Professional Documents
Culture Documents
Screenshot 2024-01-20 at 2.00.01 AM
Screenshot 2024-01-20 at 2.00.01 AM
Screenshot 2024-01-20 at 2.00.01 AM
Characteristics
1. Primary Storage.
The primary memory is temporary in nature. The data is lost, when the
computer is switched off. In order to store the data permanently, the
data has to be transferred to the secondary memory.
2. Secondary Storage
What is a server?
Types of Servers
Application Server: Provides the business logic for deploying and executing
application programs.
Backup Server: Performs data backups and provides centralized storage for
backup data.
Collaboration Server: Enables collaboration and communication among
users by supporting features like document sharing, instant messaging, and
video conferencing.
Database Server: Stores and manages databases.
File Server: Stores and manages files and allows clients to access and share
them over a network.
Mail Server: Handles all email communication services, including sending,
receiving, and storing email messages.
Print Server: Controls and manages network-connected printers, including
print job queuing and management.
Server Components
Hardware: This includes central processing unit (CPU), memory, storage,
network interfaces, and power supplies.
Server OS: This is an operating system (OS) designed for a specific type of
client/server environment.
Server Software: Examples database server software, email server software,
and web server software.
Network Connectivity: Server programs connect to the network
infrastructure and communicate with client devices over a local area
network (LAN), wide area network (WAN), or the internet.
Management and Monitoring Tools: that enable remote management
and performance monitoring.
Security Measures: Most server software includes security features to protect
against unauthorized access.
Networking
A network consists of two or more computers that are linked in order to share
resources (such as printers and CDs), exchange files, or allow electronic
communications. The computers on a network may be linked through cables,
telephone lines, radio waves, satellites.
Advantages of Networking
A person sitting in any country provides technical support to a person sitting in any
other country.
With the help of networking, it is very simple to share all formats of digital data
from one computer system to another
With the help of networking, it has now become very simple to share the expensive
resources including storage space, processor, fax, etc.
It is easy to share and install the software from one computer system to another
computer system.
Easy to Communicate
With the help of networking, the communication system has now become highly
efficient and fast. The different modes of communication are text chatting, video
chatting, emails, etc.
Types of Network
Local Area Network
However, in such connectivity, some other devices can also be attached such as
laser printers, fax machine, etc.
It provides high speed Internet services throughout the area covered within the
network.
Wide Area Network
Wide Area Network or simply WAN is a system of network that covers a large
geographical area across the world.
Network Topology
Topology defines the structure of the network of how all the components are
interconnected to each other.
Mesh Topology
Star Topology
In Star Topology, all the devices are connected to a single hub through a
cable. This hub is the central node and all other nodes are connected to the
central node. The hub can be passive in nature i.e., not an intelligent hub such
as broadcasting devices, at the same time the hub can be intelligent known as
an active hub. Active hubs have repeaters in them. Coaxial cables or RJ-45
cables are used to connect the computers. In Star Topology, many popular
Ethernet LAN protocols are used as CD(Collision Detection), CSMA (Carrier
Sense Multiple Access), etc.
Advantages of Star Topology
If N devices are connected to each other in a star topology, then the number of
cables required to connect them is N. So, it is easy to set up.
Each device requires only 1 port i.e. to connect to the hub, therefore the total
number of ports required is N.
It is Robust. If one link fails only that link will affect and not other than that.
Easy to fault identification and fault isolation.
Star topology is cost-effective as it uses inexpensive coaxial cable.
Drawbacks of Star Topology
If the concentrator (hub) on which the whole topology relies fails, the
whole system will crash down.
The cost of installation is high.
Performance is based on the single concentrator i.e. hub.
Bus Topology
Bus Topology is a network type in which every computer and network
device is connected to a single cable. It is bi-directional. It is a multi-point
connection and a non-robust topology because if the backbone fails the
topology crashes. In Bus Topology, various MAC (Media Access Control)
protocols are followed by LAN ethernet connections like TDMA, Pure
Aloha, CDMA, Slotted Aloha, etc.
Ring Topology
In a Ring Topology, it forms a ring connecting devices with exactly two
neighboring devices. A number of repeaters are used for Ring topology with a
large number of nodes, because if someone wants to send some data to the last
node in the ring topology with 100 nodes, then the data will have to pass through
99 nodes to reach the 100th node. Hence to prevent data loss repeaters are used in
the network.
The data flows in one direction, i.e. it is unidirectional, but it can be made
bidirectional by having 2 connections between each Network Node, it is
called Dual Ring Topology. In-Ring Topology, the Token Ring Passing protocol
is used by the workstations to transmit the data.
Tree Topology
This topology is the variation of the Star topology. This topology has a
hierarchical flow of data. In Tree Topology, protocols like DHCP and SAC
(Standard Automatic Configuration ) are used.
In this, the various secondary hubs are connected to the central hub which
contains the repeater. This data flow from top to bottom i.e. from the central hub
to the secondary and then to the devices or from bottom to top i.e. devices to the
secondary hub and then to the central hub. It is a multi-point connection and a
non-robust topology because if the backbone fails the topology crashes.
Advantages of Tree Topology
It allows more devices to be attached to a single central hub thus it
decreases the distance that is traveled by the signal to come to the devices.
It allows the network to get isolated and also prioritize from different
computers.
We can add new devices to the existing network.
Error detection and error correction are very easy in a tree topology.
Drawbacks of Tree Topology
If the central hub gets fails the entire system fails.
The cost is high because of the cabling.
If new devices are added, it becomes difficult to reconfigure.
Advantages of Tree Topology :
This topology is the combination of bus and star topology.
This topology provides a hierarchical as well as central data arrangement of
the nodes.
As the leaf nodes can add one or more nodes in the hierarchical chain, this
topology provides high scalability.
The other nodes in a network are not affected if one of their nodes gets
damaged or does not work.
Tree topology provides easy maintenance and easy fault identification can
be done.
A callable topology. Leaf nodes can hold more nodes.
Supported by several hardware and software vendors.
Point-to-point wiring for individual segments.
Tree Topology is highly secure.
It is used in WAN.
Tree Topology is reliable.
Disadvantages of Tree Topology :
This network is very difficult to configure as compared to the other
network Advantages of Tree Topology :
This topology is the combination of bus and star topology.
This topology provides a hierarchical as well as central data arrangement of
the nodes.
As the leaf nodes can add one or more nodes in the hierarchical chain, this
topology provides high scalability.
The other nodes in a network are not affected if one of their nodes gets
damaged or does not work.
Tree topology provides easy maintenance and easy fault identification can
be done.
A callable topology. Leaf nodes can hold more nodes.
Supported by several hardware and software vendors.
Point-to-point wiring for individual segments.
Tree Topology is highly secure.
It is used in WAN.
Tree Topology is reliable.
Disadvantages of Tree Topology :
This network is very difficult to configure as compared to the other
network
Hybrid Topology
WEP :The first wireless security protocol was WEP (Wired Equivalent
Privacy). It was the standard method of providing wireless network
security from the late 1990s until 2004.
Wi-Fi Protected Access (WPA): is an improvement of WEP introduced in
2003. It provides stronger security measures.
Wi-Fi Protected Access II (WPA2) :introduced in 2004
Wi-Fi Protected Access III (WPA3) is the latest wireless security
protocol and offers enhanced security features such as stronger encryption,
protection against dictionary attacks.
Methods to protect wireless network
Using A Strong Password- Using a strong password is one of the most
important best practices for wireless network security.
Encrypting Data- Data encryption scrambles data so that it can only be
decrypted and read by authorized users. This helps to protect sensitive
information from being accessed by unauthorized individuals. Encryption
can be implemented in a number of ways, including through the use of
encryption software, hardware, or services.
Enabling WPA3 Security
WPA3 is the most recent and most secure wireless security protocol.
Using A Firewall
A Firewall is a network security device that monitors and filters incoming
and outgoing network traffic based on an organization’s previously
established security policies. At its most basic, a firewall is essentially the
barrier that sits between a private internal network and the public Internet.
A firewall helps to protect the network by blocking incoming traffic that is
not authorized.
1. Process Management
2. Memory Management
3. File Management
4. Device Management
5. Security and protection
2. Memory Management-
• Keeps record of how much memory is used and how much is unused.
3. File Management
4. Device Management
Decides which process gets access to a certain device and for how long.
The operating system uses password protection to protect user data and
similar other techniques.
Multiprocessing OS
Time-Sharing OS
Distributed OS
Network OS
Real Time OS
Embedded OS
The users of this type of operating system does not interact with the
computer directly.
There is an operator which takes similar jobs having the same requirement
and groups them into batches.
It is sometimes costly
IBM's MVS
Multiprogramming Operating System
In this Operating Systems more than one program is present in the main
memory and any one of them can be kept in execution. This is basically used
for better execution of resources.
Advantage
There is not any facility for user interaction of system resources with the
system.
These systems run on a server and provide the capability to manage data, users,
groups, security, applications, and other networking functions. These types of
operating systems allow shared access of files, printers, security, applications, and
other networking functions over a small private network. popularly known as
tightly coupled systems.
The time interval required to process and respond to inputs is very small.
Student database
Student name Roll no. class Subjects
A 1 BCA I ITC
B 2 BCA I ITC
C 3 BCA I ITC
Table/Relation: Table/Relation is a Two-dimensional array of data and it can’t
contain duplicate rows.
Domain: A domain is a collection of all possible values of one or more attributes.
Functions of DBMS:
It must give facility for defining the database structure also specifies access
rights to authorized users.
The DBMS must-have functions like insertion of record into database
updation of data, deletion of data, retrieval of data.
The DBMS must share data items for multiple users by maintaining
consistency of data.
It must protect the database against unauthorized users.
If for any reason the system fails DBMS must facilitate database recovery
Advantages of DBMS:
Minimal Data Redundancy
Improved Data Consistency
Improved Data Sharing
Improved Quality
Conceptual level:
It is also called a logical view of the database. It hides the internal details of
physical storage. It describes what data is stored and the relationship
between the data. This level contains the logical structure of the database.
This level represents all entities, attributes, and relations.
Internal level:
It is the lowest level of architecture. It deals with the physical representation
of data. It describes how the data is stored. It includes storage structure,
allocation techniques such as indexing, hashing, pointers, etc. It is also
known as the physical level.