802-Information Technology Class- XI.pdf
Document Details
Uploaded by TrustingPond
2020
Tags
Full Transcript
INFORMATION TECHNOLOGY - 802 CLASS – XI SESSION – 2020-21 (DRAFT STUDY MATERIAL) Session 1: Fundamentals of Computer Introduction In today’s world we can see that almost all our work is being done with the help of computers. Applications of computers can be seen in every electr...
INFORMATION TECHNOLOGY - 802 CLASS – XI SESSION – 2020-21 (DRAFT STUDY MATERIAL) Session 1: Fundamentals of Computer Introduction In today’s world we can see that almost all our work is being done with the help of computers. Applications of computers can be seen in every electrical device nowadays whether it is television, washing machine, watches, mobile phones and the list is endle ss. With the advancement in use and technology, use of electronic devices has increased manifold. All this is possible because of the ease and accuracy we get with these devices. Life has taken a fast pace and distances make hardly any difference with the help of these machines. Let us have an insight to the basics of computers in this chapter. Evolution of Computers Growth of the computer industry started with the need for performing fast calculations. The manual method of computing was slow and prone to errors. So attempts were made to develop faster calculating devices. The journey that started from the first calcul ating device i.e. Abacus has led us today to extremely high speed calculating devices. Computer is a term derived from the term ‘compute’ which means to calculate. Computer takes input from the user, processes it and displays output. It is a device that works on a set of instructions. It takes input from the user, processes the input according to the set of instructions and gives the output. Computer is an electronic device and works on electronic signals. The on and off signals denote 1 and 0 respectively. The binary language, also called machine language, works on two digits 0 and 1. Earlier computer experts used to work and give instruction in binary language only. Over the years, many user friendly languages similar to simple English terms have develo ped and every computer programmer need not learn and give instructions in binary language. Many user friendly languages have been developed like C, C++, Java, JavaScript, Python and many more. These languages are known as high level languages. Commands given in high level languages need to be converted into binary language with the help of translators. All this is achieved by an effective coordination of the components of the computer; broadly categorized as hardware and the software. The term hardware re fers to the tangible components of a computer that we can touch and feel like the keyboard, mouse, monitor. However, the term software refers to a set of instructions and is intangible. Some examples of software are operating systems, word processors, spreadsheets, online calculators etc. The data and/or instructions given by the user to the machine are termed as Input and the result generated by the machine after processing the data is the Output. Characteristics of a Computer Computer has become an inseparable part of our lives today because of following characteristics: Speed : A remarkable quality of computers is their ability to process data and instructions at a very high speed. A typical high-speed computer can perform about 3-4 mips (million instructions per second). Note that this is different from the speed with which information can be sent to and from a computer, which is normally measured in baud. Versatility: is the ability of a computer to do a variety of jobs with ease. One moment you can type a letter using any of the available word processing packages, and the other moment you can use the same machine to do calculations yielding the salaries of employees of an organization. Accuracy: Not only does the machine perform varied jobs with high speed, but also does them with high precision and accuracy. Note that the errors that one may see in output produced by the computer is not because of the machine, but because of either wrong entry of data or wrong instructions given to compute. In computer terminology, this phenomena is often referred to as GIGO (Garbage In Garbage Out) Diligence: Another noteworthy feature of computers is its ability to perform the same task repeatedly over and over again without getting bored! For example a task of adding 1000 numbers repeatedly for 10000 times if given to a computer, it would be able to do the task with the same accuracy every time without complaining that it is being asked to do this job over and over again!!! Memory: One of the notable features of a computer is its memory. However, the computer’s main memory is volatile, i.e., it is lost when we switch off the computer. Therefore, computers are provided another form of memory that does not fade away when it is switched off. It is called secondary memory and is available in the form of floppy disks, pen drives, portable hard disks. Storage: Huge amounts of data and information can be stored in a computer for future retrieval. The human memory is limited and fades away with time, which is not true for a computer. Intelligence: In the early days, although computers possessed striking characteristics yet a prominent drawback was that they are merely dumb machines which were programmed to perform certain tasks. With the advent of artificial intelligence techniques, we now have machines which can drive a car without a human driver or play chess against the best players. Thus to summarize, this electronic device is capable of storing, processing huge amounts of data and/or instructions with accuracy, diligence and high speed in an untiring manner. Having seen the characteristics of a computer, now let us understand the way a computer works. Components of a Computer The computer is the combination of hardware and software. Hardware are the physical components of a computer like motherboard, memory devices, monitor, keyboard etc. while software is the set of programs or instructions. Both hardware and software together make the computer system function. Let us first have a look at the functional components of a computer. Every task given to a computer follows an Input- Process- Output Cycle (IPO cycle). It needs certain input, processes that input and produces the desired output. The input unit takes the input, the central processing unit does the processing of data and the output unit produces the output. The memory unit holds the data and instructions during the processing. Let us discuss each component and its functionality :- Input: To initiate the process, the computer needs to be told of the problem to be solved. For this purpose, a set of instructions and data is provided through the input devices such as keyboard and mouse. A set of instructions provided to the computer for doing a task is called a program. Storage: There are basically two types of computer storage devices: Primary Memory : Data stored in Primary Memory is directly accessible by the CPU. The inputs received in the above steps are stored in the computer memory, called random access memory (RAM). This storage is relatively fast and expensive as compared to the secondary storage. Primary memory is directly connected to the CPU. It is also called main memory, primary memory, or working memory of the machine. Primary memory is of two types : 1. RAM ( Random Access Memory) : It is a primary volatile memory i.e. its data gets lost once the power supply is stopped. RAM is of two types : DRAM (Dynamic Random Access Memory) and SRAM ( Static Random Access Memory. DRAM SRAM Used in main memory It is used in cache Inexpensive Expensive Uses less power Uses more power Slower than SRAM Faster than DRAM 2. ROM ( Read Only Memory) : It is generally used in startup operations of computer. It is a non-volatile primary memory. Further it may be classified as : ROM, PROM(Programmable read only memory), EPROM ( Erasable Programmable read only memory), EEPROM ( ElectricallyErasable Programmable read only memory) Secondary Storage: The memory which is external to the computer system forms the secondary storage, for example, the magnetic tapes, compact disks, pen drives are all examples of the secondary storage. These are not directly connected to the CPU. Cache Memory : it is a very high speed memory which is used to cope -up with the high speed of CPU. It is generally placed between CPU and Primary memory and acts as a buffer. It reduces the average access time to data from the main memory and is comparatively expensive. All the inputs, the intermediate results of computation carried out, and the final result are stored in the memory of the computer. The computer also has another form of memory called secondary memory. The programs and data not currently required are stored in secondary memory. It comes in the forms such as a hard disk, pen drive, and CDROM. When required, for processing, these can be retrieved and transferred to the main memory of the computer, Processing: The inputs provided by the user are processed by the central processing unit as per the specified instructions. The result of the processing is then either directed to the output devices or to a memory location for storage. Control Unit: is responsible for coordination between the different units of a computer. It controls the input, processing and output operations. For example, it coordinates with the peripheral devices to accept the input or display the output. It is like a manager of all operations. The manner in which the program is to be executed is managed by the control unit of the computer. This entails deciding the address from which the instructions to be executed is to be picked up, the memory location where the data or intermediate result is to be stored, etc. Arithmetic Logic Unit (ALU): is responsible for actual processing of data. It retrieves the data from the storage unit and performs the arithmetic calculations and/or comparisons on them and the processed data is then sent back to the storage. Output: The result of processing carried out by the computer is often directed to the display device such as the monitor or printer. Other forms of devices are not uncommon, for example, the computer may output music or video. We have seen above that the input unit receives data, which is stored in the main memory, from where it gets transferred to the Central Processing Unit and subsequently to the output device. The Central Processing Unit has two modules; the Arithmetic Logic Unit and the Control Unit. It also coordinates between memory and ALU by issuing timely signals. As mentioned above, the storage unit has primary storage and secondary storage. Block Diagram of Computer Inside the Computer There are various types of computers in the market these days, desktop personal computer – popularly known as PC, laptop (also called notebook) – a small computer that can easily put on your lap, tablet – a light computer of the size of a handbook, often used for working on the Internet. If we look at a personal computer, from outside, it looks like a box (sometimes called CPU) that contains CPU and hard disks, keyboard, mouse, monitor and speakers. The keyboard, mouse, speakers, printer and other attachments like- scanner constitute the peripherals. The major functionality in a computer is done in the Processing Unit. Processing Unit takes input and processes it through the set of instructions ( given in the software) for that input and finally it gives the results to the output unit. Let’s now peep into the chassis of a processor! Self Assessment Exercises: 1. Define the following : a. Computer b. Input Device c. Output Device d. Processor 2. Expand the following : a. ALU b. CPU c. CU d. RAM e. EEPROM f. ROM g. DRAM h. SDRAM 3. Answer the following a. Explain the block diagram of computer b. Describe the function of ALU and CU in short c. Differentiate between RAM and ROM d. Differentiate between input and output devices. e. Explain the importance of Cache memory. Session 2: Components of Computer Motherboard: This is the main circuit board which holds together various components like CPU, memory, connectors for the hard drive and optical drives, expansion cards to control the video and audio, and connections in the form of various ports (such as USB ports). It provides a connection to every component of the computer. Input – Output Devices Input devices takes input from the user. The input may be in the form of text, image, sound, video etc. a wide range of input devices have been devised for supporting varying types of input. Following are examples of some of the input devices of computer: - Keyboard: this is a standard input device and takes data in the form of text. - Mouse ; it is a pointing input device. - Webcam: it takes data in the form of video/image - Scanner : it generally stores data in the form of graphics - Microphone : it is used for voice input/ audio input - Handwriting input board: it is used for giving input from Output Devices: devices that are used to give output to the user. Output may be in the form of visuals, text, audio, printout etc. different types of output devices are there to support various types of output. Following are some examples of output devices: - Monitor/ VDU ( Visual Display Unit) : it is the standard output device and is similar to a television screen. - Speaker : it is an output device that gives output in the form of an audio/ voice. - Printer : it is also a very commonly known output device that gives output in the form of print out also called as hard copy. - Plotter : it is a large printer like device that is used to take print of large maps, architectural designs. - Projector : it is an output device that gives an enlarged view of the output on a large screen. It is generally used for giving a view of output to a large audience. CPU: The motherboard houses the main processor or the CPU (Central Processing Unit). CPU executes the user instructions and coordinates amongst all other units of the computer. Thus, it is primarily responsible for the performance of the machine. Processors may be classified on the on the basis of their speed, technology (dual-core, quad-core, octa- core) and their manufacturers (Intel and AMD to name just two). Speed of processors is usually measured in megahertz (MHz) – millions of instructions per second; and gigahertz (GHz) – billions of instructions per second, is indicative of its power. Power Supply Unit: This component of the computer is the one which converts the alternate current power supply being received by homes or offices to the low voltage direct current required by the machine. Random Access Memory (RAM): This memory storage plays an important role in the functioning of a computer system. Every time you start up the computer, the operating system (the system software that manages the device’s interaction with the peripherals and the internal resources) is loaded in the RAM. The program that needs to be executed at any point of time also needs to be brought in the RAM. These days the PCs have around 8-32 GB RAM. More the RAM, more will be the space for the programs leading to faster execution. Of course, everything in computers is subject to some limits. Hard Disk(HD): all the data stored in c drive of a computer is basically stored in Hard Disk.. It is a magnetic secondary storage device for storing the data and is fixed in the box of a computer. The program which is to be executed is first stored in the hard disk from where it is transferred to RAM. On completion of work, the program is again saved on the hard disk. These days external and portable hard disks are also available in the market for large storage of data. It is usually characterized by the performance and its capacity. Memory capacity is specified in terms of bytes. These days the capacity of a hard disk is expressed in terms of Gigabytes, Terabytes. Pen drive/Flash drives : it is a small pen-like storage device of and can be accessed by directly inserting in the USB(Universal Serial Bus) Port. It is very popular these days because of its small size and easy accessibility. Let us look into the hierarchy of the terms used to specify the capacity. Every bit of information in computer is stored in terms of Bits (Binary Digits) i.e. 0s and 1s 1 nibble = 4 bits 1 byte = 8 bits 1024 bytes = 1 Kilobyte (KB) 1024 KB = 1 Megabyte (MB) 1024 MB = 1 Gigabyte (GB) 1024 GB = 1 Terabyte (TB) 1024 TB = 1 Petabyte (PB) 1024 PB= 1 Exabyte(EB) 1024 EB = 1 Zettabyte(ZB) 1024 ZB = 1 Yottabyte (YB) Optical Storage devices : Compact disc (CD) and Digital Video Disc(DVD) are examples of optical storage devices. Capacity of a DVD is higher than that of a CD. Data in a Cd/DVD may be accessed by inserting the disc in a Disc Drive. Following is the image of a CD/ DVD drive: All these components need to work in coordination and this is accomplished by the operating system. It initializes the system for our use. In the next section, we study the basics of operating systems. Self Assessment Exercises 1. Explain storage devices of a computer. 2. Describe secondary and primary storage devices of a computer 3. Write a short note on Optical storage devices 4. Explain the role of Power Supply Unit. 5. Explain various units to measure storage capacity of a device. Give the smallest unit. 6. Do the following conversions : a.2 GB = ___________KB b. 210 MB = _ _________B Session 3: Operating System Operating System : Operating system is the software that acts as an interface between user and computer hardware. A computer needs to communicate with both the hardware and software; to do this; it utilizes the services of an Operating system. Examples of some popular operating system are Windows, Linux, Unix, MS-DOS, SOLARIS, MAC OS, Gary Arlen Kildall is known as the father of operating system. It also acts like a government which lays down policies for efficient utilization of the resources and provides for effective coordination amongst the various components of a computer. Every computer system whether it is an independent system like a desktop or a cell phone must have an operating system for performing the core functionalities like accepting input from various input devices, directing the output to the display, managing the files and directories, communicating with hardware, and installing /uninstalling of peripheral devices. Figure 1.7 : Operating System as an Interface Functions of an Operating system can be broadly categorized as: − Communication Manager − Resource Management − Process Management − File Management − Memory Management Figure 1.8 presents the various functions of an operating system. Figure : 1.8 Functions of Operating System Communication Manager: Manages the communication needs of the system, be it communicating with the peripheral devices or the internet, are addressed by the operating system. Each of the peripheral devices like printer, mouse have unique characteristics and the computer needs to know these unique properties, to interact with them. For this, the operating system uses special programs called drivers which enable recognition of these devices and their properties. Resource Management: The working of a computer system is predominantly dependent on how its resources are being managed. The resources that we talk of here are - the memory of the computer, the CPU time, files, secondary storage, input/output devices etc. The operating system handles the allocation of all such resources, the priority in which these are allotted to the various processes to get an optimum performance from the system. We discuss here the prime resource management. Process Management: A process is a program currently executing in the memory or waiting for the CPU. In a computer there are multiple processes in the system. The OS manages, controls, schedules all the processes being executed in the computer. It decides which process gets the processor and for how long. Memory Management: For a process to be executed, it has to be loaded in the working memory that is the RAM (Random Access Memory). The memory management component of an operating system allocates memory to the processes in a dynamic manner that is allocated on demand and released when not needed. File Management: Operating system takes care of all the files and folders (directories) maintained on the computer disk. The basic tasks that a user needs to perform on files are creation, renaming, deletion, copying or moving of a file or folder. All the files stored in a computer system can be located through the file system. Two main types of file system are Details of files in a computer are stored and traced using a file system called FAT. FAT is used by the operating system to keep a track of files on hard disk. Various FAT systems are named on the basis of the number of bits used to store the data of FAT. For ex ample : FAT 16 uses 16 bits to store data, FAT 32 uses 32 bits. Another system is NTFS (New Technology File system). Types of Operating system Operating systems can be classified in different ways; depending on various parameters. Single-tasking and Multi-tasking Single Task Operating System : such operating systems allow execution of only a single program at any given instant. Multi-Tasking operating system can execute more than one program simultaneously. The processor time, in this case, is divided amongst various processes. Single user and Multi-user Single-user operating systems allow only one user to use the system. The desktop systems can be classified as typical single user systems Multi-user operating systems allow many users to access the system by maintaining an account of all the registered users. Real-Time Operating System Operating systems which ensure that the response time is fixed are categorized as real -time operating systems. They are intended for applications where data needs to be processed quickly, without any significant delays. For example, an anti-aircraft missile system must fire as soon as it receives a signal from the enemy aircraft, before it leaves the bomb and flies away. Batch Processing Systems In a batch processing system, similar jobs are clubbed together and submitted as a block to the processor for execution. User intervention is minimal in such systems. The jobs are picked up one by one and executed. Exercises Fill in the blanks 1. The unit used to measure the performance of a computer is...................... 2. Two main types of File system are..................... and...................... 3. ________________ is the software that acts as an interface between user and the hardware. Short Answer questions 1. List the various functions of an operating system. 2. Compare batch processing systems and multiprogramming systems. 3. What is FAT? Give an example. Session 4: Troubleshooting and utilities Introduction While working with a computer you are sure to come across some hardware, software and networking problems. The objective of this chapter is to help you find a solution to some commonly encountered problems. Having gone through this chapter you will be able to diagnose and fix minor issues. You may need expert advice for advanced problems not covered here. As you gain experience, you would be more confident to handle problems. Some of these problems would not occur if you work carefully and ensure that connections are in place and proper settings are done. There could be many reasons/ causes for a problem on a computer. It is sometimes difficult to judge if it is a hardware -related or software-related problem. Troubleshooting is generally a trial and error process, requiring persistence and patience. Starting with the simplest possible cause, we use the process of elimination to diagnose the problem. One needs to figure out the cause of the problem, i.e., identify the part of the computer system that is not functioning well. Always take a backup of your important files to another source, like a pen drive o r an external hard disk. In case the problem is not solved, this ensures that a copy of your data is available. Common Troubleshooting Steps When you switch on the system, the power supply detects the CPU and the peripherals (the other connected devices). The system boots, and if all peripheral devices have been successfully detected, most systems will produce a beep. If any connected device (such as monitor, keyboard, mouse, and printer) does not switch on, try the following: Close running programs that are not being currently used Check the Cables : Check the cable of the specific computer hardware which is not working. Ensure that all connections are tight, correctly plugged in, and the Power button of these devices is ON. For wireless devices, make sure it is turned on and the batteries are charged. For example, a laptop’s battery may not be charged. Plug the AC adapter into the electric socket, wait a few minutes, and then try to turn on the laptop. Repeat the Steps to See if the Problem Recurs : Repeat the sequence of steps that you performed before the problem occurred. Observe if it causes the same response from your computer. Use Help: Access the Help window by pressing the F1 key. This window helps to find a solution to the problem. Record Error Messages : Record the full error message for future reference. Restart the Computer: Restart the peripheral device. If the device still does not switch on, shut down the computer and start it again. Troubleshooting Hardware Problem 1. Monitor is not Showing any Display/ The Screen is Blank The System is in Sleep Mode: The computer may be in Sleep mode. Click the mouse or press any key on the keyboard to wake it up. Check All Connections: For a desktop, ensure a proper connection of a cable connecti ng the monitor and a computer cabinet. Check that the power cables of the monitor and cabinet are plugged into the electric socket and the power is turned on. Laptop’s Battery is Low: The laptop’s battery could be very low, causing the laptop to switch of f. Connect the charging cable to the laptop and plug it into the electric socket. The laptop will start charging, and in a few minutes, the laptop can be switched on. 2. Keyboard Troubleshooting If the keyboard is not responding, try the following: Check Connections: Check the connection of the keyboard to the computer. If it is not connected, or the connection is loose, connect it properly to the computer. Check for any Damage: Inspect the keyboard cord for any damage. If any damage is found, the keyboard may need to be repaired or replaced. Change Batteries: For a wireless keyboard, the batteries may have discharged. You may need to change the batteries. Keys are stuck: If one of the keys on your keyboard is stuck, you need to clean the keyboard. You will have to first turn off the computer. As the keyboard is stuck, you may need to use a mouse if required. Remove dust with the help of a brush, and wipe the keyboard clean with a damp cloth (water should not be dripping from the cloth). 3. Mouse Troubleshooting In case the mouse is not working, try the following troubleshooting options: Check Connections: Make sure that the mouse is securely plugged into the computer. Check for any Damage: Inspect the mouse cord for any damage. If the damage is noticed, the mouse may need to be replaced. Check the Cordless Mouse: For a cordless mouse which is not working, switch off, and then switch on the cordless mouse. This should re-establish a connection with the system. Clean the Mouse: Try cleaning the mouse with a damp cloth. Clean the area around the button located on the underside of the mouse. 4. Troubleshooting Printer Problems Printer is Not Responding (Not Printing) The printer could not be responding due to a number of reasons. Check for each of the following causes, taking necessary action as required: The Printer is Not Connected Properly or Not Switched On: Ensure that the printer cables are connected properly. If the printer is not switched on, switch it on. The Printer is Out Of Paper: If the printer does not have paper, put paper in the paper tray and try printing again. The Printer Paper Jam (Paper is caught in the Printer): Open the printer and remove the paper caught in the printer. Close the printer and try printing again. The Ink Cartridge of Printer is Empty: Most printers give a warning message when the ink levels are low (insufficient for printing). Change the ink cartridge and try again. Incorrect Printer Driver: The printer driver may be incorrect. You would need to install a new printer driver. The latest driver can be downloaded from the manufacturer’s website. Some printers, when connected to the internet, give a message when driver updates are available. Consult your system administrator before installing any new software. The Printer and Computer are Communicating Properly: This problem is more common when a wireless connection is being used to connect a PC/ laptop to a printer. Check that the IP address configured on your computer matches the Dynamic IP address allocated to the printer (If the printer is connected through WI-FI (a wireless network) the configured IP Address could be different from the one stored on your PC). Before troubleshooting the printer’s IP address, you need to ensure that both your system and printer are connected by means of a network – through a wireless connection or through Ethernet. You can access your printer settings and check the IP address and change the settings (if required). Follow the following steps: Step 1: Open the devices and printer dialog box by clicking Start button > Control Panel > Hardware and Sound > Devices and Printers (or Start button > Control Panel > All Control Panel Items > Devices and Printers), and select the printer whose IP address you wish to check/change. (The example below, Figure 1.9, shows an HP Printer. Other printer models also have similar interfaces). Figure 1.9 : Screen to select device Printer Step 2: Select the desired Printer (here HP Deskjet 3540 was selected). The following screen (Figure 1.10) shows the programs that can be selected to manage the printer, change its settings, etc. Figure 1.10 Private Screen allowing you to choose a program Step 3: Run the HP Print Assistant (as shown in Figure 1.11). This program manages the printer and gives access to the Help information. The HP Print Assistant program may take some time to open, as your PC/ laptop would try to establish a connection with the printer. Figure 1.11 HP Assistant Processing Step 4: Click on the Utilities icon to get the printer utilities screen (Figure 1.12) Figure 1.12 Printer Utilities Step 5: Run the ‘Update IP Address’ utility. Before the utility program starts, a pop-up message appears - “Do you want to allow the following program to make changes to your computer?”. On confirmation, a screen (Figure 1.13) showing the printer’s Previous IP address appears (in this case 192.168.1.11). Please note that the box next to the Test button would be blank. Figure 1.13 U pdate HP Software with Printer IP Address Step 6: We have to now check whether the printer’s Previous IP address matches the Printer’s current IP address. Your system may be connected to the printer through a wireless or an Ethernet connection. For Wireless Connection: Press the Wireless button or touch the wireless icon on the printer display. The printer’s IP address appears (see Figure 1.14). As shown in this screen, it is 192.168.1.5. In case, the printer does not have a display, print the Wireless Network Test Report. This report includes the printer’s IP address. Figure 1.14: Current IP Address of Printer For an Ethernet Connection: Press the Ethernet icon on the printer display. The printer’s IP address appears. In case the printer does not have a display, print the Network Configuration page. This report includes the printer’s IP address. Step 7: Update HP Software with Printer IP Address: From the above screens (Figure 1.13 and Figure 1.14), we can see that the Printer’s previous IP address saved on your system (192.168.1.11) does not match the Printer’s current IP address (192.168.1.5). Enter Printer’s current IP address or hostname in the box provided (HP Software screen is shown in Figure 1.13) and Click Test (to test the printer connection with the changed IP address). On successfully connecting to a printer with the current IP address, the software shows a Success message. Click Save to update the software with this new IP address. Print Jobs are Being Sent to the Wrong Printer When there are multiple printers on a network, a possible problem could be that a print job is being sent to a wrong printer. This is because your system has set the default printer as Printer A, but you had actually wanted the print job to go to Printer B. You could either change the default printer to Printer B or choose Printer B for the current job. Change the Default Printer To change the Default Printer, open the devices and printer dialog box. Click Start button> Control Panel > Hardware and Sound > Devices and Printers. Alternatively, click Start button > Control Panel > All Control Panel Items > Devices and Printers. The screen below (Figure 1.15) shows the default printer as HP Deskjet 3540 (Printer A). There is a tick inside a small green circle next to its icon (this signifies that HP Deskjet 3540 has been set as the default printer). Figure 1.15: Change the Default Printer Suppose you wish to change the default printer to say, HP Laserjet 1020 (Printer B). Right click on the icon for this printer, a pop-up menu is displayed (as shown in screen in Figure 1.15). Select, Set as default printer from this pop-up menu. The screen will now look like the one below (Figure 1.16). The tick next to the HP Laserjet 1020 icon shows that it is now the default printer. Figure 1.16: Default Printer Changed Note: Changing the default printer to Printer B, as described above, is possible even if Printer B is not connected to your network. Give a print job only if your system and Printer B are connected via a network. You must ensure that Printer B is on your network and that your system can establish a connection with it. Choose an Alternate Printer for the Current Print Job. When you give a print job, a Print screen opens, as shown in Figure 1.17. The Default Printer (here HP Deskjet 3540) is automatically selected for the print job. Figure 1.17: Print Screen If you wish to change to an alternate printer for the current print job, click on one of the available printer icons in the list. The next screen (Figure 1.18) shows HP Laserjet 1020 as the printer selected for the current job. As you can see, printer HP Laserjet 1020 is offline (not connected to your system via a network/ cable). The Print program allows you to select the printer even when the printer is offline. Ensure that this printer is online (connected to your system via a network/cable), before you click on the Print button and start the print job. Figure 1.18: Print Screen Printer is Slow The printing speed can be improved by reducing the printing quality and using Fast Draft/ Fast Printing. This works well for everyday printing. Change the default printer quality setting from Normal to Fast Draft. To do this, click the Preferences button (as seen on the screen in Figure 1.17 and 1.18).This will open the Printing Preferences screen (Figure 1.19). Under the Printing Shortcuts Tab choose Fast/ Economical Printing. Figure 1.19: Change to Fast Printing Sound Troubleshooting When you are not getting sound from the speakers, troubleshoot using the suggestions given below: Check Speaker Volume Check the volume level of the speakers. Click the Audio button in Task Bar to make sure the sound is turned on and that the volume is up (Figure 1.20). Figure 1.20: Checking for the volume level of the Speaker Check Audio Player Controls Many audios and video players have their own separate audio controls. Ensure that the sound is turned on and that the volume is set large enough to be heard. Check the Cables In case external speakers are used, ensure that the speakers are plugged into the electric socket, turned on, and connected to the correct audio port or a USB port on your system. If your computer has color-coded ports, the audio output port will usually be green. Check the Sound Using Headphones Connect headphones to the audio output port of your computer, and check whether you can hear sound from the headphones. If you can, that means there is something wrong with your speakers. Contact a Service Engineer. Troubleshooting Software Problems Common Troubleshooting Technique - Close the Program and Reopen it A simple troubleshooting technique would be to close the application/program and reopen it. If the problem persists, try other troubleshooting techniques. An Application is Running Slow Check for Available Updates If restarting the application does not improve the speed of the application, check for updates. Click the Help menu and look for an option to check for Updates. In case this option is unavailable, you can search online for application updates. An Application is Frozen Sometimes an application may freeze. When this happens, you will not be able to close the window or click any button within the application. The following troubleshooting options may be tried: Forcefully End the Application On a PC / Laptop keyboard, press (and hold) Ctrl+Alt+Delete (the Control, Alt, and Delete keys). This will open the Windows Task Manager (Figure 7.13). Open the Applications tab on this screen. You will see a list of applications. The applications should have the status as Running. An application which is not responding would have the status as Not Responding. Select the application which is not responding from the list and click the End Task button. This forcefully terminates the application. Now restart the application. Restart the Computer If you are unable to forcefully end an application, close all running programs and restart the computer. If you are unable to shutdown/ restart your system, perform a hard reboot by pressing the Power button, i.e. manually turn off the computer. This step should be performed in extreme situations, as a last resort. Remember that hard reboot may cause data loss. Once the system is responding, run the virus check to scan the system for viruses. Utilities Utilities are the special programs that help computer systems to work more smoothly, efficiently and effectively. Utility software programs help in : - improving the performance of computer - provide security from virus, - manage disk space - free disk space on hard Disk - provide backup etc. 1. Check for Viruses You may have malware running in the background, which is slowing applications on your system. Viruses generally lower the system’s performance. Run the virus scanner installed on your system. 2. Free Space on the Hard Drive Check Minimum Free Disk Space Required There should be at least 200-500 MB of free hard drive space on your system. Non-availability of free space slows the functioning of the computer. To check the amount of disk space available, Open the Windows Explorer Application and click on My Computer. This will show the different hard disk partitions such as C, and D. To check the amount of disk space available on the C drive, highlight the C drive and right click to get a pop-up menu as shown below: Figure 1.21: Pop-up Menu showing operations on a Disk Select the Properties option from this pop-up Menu. Choose ‘General’ Tab of this application. The screenshot in Figure 1.22 shows the available Free Space on the C Disk, shown by the purple pinkish coloured area in the Pie chart (here 1.91 GB). Figure 1.22: Free Space on a Disk Run a Disk Clean Up Application To get some more disk space, run the Disk Cleanup Application. On the General tab shown in Figure 1.22, click on the Disk Cleanup button, to start disk cleanup. Once the Disk Cleanup is complete, the Disk Cleanup dialog box opens (Figure 1.23). Click on Clean up system files button. This will delete any unnecessary system-related files from the local disk. Figure 1.23: Disk Cleanup Delete Unused Files and Programs Periodically delete files and programs you do not need. This will increase the free space on your disk, increasing the performance of your computer. Images and videos take up a lot of space. These can be moved to an external drive. This will free some space on the disk drive. Empty Your Recycle Bin This can be done by right-clicking on the Recycle Bin icon (usually on the desktop), and then selecting Empty Recycle Bin. Figure 1.24: Empty Recycle Bin Remove Temporary files It is important to periodically remove the temporary files and the Internet browsing history. This too will increase the free space on your disk. To do this you would need to first open the network and sharing dialog box. Click Start button> Control Panel > Network and Internet > Network and Sharing Center (Figure 1.25 same as Figure 7.25). Alternatively click, Start button> Control panel > All Control Panel Items> Network and Sharing Center. Figure 1.25: Network and Sharing Center Dialog Box On the bottom left corner of this screen, click on the link Internet Options. This opens the Internet Properties dialog box (Figure 1.26). Select the General tab. Under Browsing History, check the Delete browsing history on exit checkbox, and then click the Delete… button. This deletes the browsing history. Click the OK button to exit. Figure 1.26: Screen to delete temporary files and browsing history Disk Defragmentation The information in our files changes frequently. This results in gaps or spaces in the file stored in the memory (hard disk). The file thus takes more space on the computer, and may cause the computer to slow down. You need to run a Disk Defragmentation program to reclaim these gaps in space. This can be achieved as follows. − Open the Windows Explorer Application and click on My Computer. − Highlight the C drive and right click to get a pop-up menu. − Select the Properties option from this popup Menu. − The dialog box showing the properties of the local disk (C:) is displayed (Figure 1.27). − - - Choose the Tools Tab of this application. Click the Defragment now… button. Figure 1.27: Running the Defragmentation Application Remove Unused Programs Old or unused programs that are not being used may still have components running behind the scenes when you start your computer. This can slow down the system. To prevent these programs from running when your computer starts, turn off unused program services. For this purpose, from the Windows startup, click Start button > All Programs > Startup. Right-click the shortcuts that you do not need and click Delete (Figure 1.28) Figure 1.28: Removing unused Shortcuts Disable Unused Program Services: This is done in two steps. First, the unused program service is stopped. It is then disabled so that it does not run at Startup. Click Start button> Control Panel> Administrative Tools> Services. For each program/service that you are sure that you do not need, click on the Service to highlight it, click the Stop link to stop the service from running (Figure 7.29). Now double-click the stopped service and choose Startup Type as Disabled, and click OK (Figure 7.30). Figure 1.29: Stopping an unused program service Figure 1.30: Disabling a program Service The Computer is Frozen Sometimes the computer may become completely unresponsive, or frozen. When this happens, you won’t be able to click anywhere on the screen, open or close applications or access shut -down options. Force System Restart In such a situation, you would have to force a system shutdown. Press and hold the Power button. The Power button is usually located on the front or side of the computer. On a laptop, the Power button is usually located in the top center or left/ right corner of the keyboard. Press and hold the Power button for 5-10 seconds to force the computer to shut down. Now switch on the computer again. Troubleshooting Networking Problems Unable to Connect to the Network 1 Checking for Network Connectivity A common problem is that you are unable to open a web page that you had requested. This could be because you are unable to connect to the Internet. To check the internet connection, view the Network icon (triangular in shape). This is on the Task Bar (bottom right of the screen) (Figure 1.31). The screenshot in this figure shows that there is no network connection (an orange star on the network icon). Figure 1.31: Task Bar showing no Internet connection An alternate method to check for network connectivity is to click Start button > Control Panel > Network and Sharing Centre (Figure 1.32). The red cross between the USER-PC and Internet shows that the computer is not connected to the Internet. You would have to establish an internet connection. You may need to run the diagnosis to find the cause of the problem. Figure 1.32: Checking for network connectivity through Control Panel On the Task Bar, click the Network icon to see the available Internet connections. If you have opened the Network and Sharing dialog box (Start button > Control Panel > Network and Sharing Center), click on the link Connect to a network. This will open a list of Wireless Network Connections in the vicinity of your system, (Figure 1.33). Click on one of the connections and then click the Connect button. Figure 1.33: Wireless Network Connections in the vicinity of the system Once you have requested for network connectivity, the troubleshooting application will display a few screens while the system attempts to diagnose the issue: Windows Network Diagnostics: Investigate router or access point issues, Detecting problems, Resolving the problems, Detecting additional problems, etc. These screens will guide you in establishing a connection. For example, while investigating router or access point issues, it would ask you to turn off the router and restart it again (Figure 1.34). Figure 1.34: Investigation of router or access point issues If you are still unable to connect to the internet, the troubleshooting application would report the Problem in network connectivity. Figure 1.35 shows ‘Problem with wireless adapter or access point’. Try Switching Off and then Switching On the adapter. If that still does not work, repeat the whole process again after some time. Your network connectivity issue would probably be solved after a few attempts. Figure 1.35: Troubleshooting application showing the Problem in network connectivity Check for the Validity of IP Address If the above steps do not help in establishing a network connection, you would have to check a few more system settings. First check the validity of the IP address of your system. In the bottom left corner of your Windows screen click Start. In the Search box type CMD and press Enter (Figure 1.36a)..Figure 1.36a: Opening COMMAND PROMPT from the Startup Menu Alternatively, in the bottom left corner of your Windows screen click Start. In the Search box type Run and press Enter. This will open the Run application, which opens a program or document that you request it to. Type CMD in the Open textbox and press Enter (Figure 1.36b). Figure 1.36b: Opening COMMAND PROMPT using the Run application The COMMAND PROMPT (an MS-DOS window) will open. Type IPCONFIG and press Enter. The results should show the Connection-specific DNS Suffix, IP Address, etc., as seen in Figure 1.37. This information will only show if your system is connected to the internet, else, it will show Media State: Media disconnected. Figure 1.37: IPCONFIG showing the system’s IP address in the COMMAND PROMPT WINDOW The Network Fly lead is Not Working Properly The fly lead is the cable that connects the network card in your computer to a network point (usually on the wall). A non-operational network fly lead could also cause failure in the internet connection. The network fly lead is seated in the network slot on your computer. This slot is located either at the back of the computer or on the side, depending on your PC/laptop. Ensure that the fly lead is plugged securely into the network point on the wall. Check whether the cable or point has been damaged. If so, seek assistance from a network administrator. Your fly lead could be faulty or damaged. To check if your fly lead is faulty, borrow a working fly lead from someone and repeat the previous steps with the borrowed fly lead. If this borrowed fly lead works, your own fly lead is faulty. Seek assistance f rom a network administrator. Sometimes, the network point on the wall may not be activated. A network point will not work until it is activated. For this purpose, get help from your network administrator. The Network Card is Not Working Properly A working network card is essential to connect to the Internet. The network card lights must be flashing or lit up. If there are no lights, either the network card is broken, or there is no network to connect to. A broken network card needs repair or replacement. Contact a Service Engineer. Seek assistance from a network administrator to check whether the fly lead is plugged into the correct network card. If the machine has more than one network cards, you need to ensure that the cable is plugged into the network card configured for it (i.e. the fly lead should connect the network card to the network point on the wall, for which it is configured). To check whether the network card is working open a command prompt window (Start >Run >type CMD). An MS-DOS window will open, type ping 127.0.0.1 at the prompt. Alternatively, click Start and in the Search box type ping 127.0.0.1 and press Enter. This will run the ping command in the command prompt window. If you get a reply (as seen in Figure 1.38), the network card i s working. Figure 1.38: PING showing that the Network Card is working Contact a Service Engineer/ your Network Administrator in case there is no reply when you ping. Points to Remember: While working with a computer one comes across hardware, software and networking problems. In this chapter, we learned how to diagnose and fix minor problems. The following summarizes what we learned: - Computer is an electronic device that takes input from the user, processes it and displays output. - The on and off signals denote 1 and 0 respectively. The binary language, also called machine language, - Commands given in high level languages need to be converted into binary language with the help of translators. - Speed, accuracy, memory, diligence, versatility are some of the features of computer. - Hardware are the physical components of a computer like motherboard, memory devices, monitor, keyboard etc. - Software is the set of programs or instructions. - It is sometimes difficult to judge if the problem is hardware -related or software related. Identify the part of the computer system that is not functioning properly. - Before handing over your machine to an engineer, take a backup of important files to anothe r source, like a pen drive or an external hard disk. This would ensure a copy of your data is available, in case something unforeseen happens while your computer is being repaired. - Most systems produce a beep when a system boots successfully (i.e. all peripheral devices have been successfully detected). If any connected device does not switch on, try the common troubleshooting tips: close running programs that are not being currently used; check the cables; repeat to see if the problem recurs; use help; record error messages and restart the computer. - If the monitor is not showing any display or the screen is blank: the system could be in sleep mode; check all the connections; the laptop’s battery may be low. If the keyboard is not responding: check connections; check for any damage; try changing batteries in a wireless keyboard; the keys may be stuck, replacing the keyboard. - In case the mouse is not working: check connections; check for any damage and replace the mouse if required; restart the cordless mouse; clean the mouse. - The printer may not be responding because: it may not be connected properly or not switched on; the printer could be out of paper; there could be a paper caught in the printer; printer’s ink cartridge could be empty; an incorrect printer driver may be configured. - The printer and computer may not be communicating properly when a wireless connection is being used to connect a PC/ laptop to a printer. The IP address configured on your computer should match the Dynamic IP address allocated to the printer. - When the print jobs are being sent to the wrong printer: change the default printer or choose an alternate printer for the current print job. - To improve the printing speed, reduce the printing quality by using Fast Draft/ Fast Pri nting. - When there is no sound from the speakers: check speaker volume; check audio player controls; check the cables; check the sound using headphones. - When an application is running slow, check for available updates. - Sometimes an application may freeze. Forcefully end the application or restart the computer. - When all programs on the computer run slowly, check for viruses or try freeing space on the hard disk. - To free space on the hard drive: check minimum free disk space required; run a disk cleanup application; delete unused files and programs; empty the recycle bin; remove temporary files; run the disk defragmentation program; remove unused shortcuts and program services. - Force System Restart when the computer freezes. - When the computer is unable to connect to the network: check the network connectivity; check the validity of IP address; the network fly lead or network card may not be working properly. Exercises 1. List some common troubleshooting steps that you should keep in mind. 2. What steps would you take if the monitor is not showing any display, or the screen is blank? 3. What would you do when your keyboard or mouse is not responding/ working properly? 4. What troubleshooting step will you take when the printer is not responding? 5. How can you check the IP address of a printer connected through a wireless connection? 6. What steps do you need to take to change the default printer? 7. What could be the reasons for the print jobs being sent to the wrong printer? 8. What checks would you undertake when the speaker is not working? 9. What are the troubleshooting steps taken when an application freezes? 10. What could be the possible cause for all the applications to be running slow? 11. How can one free disk space on the computer? 12. How do we remove temporary files? 13. Why is disk defragmentation required? How can we achieve disk defragmentation? 14. What steps do we take to remove unused shortcuts and program services? 15. How can we check the network connectivity of your system? 16. Explain how you would check the validity of the IP address. 17. How will you check whether the network fly lead is working properly? 18. Describe the procedure to check whether the network card is working properly Unit-2 Networking and Internet Computer Networking Internet and Its Terminology Cyber Threats and Cyber Security Unit-2 Networking and Internet In the beginning of civilization humans communicated via means such as oral, gestures, and touch. Knowledge transcended from one generation to another largely by way of oral traditions, and later on by inscriptions on stone and metal until early forms of paper were developed. However, education remained largely confined to the elite until the invention of printing press by Johannes Gutenberg, around 1440. It led to dissemination of information through newspapers and books and provided a new and versatile method of communication of information. This was followed by the era of telegraph and telephone marking in the nineteenth century. Twentieth century saw the development of commercially viable radio and television which became instrumental in dissemination of information and entertainment. ARPANET that began with a network connecting computers in a few organizations in early sixties paved the way for the Internet in early eighties that revolutionized not only the exchange of information amongst individuals and organizations, but also the way organizations do business, and the people educate, entertain, and organize themselves. Social networking, instant messaging, voice calls (through VOIP), media are influencing the definition of Internet being used. 2.1 Computer Networking 2.1.1 Evolution of Networks and Internet In 1876 Bell came forward with the concept of communication through telephone lines leading to development of Public Switched Telephone Network (PSTN) in 1877. It opened the new frontiers allowing several homes to connect through telephone lines. From that time, communication was mainly through telephone lines. In the late 1950s, all the military communications started using telephone networks setting up dedicated connections between the two parties. This dedicated connection made use of technology called circuit switching. The connection consisted of several intermediary lines and switching offices enroute. They were vulnerable to danger of damage to the switching offices which may disrupt the entire network. At the peak of the cold war, the US Department of Defense (DoD) realized the need to establish fault-tolerant networks that would not fail at the time of nuclear war and could survive a single point failure in the network. Paul Baran along with Donald Davies and Len Kleinrock came forward with the idea of digital packet switching in which the message to be transmitted is divided into small chunks called packets. Unlike circuit switching in which resources are reserved along the dedicated path of communication, packet switching is based on link sharing. The US Department of Defense realized the need to connect geographically separated research computers together to form a network. This led to the development of Advanced Research Projects Agency Network (ARPANET) in 1969. ARPANET made use of technology called digital packet switching. Initially its use was restricted to non-commercial purposes such as military and research. Subsequently, its use extended to education by supporting various educational institutes. Need for communication between various heterogeneous networks led to the development of TCP/IP (Transmission Control Protocol/Internet Protocol) in 1970. Along with several smaller networks, another large network called NSFNET was developed in 1984 by NSF, U.S. National Science Foundation for research and education purposes. When ARPANET and NSFNET were interconnected, the network growth increased tremendously. TCP/ IP protocol (rules for communication) acted as a glue to connect various heterogeneous networks together into a single network. This wide network is an Internet (network of networks). The Internet is a global network that comprises many voluntarily interconnected networks. It operates without a central governing body. The standardization of the core protocols (IPv4 and IPv6) lis an activity of the Internet Engineering Task Force (IETF), To maintain interoperability, the principal name spaces of the Internet are administered by the Internet Corporation for Assigned Names and Numbers (ICANN). ICANN coordinates the assignment of unique identifiers for use on the Internet, including domain names, Internet Protocol (IP) addresses and many other parameters. Several government and private organizations, collectively called Internet Service Providers (ISPs) joined hands to Fig 2.1 one way communication channel provide connectivity for the Internet. The Internet made it possible to exchange information and communicate with remote nodes. Bandwidth describes the maximum data transfer rate of a network or Internet connection. 2.1.2 Computer Network Nodes or stations are electronic devices such as computers, printers, Fax machines, and telephones which communicate with each other by sending and receiving data/message. Figure 2.1 depicts a one-way simple communication system that comprises the following components: Sender: The node that is responsible for sending the data. Receiver: The node that is responsible for receiving the data. Message: Message is the information or meaningful data that is being communicated in a structured form. Channel: Channel is the communication medium through which message is transmitted Fig 2.2 computer network A collection of interconnected nodes which communicate by means of some channel form a computer network. The communication taking place in a computer network can be categorized as simplex, half-duplex, and full-duplex. In simplex mode, information can be transferred only in one direction. This mode is termed unidirectional. In computer networks, the data transmitted using many fiber optics and satellites is simple in nature. Half-duplex mode is a bidirectional communication between the two nodes, however, only one node at a time can transmit the data. This mode is generally used for transferring files between nodes in a low-bandwidth setting. In full-duplex mode, both communicating parties can send and receive at the same time. interactive receive at the same time. The interactive applications use this mode of communication, thus speeding up the data transfer. NIC (Network Interface Card) on the systems for networking supports full-duplex mode. Computer networks can be used as means of resource sharing and communication. Resource Sharing: Connecting computers through networking allows us to share hardware and software resources. Examples of hardware resources include peripherals (for example, printers and scanners), CPU, and memory. Examples of software resources include system and application software, and files that may include text, audio, and video content. Note that in the network shown in Figure 2.2, all the three computer systems are connected with each other and to the printer through the network. Communication: Connecting computers through a network facilitates exchange of information amongst the nodes in the network. For example, any of the computer systems in Figure 3 may send data to any of the three computer systems or the printer, as it is connected to every node in the network. Creation of a network requires various network devices such as modems, routers, switches, and bridges, each of which plays a specific role in the network. Networks differ on the basis of transmission media used, arrangement of nodes in the network, their geographical span, and their purpose. 2.1.3 Transmission Medium A transmission medium refers to the channel of transmission through which data can be transmitted from one node to another in the form of signal. A signal encodes the data in a form suitable for transmission on the medium. A medium is characterized by its bandwidth defining the information carrying capacity of the medium. Common methods of Internet access by users include dial-up with a computer modem via telephone circuits, broadband over coaxial cable, fiber optics or copper wires, Wi-Fi, satellite, and cellular telephone technology (e.g. 3G, 4G).A transmission medium may belong to one of the following two categories: Guided Medium: The term refers to physical conductors such as twisted pairs, coaxial cable, and fiber optics. In twisted pair and coaxial cable, the signal travels as voltage and current signal whereas in optical fibre, the signal is in the form of light. Unguided Medium: The unguided mediu, m uses electro-magnetic waves that do not require a physical conductor. Examples of unguided medium include microwave, radio wave, infrared. Radio and microwave Fig 2.1.3 Transmission Medium 2.1.4 Network Devices Creation of a network requires various network devices, each of which plays a specific role in the network. Repeater With increase in distance, a signal may become weak and distorted. A repeater is used to restore the input signal to its original form, so that it can travel a larger distance. Thus, it is placed between two cable segments as shown in Figure 2.4 It is also known as digital generator which reshapes and amplifies the digital signal.. Fig-Repeater 2.4 Hub Unlike a repeater which connects two cables, a hub connects several lines, also called, cable segments. A hub comprises several input/output (I/O) ports, each of which connects to a single cable as shown in Figure 2.4. Data arriving on an incoming line is output to all lines except the line on which the hub receives the data. Fig 2.5 Hub Bridge A bridge is a multiport device used for connecting two or more local area networks (LAN), possibly operating at different speeds as shown in Figure 2.5. Thus, a bridge may be used to produce bigger LAN by combining smaller LANs. A bridge enables devices on one LAN segment to communicate with the devices on another LAN segment. Unlike hubs, they are intelligent devices which exercise discretion while forwarding data to the outgoing line leading to the destination Fig. 2.5 Bridge Switch Unlike bridges which connect two or more LAN segments, switches are used to connect individual nodes in the network with each other. Each node within network is connected to a unique port in the switch as shown in Figure 2.6. On receiving the incoming data frame, it forwards it to only a single line connecting to the destination node. All the nodes connected through switch forms only one LAN. Fig 2.6 Switch Router Routers are used for connecting various networks (LAN or WAN) with each other as shown in Figure 2.7. A router transmits data from incoming network to another network. A router maintains a routing table of various networks. Based on the destination address, the router determines to which network the incoming packet should be transmitted Fig 2.7 Router Gateway A gateway connects networks based on different protocol technologies to communicate with each other. Data coming from one network operating on one protocol is converted according to the protocol of the outgoing network, and then forwarded. Thus a gateway may be thought of as a router equipped with software for protocol conversion. 2.1.5 Network Types On the basis of geographical span, network can be broadly categorized as PAN, LAN, MAN, and WAN. Personal area network A personal area network (PAN) is a computer network used for communication among computer and devices close to one person. Some examples of devices that are used in a PAN are personal computers, printers, fax machines, telephones, PDAs, scanners, and even video game consoles. A PAN may include wired and wireless devices. The reach of a PAN typically extends to 10 meters. Fig 2.8 PAN LAN stands for Local Area Network. Local Area networks are private networks and c an span a radius of up to 1 Km. They are generally established within a building or campus shown in Figure 2.9. LANs operate at a speed in the range 10 Mbps to 1 Gbps. Fig 2.9 LAN MAN stands for Metropolitan Area Network. It may be owned by a single organization or by many individuals or organizations. These networks are used to establish links within a city, and span an area of radius up to 50 Km. MANs facilitate sharing of resources by connecting various local area networks (Figure 2.10). For example, a cable television network within a city. Fig 2.10 MAN WAN stands for Wide Area Network. Typically a WAN spans a segment of about 1000 Km. They are used for long distance communication and are well suited for connecting remote areas. They establish links within a country or continent. A WAN may be owned and managed by several organizations. It connects various local and metropolitan area networks. Fig 2.11 WAN 2.1.6 Topology The arrangement (also called layout) of nodes in a network is called network topology. There are broadly two types of topologies broadcast and point to point. In broadcast topology, all nodes share the same physical link. When one node transmits, all nodes receive. Collision may occur when more than one node simultaneously transmits, and there is a collision resolution mechanism for handling it. Broadcast topologies are mainly bus and ring. In point to point topology, every pair of nodes has a dedicated link. Popular point to point topologies are star and mesh. Bus Topology In bus topology, there is a long cable, called backbone cable (or simply backbone), that connects various nodes through a connector called tap as shown in Figure 2.12. In this, a message sent by one is received by all devices connected to backbone cable. This topology requires less cabling and is easy to install and extend the network laid using it. However, fault detection and isolation is difficult. Fig 2.12 Bus Topology Ring Topology In ring topology, all the devices are attached through a cable in the form of ring as shown in Figure 2.13.The message to be communicated is transmitted in one direction, thereby, relaying the message to the intended recipient. addition and deletion of devices, and fault detection and isolation is easy. However, the topology suffers from the limitation of single point failure leading to disruption of the entire network. sending a message from one node to another node may take more time (four steps while sending message from device A to device E) Fig 2.13 Ring Topology Star Topology In star topology, all the devices are connected to the central controller called hub as shown in Figure 2.14. communication between any two devices takes place through the hub responsible for relaying messages. star network can be easily installed and configured. Also, fault detection and isolation is easy. However, it requires more cabling as com pared to bus and ring topology.also, hub failure will lead to network failure Fig 2.14 Star Topology Mesh Topology In mesh topology, every node is connected with every other node in the network as shown in Figure 2.15 Because of dedicated point to point connection between every possible pair of nodes, the topology provides secure data transfer without any traffic problem. it requires a large number of connections to establish the topology. This leads to difficulty in installation as the number of nodes grow as the network grows. Fig 2.15 Mesh Topology Tree Topology Fig 2.16 Tree Topology Tree topology is a hybrid topology using a combination of star and bus topology. Backbone cable in a bus topology acts like the stem of the tree, and star networks (and even individual nodes) are connected to the main backbone cable like the branches of tree as shown in Figure 2.16 damage to a segment of a network laid using tree topology will not affect other segments. installation and configuration is difficult as compared to other topologies. Also, if the backbone cable is damaged, the entire network communication is disrupted 2.1.7 Identification of computers and users over a network MAC Address Once a network has been set up, the nodes can communicate among themselves. But for proper communication, the nodes should be uniquely identifiable. If a node X sends some information for node Y on a network, then it is mandatory that nodes X and Y are uniquely identifiable on the network. Let us see how this is achieved. Each NIC has a universally unique address assigned to it by its manufacturer. This address is known as the MAC (Media Access Control) address of the card. It means that a machine with an NIC can be identified uniquely through its NIC's MAC address. The MAC address of an NIC is permanent and does not change. MAC addresses are 12-digit hexadecimal (or 48 bit) numbers. By convention, MAC addresses are usually written in one of the following two formats: MM:MM:MM: SS: SS:SS MM-MM-MM-SS-SS-SS The first half (MM:MM:MM) of a MAC address contains the ID number of the adapter manufacturer. The second half (SS: SS:SS) of a MAC address represents the serial number assigned to the adapter (NIC) by its manufacturer. For example, in the following MAC address, 00:A0:C9 : 14:C8:35 The prefix 00:A0:C9 indicates that the manufacturer is Intel Corporation. And the last three numbers 14:C8:35 are given by the manufacturer (Intel in this example) to this NIC. IP Address Every machine in a network has another unique identifying number, called its IP Address. An IP address is a group of four bytes (or 32 bits) each of which can be a number from 0 to 255. A typical IP address looks like this: 59.177.134.72 To make it easier for us to remember, IP addresses are normally expressed in decimal format as a "dotted decimal number" like the one above. On a network, the IP address of a machine, and not the MAC address of its NIC, is used to identify it. Do you recall IP protocol? IP protocol identifies a machine with its IP address to route the packets. MAC address is used only when a specific machine is to be targeted. For example, suppose we want to block a specific PC to access some network resource. If we use the PCs IP address, then the PC is not blocked permanently as its IP address may change when it connects to the network next time. Instead, if the PCs MAC address is used for the purpose, then the job is done! An IP (Internet Protocol) address is a unique 4 digit hexadecimal number assigned to each node on a network. IP address settings of a node can be changed by the user You might wonder how an IP address differs from a MAC address. In fact, the IP address is assigned by the network administrator or the internet service provider while the MAC address is assigned by the manufacturer. Thus if a computer is transferred from one network to another, its IP address gets changed whereas the MAC address remains the same.From the IP address it is usually possible to track the tentative location of the computer but this is not the case with a MAC address. Domain Name So, whenever we have to communicate with a computer on internet, we can do so by using its IP address. But it is practically impossible for a person to remember the IP addresses of all the computers one may have to communicate with. Therefore, a system has been developed which assigns names to some computers (web servers) and maintains a database of these names and corresponding IP addresses. These names are called Domain Names. Examples of some domain names are cbse.nic.in, sikkimipr.org, indianrailway.gov.in etc. Domain names are used in URLs to identify particular Web servers. For example, in the URL http://www.cbse.nic.in/welcome.htm, the domain name is www.cbse.nic.in. A domain name usually has more than one parts: top level domain name or primary domain name and sub-domain name(s). For example, in the domain name , in is the primary domain name; nic is the sub-domain of in; cbse is the sub-domain of nic.There are only a limited number of top level domains, and these are divided into two categories: Generic Domain Names and Country-Specific Domain Names. For example Generic Domain Names: ·com - commercial business ·edu - Educational institutions ·gov - Government agencies ·mil - Military ·net - Network organizations ·org - Organizations (nonprofit) Country Specific Domain Names:.in - India ·au - Australia ·ca - Canada.ch - China.nz - New Zealand.pk - Pakistan.jp - Japan.us - United States of America Domain Name Resolution is the process of getting the corresponding IP address from domain name. It happens as follows: Suppose you mention a URL in the web-browser to visit a website. The browser first checks your computer to find if the IP address of the server corresponding to the Domain Name (embedded in the URL) is present. If this address is present then with the help of this address, the corresponding server is contacted and then the website opens in your browser. Otherwise the browser sends this domain name to some specific servers (called domain name servers) to find the corresponding IP address. Once the IP address is known, the server is contacted and then the website opens in your browser. 2.2 INTERNET AND ITS TERMINOLOGY The Internet is helping in relearning and digital literacy. 2.2.1Digital literacy Digital literacy refers to raising knowledge and awareness about technology such as desktop computers, smartphones, tablets, and other electronic gadgets. It also includes familiarity with software tools and the Internet. This knowledge facilitates people to acquire, analyze, share, create, and deliver information in an efficient and constructive way. Digital literacy also aids people in several arenas such as education, social networking, e- commerce, healthcare, and tourism. Especially in education, it provides learners with digitally enhanced learning through use of technology. They can use technology to access Massive Open Online Courses (MOOCs) which are providing opportunities to study irrespective of the boundaries of time and space. Moreover, Prime Minister Narendra Modi has taken an initiative to make India, a Digital India to use technology proficiently and ethically. The campaign promotes building up of India-wide digital infrastructure to provide government services digitally to people even in remote. 2.2.2 Internet Services Network services are applications hosted by servers on a computer network, to provide some functionality for users of the network. There are several applications of Internet such as e-mail, file transfer, remote login, and World Wide Web (WWW). Electronic Mail (E-Mail) An email may be a written text and may include multimedia attachment consisting of text, audio, image, or video. Senders of the e-mail may send it to one or more intended recipients. Sending and receiving of mails can take place through web based email application also called webmail application, (such as, Gmail, Windows Live Hotmail, and Yahoo), or a desktop based email applications (such as, Microsoft outlook, Thunderbird). Transferring mail over the Internet is governed by a set of rules known as email protocols such as SMTP (Simple Mail Transfer Protocol) and POP3 (Post Office Protocol). File Transfer Transferring files from one machine to another through a TCP based network is done using FTP (File Transfer Protocol). File Transfer Protocol is based on client server architecture. Using FTP, local hosts (clients) can download or upload files to and from remote hosts (server). Remote Login (TELNET) TELNET stands for TErminaLNETwork. It is a client server based application that allows the user working on one system to access a remote system. For initiating remote login, the user (client) should specify the address of the remote system, and should authenticate himself/herself using username and password mechanism. On successful login, the client can access the remote system. TELNET service is often used for accessing data on the remote host, or executing on the server the applications installed on it (server). World Wide Web (WWW) World Wide Web (WWW), commonly known as web, is a repository of information on machines spread all over the Internet and linked to each other. The information is organized in the form of documents called web pages. A web page may contain text, images, audio, videos, and information for linking the web pages in the form of hyperlinks. WWW uses distributed client server architecture based on HTTP (HyperText Transfer Protocol). The client request is relayed through the Internet to the appropriate server, which sends back the reply through the Internet to the host system. 2.2.3 Internet Protocol Suite The Internet protocol suite is a set of communications protocols used in the Internet and computer networks. It is commonly known as TCP/IP because the foundational protocols in the suite are the Transmission Control Protocol (TCP) and the Internet Protocol (IP).The simple task of sending the data from one place to another through network requires several sub-tasks such as specifying sender and receiver’s network and physical address, dividing the message into smaller fragments so that they can be easily transmitted over Internet, taking appropriate measures for error and flow control, and taking necessary action on receiving the message. These sub-tasks or functions are performed by different layers of TCP/IP model as shown in Figure 2.17 Fig 2.17 Application layer:-Data/message is created at the sender’s end and at the receiving end it is examined and processed. This layer is also responsible for enveloping the message to be sent with the header. Several protocols such as HTTP (HyperText Transfer Protocol), POP3 (Post Office Protocol version 3) operate on this layer. POP3 allows you to download email messages on your local computer and read them even when you are offline. Transport layer:-Application layer passes the message to the Transport layer which appends the information about the source and destination ports of the processes at two ends. Two end-to-end protocols operate at this layer, namely TCP and UDP. TCP (Transmission Control Protocol) is a reliable connection-oriented protocol needed when timely and error free delivery of data is important. UDP (User Datagram Protocol) is an unreliable connectionless protocol for short messages and client server request-reply messages, where immediate response is more important rather than assured delivery. Transport protocol is used for streaming video. Further, the transport layer divides the message into a number of fragments, called segments, each segment will carry the sequence number denoting its relative position in the message, so that the message can be assembled at the receiver end. Internet Layer:-Transport layer hands over the segments to the Internet layer which adds source and destination machine network address (also termed IP addres s). In the Internet layer, Internet Protocol (IP) is used. IP defines the format of packets exchanged over the Internet. Link layer is also called Host to Internet layer. This layer is responsible for adding the header containing the sender and receiver physical address to the packet received from the Internet layer. 2.3 CYBER THREATS AND CYBER SECURITY 2.3.1 Security concerns With the increase in use of the network for accessing data and resource sharing, security is becoming a prime concern. The Internet represents an insecure channel for exchanging information, which leads to a high risk of intrusion or fraud, such as phishing, [viruses, trojans, worms and more. 2.3.1.1Malwares The term malware refers to malicious software (programs) designed with the intention to affect the normal functionality by causing harm to the system, or with the intention of getting unauthorized access to the system or denying access to legitimate users of computing resources. A malware may be a virus, worm, Trojan horse. Virus A virus is a software code that may harm your system by overwriting or corrupting the system files. A computer virus is similar in action to viruses in our body which replicate themselves and affect body cells. The affected part is called the infected area. A computer virus may make several copies of it by inserting its code onto the system programs, files or boot sector of hard drives and thereby may corrupt them. This causes the system to slow down or even stop functioning like boot sector virus, file infector virus, and macro virus. Worm A worm is often received via network, and it automatically keeps on creating several copies of itself on the hard disk thereby flooding the hard disk. When a worm is received as an email attachment, it is automatically forwarded to the recipients leading to network congestion. Thus, a worm may crash the system and entire network. No host application is required for worms to replicate themselves e.g. Code Red Worm which makes more than 2,50,000 copies of itself in approximately 9 hours. Trojan Horse Trojan Horse is a code that appears to be desirable and useful but ends up harming the system. Trojan horse can attach itself with a safe application. For example, it may be attached to any game downloaded over the Internet. Such an application when executed creates a backdoor in the system through which a hacker can access the system. The hacker can monitor all the activity performed on the system. He can also control the infected system by harming the data on the system. For example, in the late 1990s, Trojan Horse named Sub7 was created which took advantage of security flaws of earlier version browsers such as Internet Explorer and Chrome to illegally access the host computer. 2.3.1.2 Eavesdropping Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent. Eavesdropping is done through telephone lines, cellular networks, email, and instant messaging. 2.3.1.3 Denial of Service A denial-of-service attack (DoS attack) is a cyber-attack in which the machine or network resource becomes unavailable to its users by temporarily or indefinitely disrupting servic es. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests to overload systems and prevent requests from being fulfilled. A DoS attack is like a group of people crowding the entry door of a shop, making it hard for legitimate customers to enter. 2.3.1.4 Phishing Phishing refers to the act of stealing a user's personal information through fraud mails. These emails eit4er entail personal information through embedded forms or contain links to the web page that may prompt you to provide this information. Information attempted to be stolen may include bank account number, debit/credit card number, passwords or any other valuable data 2.3.1.5 Cyber Crime Cybercrimes are the crimes related to the misuse of computers or the Internet such as theft, fraud, and forgery. The IT act defines cybercrime as an unlawful act where in the computer is either a tool or a target or both. Some of these crimes are mentioned below Cyber bullying Harassment or bullying inflicted through the use of electronic or communication devices such as computer, mobile phone, laptop, etc. Cyber stalking Use of electronic communication by a person to follow a person or attempts to contact a person to foster personal interaction repeatedly despite a clear indication of disinterest by such person. Online Job Fraud An attempt to defraud people who need employment by giving them a false hope/ promise of better employment with higher wages. Vishing To seek personal information like Customer ID, Net Banking password, ATM PIN, OTP, Card expiry date, CVV etc. through a phone call. SMSing Use of mobile phone text messages to lure victims into calling back on a fraudulent phone number, visiting fraudulent websites or downloading malicious content via phone or web. SIM Swap Scam Getting a new SIM card against a registered mobile number Credit card (or debit card) fraud An unauthorized use of another's credit or debit card information for the purpose of purchases or withdrawing funds from it. Identity theft Dishonestly making use of the electronic signature, password or any other unique identification feature of any other person. Spamming Persuading a recipient to buy a product or service, or visit a website via email, SMS, MMS where he can make purchases. Ransomware The victim is asked to pay the demanded ransom to get his device decrypts. 2.3.2 Network Security Tools and Services Since the Internet has emerged as a prime tool for sharing resources and accessing data, an exponentially growing number of users are using it with both good and bad intentions. Everyone accessing the Internet needs to be aware of the security issues and take protective measures to address the same. Network layer security TCP/IP protocols may be secured with cryptographic methods and security protocol like Secure Sockets Layer (SSL) Firewalls A firewall aims at protecting the internal network of an organization, home, or individual from malicious traffic from external networks. A router or a computer (often dedicated to serve as a firewall) may be installed between external network and internal network for this purpose. Firewall inspects the network traffic and allows only that data to pass through the network that does not violate the security constraint. Hardware firewalls in the form of a router prevents malicious software from entering your network from outside the network. However, software firewalls installed on personal computers prevent unauthorized access or malwares from gaining access to personal computers. Network firewalls may also encrypt the incoming data by converting it to non-readable format, thus, adding further protection. Antivirus Anti-virus is software that aims to protect your system against malicious and potentially unwanted programs. It is responsible for detecting these malicious programs by searching for them, and removing them to keep the system protected. The software operates by maintaining a database of malware definitions, which are automatically updated. It searches for any malicious program by scanning the files against the stored malware definitions for a match. In case of a match, they are declared as potentially harmful, and are disabled and removed depending upon anti-virus software settings. Password managers A password manager is a software application that helps a user store and organize passwords. Password managers usually store passwords encrypted, requiring the user to create a master password; a single, ideally very strong password which grants the user access to their entire password database from top to bottom Cyber Law Cyber laws are the laws for systematic use of e-resources, for example, e-business, and serve as a measure against illegal cyber-crime. Various cyber laws have also been enacted to prevent cyber-crimes and take action against those involved in such crimes. These laws define the action that would be taken against people committing the offences. For cyber security, an amendment in IT Act 2000 named Information Technology Amendment Act,2008 was also introduced. The act also defines offences and penalties for cyber-crime. Cyber police are responsible for detecting such crimes and taking the necessary measure against it according to the IT Act. 2.3.3 Protective Measures while accessing Internet Never click on a suspicious link specified on a web page or send through a mail for which you are not sure about its authenticity. Make sure that passwords are strong and are changed frequently. Passwords are the means for authenticating users, thereby allowing access to networked systems. Weak passwords have smaller length and use a small subset of possible characters, and thus, are subjected to be cracked easily. One should also avoid setting obvious pas swords such as names, mobile numbers, or date of birth. Passwords should be strong, having long length and including characters such as numbers and punctuation signs. Never disclose personal information such as date of birth, home address, personal phone number, account details, passwords, credit and debit card details, work history details. Report phishing issues to the concerned authorities or at cybercrime.gov.in. In case of unsolicited mails, mark them as spam mails. Security of the communication made over the Internet can be indicated by the security of protocol being used. Secure Hypertext Transfer Protocol (HTTPs) is a secure version used for communication between client and host on the Internet. So, ensure that all communications are secure, especially online transactions. The security of the website can be ensured if there is a padlock on the left side of the address bar. It indicates that the website has a SSL (Secure Socket Layer) digital certificate issued by a trusted party which ensures and proves the identity of the remote host. Ensure that the web browser being used for accessing the web is updated and is secure. For example, chrome browser is up to date, if the security patch indicated by three dots on top right corner are grey in color. Green, orange and red color security patches indicate that browser update is available for two, four and seven days respectively. Be selective while making friends on the social networking site. Do not send or accept friendship requests from any unknown user. Also, trust the authenticity of a message only if you are sure about its origin (sender). Do not post any offensive content on social networking site as it may lead to a criminal action against you. Beware before spreading any kind of a rumor as it may be treated as a cyber-crime. If someone is harassing or threatening you, take snapshot of it as a proof, and block the person. Also, report the incident to the site administrator. Use updated antivirus and firewall, secure browsing, and password management techniques. Make sure that the website address is properly spelled. Because there may be two websites with almost the same name, one being a phishing website. Delete cookies periodically. A cookie is a small piece of information about the client browsing a website. On receiving a request from a client, the server records the client information such as domain name and registration id on the server site in the form of a file or a string. The server sends this cookie along with the response requested by the client. At the client side, the browser stores this cookie received from the server in a directory called cookie directory. By obtaining access to these cookies, hackers may gain unauthorized access to these websites. Thus, cookies should be deleted occasionally along with the temporary files stored on our system during web browsing. Points to remember A communication system consists of four components: sender, receiver, messages, and channel. A collection of interconnected nodes (electronic devices such as computers, printers, fax machines, and telephones) which communicate by means of some channel from computer network. Computer networks can be used as means of resource sharing and communication. A transmission medium refers to the channel of transmission through which data can be transmitted from one node to another. a transmission medium can be categorized as guided and unguided medium. u guided medium refers to the physical conductor such as twisted pair, coaxial cable, and fiber optics. The unguided medium uses electro-magnetic waves that do not require a physical conductor, for example, infrared, radio, microwave, and satellite links. The arrangement (also called layout) of nodes in a network is called network topology. In bus topology, there is a long cable, called backbone cable (or simply backbone), that connects various nodes through a connector called tap. In ring topology, all the devices are attached through a cable in the form of a ring. In star topology, all the devices are connected to the central controller called hub. In mesh topology, all nodes are connected with every other node in the network. Tree topology is a combination of star and bus topology. Backbone cable in a bus topology acts like the stem of the tree, and star networks (and even individual nodes) are connected to the main backbone cable like the branches of a tree. LAN stands for local area network. They are private networks and can span a radius of up to 1Km. they are generally established within a building or campus. Man stands for Metropolitan area network. it may be owned by a single organization or by many individuals or organizations. These networks are used to establish links within a city, and span an area of radius up to 50 Km. Wan stands for Wide area network. Typically, a WAN spans a segment of about 1000 Km. they establish link within a country or continent A repeater is used to restore the input signal to its original form, so that it can travel a larger distance. It is also known as a digital regenerator. A hub comprises several input/output (i/o) ports, each of which connects to a single cable segment. A bridge is a multiport device used for connecting two or more local area networks (LAN), possibly operating at different speeds. Switches are used to connect individual nodes in the network with each other. Routers are used for connecting various networks with each other. a router transmits data from an incoming network to another network. Gateway connects networks based on different protocol technologies to communicate with each other. A wide network of networks is known as the internet. It has made it possible to exchange information and communicate with remote nodes. A network protocol defines the rules and conventions of communication that must be followed when two devices interact with each other. it specifies what should be communicated, and how and when communication should take place. An email may be written text and may include multimedia attachment. Sender of the e- mail may se