Unit 3 Computer
Unit 3 Computer
Data: It is considered to be the raw fact in which alphabets, numbers and other symbols
were used. Eg: Ram, 10, Ramesh etc.
Information: When the data are processed they provide some result with meaning and that
meaningful result is known as information.
Field: A field is considered to be a property or attribute of a table. Eg: Roll no., Name etc.
Table: The combination of rows and columns is known as a table which must have a unique
name and should be simple in which a row defines the record and column defines the field of a
table.
Database: It is the collection of interrelated data items which are stored in a system and they can
be easily accessed by the user whenever needed
Flat File System: It is an ordinary way of storing data in the computer system by which we can
store the data until the disk gets full. This system may applicable only for processing short
queries.
Same sort of information are stored in more files and as a result it will occupy more
space on disk and data duplication may occur.
Special type of computer programs have to be written to retrieve the data such that it
will too difficult and consume more time and expensive too.
Security of data will be very poor in flat file processing.
When processing complex data difficulties may arise.
Advantages of DBMS:
Sharing the data: The data stored in a database can be shared without any
disturbance
No data duplication
Data backup and Recovery: Data may be recovered easily from the database server.
No data inconsistency: If data values are changed in one location automatically
changes will be applicable in all locations.
Security of the data: The data may be secured in such a method so that unauthorized
person cannot access the data even they work in a same dbase.
Ease of access: With the help of dbms the data may be accessed easily.
Dbms has the capacity of processing complex queries.
Disadvantages:
Technology based software so are more expensive.
Technical manpower needed to work on.
Backup is a must needed one.
Database models: The database management systems are developed according to the needs of
the structure and they are named as models. The different models of dbms are
Hierarchical model
Network database model
Relational dbase model
E-R dbase model
- It is record based representational or implementation data model. Different records are inter-
related through hierarchical or tree like structures.
- The root may have any number of dependents; each of these dependents may have any number
of lower level dependents.
- A parent record can have several children, but a child can have only one parent.
Parent (root)
AB AC AD
3. Relational model:
- Each row (record) represents an entity and a column (field) represents an attribute of entity.
- The relationship between the two tables is implemented through a common attribute in the
tables not by physical links or pointers.
- This makes query much easier in a relational database system than hierarchical or network
database system.
- More program friendly and the popular model in today’s commercial world.
1 X Y Z 1 X1 L Z
2 A B C 2 U1 V W
3 K L M 3 D1 E F
4 P Q R 4 G1 H I
RDBMS
4. Entity-Relationship Model:
- Entity relationship model is based on the perception of real world objects called entities and
relationship among those objects.
Database Users:
• Database users are those who interact with the database in order to query and update the
database and generate reports.
• On the basis of how users interact with the database, users are classified as below:
•
- Naive users or end user: normal users, invokes written application programs.
Database Administrator:
• They are the person who has central control over both data and application programs.
• Responsibilities of DBA:
- Schema definition and modification
- New software installation
- Security enforcement and administration
- Data analysis
- Preliminary database design
- Physical organization modification
- Routine maintenance checks
where P
• The basic structure of an SQL expression consists of three clauses: select, from and
where. These 3 clauses are basic DML language.
• The select clause corresponds to the projection operation of the relational algebra. It is
used to list the attributes desired in the result of query.
• The from clause corresponds to the Cartesian-product operation of the relational algebra.
It lists the relations to be scanned in the evaluation of the expression.
• The where clause corresponds to the selection predicate of the relational algebra. It
consists of a predicate involving attributes of the relations that appear in the from clause.
Schema: It is the structure of a database which defines name of tables, data fields with data
types, relationships and constraints.
Candidate key: Occasionally we may encounter a relation in which there is more than one
attributes possessing the unique identification property. So all attribute combinations inside a
relation that can provide the unique record in a relation are called candidate keys.
Primary key: The field or fields that contain the unique value can be set as primary key. It does
not permit duplicate or null values. For ex: the Reg No. of a student is a primary key.
Foreign key: An attribute of one entity whose values depend on the primary key of another
entity is called foreign key.
Composite key: In some tables, combination of more than one attribute provides a unique value
for each row. In such tables, the group of these attributes is declared as primary key. In such
cases, the primary key consists of more than one attributes, it is called composite-primary key.
For example combination of roll no and name is considered as composite key
Normalization: It is a database design process in which complex database table is broken down
into simple separate tables. It makes data model more flexible and easier to maintain. There are
two goals of normalization process: eliminating redundant data and ensuring data dependencies
make sense.
Importance of Networking:
Information sharing: The information from one system to another is shared so that
communication may be easily successive. This is one of the significant advantages of computers.
Hardware and Software sharing: Through networking all the hardware and software
resources may be shared so that the cost of the products may be reduced. For example: Group of
computers with a single printer to print through networking.
Fast and cheap communication: The communication through networking is faster and
cheaper. The networking computers are connected with one another with the help of some
medium by which the messages can be transferred. For a long distance, the messages are passed
faster so that the time will be saved.
Backup and recovery: The networking servers may share the data as backup and if the
data are lost they may recovered from the server.
Drawbacks of Networking:
Expensive: As the connection in the network needs extra devices and resources the cost
may increase.
Security of data: There are different methods of security in networking but problems like
damage of hardwares, virus infection may leads to the loss of data.
Technical support: There may occur lot of problems in a system and not everybody can
solve them; for that the IT technicians are required.
Mode of transmission:
The flow of data takes place in three types along transmission media. They are
simplex transmission, half duplex transmission and full duplex transmission
Simplex transmission: The flow of data here is in only one direction, i,e from the sending
device to the receiving device. This transmission is used only when the sending device does not
require a response from the receiving device. Eg: Computer Printer
Half duplex transmission: In this transmission the data flow is in either direction from the
sender to the receiver and receiver to sender but only in one direction at a time.
Eg: Fax Machine, ATM etc.
Full duplex transmission: The flow of the data is in both directions at the same time. Regular
telephone line uses full duplex transmission.
On the basis of architecture: The network types are differentiated on the basis of their
functionality. The choice of the connection is made according to the user requirement. In data
transmission there are different technologies used.
Advantages:
Easy to install.
Inexpensive.
No central administrator who sets the network policies.
No extra investment in server hardware or software required.
Does not require dedicated workstation.
Easy to troubleshoot
Disadvantages:
Less security.
Not suitable for more than 10 users.
Difficult to later time expand.
Useful for only small organization.
Each machine must be backed up individually to protect all shared data.
Client-Server Network:
An arrangement of computer to resources sharing and communicate to each other through a central
device (server) to all workstations (Clients) is called client-server network. The server is a high
capacity, high speed computer with a large memory. The clients/workstation can be simple
microcomputers having their own application package with network operating system. The central
server manages, organize and coordinate all network clients on the network. Clients request server
for data and communicate to other clients. Different types of server provide different services. The
most common service is provided by different servers are file services, print services, message
services and database services.
Advantages of LAN:
It provides cheaper and reliable communication medium.
High data transmission rate is possible.
Easy to add new computer to network.
Failure of one computer in the network does not affect the functioning for the other
computers.
Disadvantages of LAN:
Installation cost is high.
User authority and identification is poor.
Occupies limited geographical area.
Advantages of MAN:
Nodes are located in wider areas (generally connects the cities)
Owned by the big organization. (Government, Semi-government or big private organization)
It enables you to connect many fast LANs together.
It offers centralized management of data
It provides high security.
Disadvantages of MAN:
Data rate is slow as compared to LAN
Error rate is high as compared to LAN
Expensive.
Difficult to maintenance.
Advantages of WAN:
It covers large geographical area.
It connects different types of network together.
WAN has made life and communication very easy.
It can support large number of hosts.
It is owned by the multiple organizations.
Disadvantages of WAN:
Lower data transfer rate.
Set-up costs are higher.
Difficult to maintenance.
Network Topologies:
Topology refers to the way in which a network is laid out physically. Geographic orientation and
arrangement of networking components is known as LAN topology. While selecting the network
topology the following point must be considered.
The cost of physical interconnections.
The time delay during the communication.
Reliability and possibilities of failure.
Network controlling strategy or protocol.
The different kinds of network topology used in computer networking are Bus/linear, Ring, Star,
Tree and Mesh.
Bus topology:
In case of Bus topology, all devices share single communication line or cable. Bus topology may have
problem while multiple hosts sending data at the same time. Therefore, Bus topology either uses
CSMA/CD technology or recognizes one host as Bus Master to solve the issue. It is one of the simple
forms of networking where a failure of a device does not affect the other devices. But failure of the shared
communication line can make all other devices stop functioning.
Both ends of the shared channel have line terminator. The data is sent in only one direction and as soon as
it reaches the extreme end, the terminator removes the data from the line.
Advantages of Bus topology:
Easy to install and cheap.
Easy to add new nodes.
Less cable required.
It does not affect the network if one computer goes down.
Ring Topology:
Ring topology consists of several computer joined together to form a circle. It is called loop
topology. Messages move from one computer to the next in one direction only. When a computer
receives a message addressed to it, the message is copied and sent back with modification to indicate
that it was received. Computers connected to a ring topology are responsible for moving data from
themselves to next computer. Thus, if one computer fails, it affects the rest of the network.
Star topology:
In star topology, each device (node) has a dedicated point to point link only to a central controller,
usually called hub. The computers are not directly linked to one another. Unlike other topology, star
topology does not allow direct traffic (flow of data) between computers. The controller acts as an
exchange. If one computer wants to send data to another, it first sends the data to the controller which
then relays the data to the other computer. If one link fails, only that link is affected and all other
links are active.
Tree Topology:
In tree topology, the nodes are connected to each other in such a way that forms like a tree structure.
Typically to form a tree network, multiple star topologies are combined together. This type of
network has combined features of bus and star topology. One tree topology the hubs of each star
topology are connected to the central hub that controls the entire network. However, some nodes can
be directly connected to the central hub.
Advantages of tree topology:
Easy to extend because it is divided into many sub-units.
Easy to add new nodes to branches.
Supported by several hardware and software venders.
It supports various types of cable.
Mesh Topology:
In mesh topology, each computer has a dedicated point to point link to other computers. The term
dedicated means that the link carries traffic only between the two devices. Hence, a fully connected
topology of 'n' computers has n(n-1)/2 links. If one link fails, it does not affect entire system. It has
privacy or security. Large amount of cable is required.
Hybrid Topology
A network structure whose design contains more than one topology is said to be hybrid topology. Hybrid
topology inherits merits and demerits of all the incorporating topologies.
The above picture represents an arbitrarily hybrid topology. The combining topologies may contain
attributes of Star, Ring, Bus, and Daisy-chain topologies. Most WANs are connected by means of Dual-
Ring topology and networks connected to them are mostly Star topology networks. Internet is the best
example of largest Hybrid topology.
Coaxial Cable:
It consists of wire surrounded by insulating layer, shielding layer ad outer jacket. Quarter inch or
more in diameter, therefore less flexible than twisted pair. Less susceptible to noise but more
expensive than twisted pair. Wider bandwidth, more difficult to install, more costly than twisted pair.
Data transfer rate up to 150 MBPS. Used extensively in LAN and relatively short distance (10 miles).
For longer distance, repeaters may be necessary.
Usage: Data communication, Voice communication, Video communication
b. Thicknet: Thicknet is an Ethernet technology uses thick type of coaxial cable. It is also known as
10Base5, i.e. 10Mbps data transmission, Baseband connection and 500 meter for data transmission. It
has an extra protective plastic cover that helps keep moisture away from the conductor. It is popular
for cable television transmission.
Fiber Optic Cable:
One or more glass or plastic fibers are woven together to form the core of the cable. This core is
surrounded by a glass or plastic layer called the cladding, which in turn is covered with plastic or
other material for protection. Light source is used is either laser or LED (Light-Emitting Diodes)
whereas detector is a photodiode.
Low error rate, very high noise immunity to electrical and magnetic noise.
Reduced size and weight, but easy to break.
High cost of installation with special equipment and skilled manpower required.
Very expensive but may be economical for high volume application.
Broadband width.
High data rate over 2 Gbps.
Usage: Voice communication, Data communication and Video communication
Unguided/Wireless communication media:
Unguided communication media transmits the information through the air in much the same way as
radio stations broadcast their programming. They are also called unbound or wireless transmission
media because they do not use any physical wire or a closed circuit for data communication.
Following are the example of unguided communication media are: Satellite, Microwave, Wireless
media.
Microwave:
Parabolic antennas are mounted on towers to send beams.
It is cheaper than digging trenches for laying cables, and maintaining repeaters of cables if cables
get broken by a variety of causes.
Transmitter and receiver must be in line of sight- 30 miles apart because of earth curvature.
Possible interference from environment.
Lack of security.
High initial equipment cost.
Relatively high speed data rates upto 250 Mbps.
Usage: Voice communication (Cellular services)
Satellite:
Line of sight required between satellite and earth stations.
12 to 24 transponders per satellite. These transponders receive, amplify, change frequency and
transmit.
Geosynchronous orbit (22,300 miles)
Low security. Anyone with satellite dish and right frequency can tune in.
Easy of adding stations.
Data rates of upto 50 Mbps.
It provides high bandwidth for large amount of audio, data and video transmission.
Usage: Television transmission with multiple channels.
Wireless media:
Some common types of wireless media are infrared light and radio. Infrared transmission is usually
limited to a small area, e.g. one room, with transmitter pointed toward the receiver. The hardware is
inexpensive and does not require an antenna. A network that uses electromagnetic radio waves
operates at Radio Frequency and its transmissions are called RF transmissions. Each host on the
network attaches to an antenna, which can both send and receive RF.
Bluetooth
It is a low cost, low power, wireless radio frequency technology that allows various devices to
communicate with each other. One of the advantage of Bluetooth over infrared is that close
proximity between the communication devices is not required distance of up to 10 meters or 32 feet
are allowed.
Switch/Hub
A switch is a device that provides a central connection point for cables from workstations, servers,
and peripherals. In a star topology, twisted-pair wire is run from each workstation to a central
switch/hub. Most switches are active, that is they electrically amplify the signal as it moves from one
device to another. Switches no longer broadcast network packets as hubs did in the past, they
memorize addressing of computers and send the information to the correct location directly. Switches
are: Usually configured with 8, 12, or 24 RJ-45 ports
Often used in a star or star-wired ring topology
Sold with specialized software for port management
Also called hubs
Routers
A router translates information from one network to another; it is similar to a super intelligent bridge.
Routers select the best path to route a message, based on the destination address and origin. The
router can direct traffic to prevent head-on collisions, and is smart enough to know when to direct
traffic along back roads and shortcuts. While bridges know the addresses of all computers on each
side of the network, routers know the addresses of computers, bridges, and other routers on the
network. Routers can even "listen" to the entire network to determine which sections are busiest
they can then redirect data around those sections until they clear up. If you want to connect to the
Internet in your network, you will need to purchase a router. In this case, the router serves as the
translator between the information on your LAN and the Internet. It also determines the best route to
send the data over the Internet. Routers can:
Direct signal traffic efficiently
Route messages between any two protocols
Route messages between different topologies
Route messages across fiber optic, coaxial, and twisted-pair cabling
Gateway
A gateway is a node or a device that servers as an entrance to another network. The gateway routes
the traffic from a workstation to the outside network that is in the network or in the websites. The
gateway is used to connect the users to the internet. The gateway also acts as a firewall in the
network.
Repeaters
Since a signal loses strength as it passes along a cable, it is often necessary to boost the signal with a
device called a repeater. The repeater electrically amplifies the signal it receives and rebroadcasts it.
Repeaters can be separate devices or they can be incorporated into a concentrator. They are used
when the total length of your network cable exceeds the standards set for the type of cable being
used. A good example of the use of repeaters would be in a local area network using a star topology
with unshielded twisted-pair cabling. The length limit for unshielded twisted pair cable is 100 meters.
The most common configuration is for each workstation to be connected by twisted-pair cable to a
multi-port active concentrator. The concentrator amplifies all the signals that pass through it allowing
for the total length of cable on the network to exceed the 100 meter limit.
Communication Protocol
A protocol is a set of rules that governs the transmission of data over a communication network.
These rules provide a method for orderly and efficient exchange of data between sender and receiver.
These rules include the guidelines that regulate the following characteristics of the network: access
method, allowed physical topologies, types of cabling and speed of data transfer.
The OSI model is based on a proposal developed by the ISO as a first step toward
international standardization of the protocols used in the various layers. The model is called ISO,
OSI(Open Systems Interconnection) reference model because it deals with connecting the open
systems, i,e the systems that are open for communication with other systems.
There are seven layers in this model and each layer carries out specific
functions in transmitting data on the network.
The physical layer: The physical layer is concerned with transmitting raw bits over a communication
channel. The design issue have to do with making sure that when one side sends a 1 bit information it is
received by the other side as a one bit and not as a 0 bit. So the designing may include the connection of
pins and deals with mechanical, electrical, and procedural connectivity. It accepts data from the data link
layer in bit streams for the subsequent transmission over the physical medium.
Data Link Layer: The main task of the data link layer is to take a raw transmission facility and transmit
it into a line that appears free of undetected transmission errors to the network layer. This layer is
responsible for better transfer of data across the physical link.
Network Layer: This layer is concerned with controlling the operation of the subnet. The key designing
of this layer is determining how packets are routed from source to destination. During the travelling of
packets from one network to another lot of problems may occur and may be solved by network layer.
Transport Layer: The basic function of this layer is to accept data from the session layer, split up into
smaller units if need be, pass these to the network layer and ensure that the pieces all arrive correctly at
the other end. This layer also determines what type of service to provide the session layer. Data
multiplexing and de-multiplexing is carried here.
Session Layer: This layer allows users on different machine to establish session between them. One of
the service of the session layer is to manage dialogue control. It can allow traffic to go in both directions
at the same time, or only in one direction at a time. If traffic can only go one way at a time this layer can
help to keep the track of whose turn it is.
Presentation Layer: This layer is mainly responsible for code conversion, data compression, encryption
and so on. Most user programs do not exchange random binary bit strings, they exchange things such as
names, data, and so on. These items are represented as character strings, integers, floating point numbers
and so on. Different codes are used here such as ASCII, BCD, Binary, 1's and 2's compliment's and s on.
Application Layer: This layer is used for various purposes. All the transferring and sharing may carried
by this layer. This layer has variety of protocols by which all the actions such as file transfer, resource
sharing, remote file access, network management can be achieved easily.