Download INTRODUCTION TO INFORMATION SYSTEMS TECHNOLOGY

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Bus (computing) wikipedia , lookup

Net neutrality law wikipedia , lookup

Network tap wikipedia , lookup

Deep packet inspection wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Airborne Networking wikipedia , lookup

Wireless security wikipedia , lookup

Internet protocol suite wikipedia , lookup

Computer network wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Computer security wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Transcript
Review For Final
(Fall 2008)
© Abdou Illia
1
Computer Hardware
2
The Core Computer Components

Three subsystems in a computer system:
1. Input subsystem
2. Processing subsystem
3. Output subsystem
3
Output Devices

Monitors



Cathode ray tube (CRTs)
Liquid crystal displays (LCDs)
Quality of display




Resolution in pixels (e.g. 640 x 480)
Dot pitch in millimeters (.26 to .28)
Active-Matrix vs. Passive-Matrix display
Touch screens

Input and output via display device
Monitor size
Common resolution
15 inches
640 x 480
17 inches
800 x 600 or 1024 x 768
19 inches
1024 x 768 or 1280 x 1024
4
Printers

Speed and resolution


Pages per minute (PPM)
Dots per inch (DPI)



Impact printers



Number of ink dots to fill a square inch
Higher DPI = greater page clarity
Create image by striking paper and ribbon
Dot-matrix printers = most common impact printers
Non-impact printers

Create image by spraying or rolling ink on the page
5
I/O devices or Secondary Storage


Nonvolatile storage of digital data
Magnetic or optical
 Magnetic storage (Floppy disk, Magnetic
tape, Zip disk, Hard disk)


Sequential access (tape) or direct access (HDD)
Hard disk drives

Two main standards:
 IDE (Integrated Drive Electronics) aka ATA (AT Attachment)
 SCSI (Small Computer System Interface)


SCSI allows disk fault-tolerance through RAID – Redundant
Array of Inexpensive Disks
Disk speed:
 Transfer rate in MBps (Megabytes per second)
 Average Read Time (in milliseconds or ms)
 Platter rotation speed in RPM (5400/7200/10,000/15,000)
6
Measuring Storage Capacity
7
Processing subsystem

Two major components


CPU (Central Processing Unit) or Processor(s)
Primary Storage:
 Random Access Memory (RAM)
 Read Only Memory (ROM)
CPU
Busses that
transfer data
Primary Storage
8
Central Processing Unit
Processor

Clock: generate time that
synchronize other components

ICU: Fetches instructions from
RAM

ALU: Execute instructions
(arithmetic & logic operations)

Registers: Store control
information, data, intermediate
results
Clock
Instruction
Control Unit
Arithmetic
Logic Unit
Registers
9
CPU speed

Speed measured in hertz



Hertz = # of instructions executed per second
Megahertz = 1 million of instructions per second
Gigahertz = 1 billion of instructions per second
Major Processor manufacturers
Intel
-
Celeron
- Pentium 3, Pentium 4, Pentium 4 Xeon, Dual Core
Advanced Micro Devices (AMD)
- K6 series processors (which compete with Intel Pentium 3)
- Athlon series (which compete with Intel Pentium 4)
IBM
- PowerPC 740, 750, 750FX, 750GL, 750GX
10
Primary Storage
 Computer’s memory stored on semiconductor chips
 Two categories:
 RAM (Random Access Memory) which is volatile
 Synchronous Dynamic RAM (SDRAM)
 Double Data Rate SDRAM or DDR SDRAM
 ROM (Read-Only Memory) which is non-volatile
 Capacity in Megabytes (MB) or Gigabytes (GB)
Primary Storage
RAM
Program

RAM holds running programs
and the data they use

ROM contains critical
programs such as those that
boot the computer
Data
ROM
11
Summary Questions
Book
Notes
1) Name two devices that could be used for both input
and output.
2) What is the difference between: (a) a Kilobyte and a
Gigabyte? (b) a Megabyte and a byte?
3) What is the function of the Instruction Control Unit
or ICU found in the processing subsystem?
4) Explain the difference between RAM and ROM.
5) What is pixel? What is dot pitch
6) What is a byte?
7) What is a Hertz?
12
Network Technology
13
Computer Network

Once connected to the network,
the computer (or another device)
becomes a network node
An interconnection of computers and
computing equipment using either wires
or radio waves over small or large
geographic distances
GHI
DEF
ABC
MNO
“Connect to GHI”
JKL
14
Physical
Transmission Media

Physical media



Wireless
Transmission media used to physically connect
nodes in to the network
Transmits electrical or optical signals
Could be cooper wire or fiber optic cable
15
Transmission Media (Continued)

Twisted Pair
Category
Use
Signal
Data rate
Distance
Problem
Category 1
Telephone
Analog/Digital
<100Kbps
3-4 miles
Security, noise
Category 2
T1, ISDN
Digital
<2 Mbps
3-4 miles
Security, noise
Category 3
LANs
Digital
10 Mbps
100 m
Security, noise
Category 4
LANs
Digital
20 Mbps
100 m
Security, noise
Category 5
LANs
Digital
100 Mhz
100 m
Security, noise
Category 6
LANs
Digital
250 Mhz
100 m
Security, noise
Category 7
LANs
Digital
600 Mhz
100 m
Security, noise
16
Wireless Media



Uses electromagnetic waves or electromagnetic radiation
for data transmission
Propagation through space, and indirectly, through solid
objects
Two kinds of wireless media used

Radio waves (radio Frequency)

Infrared light




Affected by Multipath interference
Highly vulnerable to snooping
Limited distance
Blocked by thick objects

Close proximity and “line of sight” location required
Laptop
Comm.
Tower
17
Network Topologies

The configurations of network components



How physically the network looks like
How logically data is transferred on the network
Widely used network topologies:



Bus
Star
Ring
18
Network Architecture

Defines how the
processing takes
place on the network

Two primary types


Client-server
Peer-to-peer (P2P)
19
Protocols


An agreed upon set of rules that govern
communications in a network
Example: TCP/IP suite, Ethernet, Token Ring
Computer 1
Computer 2
Rules for Task 1
Rules for Task 1
Rules for Task 2
Rules for Task 2
Rules for Task 3
Rules for Task 3
Rules for Task 4
Rules for Task 4
Rules for Task 5
Rules for Task 5
20
TCP/IP
TCP/IP suite is named after its two main protocols: TCP and IP
Transmission Control Protocol (TCP)


Provides a reliable byte-stream transfer service between two
endpoints on an internet

Internet Protocol (IP)

Defines a delivery mechanism for packets of data sent between all
systems on an Internet


It’s the protocol suite for the Internet
Task
Sample rules/protocols
Application
HTTP, FTP, SMTP
Transport
TCP, UDP
Internet
IP
Physical
Ethernet, Token Ring, PPP, Modem standards
21
Ethernet




A set of rules for transmitting messages in LANs
Most widely used protocol for LANs
Uses a method called CSMA/CD* for wired LANs
Set rules to handle collisions
CSMA/CD*
1)
2)
3)
4)
All computers (“carriers”) listen (“sense”) for traffic on the LAN
If no traffic, computer that wishes to transmit may transmit
If collision occurs, computers must wait a random amount of time
The computer with smallest random number send again first.
* Carrier Sense Multiple Access with Collision Detection
22
Token Ring


Other set of rules for transmitting messages in LANs
Only one node “talks” at a time

A node only transmit when it receives a special packet called
a “Token”

Only one Token on the ring
No collisions

23
Summary Questions
Malaga
Notes
1) What is a node?
2) Name physical and wireless media used in networking
3) What transmission media is used for the telephone?
4) What are the main network topology? What are the
differences between them?
5) Distinguish between Client-server and P2P networks
6) Could collisions occur in Token Ring networks? In
Ethernet networks?
7) What is TCP/IP?
24
The Internet and
eBusiness
Refer to Review For Exam 3 material posted to the
course web site
25
IS For Business
Integration
Refer to Review For Exam 3 material posted to the
course web site
26
Security and privacy
Refer to Review For Exam 3 material posted to the
course web site
27
Development of IS
Refer to Review For Exam 3 material posted to the
course web site
28