server Network

• Centralised control– Of software installation– Over software versions– Ability to configure stations to a common format.

• Resources shared– Hard disk space, expensive peripherals (laser & colour laser

printers), modems and routers.

• Security– Access to file and other resources easily implemented.

• Backup routines– Easy to backup central server to tape either full or incremental

backup

• Ease of expansion– Most LANs can easily be extended by adding cables and stations.

Page 102: Learning&Teaching Systems Ppt

5 Networking5.3.1.1 Disadvantages of Client-Server Network

• Cable Faults– In a bus topology can bring down whole sections of

the network

• Server Failure– Will bring down the entire network.

• Software incompatibility– Some network s/w is proprietary and difficult to link

to other LANs

• Management & Control– The bigger the network the more highly trained and

expensive the technician or controller is to employ.

Page 103: Learning&Teaching Systems Ppt

5 Networking5.3.2 Peer to Peer Networks

• Peer to peer– All machines on network of equal status.– No server on network– Suitable for small (up to 5 stations) LANs.– Used in home situations– Also in small offices where all staff are trusted– Security difficult to implement– Bottlenecks can occur if more than one user wishes to

access the same resource (e.g. hard disk) at the same time.

Page 104: Learning&Teaching Systems Ppt

5 Networking5.3.2 Advantages of Peer to Peer Networks

• Peer to peer networks are cheap and easy to implement.

• Modern operating systems like Windows 98 and Apple OSX have this sort of networking built in

• you do not have the expense of providing a dedicated machine to function as a server

• If security is not a problem, then it is very convenient to be able to share files, access peripherals and have several people using the same Internet connection without having to set up a more complex network structure.

Page 105: Learning&Teaching Systems Ppt

5 Networking5.3.2 Disadvantages of Peer to Peer Networks

• Organisation and management become difficult when several machine connected together and sharing files

• Versions of installed software are difficult to control.

• Backup difficult as files distributed across several machines.

• Proper security difficult as no easy way to restrict access to shared files or resources.

Page 106: Learning&Teaching Systems Ppt

5 Networking5.3.3 Stations and servers

• Network stations and servers are nodes on the network.• Servers

– A server usually refers to a program and the computer it is running on.

– Servers provide access to resources on a network. – On a network, one machine may provide access to a number of

different resources– There may be a number of different machines acting as servers,

each one providing access to different resources.

• Machine identification– All nodes on a network, whether they are servers or network

stations, will have a unique identity which identifies that particular machine.

– The type of identity a node has will be determined by the protocols running on the network.

Page 107: Learning&Teaching Systems Ppt

5 Networking5.3.3 Stations and servers - 2

• Machine identification – Ethernet Standard– Every network interface card has a Media Access

Control (MAC) address – 6 bytes

– In TCP/IP every node has its own IP address – 4 bytes.

– Nodes may also have a network name.

Page 108: Learning&Teaching Systems Ppt

5 Networking5.3.3 Stations and servers – Network Servers

• File Server– Controls log-ins and gives users access to files

• Print Server– Allows a user access to a shared printer.

• Applications Server– Distributes applications around the network (read only access) to users.

• E:mail Server– Stores users’ e:mails and account details. Regularly contacts external e:mail

server to send and receive external mail.

• News Server– Stores and forwards messages posted by users on a bulletin board system.

• Web Server– Transmits and stores Web pages and provides access to to an Intranet.

• Proxy Server– Connects a LAN to the Internet. Allows many users simultaneous access.

Page 109: Learning&Teaching Systems Ppt

5 Networking5.4 Network Topology

• A network topology describes the arrangement of computers to form a network. The actual physical layout is determined by the buildings or other locations that house the parts of the network.

• We will look at four local area network topologies.

– Bus

– Star

– Ring

– Mesh

Page 110: Learning&Teaching Systems Ppt

4 Factors Affecting Performance4.6. Network Topology - Bus

Bus Topology- easy to expand and cheap to set up.

e.g. Ethernet in school or college.

5 Networking5.4.1 Network Topology - Bus

Data Security – data encryption methods used. High collision rates requiring re-transmission

Bandwidth – available bandwidth shared amongst all stations accessing network. Data compression used.

Reliability – fault in one station has no effect on rest. Cable fault will lose all that section.

Cost – relatively cheap

Page 111: Learning&Teaching Systems Ppt

5 Networking5.4.2 Network Topology - Star

Data Security – higher security as data routed only to the computer that is to receive it. No collisions.

Reliability – if a link fails then only that station is off the network. Failure to central controller is fatal.

Cost – can be quite expensive due to high cost of cabling. Popular in small self-contained networks as not too expensive (small office).

All nodes connected to one central node that routes traffic to the appropriate place.

Page 112: Learning&Teaching Systems Ppt

5 Networking5.4.3 Network Topology - Ring

Ring Topology

Similar to Bus in many respects with similar security problems.

Control system in charge of transmissions and stations guaranteed access to transmissions. Collisions avoided by use of a token

Additional expense for control s/w and system. May have to wait turn to transmit.

Network down to add station, but few if any crashes.

Page 113: Learning&Teaching Systems Ppt

5 Networking5.4.4 Network Topology - Mesh

Mesh Topology

Fault in one cable does not affect network.

Multiple transmissions

Lots of wiring

Expensive

Excellent performance

Page 114: Learning&Teaching Systems Ppt

6 Using Networks6.1 Introduction

• This unit considers:-

• The hardware and software required to use networks

• The associated communications issues.

• The misuse of networks is also considered and the implications discussed.

Page 115: Learning&Teaching Systems Ppt

6 Using Networks6.2.1 Network Hardware – The Hub

• A hub in an Ethernet network is a multi-port repeater.• Hubs are most often used on networks using UTP

cabling as the limit for this type of cable is 100 metres.• A hub will divide the network up into a series of

different segments, reducing the likelihood that a cable fault will bring the whole network down.

• Hubs are commonly supplied with 12 or 24 ports, and are suitable for distributing a UTP cable to a room or office full of network stations.

• A hub also functions at the lowest level of the OSI networking model, the Physical Layer.

Page 116: Learning&Teaching Systems Ppt

6 Using Networks6.2.2 Network Hardware – The Switch

• A switch (sometimes called a switched hub) divides the network up into collision domains. A Switch is often regarded as an intelligent Hub

• A Collision occurs when a station begins transmission and then receives the beginning of a frame from another station.

• The station will immediately stop transmission and issue a JAM signal onto the segment.

• This will indicate to the other transmitting station that a collision has occurred and both stations will back off for a random amount of time and try to re-transmit.

• This back-off time is dependent on the number of consecutive collisions that were issued before a successful transmission.

• The more collisions, the longer the maximum back-off time. • This mechanism requires that stations be close enough together for

each station to see any possible attempted transmission before the first 64 bytes of its frame have been transmitted.

• This is because 64 bytes is the minimum frame size for an Ethernet network.

Page 117: Learning&Teaching Systems Ppt

6 Using Networks6.2.3 Network Hardware – The Router

• A router works like a bridge on inter-networks using IP addresses.

• Routers are used to link Ethernet networks to the Internet via fibre or ISDN and ADSL lines.

• Routers can be programmed remotely to restrict access to certain IP addresses.

• Possible to connect over 200 stations to the Internet and share the bandwidth intelligently.

Page 118: Learning&Teaching Systems Ppt

6 Using Networks6.2.4 Network Hardware – Network Interface Card

• Network Interface Card (NIC)– Circuit board installed inside a computer to

connect it to the network.– NIC must be designed for the network it is

connected to e.g. Ethernet card for Ethernet LAN.

– Provides a dedicated full time connection to the network.

Page 119: Learning&Teaching Systems Ppt

6 Using Networks6.3 Hardware & Software Factors

• 6.3.1 Processors– Processor hungry applications run on networks

(Browser, P2P. Virtual Private Networks)

– Features to consider• Performance (High Speed and throughput)

• Flexibility (Ability to adapt to changing O/S and Application S/W)

• Power (High power leads to heat – need cooling etc.)

• Software Support (compilers, operating systems and libraries available to the processor)

Page 120: Learning&Teaching Systems Ppt

6 Using Networks6.3 Hardware & Software Factors

• 6.3.2 Memory– Factors defining the memory that supports a network processor

can be categorised as follows:• Shared, distributed or a combination• Size and type of memory used• Caches that are included on or off the chip

– Memory is available as RAM, on the NIC and shared from a server. Also can use a NMS (Network Memory server) – provides RAM as fast network memory paging.

– Special Features• Memory / buffer controllers• Packet management units• Address generation units

Page 121: Learning&Teaching Systems Ppt

6 Using Networks6.3 Hardware & Software Factors

• 6.3.3 Backing Storage– Local storage on PC and remote network storage.– Hard disks used throughout– Specialised RAID systems used on shared network

disks– Some systems separate from main server and accessed

via a storage server.– Shared drives are assigned a network address allowing

them to be accessed. E.g. Each “Home” drive has an address tied in with its owner’s account.

Page 122: Learning&Teaching Systems Ppt

6 Using Networks6.3 Hardware & Software Factors

• 6.3.4 Browsers– A browser is the application program that enables a

computer user, to look at, and interact with World Wide web.

– It makes requests to web servers throughout the Internet. – Netscape Navigator and Microsoft Internet Explorer are the

only two browsers that the vast majority of Internet users are likely to use.

– The notion of a browserless web describes communication over the World Wide web between programs rather than between people using browsers and web servers and does not involve an interactive user.

Page 123: Learning&Teaching Systems Ppt

6 Using Networks6.3 Hardware & Software Factors

• 6.3.5 Network Operating Systems– Server runs a specialised NOS

• Windows NT, Server 2000, Server 2003• Unix based variations including Linux (open source).

– Workstations run client based O/S• NT for Workstations, Widows 98, 2000, XP• Server can cope with mixture of client O/S on the network

(inc Mac OS)

– Transparency needed e.g.• Printing or Saving a file should be the same operation

whether locally or on the network.• Achieved using a network driver called a Redirector

Page 124: Learning&Teaching Systems Ppt

6 Using Networks6.4 Technical Factors Affecting Communications

The technical factors which have led to the growth of computer networks have emerged in parallel with the economic factors which have driven the research into networking technology.

As the economic demand or networking technology has grown, the trend has been for equipment prices to fall and performance to increase.

Although still in its infancy, the development of wireless networking is likely to follow the same pattern.

Page 125: Learning&Teaching Systems Ppt

6 Using Networks6.4.1 Cabling

• Cabling can affect bandwidth and different cabling is used in different situations.– As more networks are installed the cost of

cabling has fallen.– Different cables used in different situations

(even on one network)• Ethernet uses UTP cabling (developed by Xerox)

running at 100Mb/sec.• Fibre Optic cable used to join areas of the network

to the server. Very fast (e.g. 2Gb/sec) allowing many stations to share the bandwidth. Connects Hubs/Switches to a server.

Page 126: Learning&Teaching Systems Ppt

6 Using Networks6.4.2 Bandwidth

• The term bandwidth describes the rate at which data can be transmitted over a segment of a network.

• As users share networks the Bandwidth available to each user depends on the number of users. To maximise bandwidth either increase overall or reduce the demand.

– Reducing the demand

• Data Compression – remove redundant information

• Caching – Commonly viewed or used data stored locally to avoid transmission e.g. Internet home page. Most of a network profile.

• Broadcasting - - if data such as video or audio is transmitted live, then although the user only has one chance of viewing it, the bandwidth requirements will be a lot less than if users are continually downloading their own copy of the data.

– Increasing capacity

• Fibre Optic and satellite links on a LAN, ISDN and ADSL on the Web.

Page 127: Learning&Teaching Systems Ppt

6 Using Networks6.4.3 Wireless

• Features– Slower than conventional cabling.– Convenience of being able to move around rooms and

buildings.– Quick and easy to install– Bluetooth allows devices such as mobile phones,

printers and laptops to form a mini network when they are in close proximity.

– Mobile phones can access the Internet via Wireless Application Protocol (WAP)

Page 128: Learning&Teaching Systems Ppt

6 Using Networks6.5.1 Misuse of Networks – Social Issues

– Personal privacy• The monitoring of individuals’ Internet and email use is a

contentious issue. Many governments would like to have access to this sort of information. Many individuals would not like them to have this kind of access. With modern communications networks it is theoretically possible to trace the movements of any individual around the world - they use cash machines, pay with credit cards, use the Internet, use mobile phones, appear on surveillance cameras, and may use electronic road tolling systems. All of these systems could be combined to track an individual’s movements.

• Even organisations who manage LANs are becoming concerned about the security and employment issues surrounding email, and are starting to monitor all email activity on their networks to make sure that their employees are not divulging company secrets or using the network facilities for their own personal use.

Page 129: Learning&Teaching Systems Ppt

6 Using Networks6.5.1 Misuse of Networks – Social Issues

• Encryption– Encrypting data is a method of coding it, in order to make it

difficult or even impossible for someone to read it unless they have authorisation from you. Some governments make encrypting data illegal, others regard it as an individual right. There is a trade-off between security and convenience.

– Encryption is classified according to the number of bits needed for the key used to encode the data. The more bits that are used, the longer it takes for the code to be cracked. As computers increase in power, the time and resources needed to crack such codes decreases, so the minimum encryption key size needs to increase as computer technology improves.

– At the moment email on most networks is un-encrypted and insecure, as messages are sent as plain ASCII text. One popular and free encryption system currently available is Pretty Good Privacy (PGP), although until recently PGP was regarded as “mutinous“ by the USA government and its inventor was prosecuted for allowing details of how his system worked to be posted on the Internet.

Page 130: Learning&Teaching Systems Ppt

6 Using Networks6.5.1 Misuse of Networks –Disconnection

• Disconnection– Many people feel that the Internet

has accentuated the difference between the rich and the poor. People in western countries are described as "Information rich" whereas most people in the Third World are "Information poor", since connecting to to the Internet requires expensive equipment and access to a networking infrastructure which does not exist in many poor countries.

Page 131: Learning&Teaching Systems Ppt

6 Using Networks6.5.1 Misuse of Networks – Social Isolation

– Social isolation• There is a fear that the increased use of

electronic communication will mean that many people will become physically more isolated from each other. The Internet encourages the creation of global communities, but may result in neighbours not seeing each other for weeks on end.

Page 132: Learning&Teaching Systems Ppt

6 Using Networks6.5.2 Misuse of Networks – Ethical Issues

• Netiquette– There are several conventions and a whole new

vocabulary which has developed with regard to how you should behave on Internet newsgroups, using email, etc. Simple rules such as not sending "spam" (unsolicited commercial email), not shouting (writing in capital letters) and respecting people’s privacy may seem obvious, but it is easy to make mistakes without realising it. The best policy when subscribing to a newsgroup or joining a list server is to "listen" quietly for a while to see how others behave before you submit any contributions yourself.

Page 133: Learning&Teaching Systems Ppt

6 Using Networks6.5.2 Misuse of Networks – Ethical Issues

• Misrepresentation– The ability to post

messages on newsgroups or discussion lists anonymously means that offensive statements can be made without the person making them being held to account.

Page 134: Learning&Teaching Systems Ppt

6 Using Networks6.5.2 Misuse of Networks – Ethical Issues

• Surveillance and monitoring– The email you send and receive, the

pages you view and the files you download via the Internet can all be logged by a number of organisations. These organisations may not always have your best interests at heart.

Page 135: Learning&Teaching Systems Ppt

6 Using Networks6.5.2 Misuse of Networks – Ethical Issues

• Chatrooms– Are popular with young people who use the Internet as

they enable users to communicate in real time with others from all over the world. A chatroom on the Internet is an area where users can type messages which can be read immediately by anyone else connected to the same server. Communication is slow because of the need to type the messages, but this disadvantage is outweighed by the immediacy of the system. One problem with chatrooms is that there is no way of verifying that the person you are communicating with is who they say they are. They may have lied about their age, their sex, or why they are interested in chatting with you.

Page 136: Learning&Teaching Systems Ppt

6 Using Networks6.5.3 Misuse of Networks – Network Etiquette

• Netiquette– While there are no international standards of

behaviour on networks, there is an accepted code of conduct often referred to as netiquette.

– Netiquette is usually just common sense. Network administrators are the only users of a network who have access to all the files on a network - it is considered unprofessional for a network administrator to access any personal file unless they are required to do so to perform their job.

Page 137: Learning&Teaching Systems Ppt

6 Using Networks6.5.3 Misuse of Networks – Network Etiquette Rules

• Some network rules of etiquette on a LAN are:– do not use other peoples identities and passwords; – do not attempt to access files which are not yours; avoid

wasting disk storage space or bandwidth unnecessarily. (Keeping your entire music collection in MP3 format on your network drive or downloading large video files at peak times of Internet use are activities unlikely to endear you to your network administrator);

– avoid causing other people unnecessary work. It may be entertaining to install the latest screen-saver on your network station, but the next user is unlikely to appreciate having to re-boot the machine because they do not know the password, and the network administrator is unlikely to enjoy un-installing it.

Page 138: Learning&Teaching Systems Ppt

6 Using Networks6.5.3 Misuse of Networks – Network Etiquette 2

• Some network rules of etiquette on a WAN are:– Avoid wasting bandwidth by sending unnecessary emails,

attaching uncompressed files or creating web pages with large or unnecessary graphics on them;

– Be aware that the Internet is used by people with a large variety of different machines running different operating systems and different browsers. If you want other users to access information, try to store the files in a format which is going to be easy to read for everyone. ASCII code is the simplest format for text. CSV is the simplest format for a database;

– Try to create web pages which are readable no matter what resolution your monitor is set to use.

Page 139: Learning&Teaching Systems Ppt

6 Using Networks6.5.3 Misuse of Networks – Network Etiquette

• Email etiquette– email messages should be concise and to the point;– remember to make the subject line relevant to the message you

are sending. – do not repeat email messages. Give the recipient time to read

your email and to respond to it;– be professional and careful what you say about others. – email is not a secure means of communication as it is transmitted

without encryption. – when being humorous, use emoticons to express humor. (Tilt your

head to the left to see the emoticon smile) :-) means happy face;– typing mail messages all in upper case is considered SHOUTING!

and rude;– do not send people chain letters or hoax virus warnings. Such

email just reduces the bandwidth available for everyone;– avoid sending anyone spam;– do not attach large files to an email message without asking the

recipient’s permission first.

Page 140: Learning&Teaching Systems Ppt

6 Using Networks6.5.3 Misuse of Networks – Network Etiquette

• Usenet etiquette– All of the email etiquette rules apply to Usenet. – remember to be courteous and respect others:– when quoting someone else, remove what is not directly

applicable to your reply.– Do not automatically quote the entire body of messages you are

replying to when it is not necessary. Leave only the minimum necessary to provide context for your reply.

– it is extremely rude to forward personal email to mailing lists or a newsgroup without the original author’s permission. only messages meant to be read by the entire group should go to the list. Send a personal mail message aimed at one person to that person.

– posting an advertisement in news groups, unless it is specially chartered for that purpose like the for-sale newsgroup, or sending unsolicited advertisements with email is considered rude.

Page 141: Learning&Teaching Systems Ppt

6 Using Networks6.5.3 Misuse of Networks – Network Etiquette

• Listserver etiquette– All of the Usenet etiquette rules apply to listservers, though

as your messages will arrive as emails to the members of the list, it is best to be even more careful than when posting to a newsgroup. Some list servers generate large amounts of email every day. It is often wiser to receive the messages in digest form as one single email containing all the messages posted that day.

– Here are a few guidelines:• when signing up for a group, save your subscription

confirmation email for reference, so that if you go on holiday or no longer wish to receive the list messages, you will have the subscription address for suspending mail;

• if you lose interest in a list-server, un-subscribe from it so that the messages being sent to you do not clog up the network.

Page 142: Learning&Teaching Systems Ppt

6 Using Networks6.5.3 Misuse of Networks – Network Etiquette

Page 143: Learning&Teaching Systems Ppt

6 Using Networks6.5.4 Hacking

• Controlling access to the network– The network operating system is responsible for security

on the network. The most obvious example of this is when a user logs on. The user must supply an identity and a password. The operating system compares the data entered with the identities and passwords in its database and if the two do not match up then it will not allow that user any access to the resources on the network.

– If the identity and password do match, then the resources which the user has access to will depend on the level of access that user has been given by the network manager.

– The access a user has to resources depends on that user’s level of permissions.

Page 144: Learning&Teaching Systems Ppt

6 Using Networks6.5.4 Hacking

• Controlling access to network resources– The easiest way to control different levels of access is to divide users

into groups. Each group can have different levels of access to the shared network resources. Such as a printer or need to be able to alter files in a particular section of the organisation’s Intranet. Once groups have been set up with different permission levels, it is easier to give one or more users access to a resource by making them a member of a group than to individually change the permissions for each user. When a user tries to access a resource, whether it is a printer, a file or an area of disk storage, the operating system checks against the permissions for that resource. If the user or the group they belong to does not have permissions for that resource then their access is denied. Users will probably be given full permissions to their own file area, but only read access to parts of the Intranet, read/execute access to applications areas, and no access at all to network management areas or other user’s files.

Page 145: Learning&Teaching Systems Ppt

6 Using Networks6.5.4 Hacking

• Security on the Internet– This is of particular concern to anyone purchasing goods or

services using e-commerce. Many people are concerned that their credit card details are being transmitted over the Internet when they use e-commerce systems.

– Anyone using an online bank account also needs to be reassured that the system they are using to access their financial details is secure.

– A secure web browsing protocol named Secure Hyper Text Transmission Protocol (SHTTP) has been developed for this kind of transaction. SHTTP ensures that data transmitted using this protocol encrypts the data before it is transmitted using SSL (Secure Sockets Layer) originally developed by Netscape.

– Other security systems on the Internet depend on the issuing of digital certificates which guarantee that you are who you say you are.

Page 146: Learning&Teaching Systems Ppt

6 Using Networks6.5.5 Viruses

• A virus is a piece of programming code that causes some unexpected and usually undesirable event in a computer system.

• They are often designed so that they automatically spread to other computer users on a network. Viruses can be transmitted as attachments to an e-mail, as a download, or be present on a disk being used for something else.

• Some viruses take effect as soon as their code takes residence in a system whilst others lie dormant until something triggers their code to be executed by the computer.

• Viruses can be extremely harmful and may erase data or require the reformatting of a hard disk once they have been removed.

Page 147: Learning&Teaching Systems Ppt

6 Using Networks6.5.6 Legal Protection

• Censorship and pornography– What is legal in one country may not be legal in another.– Not all governments encourage the free debate of political subjects and

many governments try to block access to political debate which is critical of them.

– Many people believe that children should be protected from violent, pornographic or extreme political material, though of course what is considered to be extreme depends on the society.

– The world-wide nature of the Internet makes it very difficult if not impossible to control. An international standard of "rating" web pages for violent or sexual content has been developed which makes controlling access easier.

– Many educational institutions and some Internet Service Providers install filtering software on their Proxy Server which can be set to deny access to web pages or news groups which contain offensive material.

– Commercial organisations may deny their users access to entertainment or other services because they believe that their employees should only access material which is relevant to their work.

Page 148: Learning&Teaching Systems Ppt

6 Using Networks6.5.6 Legal Protection

• Taxation– Buying and selling on the Internet makes it very

difficult indeed to impose taxes, import duties or other fees, particularly if the item purchased such as software, music, or access to information can be transmitted electronically and does not have to be physically delivered to the purchaser.

– If you work in one country but are employed in another (tele-commuting) where should you pay tax? Who should pay for your National Insurance? Which country’s employment laws should apply?

Page 149: Learning&Teaching Systems Ppt

6 Using Networks6.5.6 Legal Protection

• Copyright– The Internet has made the distribution of software cheap and easy, but of

course this also means that the distribution of illegal copies of software is just as easy.

– Software piracy is a major problem in many parts of the world. Many people argue that software piracy increases the cost of software because software distributors need to charge more to recover the cost of research and development if only a percentage of those using the software are actually paying for it.

– In addition to conventional software licensing, there are a number of alternative software distribution models in existence, including Shareware, Adware and even Freeware.

– The Internet has made many of these distribution models viable because it provides a large enough market and removes the cost of distribution from the developer.

– There is also concern over copyright concerning images and other data available on the Internet. The fact that this data is on a web page and anyone can access it does not make it freely available for anyone to take for themselves and publish it under their own name.

Page 150: Learning&Teaching Systems Ppt

6 Using Networks6.5.6 Legal Protection

• Computer Misuse Act– In the United Kingdom, the Computer Misuse

Act (1990) covers using computers to damage or steal data.

– The Computer Misuse Act covers crimes such as breaking into computer systems or networks to destroy or steal data and propagating viruses which destroy or damage information or computer systems.

Page 151: Learning&Teaching Systems Ppt

6 Using Networks6.5.6 Legal Protection

• Data Protection Act– In the United Kingdom, the Data Protection Act (1998)

describes the duties and responsibilities of those holding data on individuals.

– It also describes the right of these individuals. – In general, it is the duty of those holding data on individuals

to register with the Data Protection Registrar, to keep the information secure, make sure it is accurate, and to divulge it only to those persons who are authorised to view it.

– It is the right of an individual who has data stored concerning them to view that information and to have it changed if it is inaccurate.

– There are a number of organisations which may be given exemption from this act - namely the Police, Customs, National Security and Health Authorities.

Page 152: Learning&Teaching Systems Ppt

6 Using Networks6.5.6 Legal Protection

• Copyright Designs and Patents Act– Copyright is the ownership of intellectual

property outlined by a particular nation’s or international law.

– In the UK, the Designs and Patents Act of 1988, and legislation in other countries who signed the Berne Convention, provide protection.

Page 153: Learning&Teaching Systems Ppt

7 – Computer Software 7.1 Introduction

• This unit on computer software considers the software that is required to support the use of computer systems.

• We consider the Different Categories of Software– Emphasis is on systems software– Also look at applications software & graphics– Selection of software and file formats in LAN,

Multimedia applications and web sites

Page 154: Learning&Teaching Systems Ppt

7 – Computer Software 7.2 Systems Software

• System software is designed to enable you to run a computer without having to know exactly what’s going on inside.

• System software controls the actual operation of the computer system.

• You can enter instructions to the computer by typing at the keyboard or clicking on a mouse and the system software will convert these instructions into the low-level operations needed for the computer to carry them out appropriately.

• The operating system is part of the system software.

Page 155: Learning&Teaching Systems Ppt

7 – Computer Software 7.2 Systems Software – Operating System

• Manages the hardware & communicates with the user in 5 key areas.

1. User Interface

2. File Management

3. Input and Output

4. Memory Management

5. Kernel

• O/S is broken down into layers so updates can be written for specific layers.

• Some parts of O/S held in ROM chips, but most parts held on disk – can be corrupted.

• O/S manages processes – programs in execution

Page 156: Learning&Teaching Systems Ppt

7 – Computer Software 7.2.1 Starting up

• The most essential and frequently used instructions of the operating system are held in main memory. This part of the operating system is known as the supervisor, executive or kernel.

• The remaining part of the operating system can be loaded into memory whenever it is needed.

• On power up computer carries out tasks to check that the basic hardware is operating correctly. It then tries to load the o/s program into main memory. Checking hardware, locating and loading the operating system is carried out by a small program called a boot program that is held in ROM.

• Booting means " to pull yourself up by your own bootstraps". The o/s builds its capability using what it already has, the ROM boot program, to load itself from disk into RAM.

• Once the operating system is loaded into main memory, it runs until the computer is switched off.

Page 157: Learning&Teaching Systems Ppt

7 – Computer Software 7.2.1.1 ROM Based Operating Systems

• In ROM based operating systems, the operating system is held on a ROM chip.

• Advantages – releases main memory for applications– Prevents the o/s from being corrupted. – takes very little time to load and be up and running.

• Changes to the operating system require an alteration to the ROM program and subsequent chip replacement.

Page 158: Learning&Teaching Systems Ppt

7 – Computer Software 7.2.1.2 Disk Based Operating Systems

• With a disk based operating system the system software is held on backing storage and loaded into main memory when the machine is switched on.

• Some computers have the operating system and utility software pre-installed on the hard disk otherwise the user must install and configure the software.

• Originally, systems software was distributed on floppy disks. These days, desktop operating systems are so large that they are distributed on CD-ROM, or upgrades can be downloaded directly from manufacturer’s websites.

• Features of Disk Based Systems– Easy to upgrade via CD or the Internet– Can get corrupted or damaged but easily re-installed

Page 159: Learning&Teaching Systems Ppt

7 – Computer Software 7.2.2 User Interfaces

• The most common styles include:– form filling

• Seen in specialised applications such as configured database systems. Used to control the information entered.

– menu driven• Provide users with a set of options. Restricts users to those

options but easy to use for novices.

– command• User types in commands. Can be very powerful, but hard to

learn. For expert users usually.

– graphical user interfaces• Generally uses the desktop metaphor> Users mouse as

pointing/selecting/initiating device.

– natural language.• Speech input and written language.

Page 160: Learning&Teaching Systems Ppt

7 – Computer Software 7.2.3 File Management

• The operating system supervises the creation, deletion and updating of files.

• It deals with floppy & hard disks, CD-ROM and DVD, Memory sticks etc.

• Disks are divided into tracks and sectors. Each sector has an address.

• Simplest way of finding free space - search the disk until a suitable space can be found. Too slow for practical purposes, - better approach is to use an index file to keep track of the files and space on a disk.

• The use of an index means that some of the space on the disk is used to keep the index file, reducing the amount of space available for user files.

Page 161: Learning&Teaching Systems Ppt

7 – Computer Software 7.2.3 File Management

• Index on a disk– File Allocation Table (FAT). Set aside a fixed amount of space

on the disk for the index, related to the number of files that the system can manage.

– E.g. a FAT12 system is capable of dealing with 212 or 4096 entries, uses little space on the disk. FAT12 is used for MS-DOS floppy disks and very small hard disks.

– FAT16 gives 216 entries - much larger hard disks. – FAT32, which provides 232 entries for very large disks.– Files allocated to clusters of sectors – reduces no of entries in

FAT table– A sector can contain either part of a file or 1 file. Lots of wasted

space with many small files. A very large disk may have very large sectors and minimum file size may be 128K.

Page 162: Learning&Teaching Systems Ppt

7 – Computer Software 7.2.3 Hierarchical Filing System

• A hierarchical filing system is shown. – folder icons represent

directories – rectangle icons represent

files.– users can group related

data into directories. – It is possible to have many

files of the same name existing in different directories.

– The file management system holds pathnames, providing unique identifiers for every file and directory that is created.

Page 163: Learning&Teaching Systems Ppt

7 – Computer Software 7.2.4 Memory Management

• The operating system decides what programs and data are to be placed in memory.

• It also keeps track of what stage a program is at and this applies equally to the operating system's own memory space.

• If corrupted it could cause the computer to crash

Page 164: Learning&Teaching Systems Ppt

7 – Computer Software 7.2.4.1 Multitasking

• The simplest method of memory management is to have just one process in memory at a time. It uses all the memory there is. One problem is that a program needs to be entirely self-reliant and contain, for example, drivers for all I/O devices it needs to use. This method is no longer used.

• The technique simple PCs was to have the o/s and one user program at a time in memory. Basic Input Output System (BIOS) containing device drivers in ROM. This is called monoprogramming because there is only one user program in memory at a time. DOS works in this way.

• Windows offers multi-tasking. where several applications or tasks are (apparently) available at the same time, and the user can switch easily between one application and another.

• Similarly, Windows offers foreground/background processing. The foreground task can claim sole use of the processor but other background tasks can make use of the processor whenever the foreground task doesn’t need it.

Page 165: Learning&Teaching Systems Ppt

7 – Computer Software 7.2.5 Input / Output

• The I/O system handles the interactions between the processor and all the devices that are part of the computer system. E.g. keyboard, the mouse, disk drives, modems and monitor.

• The I/O system also has to deal with external devices. E.g. printers and scanners.

• Peripherals work in different ways and at different speeds. All slower than the computer’s processor and memory.

• I/O system getting devices to work at their highest useful rates.• Software can be thought of as organised in layers.• lower layer deals directly with the hardware.

– consists of device drivers, software that handles one device or type of device.

• upper layer presents an interface to the user or application. – The upper level is the I/O control system, which takes commands

from the user checks them, and sends them to the appropriate part of the lower level. The lower level consists of device drivers.

Page 166: Learning&Teaching Systems Ppt

7 – Computer Software 7.2.5 Input / Output - 2

• This diagram shows how these levels are related. An application starts things off by making a system call that demands action from the I/O system.

Page 167: Learning&Teaching Systems Ppt

7 – Computer Software 7.2.5.1 Direct Memory Access

• A device controller usually has its own memory on board. This enables it to use Direct Memory Access (DMA) to get data to and from the computer’s memory.

• In DMA, the processor only sets up the transfer. Thereafter, some clock cycles are used by the I/O system for the data transfer. During these cycles, the processor is doing nothing but, during the other cycles, the processor can be getting on with its work: it doesn’t have to suspend the current process or spend time on context switches. On the whole, DMA saves time by saving the processor for other things than supervising data transfer.

Page 168: Learning&Teaching Systems Ppt

7 – Computer Software 7.2.5.2 Virtual Devices

• A virtual device seems, to the user, like an actual device but is, in fact, a simulation maintained by the I/O system.

• E.G A Print spooler – a virtual device, that takes data sent to the printer, stores

data temporarily on disk, and prints the data when the system is ready to do so.

– Several print jobs can be sent to the printer at the same time and will be dealt with in an orderly manner.

– The jobs are placed in a print queue and serviced one by one.

– a user does not have to wait while the actual printing takes place but, having sent a print job to the spooler, can get on with other work on the computer.

Page 169: Learning&Teaching Systems Ppt

7 – Computer Software 7.2.5.3 Buffering

• All I/O is relatively slow. – Input by typing is painfully so. Screens and printers work a fair bit

faster. I/O system needs to use the devices efficiently so as not to waste the CPU.

• A buffer is an area of memory set aside to help in the transfer of data between the computer and a device. – A buffer provides a sort of barrier between parts of the computer

system that work at different speeds.– Buffering is used in sending blocks of data. Data is transferred into

the buffer until it is full. Then the entire block is sent at once. This is more efficient than having the data trickle through the system.

– single buffering, the receiver has to wait for a block before it can do anything with it, and the transmitter of the data has to wait for the receiver to have processed the block before it can send another.

– With double buffering, two buffers are used and, as one is emptied, the other is being filled up. This makes more efficient use of both transmitter and receiver of the data.

Page 170: Learning&Teaching Systems Ppt

7 – Computer Software 7.2.5.4 Device Drivers

• Device drivers are specialist software components that facilitate the operation of physical devices attached to the system. Without an appropriate device driver the system cannot communicate with a device, rendering the device useless.

• Each variety of device will have different hardware. For optimum performance, each device should be used with a device driver specifically written for use with that device. Some devices such as CD-ROM drives are currently so similar that it is possible to use a ’generic’ driver in conjunction with just about any CD-ROM.

• Modern operating systems offer the facility of adding device drivers to a system, at the same time that the device itself is added.

Page 171: Learning&Teaching Systems Ppt

7 – Computer Software 7.2.5.5 Plug and Play

• Adding a new device to a system – Historically a difficult and fiddly process. Often a new

control card has to be plugged into the computer. Very often, switches on the device would have to be set by hand. Then the computer system would need a lot of tweaking before the operating system and the device could communicate in a satisfactory way.

• Plug and play – tries to make installation more automatic.– Standard agreed between the companies responsible for

the different parts of a computer system.– Windows automatically detects all plug and play devices on

the system. – The user has to supply very little information during

installation and nothing at all from then on.

Page 172: Learning&Teaching Systems Ppt

7 – Computer Software 7.2.6 Kernel

• The kernel – central component of the system, upon which all of the other

components depend. – The kernel co-ordinates the activities of the system. – typical operations of the kernel of single user system include:

• if a key is pressed, the device driver will notify the kernel which will pass the request to the user interface.

• If the user interface requests that a file be moved, the kernel will pass the request to the file system. Once the file system has finished, any messages from the file system will be sent to the user interface;

• if the user interface wishes to send a message to the user, the kernel will notify the device drivers for the output device (such as monitor or printer).

• In multi-tasking / multi-user systems the kernel will usually also be responsible for managing the processes as well.

Page 173: Learning&Teaching Systems Ppt

7 – Computer Software 7.3 Utility Programs

• Utility programs enhance the operating system.– Utility used to maintain a system– Applications external to the use of the system.

• Examples– 1 Disk partitioning tools– 2 disk formatting programs– 3 file compression utilities– 4 disk defragmentation tools– 5 virus checking tools

Page 174: Learning&Teaching Systems Ppt

7 – Computer Software 7.3.1 Disk Partitioning Tools

• Disk partitioning tools are used to divide one physical device into more than one logical device.

• Some operating systems require a disk to be partitioned before installation can take place, other systems provide the user with the facility to partition a disk for the purpose of convenience e.g user data.

• The disk partitioning tools provided with many operating systems can be regarded as a little primitive and unfriendly, but are usually sufficient for all but the most exotic of requirements.

Page 175: Learning&Teaching Systems Ppt

7 – Computer Software 7.3.2 Disk Formatting Programs

• Disk formatting programs are used to prepare the surface of writeable media for use.

• The process often involves laying down ’markers’ for future use.

• Formatting a disk usually deletes any existing data on that disk, so caution should be exercised.

• File compression utilities• File compression utilities are used to reduce the

amount of space that a file takes up on disk. It will take a small amount of time to decompress a file, and also some time to compress a file before storage.

Page 176: Learning&Teaching Systems Ppt

7 – Computer Software 7.3.3 Disk Defragmentation Tools

• Disk defragmentation tools are used to combat the problem of file fragmentation. – Ideally,all of a file should be located in the same area of a

disk, as this speeds up file accesses.– Files are often broken up, with the various portions of the

file dispersed across the disk. – This usually happens when a number of small files are

deleted from a disk, and the file system chooses to fill in the gaps left by the deleted files when the next file is saved.

– A defragmentation utility reorganises the way the files are laid out on the disk so that the components of a file are near to each other.

– Some operating systems are more prone to fragmentation than others, so not all systems will ship with a utility of this type.

Page 177: Learning&Teaching Systems Ppt

7 – Computer Software 7.3.5 Anti-Virus Software

• Used to prevent the spread of viruses.– Payload of a virus is the damage caused.– Can reside in operating system and start up on boot-up making

the machine run slowly and do strange things.– May overwrite part of the O/S – machine useless.

• Anti-Virus software operates in different ways including– 1. monitoring the size of files (if a program suddenly changes

size this may indicate that a virus has attached to it);– 2. monitoring the system for ’suspicious’ activities, such as

trying to modify important files;– 3. checking to see if a characteristic series of program

instructions known as a signature appears in a file. The appearance of a recognised signature is an indication that a known virus is infecting a system.

Page 178: Learning&Teaching Systems Ppt

7 – Computer Software 7.4 Graphic Applications

• Many applications use computers to generate images. – The images can be an end in themselves, for example

using a painting or a drawing package to generate a diagram or picture.

– These packages can vary in sophistication, from simple 2 dimensional object rendition, or elementary paintings to professional design work used by graphic illustrators.

– E.g. Computer Aided Design – suite of programs used to design kitchens, buildings etc. Also can cost up total job, produce bill of materials etc.

– E.g. Animations and simulations. Games etc rely on animations produced in drawing packages and imported into authoring environment. Also with “live action” used in TV and film industry.

Page 179: Learning&Teaching Systems Ppt

7 – Computer Software 7.4.1 JPEG

• JPEG (Joint Photographic Experts Group) is a group of experts that develop and maintain standards for compression algorithms for computer image files.

• Any graphic image file created or converted using a JPEG standard is given this name.

• A JPEG file is created by choosing one of the set of compression algorithms available.

• For example, similar colours and minor changes in colour, need not be coded separately.

• JPEG processing makes image files small by removing detail. This is called a lossy compression. This will reduce the number of colours used to store the image and avoid unnecessary repetition of bit patterns.

• The highest quality results in the largest file size so a trade off has to be made between image quality and file size.

• JPEG is one of the image file formats supported on the WWW suffixed by ".jpg".

Page 180: Learning&Teaching Systems Ppt

7 – Computer Software 7.4.2 GIF

• The web also supports GIF (Graphics Interchange Format) images.

• These images are based on a compression algorithm that creates a codebook or dictionary of particular bit patterns. These in turn, are then substituted resulting in a smaller file.

• When decoding, the algorithm uncompresses the file to generate the original image.

• Significantly, GIFs preserve all the precise shapes in an image i.e. result in lossless compression.

• Restricted to 256 colours

Page 181: Learning&Teaching Systems Ppt

7 – Computer Software 7.4.3 TIFF

• TIFF (Tag Image File Format) is a common format for encoding bitmap images e.g. scanner images, and can be any resolution.

• TIFF files can be in any of several classes, including gray scale, colour palette, or RGB full colour, and can include files with JPEG and GIF formats.

• A TIFF file can be identified as a file with a ".tiff" or ".tif" suffix.

Page 182: Learning&Teaching Systems Ppt

7 – Computer Software 7.5.1 Multimedia Software

• Multimedia– combination of text, graphic artwork, sound,

animation and video data types delivered to the user by computer or other electronic means.

– If the end user can control what is displayed, then it is called interactive multimedia.

– When data elements are linked to form a structure through which the user can navigate then it is called hypermedia. The World Wide web, e.g, is a hypermedia environment.

Page 183: Learning&Teaching Systems Ppt

7 – Computer Software 7.4.1 Multimedia Software - 2

• Applications of multimedia– Examples include the development of a World Wide web site,

training and education programmes where information is presented for learning, or CD-ROM based encyclopaedias and games.

– Multimedia in the home includes anything from cookery to interior design. Although currently CD-ROM based, in future most multimedia software will reach the home via television sets with an in-built mechanism for user interaction.

– A pay-for play mechanism will allow you to download applications and entertainment packages as you require them.

– In public services, such as transport, museums, libraries and shopping centres, multimedia information kiosks designed to provide information and assistance at thet ouch of a button will become more prevalent.

Page 184: Learning&Teaching Systems Ppt

7 – Computer Software 7.5.1.1 Common Features

• The software that allows you to put the different data elements together, build interactivity and navigation is called authorware.

• Authorware packages support the following basic authoring operations.– ability to import media types;– editing, particularly text and static images;– organising navigation;– programming - visually using icons and objects;– scripting language;– playback;– delivery by building a run-time version of the project that

does not need the full authoring software to execute.• Examples of authoring software include: Macromedia Director,

Apple’s Hypercard and Windows Toolbox.

Page 185: Learning&Teaching Systems Ppt

7 – Computer Software 7.5.1.3 Interactive Presentations

• Images– Simple graphs & charts from spreadsheet as well as colour

images.

• Video– Great deal of storage space & memory needed.– If computer not powerful enough or bandwidth too low the video

appears jerky.

• Sound– Similar problems as with video so MP3 standard introduced.

• Animations– From animated GIF files to full blown animated films. Great

skill needed by animators.

Page 186: Learning&Teaching Systems Ppt

7 – Computer Software 7.5.2 Web Software

• The World Wide Web – is a mass of global resources accessed anywhere in the world.

– Uses a Uniform Resource Locator (URL) and a browser.

– Websites can be built with many different tools but all contain pages in HTML

– HTML is interpreted by a browser .

– Hyperlinks are viewed by the browser as demands to fetch and display a new page.

– World Wide Web Consortium (WC3) founded in 1994

• Develop common protocols that promote evolution of WWW

• To ensure WWW interoperability

Page 187: Learning&Teaching Systems Ppt

7 – Computer Software7.5.3 Network Software

• All Stations should have the same O/S to use the network system and to share messages on the network system.

• Data Integrity – When an error is detected the Network O/S has to inform the network and the packet of data has to be re-transmitted.

• Multi-User Access – A user ID controls what the user has access to on the network.

• File Attributes – A user usually has read/write (r/w) access to their own files, read-only access to shared files.

• Encryption of Data – Typical networks hide data from the user, but a print server prints documents from many workstations and a fileserver often serves the whole network.

Page 188: Learning&Teaching Systems Ppt

8 – Supporting Software8.1 Introduction

• This unit on Supporting Software considers the factors affecting the deployment of software on a system.

• These include compatibility issues between the software and the intended hardware and operating system.

• Once up and running, the issue of protecting software and systems from viruses is then considered.

Page 189: Learning&Teaching Systems Ppt

8 – Supporting Software8.2 Application Software

• Application software supports user tasks.– Reports, database, spreadsheet, artwork, web pages

etc.– GPPS of same genre often very similar.– Need to match the correct package to the intended

tasks.– GPPS offer less functionality than specialised

packages e.g. art facilities in Word nothing like in Photoshop.

– You should be familiar with• General class of functions that different types of app

packages support• Data standards that facilitate the exchange of data between

packages.

Page 190: Learning&Teaching Systems Ppt

8 – Supporting Software8.2.1 Application Requirements

– When buying software applications it is important to ensure that they will not conflict with your operating system or your hardware. If there are problems then your software will not run properly if at all! Each application software package includes details of the minimum system specification required to run the application. This will include:

• operating system;• minimum RAM;• minimum processor speed;• minimum hard disk space;• peripherals required.

Page 191: Learning&Teaching Systems Ppt

8 – Supporting Software8.2.2 Software Compatibility

• Whether you are installing or upgrading software, checking your hardware and software and O/S for compatibility is essential.

• The main factors to consider are:– Memory requirements;– Storage requirements;– Operating System.

• It is important that checks are made to make sure you have the needed software, hardware, and operating system to run the application before installing.

Page 192: Learning&Teaching Systems Ppt

8 – Supporting Software8.2.3 – 8.2.5 Compatibility Requirements

• Memory requirements– Software specifies minimum RAM to run, but may

need more for enhanced performance..

• Storage Requirements– Not only need enough disk space to install the s/w but

take account of space needed for large data files (video, sound etc.)

• Operating System– S/W usually upwards compatible for a while (W98

s/w may well work on XP) but not guaranteed. • Device drivers needed may not be available any more.• Large steps up not usually supported e.g. W95 on XP

Page 193: Learning&Teaching Systems Ppt

8 – Supporting Software8.3 Viruses

• A virus is program code that causes some undesirable and unexpected event to happen in a computer.

• Viruses are usually disguised as something innocent and are designed so that they automatically spread within or between computer systems.

• Viruses can enter a system as an attachment to an e-mail, download from the web, or from on a disk or CD.

• Some viruses take effect as soon as their code is executed.

• Others can wait until circumstances cause their code to be executed by the computer.

• Viruses can be quite harmful and erase data or close down a system.

Page 194: Learning&Teaching Systems Ppt

8 – Supporting Software8.3.1 Virus Types

• File Virus– Attached to .exe or .com files or complete program or script

attached to e.g. e-mail– Resident in computer ready to cause havoc

• Boot Sector Virus– These infect executable code found in boot sector on disks or the

master boot record on hard disks. – To infiltrate the boot sector, the virus is read while the system is

running and then activated the next time the operating system is loaded.

• Macro Code Virus– Macro viruses are fairly common viruses, but tend to do the

least damage. Macro viruses infect applications and typically cause a sequence of actions within the application e.g. inserting unwanted words or phrases in a document.

Page 195: Learning&Teaching Systems Ppt

8 – Supporting Software8.3.1 Virus Code Actions

• Viruses use a combination of actions– Replication

• Virus attaches itself to any type of file and replicates very quickly. Can replicate many times before activation

– Camouflage• Takes on characteristics that detection software looks for.

Good anti-virus s/w aware of this and makes more checks (check sum etc.).

– Watching• Lies in wait and ambushes when codintion is met e.g. correct

date.– Delivery

• Used to be floppy disks, now e-mail. Virus waits for trigger to drop its payload.

Page 196: Learning&Teaching Systems Ppt

8 – Supporting Software8.3.3 Other Infections

• A worm is a self-replicating virus that does not alter any files but takes up residence in the computer’s active memory and duplicates itself. They only become noticeable once their replication consumes the memory to the extent that the system slows down or is unable to carry out particular tasks. Worms tend to use the parts of the computer’s operating system that is not seen by the user until it is too late.

• A Trojan horse is a program where harmful code is contained inside another code which can appear to be harmless. Once the apparently harmless code is in the computer, it releases the malicious code to do its damage.

Page 197: Learning&Teaching Systems Ppt

8 – Supporting Software8.4 Anti-Virus Techniques

• Checksum– A checksum of key files is recorded. At run time checksum run

again – if discrepancy then file could be infected.

• Virus Signatures– Signature is unique pattern of bits within a virus. Once it is

known anti-virus s/w uses it to identify and remove virus.

• Heuristic detection– Approaches problem through past knowledge. Works on

probability of file being infected e.g. finds file that checks for date.

• Memory Resident Monitoring– Anti-virus s/w stays in memory at start-up and actively monitors

the system. Delays in loading and execution of programs.

Page 198: Learning&Teaching Systems Ppt

8 – Supporting Software8.5 Virus Information Library

• Using a virus information library– Literally thousands of viruses have been detected and

catalogued using a Virus Information Library (VIL). One such VIL can be found at:

– http://vil.nai.com/vil/– Using this or another source, find the details of at least one

of each type of virus:

• file• boot• macro• worm• trojan

For each one, make a note of the following:

1. name:

2. type:

3. symptoms:

4. date discovered (find a recent one):5. medium for infection (e.g. email, website):6. cure (if any):