Review. Secondary Memory Devices Information is moved between main memory and secondary memory as needed Central Processing Unit Main Memory Floppy Disk.

Slides:



Advertisements
Similar presentations
Basic Computer Vocabulary
Advertisements

Firewall Lalitha Jammalamadaka. Agenda 1. Introduction 2.Types of firewalls 3.How a software firewall works 4.Methods to control traffic 5.Making the.
The Internet Useful Definitions and Concepts About the Internet.
Introduction to Computers
CSE1301 Computer Programming: Lecture 1 Computer Systems Overview.
The Internet and the World Wide Web. Una DooneyThe Internet and WWWSlide 2 What is the Internet? A collection of networks (LANS and WANS) around the world.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
1 Introduction to Computers Prof. Sokol Computer and Information Science Brooklyn College.
How Do Computers Work? A Gentle Introduction
UNIT 9 Computer architecture
Lesson 19 Internet Basics.
Inside of a computer… What happens when you turn your computer on? What loads? Where are applications stored? How are do they run? In what form is information.
Introduction to Computers Section 1A. home Definition of a Computer A computer is an electronic device used to process data, converting the data into.
A global, public network of computer networks. The largest computer network in the world. Computer Network A collection of computing devices connected.
How Do Computers Work? A Gentle Introduction Poly Pride.
An Introduction to Hardware, Software, and the Internet
Lesson 2 — The Internet and the World Wide Web
2013Dr. Ali Rodan 1 Handout 1 Fundamentals of the Internet.
Introducing the Internet Source: Learning to Use the Internet.
The Computer Systems By : Prabir Nandi Computer Instructor KV Lumding.
Java Software Solutions Foundations of Program Design
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
Introduction to Computers
Introduction to Computers
Networks QUME 185 Introduction to Computer Applications.
Business Computer Information Systems I.  Knowing how to use a computer is a basic skill necessary to succeed in business or to function effectively.
Course ILT Basics of information technology Unit objectives Define “information technology” (IT), distinguish between hardware and software, and identify.
1 Web Development & Design Foundations with XHTML Chapter 1 Key Concepts.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
Firewalls. Intro to Firewalls Basically a firewall is a __________to keep destructive forces away from your ________ ____________.
The System Unit What is the motherboard?  Also called the system board  Main circuit board in the system unit  Contains many electronic components.
An Overview of the Internet: The Internet: Then and Now How the Internet Works Major Features of the Internet.
Communication, Networks, The internet and the Worldwide Web.
1 Hardware and Software b Hardware the physical, tangible parts of a computerthe physical, tangible parts of a computer keyboard, monitor, wires, chips,
Computer Architecture
© 2011 Pearson Education, publishing as Addison-Wesley Chapter 1: Computer Systems Presentation slides for Java Software Solutions for AP* Computer Science.
MSBCS-BCSI-1 Students will identify computer system components MSBCS-BCSIII-8 Students will examine basics of networking Computer Basics & Terminology.
© 2006 Pearson Education Chapter 1: Computer Systems.
1 A Computer Specification  Consider the following specification for a “simplified” personal computer: 950 MHz Pentium 4 Processor 512 MB RAM 30 GB Hard.
A.Abhari CPS1251 Topic 1: Introduction to Computers Computer Hardware Computer components Connecting Computers Computer Software Operating System (OS)
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
1 Introduction to Computers Prof. Sokol Computer and Information Science Brooklyn College.
SEPTEMBER 8, 2015 Computer Hardware 1-1. HARDWARE TERMS CPU — Central Processing Unit RAM — Random-Access Memory  “random-access” means the CPU can read.
Week-7 (Lecture-1) Internet Protocols: TCP/IP, Client Server: Protocol: Specification in networking and Communications It defines the procedures to be.
CIS 1203 Web Technologies Introduction to the Internet and the WWW.
Introduction to Programming. Key terms  CPU  I/O Devices  Main memory  Secondary memory  Operating system  User interface  Application  GUI 
Internet Basics. The Internet: Then and Now The Internet was created by the Advanced Research Projects Agency (ARPA) and the U.S. Department of Defense.
1 ** THE INTERNET ** Large, worldwide collection of networks that use a common protocol to communicate with each other A network of networks.
Internet.
Computer and Internet Basics
Chapter Objectives In this chapter, you will learn:
Review.
An Overview of the Computer System
E-commerce | WWW World Wide Web - Concepts
E-commerce | WWW World Wide Web - Concepts
Inside of a computer… What happens when you turn your computer on? What loads? Where are applications stored? How are do they run? In what form is information.
Chapter 1: Computer Systems
Looking Inside the machine (Types of hardware, CPU, Memory)
An Overview of the Computer System
Web Design & Development
Chapter 3 Hardware and software 1.
Information Technology Ms. Abeer Helwa
Inside of a computer… What happens when you turn your computer on? What loads? Where are applications stored? How are do they run? In what form is information.
Chapter 3 Hardware and software 1.
Chap 2. Computer Fundamentals
FIREWALL.
Firewall Installation
Lesson 19 Internet Basics.
Presentation transcript:

Review

Secondary Memory Devices Information is moved between main memory and secondary memory as needed Central Processing Unit Main Memory Floppy Disk Hard Disk Secondary memory devices provide long-term storage Hard disks Floppy disks ZIP disks Writable CDs Writable DVDs Tapes

A Computer Specification Consider the following specification for a personal computer: –2.8 GHz Pentium 4 Processor –512 MB RAM –80 GB Hard Disk –48x CD-RW / DVD-ROM Combo Drive –17” Video Display with 1280 x 1024 resolution –56 Kb/s Modem What does it all mean?

Software Categories Operating System –controls all machine activities –provides the user interface to the computer –manages resources such as the CPU and memory –Windows XP, Unix, Linux, Mac OS Application program –generic term for any other kind of software –word processors, missile control systems, games Most operating systems and application programs have a graphical user interface (GUI)

Memory Main memory is divided into many memory locations (or cells) Each memory cell has a numeric address, which uniquely identifies it Remember this?

Storage Capacity Every memory device has a storage capacity, indicating the number of bytes it can hold Capacities are expressed in various units: KB2 10 = 1024 MB2 20 (over 1 million) GB2 30 (over 1 billion) TB2 40 (over 1 trillion) UnitSymbolNumber of Bytes kilobyte megabyte gigabyte terabyte

Bit Combinations Each combination can represent a particular item There are 2 N combinations of N bits Therefore, N bits are needed to represent 2 N unique items 2 1 = 2 items 2 2 = 4 items 2 3 = 8 items 2 4 = 16 items 2 5 = 32 items 1 bit ? 2 bits ? 3 bits ? 4 bits ? 5 bits ? How many items can be represented by

The Central Processing Unit (CPU) A CPU is on a chip called a microprocessor It continuously follows the fetch-decode-execute cycle: fetch Retrieve an instruction from main memory decode Determine what the instruction is execute Carry out the instruction

The Central Processing Unit The CPU contains: Arithmetic / Logic Unit Registers Control Unit Small storage areas Performs calculations and makes decisions Coordinates processing steps

The Internet was created by the Advanced Research Projects Agency (ARPA) and the U.S. Department of Defense for scientific and military communications. The Internet is a network of interconnected networks. Even if part of its infrastructure was destroyed, data could flow through the remaining networks. The Internet uses high-speed data lines, called backbones, to carry data. Smaller networks connect to the backbone, enabling any user on any network to exchange data with any other user. ARPANET, NSFnet, Internet Internetworking: the process of connecting separate networks The Internet: Then and Now

Every computer and network on the Internet uses the same protocols (rules and procedures) to control timing and data format. The protocol used by the Internet is the Transmission Control Protocol/Internet Protocol, or TCP/IP. No matter what type of computer system you connect to the Internet, if it uses TCP/IP, it can exchange data with any other type of computer. How the Internet Works - TCP/IP

Most computers don't connect directly to the Internet. Instead, they connect to a smaller network that is connected to the Internet backbone. The Internet includes thousands of host computers (servers), which provide data and services as requested by client systems. When you use the Internet, your PC (a client) requests data from a host system. The request and data are broken into packets and travel across multiple networks before being reassembled at their destination. How the Internet Works - Routing Traffic Across the Internet

In order to communicate across the Internet, a computer must have a unique address. Every computer on the Internet has a unique numeric identifier, called an Internet Protocol (IP) address. Each IP address has four parts – each part a number between 0 and 255. An IP address might look like this: How the Internet Works - Addressing Schemes

ProtocolLayerComments Application Protocols LayerProtocols specific to applications such as WWW, e- mail, FTP, etc. Transmission Control Protocol Layer TCP directs packets to a specific application on a computer using a port number. Internet Protocol Layer IP directs packets to a specific computer using an IP address. Hardware Layer Converts binary packet data to network signals and back. (E.g. ethernet network card, modem for phone lines, etc.)

In addition to an IP address, most Internet hosts or servers have a Domain Name System (DNS) address, which uses words. A domain name identifies the type of institution that owns the computer. An Internet server owned by IBM might have the domain name ibm.com. Some enterprises have multiple servers, and identify them with subdomains, such as products.ibm.com. How the Internet Works - Domains and Subdomains

The World Wide Web is a part of the Internet, which supports hypertext documents, allowing users to view and navigate different types of data. A Web page is a document encoded with hypertext markup language (HTML) tags. HTML allows designers to link content together via hyperlinks. Every Web page has an address, a Uniform Resource Locator (URL). Major Features of the Internet - The World Wide Web

File transfer protocol (FTP) is the Internet tool used to copy files from one computer to another. Using a special FTP program or a Web browser, you can log into an FTP host computer over the Internet and copy files onto your computer. FTP is handy for finding and copying software files, articles, and other types of data. Universities and software companies use FTP servers to provide visitors with access to data. Major Features of the Internet - File Transfer Protocol (FTP)

Telnet is a specialized service that lets you use one computer to access the contents of another computer – a Telnet host. A Telnet program creates a "window" into the host so you can access files, issue commands, and exchange data. Telnet is widely used by libraries, to allow visitors to look up information, find articles, and so on. Major Features of the Internet - Telnet

What Firewall Software Does A firewall is simply a program or hardware device that filters the information coming through the Internet connection into your private network or computer system. If an incoming packet of information is flagged by the filters, it is not allowed through.networkcomputer system

How Firewalls Work Firewalls use one or more of three methods to control traffic flowing in and out of the network: Packet filtering - Packets (small chunks of data) are analyzed against a set of filters. Packets that make it through the filters are sent to the requesting system and all others are discarded. Proxy service - Information from the Internet is retrieved by the firewall and then sent to the requesting system and vice versa. Stateful inspection - A newer method that doesn't examine the contents of each packet but instead compares certain key parts of the packet to a database of trusted information. Information traveling from inside the firewall to the outside is monitored for specific defining characteristics, then incoming information is compared to these characteristics. If the comparison yields a reasonable match, the information is allowed through. Otherwise it is discarded.

Firewall filters Firewall Configuration: Firewalls are customizable. This means that you can add or remove filters based on several conditions. Some of these are: IP addresses - A typical IP address looks like this: For example, if a certain IP address outside the company is reading too many files from a server, the firewall can block all traffic to or from that IP address.IP addresses Domain names -. A company might block all access to certain domain names, or allow access only to specific domain names.Domain names Protocols - The protocol is the pre-defined way that someone who wants to use a service talks with that service. The http in the Web's protocol. Some common protocols that you can set firewall filters for include (next slide):Protocols Ports - Any server machine makes its services available to the Internet using numberedports, one for each service that is available on the server. For example, if a server machine is running a Web (HTTP) server and an FTP server, the Web server would typically be available on port 80, and the FTP server would be available on port 21. A company might block port 21 access on all machines but one inside the company.Ports Specific words and phrases - This can be anything. The firewall will sniff (search through) each packet of information for an exact match of the text listed in the filter.

Types And Sources Of Network Threats Denial-of-Service Unauthorized Access Confidentiality Breaches Destructive Behavior

Acronyms you need to know GUI- RAM- ROM DVD CD CPU ALU OS- I/O-

Acronyms you need to know GUI- Graphic User Interface RAM-Random Access Memory ROM- Read Only Memory DVD- Digital Versatile Disk CD- Compact Disc CPU- Central Processing Unit ALU- Arithmetic Logic Unit OS- Operating System I/O- Input/Output

Acronyms you need to know LAN- WAN- TCP- IP- HTTP- HTML- FTP- URL-

Acronyms you need to know IP (Internet Protocol) - the main delivery system for information over the Internet TCP (Transmission Control Protocol) - used to break apart and rebuild information that travels over the Internet HTTP (Hyper Text Transfer Protocol) - used for Web pages FTP (File Transfer Protocol) - used to download and upload files HTML (Hypertext Markup Language) - used to send text-based information ( ) URL – (Uniform Resource Locator)- an address that identifies a particular file on the Internet, usually consisting of the protocol, as http, followed by the domain name.name