Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 19

Prepared by: Fareed Khan Tareen Page 1

 Computer Network
 Two or more than two inter-connected computers/nodes that share the
resources or the information are known as a computer network.
 Computer network consists of a computer, some other devices, the
physical or logical connections between them and the software required
to enable them to communicate each other and share the resources.
 Sources of Computer Network
 Server
 Computer on the network that offers or shares their resources for other
computers is known as a server.
 For Example: Google, Encyclopedia
 Client Computer
 Computer on the network that accesses resources, which are being
shared by other computer, is known as a client computer or simply
client.

 Types of Network
It is categorized into three main types:
 Server based
 Peer to peer
 W.r.t Area

 Server Based Network


 It is also called as dedicated or special server.
 In a dedicated server network, one or more computers are dedicated to act
as servers and provide quick access to shared resources. Dedicated server
networks provide centralized control of data and other resources.

 Peer to Peer Network


 In a peer to peer network, every computer can act as a client server or both
at the same time.

Prepared by: Fareed Khan Tareen Page 2


 In this type of network each computer is referred to “peer to peer
computer”, so each peer computer can share files with other computer and it
can also access other shared data/resources on the network.

 Types of Network (w.r.t Area)


Depending upon the geographical area covered by a network, it is classified as:
Local Area Network (LAN)
Metropolitan Area Network (MAN)
Wide Area Network (WAN)
Personal Area Network (PAN)
Desktop Area Network (DAN)
1. Local Area Network (LAN)
 It is a type of network spread over a limited area of some meters to a
kilometer. Usually a LAN is spread within an organization. In other words we
can say that a network within a building.

2. Metropolitan Area Network (MAN)


 An area network, that is a link between offices, buildings in a city or town. It
covers a smaller area of land.
 For Example: Radio 105

3. Wide Area Network (WAN)


 It is a type of network connecting the cities, states and countries. It is a
best example of internet.
 Computers in a WAN are connected with each other through physical
cables and wireless media like microwaves.

4. Personal Area Network (PAN)

Prepared by: Fareed Khan Tareen Page 3


 A PAN is a network that is used for communicating among computers
and computer devices (including telephones) in close proximity of
around a few meters within a room.
 PAN is a personal devices network equipped at a limited area.
 A PAN is a network, which is used for personal use.

5. Desktop Area Network (DAN)


 DAN consists the connectivity limited to a desktop.
 Network Topology
 The way in which the network connections are made is called network
topologies.
 In communication networks, a topology is a usually schematic
description of the arrangement of a network, including its nodes and
connecting lines.
Following are the main topologies of network:
1. Bus Topology
 Bus Topology is the simplest of network topologies.
 In this type of topology, all the nodes (computers as well as servers) are
connected to the single cable (called bus), by the help of interface
connectors.
 This central cable is the backbone of the network and is known as Bus
(thus the name).
Working of Bus Topology
 Before the transmission of data on bus network, the process of hand
shaking is performed between sending and receiving computers.

2. Star Topology
 In Star topology, all the components of network are connected to the
central device called “hub” which may be a hub, a router or a switch.

Prepared by: Fareed Khan Tareen Page 4


 Unlike Bus topology (discussed earlier), where nodes were connected to
central cable, here all the workstations are connected to central device
with a point-to-point connection.
 Star topologies can connect 4 to 48 computers at a time.

3. Ring Topology
 Ring Topology has a shape of a ring.
 It is made up of an unbroken circle of network computer/nodes.

4. Mesh Topology
 A mesh topology is also known as completely connected network as a
separate physical lane for connecting each node to any other node.
 It is a combination of bus topology, star topology and ring topology.
 It is the best connecting topology.

 OSI Model
 OSI stands for Open System Interconnections
 Open Systems Interconnection (OSI) is a set of internationally
recognized, non-proprietary standards for networking and for
operating system involved in networking functions.
 Layers of Computer Network
 It consists of seven layers, which describes the flow of data from one
computer to another computer. The seven layers of OSI Model are as under:
1) Application Layer (Provide end-user services, like e-mail)
2) Presentation Layer (Data compression, and other data conversion)
3) Session Layer (Authentication/Authorization)
4) Transport Layer (Guarantee end-to-end data transfer—from machine to
machine)
5) Network Layer (Routing, accounting).
6) Data Link Layer (Transmit/receive packets, resolve hardware addresses)
Prepared by: Fareed Khan Tareen Page 5
7) Physical Layer (Physical cable, medium, air)

LAYER 7: APPLICATION
 The application layer is the OSI layer that is closest to the user.
 It provides network services to the user’s applications.
 It differs from the other layers in that it does not provide services to any other
OSI layer, but rather, only to applications outside the OSI model.
 Examples of such applications are spreadsheet programs, word processing
programs, and bank terminal programs.

LAYER 6: PRESENTATION
 Provides encryption and compression of data.
 Examples: - JPEG, MPEG, ASCII, EBCDIC, HTML

LAYER 5: SESSION
 The session layer defines how to start, control and end conversations (called
sessions) between applications. This includes the control and management of
multiple bi-directional messages using dialogue control.
 The session layer offers provisions for efficient data transfer.
 Examples: - SQL, ASP(AppleTalk Session Protocol)

LAYER 4: TRANSPORT
 The transport layer regulates information flow to ensure end-to-end
connectivity between host applications reliably and accurately.
 Layer 4 protocols include TCP (Transmission Control Protocol) and UDP (User
Datagram Protocol).

LAYER 3: NETWORK
 Defines end-to-end delivery of packets.
 Defines logical addressing so that any endpoint can be identified.
Prepared by: Fareed Khan Tareen Page 6
 Routers operate at Layer 3
 Examples :- IP, IPX, AppleTalk

LAYER 2: DATA LINK


 The data link layer provides access to the networking media and physical
transmission across the media and this enables the data to locate its intended
destination on a network.
 Examples :- Ethernet, Frame Relay, FDDI

LAYER 1: PHYSICAL
 The physical layer deals with the physical characteristics of the transmission
medium.
 It defines the electrical, mechanical, procedural, and functional specifications
for activating, maintaining, and deactivating the physical link between end
systems.
 Examples :- EIA/TIA-232, RJ45, NRZ

Prepared by: Fareed Khan Tareen Page 7


 Internet
 The internet sometimes called simply the net is a worldwide system of
computer networks.
 The internet is a global system of inter-connecting computer networks
that use the internet protocol suite (TCP/IP) to link devices worldwide.
 The internet has no centralization governess in either technological
implementation or policies for access or usages.

 Requirements to access Internet through DIAL-UP


Connection
1) Hardware Requirement
 Telephone connection
 User should have a telephone connection to connect with
internet.
 Modem
 Since the transmission over telephone line should be in the form
of analog signals so Modem is required to convert the digital data
to analog signals and vice versa.
 USB (Evo)

2) Software Requirement
 In order to access to internet sites at least one web browser
should be installed in the computer.
 Web browser such as internet explorer, makes it possible to have
access to different web sites.
3) ISP (Internet Service Provider)
 Apart from hardware and software requirement, an ISP
connection is also required.
 Internet Service Provider provides a user name and password to a
user to access the internet.

Prepared by: Fareed Khan Tareen Page 8


 Services or Component of Internet
1) WWW
 WWW stands for World Wide Web are simply referred to as Web.
 It is a network that is spread over the entire world connecting the whole
world together; therefore WWW can also be called as Internet because
nearly 70 percent of all the information searches are handled through
the World Wide Web.
2) Email
 Email is an electronic message from sender to a recipient or multiple
recipients.
 Compared to postal Email is the fastest and reliable way to send
messages from one location of the world to another.
 You can also send documents, pictures, audio and video files via email
by attaching the file with email.
3) Newsgroups
 Newsgroups are electronic discussion groups on the internet through
which people with same interest exchange information and ideas.
 You can leave messages or answer messages left by other members of
the group.
4) FTP
 FTP stand for File Transfer Protocol.
 It is a protocol used to transfer files from web servers to the computer.
5) Chatting
 Internet also provides the facility to internet users to chat with people
online all over the world.
 Different programs like MSN messenger, Yahoo messenger, Skype etc
are available for chatting on the internet.
 Some programs also support voice and video chat as well.
6) Telnet
 Telnet is an Internet service or tool that is used to log on and run
commands on a remote server on the internet.

Prepared by: Fareed Khan Tareen Page 9


 Telnet provides a prompt on the screen through which you can access
the host computer and can give commands to that computer.
 You will feel that you are sitting in front of the host computer and
operating it.

 Types of Connections
i. Dial-up Connection/Access
 Dial-up or Access connection is cheap but slow.
 A modem internal or external connection to the internet after
the computer dials a phone number.
 The modem speed in dial-up connection transmits data at the
rate of 56 kilo bytes per second (kbps).
ii. High Speed/Broad Band Connection
 The High Speed service is also called Broad Band connection
because they media that can handle multiple signal at once. i.e.
Fiber, Optics, Microwaves and other advance technologies
iii. Cable-TV Line
 It provides a high speed internet connection through the cable
television network.
 A cable modem sends and receives data over cable television
line.
 Its data transmission speed is from 128 Kbps to 3Mbps.
iv. Satellite Connections
 Satellite access the internet with a satellite in earth orbit.
 The distance that a signal and back again provides a connection
compare to cable and DSL (Digital Subscriber Line).
 The satellite connection speed is around 512 Kbps to 20 Mbps.
v. Digital Subscriber Line (DSL)
 It also requires a special type of DSL modem that connection
between telephone and PC (Personal Computer) at the same
time.

Prepared by: Fareed Khan Tareen Page 10


 The standard transmission speed of DSL range from 128 Kbps to
30 Mbps.
vi. Cellular Network
 Cellular technology provides wireless internet access through
cell phones.
 The speed varies depending on the provider but the most
common are 3G, 4G.
 The 3G is a term that describes 3rd generation cellular network
obtaining mobile speeds of around 2.0 Mbps
 The 4G is a 4th generation of cellular wireless standard network.
The goal of 4G is to achieve mobile network speeds of 100 Mbps
but the reality is about 21 Mbps currently.

Prepared by: Fareed Khan Tareen Page 11


 MS Excel
 Excel is a computer program used to create electronic spreadsheets.
 MS Excel is a spreadsheet lies in a category of general purpose
application software.
 Within Excel, users can organize data, create charts, and perform
calculations.

 Spreadsheet
 Spreadsheet is a guide of rows and columns that holds a large amount
of data.
 A spreadsheet interface provides a menu bar, tool bar and a special
formula bar, by which we can create or add data and formulae in a
worksheet.

 Worksheet
 A worksheet is made up of rows and columns into which we enter and
add data.
 Each worksheet has 256 columns and 65536 rows.

 Workbook
 In MS Excel a workbook is a file in which we work and store data.
 Each workbook consists of many sheets. A maximum number of sheets
are 255 sheets.

 Cells
 Where rows and columns meet that is called cells.

Prepared by: Fareed Khan Tareen Page 12


 Data Validation in Excel
 Data validation is a feature available in Microsoft Excel. It allows you
to do the following: 
 create a drop down list of items in a cell
 restrict entries, such as a date range or whole numbers only
 create custom rules for what can be entered
 Create messages that appear when incorrect data has been
entered.
 Set a range of numeric values that can be entered in a cell.
 How to apply Data Validation on a cell:
 Open an Excel worksheet where you want to apply data
validation. Select a Table similar to the example in the next slide
and list the options in the area of excel which is outside the
table that you are using and list the options that you want to
restrict the users.
 Select a cell where you want to set validation.
 In the "Data Tools" tab click on "Data validation".
 The Data Validation window will be shown.
 From the Data Validation window you can choose list.
 Select the options that you have already listed outside the table
and click on OK button

 We can also Input the Message.


 Go to Data tab
 Select Data Validation
 Select Input Message
 Type in the message and select 'show input message when cell is
selected
 Select Error

Prepared by: Fareed Khan Tareen Page 13


 Select the type of error message you want to show "Stop,
Warning or Information
 Type in your error message and click on OK button

 Protect a Workbook
 To prevent other users from viewing hidden worksheets, adding,
moving, deleting or hiding worksheets, and renaming worksheets, you
can protect the structure of your Excel workbook with a password.
 To protect the structure of your workbook, follow these steps:
i. Click Review  Protect Workbook  Protect Structure and Windows
ii. Enter a password in the Password box
iii. In Excel for Windows, click OK, and reenter the password to confirm
it, and then click OK.

 Protect a Worksheet
 To prevent other users from accidentally changing, moving, or deleting
data in a worksheet you can lock the cells on your excel worksheet and
then protect the sheet with a password.
 Given below are the steps to protect your sheet:
i. Click on the Review tab, and then click Protect Sheet.
ii. In the Allow all users of this worksheet to list, select the elements
you want people to be able to change.
iii. Optionally, enter a password in the Password to unprotect sheet
box and click OK. Reenter the password in the Confirm Password
dialog box and click OK.

Prepared by: Fareed Khan Tareen Page 14


 Addition Formulas
1. =sum(criteria) 
For example:
=sum(C5:C6) 
=sum(10:10) 
20 answer

2. =(cell+cell+cell) 
For example:
=(12+12+12) 
36 answer

3. =(10+10+10) 
30 answer

 Subtraction Formulas
1. =(cell-cell-cell) 
For example:
=(20-10-5) 
5 answer

2. =(20-12-6) 
2 answer

Prepared by: Fareed Khan Tareen Page 15


 Multiplication Formulas
1. =product(criteria) 
For example:
=product(10:10) 
100 answer

2. =(C5*C10) 
For example:
=(10*10) 
100 answer

 Average Formulas
1. =Average(C1:C2) 
2. =min(C12:C15) 
3. =max(C20:C22) 

 Count Formulas
1. =count(C11:C33) 
2. =countblank(C7:C9) 

 Percentage Formulas
1. =(obt.marks/total.marks*100) 
For example:
=(490/600*100) 
81.66%

Prepared by: Fareed Khan Tareen Page 16


 Division Formulas
1. =(C15/C17) 
For example:
=(16/8) 
2 answer

SmartArt
 SmartArt allows you to communicate information with graphics instead
of just using text.
 There are a variety of styles to choose from which you can use to
illustrate many different types of ideas.

To insert a SmartArt graphics:


 Select the slide where you want the SmartArt graphic to appear.
 From the Insert tab, select the SmartArt command in the Illustrations
group.
 A dialogue box will appear. Select a category on the left, choose the
desired SmartArt graphic and click OK.
 The SmartArt graphic will appear on the current slide.
 You can also click the Insert a SmartArt Graphic command in a
placeholder to add SmartArt.

Prepared by: Fareed Khan Tareen Page 17


To insert a video
 Power point allows you to insert a video onto a slide and play it during
your presentation.
 You can even edit the video within Power point and customize its
appearance.
To insert a video from a file
 From the Insert tab, click the Video drop-down arrow, and then select
Video on My PC.
 Locate and select the desired video file, then click Insert.
 The video will be added to the slide.

To insert an audio


 Power point allows you to add audio to your presentation.
To insert an audio from a file
 From the Insert tab, click the Audio drop-down arrow, and then select
Audio on My PC.
 Locate and select the desired audio file, then click Insert.
 The audio will be added to the slide.

Prepared by: Fareed Khan Tareen Page 18


Prepared by: Fareed Khan Tareen Page 19

You might also like