Hardware & Networking Notes
Hardware & Networking Notes
Hardware & Networking Notes
&
Networking Notes
M.K.Prasad
SRGPTC, Thriprayar
The operating systems of this type allow a multiple users to access a computer system
concurrently. Time-sharing system can be classified as multi-user systems as they enable a
multiple user access to a computer through the sharing of time. Single-user operating
systems, as opposed to a multi-user operating system, are usable by a single user at a
time. Being able to have multiple accounts on a Windows operating system does not make
it a multi-user system. Rather, only the network administrator is the real user. But for a Unix-
like operating system, it is possible for two users to login at a time and this capability of the
OS makes it a multi-user operating system.
When a single program is allowed to run at a time, the system is grouped under a single-
tasking system, while in case the operating system allows the execution of multiple tasks at
one time, it is classified as a multi-tasking operating system. Multi-tasking can be of two
types namely, pre-emptive or co-operative. In pre-emptive multitasking, the operating
system slices the CPU time and dedicates one slot to each of the programs. Unix-like
operating systems such as Solaris and Linux support pre-emptive multitasking. Cooperative
multitasking is achieved by relying on each process to give time to the other processes in a
defined manner. MS Windows prior to Windows 95 used to support cooperative
multitasking.
DOS (Disk Operating System) was the first widely-installed operating system for personal
computers. It is a master control program that is automatically run when you start your PC.
DOS stays in the computer all the time letting you run a program and manage files. It is a
single-user operating system from Microsoft for the PC. It was the first OS for the PC and is
the underlying control program for Windows 3.1, 95, 98 and ME. Windows NT, 2000 and XP
emulate DOS in order to support existing DOS applications. To use DOS, you must know
where your programs and data are stored and how to talk to DOS.
2.UNIX
UNIX is Multi-user Operating System. The UNIX environment and the client/server program
model were important elements in the development of the Internet and the reshaping of
computing as centered in networks rather than in individual computers. UNIX is written in C.
Both UNIX and C were developed by AT&T and freely distributed to government and
academic institutions.
3. Linux
Linux is an operating system that was initially created as a hobby by a young student, Linus
Torvalds, at the University of Helsinki in Finland. He began his work in 1991 when he
released version 0.02 and worked steadily until 1994 when version 1.0 of the Linux Kernel
was released. The kernel, at the heart of all Linux systems, is developed and released
under the GNU General Public License and its source code is freely available to everyone.
The development of Linux is one of the most prominent examples of free and open source
software collaboration; typically all the underlying source code can be used, freely modified,
and redistributed, both commercially and non-commercially, by anyone under licenses such
as the GNU General Public License.
4. WINDOWS
Windows is first introduced as a personal computer operating system from Microsoft that,
together with some commonly used business applications such as Microsoft Word and
Excel, has become a de facto "standard" for individual users in most corporations as well as
in most homes. However, Windows 95, 98, ME, NT, 2000 and XP are complicated
operating environments. Certain combinations of hardware and software running together
can cause problems, and troubleshooting can be daunting. Each new version of Windows
has interface changes that constantly confuse users and keep support people busy, and
Installing Windows applications is problematic too. Microsoft has worked hard to make
Windows 2000 and Windows XP more resilient to installation problems and crashes in
general.
Classification of Computers
Computers can be classified many different ways -- by size, by function, and/or by
processing capacity. We will study the classification of computers by size. The size of a
computer often determines its function and processing capacity. The size of computers
varies widely from tiny to huge and is usually dictated by computing requirements.
Super Computers
The largest computers are supercomputers. They are the most powerful, the most
expensive, and the fastest. They are capable of processing trillions of instructions per
second. Examples of users of these computers are governmental agencies, such as the
National Weather Service, and the National Defense Agency. Also, they are used in the
making of movies, space exploration, and the design of many other machines. The Cray
supercomputer is nicknamed "Bubbles", because of its bubbling coolant liquids. Cray
supercomputers, the first of which was invented by Seymour Cray, now maintain 75 percent
of the supercomputer market. Supercomputers are used for tasks that require mammoth
data manipulation.
Mainframe Computers
Large computers are called mainframes. Mainframe computers process data at very high
rates of speed, measured in the millions of instructions per second. They are very
expensive, costing millions of dollars in some cases. Mainframes are designed for multiple
users and process vast amounts of data quickly. Banks, insurance companies,
manufacturers, mail-order companies, and airlines are typical users. Mainframes are often
‘servers’-- computers that control the networks of computers for large companies.
Microcomputers
Microcomputers can be divided into two groups -- personal computers and workstations.
Workstations are specialized computers that approach the speed of mainframes. Often
microcomputers are connected to networks of other computers. Microcomputers make up
the vast majority of computers.
Notebook
Another classification of computer is the notebook computer. A notebook computer can fit
into a briefcase and weigh fewer than two pounds, yet it can compete with the
microcomputer.
Laptop
PROCESSORS (CPUs)
The CPU or Central Processing Unit, is the core of any computer. The processor (really a
short form for microprocessor and also often called th CPU or central processing unit) is the
central component of the PC. This vital component is in some way responsible for every
single thing the PC does. It determines, at least in part, which operating systems can be
used, which software packages the PC can run, how much energy the PC uses, and how
stable the system will be, among other things. The processor is also a major determinant of
overall system cost: the newer and more powerful the processor, the more expensive the
machine will be.
Types of Processors
The vast majority of microprocessors are embedded microcontrollers. The second most common
type of processors are common desktop processors, such as Intel's Pentium or AMD's Athlon. Less
common are the extremely powerful processors used in high-end servers, such as Sun's SPARC,
IBM's Power, or Intel's Itanium.
Historically, microprocessors and microcontrollers have come in "standard sizes" of 8 bits, 16 bits,
32 bits, and 64 bits. These sizes are common, but that does not mean that other sizes are not
available. Some microcontrollers (usually specially designed embedded chips) can come in other
"non-standard" sizes such as 4 bits, 12 bits, 18 bits, or 24 bits. The number of bits represent how
much physical memory can be directly addressed by the CPU. It also represents the amount of bits
that can be read by one read/write operation. In some circumstances, these are different; for
instance, many 8 bit microprocessors have an 8 bit data bus and a 16 bit address bus.
• 8 bit processors can read/write 1 byte at a time and can directly address 256 bytes
• 16 bit processors can read/write 2 bytes at a time, and can address 65,536 bytes (64
Kilobytes)
• 32 bit processors can read/write 4 bytes at a time, and can address 4,294,967,295
bytes (4 Gigabytes)
• 64 bit processors can read/write 8 bytes at a time, and can address
18,446,744,073,709,551,616 bytes (16 Exabytes)
1 INTEL Corporation
Intel Corporation (NASDAQ: INTC; SEHK: 4335; Euronext: INCO) is an American technology
company, and the world's largest semiconductor chip maker, based on revenue. It is the inventor of
the x86 series of microprocessors, the processors found in most personal computers. Intel was
founded on July 18, 1968, as Integrated Electronics Corporation (though a common misconception
is that "Intel" is from the word intelligence) and is based in Santa Clara, California, USA. Intel also
makes motherboard chipsets, network interface controllers and integrated circuits, flash memory,
graphic chips, embedded processors, and other devices related to communications and computing.
Intel 4004, Intel 8080, Intel 8088, Intel 80286, Intel 80386, Intel 80486, Pentium I, Pentium Pro,
Pentium M M X, Pentium II, Pentium III, Pentium I V, Intel Atom, Intel Xeon, Celeron,Intel Dual Core, Intel
Core 2 Duo, Intel Core i3, 5, Intel Core i7 etc. are the some of the premium processors of Intel.
2 AMD Technology
Advanced Micro Devices ( AMD) is a leading global provider of innovative processing solutions in
the computing, graphics and consumer electronics markets. AMD is dedicated to driving open
innovation, choice and industry growth by delivering. The company started as a producer of logic
chips in 1969, then entered the RAM chip business in 1975.
A M D K5, A M D K6, AMD Athlon, AMD Athelon XP, AMD Sempron, AMD Duron, AMD Athlon 64,
A M D Phenom, Opteron etc are the some of the processors of AMD.
3 Cyrix
The form factor of the motherboard describes its general shape, what sorts of cases and power
supplies it can use, and its physical organization. For example, a company can make two
motherboards that have basically the same functionality but that use a different form factor, and
the only real differences will be the physical layout of the board, the position of the components,
etc. In fact, many companies do exactly this, they have for example a baby AT version and an
ATX version
Chipset
A chipset, PC chipset or chip set refers to a group of integrated circuit or chips, that are
designed to work together. They are usually marketed as a single product. The chipset
also controls data flow to and from hard disks, and other devices connected to the IDE
channels. The chipset consists of two main components, the North- and South- Bridge
chips, which are connected over the PCI bus. The CPU, Memory and AGP talk to the
ASRock
ASUS
BioStar
Gigabyte Technology
Intel Corporation
MSI
Transcend
FoxConn
Microstar International
Random access memory or RAM most commonly refers to computer chips that temporarily store
dynamic data to enhance computer performance. By storing frequently used or active files in
random access memory, the computer can access the data faster than if it to retrieve it from the far-
larger hard drive. Random access memory is also used in printers and other devices.
Random access memory is volatile memory, meaning it loses its contents once power is cut. This is
different from non-volatile memory such as hard disks and flash memory which do not require a
power source to retain data. When a computer shuts down properly, all data located in random
access memory is committed to permanent storage on the hard drive or flash drive. At the next
boot-up, RAM begins to fill with programs automatically loaded at startup, and with files opened by
the user
The type of RAM doesn't matter nearly as much as how much of it you've got, but using
plain old SDRAM memory today will slow you down. There are three main types of RAM:
SDRAM, DDR and Rambus DRAM.
RIMMs use only a 16-bit interface but run at higher speeds than DDR. To get maximum
performance, Intel RDRAM chipsets require the use of RIMMs in pairs over a dual-channel
32-bit interface. You have to plan more when upgrading and purchasing RDRAM.
Cache Memory
Cache Memory is fast memory that serves as a buffer between the processor and main
memory. The cache holds data that was recently used by the processor and saves a trip all
the way back to slower main memory. The memory structure of PCs is often thought of as
just main memory, but it's really a five or six level structure:
The first two levels of memory are contained in the processor itself, consisting of the
processor's small internal memory, or registers, and L1 cache, which is the first level of
cache, usually contained in the processor.
The fourth level, is being referred to as L3 cache. This cache used to be the L2 cache on
the motherboard, but now that some processors include L1 and L2 cache on the chip, it
becomes L3 cache. Usually, it runs slower than the processor, but faster than main memory.
The fifth level (or fourth if you have no "L3 cache") of memory is the main memory itself.
The sixth level is a piece of the hard disk used by the Operating System, usually called
virtual memory. Most operating systems use this when they run out of main memory, but
some use it in other ways as well.
EDO DRAM
EDO DRAM gave people up to 5% system performance increase over DRAM. EDO DRAM
is like FPM DRAM with some cache built into the chip. Like FPM DRAM, EDO DRAM
maxes out at about 50 MHz. Early on, some system makers claimed that if you used EDO
DRAM you didn't need L2 cache in your computer to get decent performance. They were
wrong. It turns out that EDO DRAM works along with L2 cache to make things even faster,
but if you lose the L2 cache, you lose a lot of speed.
DDR3-2000
DDR3-2133
The computer power-on self-test (POST) tests the computer to make sure it meets the
necessary system requirements and that all hardware is working properly before starting
Each time the computer boots up the computer must past the POST. Below is the common
steps a POST performs each time your computer starts.
1. Test the power supply to ensure that it is turned on and that it releases its reset
signal.
2. CPU must exit the reset status mode and thereafter be able to execute instructions.
3. BIOS checksum must be valid, meaning that it must be readable.
4. CMOS checksum must be valid, meaning that it must be readable.
5. CPU must be able to read all forms of memory such as the memory controller,
memory bus, and memory module.
6. The first 64KB of memory must be operational and have the capability to be read
and written to and from, and capable of containing the POST code.
7. I/O bus/ controller must be accessible.
8. I/O bus must be able to write / read from the video subsystem and be able to read all
video RAM.
If the computer does not pass any of the above tests, your computer will receive an
irregular POST. An irregular POST is a beep code that is different from the standard one or
two beeps. This could be either no beeps at all or a combination of different beeps
indicating what is causing the computer not to past the POST.
One Long and Three Short Beeps. Video (EGA) Display Circuitry.
Below are the AMI BIOS Beep codes that can occur.
Any other
RAM problem. CH000996
beep(s)
If any other correctable hardware issues, the BIOS will display a message.
Identifying external ports and interfacing
Objective:
To learn about different ports and how to connect devices to them. This diagram shows
different ports available on the back panel of the PC
Illustration 3: Rearpanel
Ports and onnectors
Video card
The video card is responsible for creating all that you see on your computer monitor
VGA Card
Network card
This piece of hardware allows your computer to be connected to a network of other
computers (known as a LAN or Local Area Network)
Procedure to install a sound card
In this example we are going to install a sound card.
NOTE: It is best not to install all your PCI hardware if you are building from scratch.
Only install your video card and sound card right now.
Once you have your operating system installed, turn off the computer and install the
other components. This saves you from possible problems when loading up for the
first time.
1. Remove any unnecessary temporary metal plates. Only remove the metal plates
from the slots you are going to use. If you do not remove these, you cannot install
any PCI components. Most either unscrew or pop out.
2. Locate PCI Slots on Motherboard. Your PCI Slots should look similar to the ones
in the image below
3. Line up component with PCI slot and install. Simply line up the component with
the slot and gently press down on both sides until it slides in place
4. Insert screw. There is only one screw needed to secure each PCI component in
place.
5. Give it CD Sound. Remember that audio cable from the CD-ROM drive?
Now we will connect the other end of it. If you want to hear audio when play a cd in
your CD-ROM, you need to connect the CD-ROM to the Sound Card (or
motherboard if your sound card is integrated in) using the audio cable as seen
below. Refer to your sound card owners manual
for correct placement. If you did not purchase a sound card and you have one
integrated into your motherboard, refer to your motherboard owner’s manual for
correct placement
6. Repeat for any other components. Every component is different but as long as its
PCI compatible, it is installed the same way (except for the audio cable. It is installed
only on sound cards and motherboards.)
Identifying ports on the cards and interfacing
Objective: To identify ports on the PC cards
MIDI / Game port is a port which is most commonly used for the game port which will
allow you to connect a game paddle and or Joystick to the computer. This port will
also allow you to connect a device such as a MIDI keyboard to the computer,
additional information on this can be found in the Midi section. Line In connector
allows you to connect a Cassette Tape, CD or record player to the computer.
Line Out connector is the location which the speakers or headphones will be
connected to get sound out of the sound card. Volume control is generally no longer
found on sound cards. However for cards that do include this as a feature this allows
for the volume to be turned up and
down on a non-amplified output such as a set of headphones. Microphone allows
you to connect a microphone to the computer and record your own sound files.
Preventive maintenance of a PC
To learn how to maintain a PC so that it gives longer service without any problems.
1) System backups.
Take the backup of data at regular intervals. Use floppy disks for small data and if
data is very large perform backup using CD- RW or tape drives.
2) System cleaning.
Floppy disk drives are vulnerable to dust as they contain a large opening in the
system case through which air continuously flows. Therefore, they accumulate a
large amount dust and chemical buildup within a short time.
Where as cleaning a hard disk requires simply blowing the dust and dirt off from the
outside the drive.
3) Cleaning motherboards:
First, clean the dust and debris off the board and then clean any connectors on the
board. To clean the boards, it is usually best to use a vacuum cleaner. Also blow any
dust out of the power supply, especially around the fan intake and exhaust areas.
Use a duster can and blast the compressed air into the supply through the fan
exhaust port. This will blow the dust out of the supply and clean off the fan blades
and grill, which will help with system airflow.
To clean the connectors on the board use the cleaning solutions.
4) Hard Disk Maintenance:
De-fragmenting files: As you delete and save files to your hard disk they become
fragmented ( they are stored on non contiguous areas on the disk).
Before you defragment your disk use Scandisk to scan your hard disk.
To scandisk your hard disk follow the below steps.
Go to programs Accessories System tools Scandisk
To scandisk your hard disk follow the below steps.
Go to programs Accessories System tools Disk Defragmenter
5) Understanding CMOS
To know and understand the features available in the CMOS. To enter into CMOS
setup continue pressing Delete(Del) or F2 button while system is booting.
First you will need to find out whether your video card is AGP or PCI-E. AGP
graphics cards have become redundant and are being phased out of the market
quickly. So if you bought a spanking new card it will certainly be a PCI-E.
• Remove the back plate on the cabinet corresponding to the graphics card
• Push the card into the slot
• Secure the card with a screw
• Plug in the power connection from PSU (if required)
High-end graphics cards need dedicated power supply and if your graphics card
needs one then connect the appropriate wire from PSU into the graphics card.
• Connect the large ATX power connector to the power supply port on your
motherboard
• Next get hold of the smaller square power connector which supplies power to
the processor and connect it to the appropriate port by taking help from your
motherboard manual
• Connect the cabinet cables for power,reset button in the appropriate port of
the motherboard
• Connect the front USB/audio panel cable in the motherboard
• Plug the cable of cabinet fans
You are done with installing the internal components of the PC. Close the side doors
of the cabinet and get it upright and place it on your computer table. Get the rest of
the PC components like monitor, keyboard, mouse, speakers etc. which we will
connect now.
• Connect the VGA cable of the monitor into the VGA port
• If mouse/keyboard are PS/2 then connect them to PS/2 ports or else use the
USB port
• Connect the speaker cable in the audio port
• Plug in the power cable from PSU into the UPS
• Also plug in the power cable of the monitor
You are now done with setting up your PC. Power on and see your rig boot to glory.
Step 10: Installing the OS and drivers
We are done with the hardware part. Now get your favorite OS disks ready and the
CD that came with your motherboard.
• Set the first boot device to CD/DVD drive in BIOS
• Pop in the OS disk
• Reboot the PC
• Install the OS
• Install drivers from motherboard CD (applicable only to Windows OS)
Installation of Windows XP
Step 1 - Start your PC and place your Windows XP CD in your CD/DVD-ROM drive. Your
PC should automatically detect the CD and you will get a message saying "Press any key to
boot from CD". Soon as computer starts booting from the CD your will get the following
screen:
Step 2 - At this stage it will ask you to press F6 if you want to install a third party Raid or
SCSI driver. If you are using a an IDE Hard Drive then you do not need to press F6. If you
are using a SCSI or SATA Hard drive then you must press F6 otherwise Windows will not
detect your Hard Drive during the installation. Please make sure you have the Raid drivers
on a floppy disk. Normally the drivers are supplied on a CD which you can copy to a floppy
disk ready to be installed. If you are not sure how to do this then please read your
motherboard manuals for more information.
Step 4 - You will be asked to insert the floppy disk with the Raid or SCSI drivers. Press enter
after you have inserted the disk.
Step 5 - You will see a list of Raid drivers for your HDD. Select the correct driver for your
device and press enter.
Step 6 - You will then get a Windows XP Professional Setup screen. You have the option to
do a new Windows install, Repair previous install or quit. Since we are doing a new install
we just press Enter to continue.
Step 7 - You will be presented with the End User Licensing Agreement. Press F8 to accept
and continue
Step 8 - This step is very important. Here we will create the partition where Windows will be
installed. If you have a brand new unformatted drive you will get a screen similar to below. In
our case the drive size is 8190MB. We can choose to install Windows in this drive without
creating a partition, hence use the entire size of the drive. If you wish to do this you can just
press enter and Windows will automatically partition and format the drive as one large drive.
However for this demonstration I will create two partition. The first partition will be 6000MB
(C: drive) and second partition would be 2180MB (E: drive). By creating two partition we can
have one which stores Windows and Applications and the other which stores our data. So in
the future if anything goes wrong with our Windows install such as virus or spyware we can
re-install Windows on C: drive and our data on E: drive will not be touched. Please note you
can choose whatever size partition your like. For example if you have 500GB hard drive you
can have two partition of 250GB each.
Step 8 - Windows will show the total size of the hard drive and ask you how much you want
to allocate for the partition you are about to create. I will choose 6000MB. You will then get
the screen below. Notice it shows C: Partition 1 followed by the size 6000 MB. This indicates
the partition has been created. We still have an unpartitioned space of 2189MB. Next
highlight the unpartitioned space by pressing down the arrow key. Then press C to create
another partition. You will see the total space available for the new partition. Just choose all
the space left over, in our case 2180MB.
Step 9 - Now you will see both partition listed. Partition 1 (C: Drive) 6000MB and Partition 2
(E: Drive) 2180MB. You will also have 8MB of unpartitioned space. Don't worry about that.
Just leave it how its is. Windows normally has some unpartitioned space. You might wonder
what happened to D: drive. Windows has automatically allocated D: drive to CD/DVD-ROM.
Step 10 - Choose format the partition using NTFS file system.This is the recommended file
system. If the hard drive has been formatted before then you can choose quick NTFS
format. We chose NTFS because it offers many security features, supports larger drive size,
and bigger size files.
Windows will now start formatting drive C: and start copying setup files as shown on the two
images below :
Step 11 - After the setup has completed copying the files the computer will restart. Leave the
XP CD in the drive but this time DO NOT press any key when the message "Press any key
to boot from CD" is displayed. In few seconds setup will continue. Windows XP Setup wizard
will guide you through the setup process of gathering information about your computer.
Step 15 - Name the computer, and enter an Administrator password. Don't forget to write
down your Administrator password.
Step 16 - Enter the correct date, time and choose your time zone.
Step 17 - For the network setting choose typical and press next.
Step 18 - Choose workgroup or domain name. If you are not a member of a domain then
leave the default settings and press next. Windows will restart again and adjust the display.
Step 19 - Finally Windows will start and present you with a Welcome screen. Click next to
continue.
Step 20 - Choose 'help protect my PC by turning on automatic updates now' and press next.
Step 21 - Will this computer connect to the internet directly, or through a network? If you are
connected to a router or LAN then choose: 'Yes, this computer will connect through a local
area network or home network'. If you have dial up modem choose: 'No, this computer will
connect directly to the internet'. Then click Next.
Step 22 - Ready to activate Windows? Choose yes if you wish to active Windows over the
internet now. Choose no if you want to activate Windows at a later stage.
Step 23 - Add users that will sign on to this computer and click next.
Step 24 - You will get a Thank you screen to confirm setup is complete. Click finish.
Step 26 - You now need to check the device manager to confirm that all the drivers has
been loaded or if there are any conflicts. From the start menu select Start -> Settings ->
Control Panel. Click on the System icon and then from the System Properties window
select the Hardware tab, then click on Device Manager.
If there are any yellow exclamation mark "!" next to any of the listed device, it means that no
drivers or incorrect drivers has been loaded for that device. In our case we have a Video
Controller (VGA card) which has no drivers installed.
Your hardware should come with manufacturer supplied drivers. You need to install these
drivers using the automatic setup program provided by the manufacturer or you need to
manually install these drivers. If you do not have the drivers, check the manufacturers
website to download them.
(a) From the device manager double click on the device containing the exclamation mark.
(d) Click Update Driver button. The Wizard for updating device driver pops up as shown
below:
You now get two options. The first option provides an automatic search for the required
driver. The second option allows you to specify the location of the driver. If you don't know
the location of the driver choose the automatic search which would find the required driver
from the manufacturer supplied CD or Floppy disk. Windows would install the required driver
and may ask you to restart the system for the changes to take affect. Use this procedure to
install drivers for all the devices that contain an exclamation mark. Windows is completely
setup when there are no more exclamation marks in the device manager.
We need the Ubuntu 10.04 LTS Desktop ISO image that corresponds to your
hardware architecture (i386 or amd64), and that can be downloaded from here.
When the download is over, burn the ISO image with your favorite CD/DVD burning
application (Nero, CDBurnerXP, Roxio) on a blank CD at 8x speed. Reinsert or leave
the CD in your CD/DVD-ROM device and reboot the computer in order to boot from
the CD. Hit the F8, F11 or F12 key (depending on your BIOS) to select the CD/DVD-
ROM as the boot device
Wait for the CD to load...
We will see the wallpaper and the installation wizard. Select your language and click
the "Install Ubuntu 10.04 LTS" button to continue...
The second screen will feature a map of the Earth. Upon the selection of our current
location, the time for the final system will adjust accordingly. We can also select our
current location from the drop-down list situated at the bottom of the window. Click
the "Forward" button after selected your desired location...
1. If we have another operating system (e.g. Windows XP) and we want a dual boot
system, select the first option: "Install them side by side, choosing between them at
each startup."
Note: This option will ONLY appear if we have another operating system installed,
such as Microsoft Windows. Remember that, after the installation, the Windows boot
loader will be overwritten by the Ubuntu boot loader!
2. If we want to delete our existing operating system, or the hard drive is already
empty and we want to let the installer automatically partition the hard drive, select
the second option, "Use the entire disk."
Note: This option is recommended for most users who do not have another operating
system installed or who want to erase an existing one, for example Windows OS.
3. The third choice is "Use the largest continuous free space" and it will install
Ubuntu 9.10 in the unpartitioned space on the selected hard drive.
4. The fourth choice is "Specify partitions manually" and it is recommended ONLY for
advanced users, to create special partitions or format the hard drive with other
filesystems than the default one. But it can also be used to create a /home partition,
which is very useful in case you reinstall the whole system.
- Make sure that the selected hard drive is the right one. /dev/sda is the first physical
hard drive. /dev/sdb is the second hard drive in our machine. So, make sure that we
know which is the one we want to format! Otherwise, will lose ALL DATA on that hard
drive;
- Let's say that the selected drive is empty (no other operating system or important
data on it), but it has some partitions on it. Select each one of those partitions and
click the "Delete" button. After a few seconds, it will say "free space." Do this with the
other partitions from the selected hard drive, until they're all deleted and you have a
single "free space" line;
- With the "free space" line selected, click on the "Add" button. In the new window,
type 2000 in the "New partition size in megabytes" field and select the "swap area"
option from the "Use as:" drop down list. Click the OK button and, in a few seconds,
we can see a "swap" line with the specified size;
- With the "free space" line selected, click on the "Add" button. In the new window,
select the "Primary" option, type a value between 10,000 and 50,000 in the "New
partition size in megabytes" field and select / as the "Mount point." Click the OK
button and, in a few seconds, we can see an "ext4 /" line with the specified size;
- With the "free space" line selected, click on the "Add" button. In the new window,
select the "Primary" option, type a value between 30,000 and 50,000 (or whatever
space you have left on the drive) in the "New partition size in megabytes" field and
select /home as the "Mount point." Click the OK button and, in a few seconds, we
can see an "ext4 /home" line with the specified size.
This is how our partition table should look like. If so, click the "Forward" button to
continue with the installation...
WARNING: Be aware that all the data on the selected hard drive or partition will be
ERASED and IRRECOVERABLE.
Submission of User details On this screen, we must do exactly what the title says.
Fill in the fields with your real name, the name you want to use to log in on your
Ubuntu OS (also known as the "username," which will be required to log in to the
system), the password and the name of the computer (automatically generated, but
can be overwritten). Also at this step, there's an option called "Log in automatically."
If we check the box on this option, automatically be logged in to the Ubuntu desktop.
Click the "Forward" button to continue...
In the final step of the installation, we can select to install the boot loader on another
partition or hard drive than the default one, but it is only recommended for advanced
users. If someone is installing to a USB memory stick, as if it was a USB hard drive,
then they should know that the installer will mess with their computer's hard disk
drive MBR.
Therefore, click the "Advanced" button and select the correct drive (the USB stick in
this case)...
The CD will be ejected; remove it and press the "Enter" key to reboot. The computer
will be restarted and, in a few seconds, will see the Ubuntu boot splash...
At the login screen, click on the username and input password. Click the "Log In"
button or hit Enter...
The devices that are installed on the computer are listed in the right pane.
3. Expand the category of the device that you want to configure
NOTE: The device may be listed under Other devices.
4. Right-click the device for which you want to install the driver, and then click
Properties.
NOTE: The device may be displayed as Unknown device, or as a generic device.
5. Click the Driver tab, and then click Update Driver.
Printer Sharing
• Click "Do not share this printer"
• Click Next
2 Exercise 1:
4 Short Answer Give at least 5 examples of how you have recently used a
computer in your everyday life:
1.
2.
3.
4.
5.
2 Exercises Key
1 1. Computer
An electronic device that operates under the control of a set of instructions that is
stored in its memory unit. It accepts data from an input device and processes it into
useful information, which it makes available on its output device.
2 2. Hardware
The physical components of the computer and any equipment connected to it.
3 3. Software
The set of instructions that the computer follows in performing a task.
4 4. Supercomputer
Classified by size, the largest classification of computers.
5 5. Mainframe
Classified by size, the second largest classification of computers.
6 6. Microcomputer
Personal computers or desktop computers.
7 7. Notebook Computer
A personal computer that can fit into a briefcase.
8 8. Laptop Computer
A larger, heavier version of a notebook computer.
3 Short Answer Give at least 5 examples of how you have recently used a
computer in your everyday life: These answers will vary.
Byte : A byte A unit of storage usually made up of eight bits. It represents one
character - a letter, digit, or symbol.
A hard disk : An internal disk, a metal platter coated with magnetic oxide that can be
magnetized to represent data.
Machine Cycle : A machine cycle Four steps performed by the central processing
unit in carrying out the instructions of a program.
Memory : Primary storage that works with the CPU to hold instructions and data in
order to be processed.
Operating Systems: software The set of programs that lie between applications
software and the hardware devices; it controls the overall activity of a computer.
Output device: A hardware device that displays the processed information to the
user.
Random access memory (RAM): Memory that the computer user can access.
Read only memory (ROM): Memory that contains programs and data that are
permanently recorded when the computer is manufactured.
Secondary or auxiliary storage: A more permanent form of storage that does not
depend on a constant flow of electricity.
Shareware: A form of free software; however, the author of shareware hopes you
will make a voluntary contribution for using the product.
Exercise 2:
1. ____ Hardware devices that accept data in a form that the computer can use.
2. ____ Raw unprocessed facts to be processed by the computer.
3. ____ Electronic circuits that interpret and execute instructions and
communicate with the input, output, and storage devices.
4. ____ Four steps performed by the central processing unit in carrying out the
instructions of a program.
5. ____ Programs and data that are permanently recorded when the computer is
manufactured.
6. ____ A billion machine cycles per second.
7. ____ Hardware devices that display the processed information to the user.
8. ____ A million machine cycles per second.
9. ____ A more permanent form of storage that does not depend on a constant
flow of electricity.
10.____ A package of software that contains several pieces of software. It is sold
as a single package and is designed to work together.
11.____ A program that consists of instructions used to control hardware.
12.____ An internal storage disk; it is a metal platter coated with magnetic oxide
that can be magnetized to represent data.
13.____ A form of free software; however, the author hopes you will make a
voluntary contribution for using the product.
14.____ Instructions provided with software that includes steps required for
installation and use of the product.
15.____ Memory that the computer user can use.
16.____ Output displayed on a monitor.
17.____ Output produced by a printer.
18.____ Primary storage that works with the CPU to hold instructions and data to
be processed.
19.____ Software considered to be in the public domain; it may be used or
altered without fee or restriction.
20.____ Software that allows you to perform a particular task or solve a specific
problem.
21.____ Equipment associated with a computer system; it is responsible for
performing four basic functions: input, processing, output, and storage.
22.____ A set of programs that lie between applications software and the
hardware devices; it controls the overall activity of a computer.
23.____ A storage unit that is usually made up eight bits and represents one
character, letter, digit, or symbol.
24.____ A way of storing data in more than one location.
25.____ One million floating-point operations per second.
4 Exercise Key
1. Input devices
2. Data
3. CPU
4. Machine cycle
5. ROM
6. Gigahertz
7. Output devices
8. Megahertz
9. Secondary or auxiliary storage
10. Office suite
11. Software
12. Hard disk
13. Shareware
14. Documentation
15. RAM
16. Softcopy
17. Hardcopy
18. Memory
19. Freeware
20. Applications software
21. Hardware
22. Operating systems software
23. Byte
24. Backup system
25. Megaflop
Networking Basics
Types of cables
Coaxial cable
Coaxial cable has a single strand or multi-strand of copper. The wire is enclosed in
plastic foam for insulation. The foam is surrounded by a second conductor, a wire
mesh or metallic foil. The wire mesh protects the central conductor from electro
magnetic interference. It also provides proper grounding for the central conductor.
Coaxial cable transmit data typically at 10 Mbps. Data is transmitted in the form of
electric current and are comparatively slower than fiber-optic cables.
Twisted-pair cable
These cables have one or more pairs of copper wires that are twisted. The twisting
reduces external interference. There are two types of twisted pair cables. 1. Shielded
Twisted Pair (STP) and 2. Unshielded Twisted Pair (UTP). STP cables are shielded
with aluminium or polyester present in between the outer jacket and the wires. UTP
cables do not have this shielding.
Fiber-optic cable
These cables are mainly used as backbone in a WAN. Data is transmitted in the form
of light signals. The inner core is enclosed in a layer of glass called as a cladding,
that reflects light back into the core. A plastic sheath surrounds each fiber. Fiber-optic
cables are capable of transmitting data at a very high speed offering data transfer
speeds ranging from 100 Mbps to 2 Gbps and are more expensive.
Plenum cable
In coaxial cables, PVC is used as the outer jacket for insulation. When the cables
have to be run in the space between the false ceiling and the floor above, a special
type of cable called as plenum-grade cable has to be used. When burned, PVC
gives off poisonous gases, so a fire resistant cable such as the plenum-grade cable
is used. It is more expensive and less flexible than PVC insulated coaxial cables.
Network Connectivity Devices
Any network grows over a period. This growth creates the need for attaching more
computers in the network. Expansion of a network is of two types, they are
a) Expansion within a network
b) Joining two networks
More computers can be attached in a network by using additional cables and
connectors. But once the network architecture is stretched beyond a point, it reduces
the data transmission speeds. In such a situation, there arises a need for special
devices, which can amplify the signals and send them over longer distances. The
following devices can be used to expand a single network without connecting it to
other networks.
a) Hubs (Active, Passive and Intelligent)
b) Repeaters
c) Switches
d) Bridges
e) Multiplexers
a) Hubs
These are the connecting points in a network where UTP and STP cables are used.
Hubs amplify signals and split them so that the signals reach their destination. Hubs
can be of three types based on their function. Hubs are available in configuration of
4/8/16/32 ports for connecting 4/8/16/32 computers respectively. To add more
computers to the network cascading of hubs can be done. Cascading is nothing but
taking the signal from
one hub to another hub. This is allowed only for Active hubs.
Active hubs : These hubs provide connection points for cables to be attached from
each computer in the network. The hub in turn is connected to the main computer
called as the Server. Active hubs are mainly used in Star Topology.
Passive hubs : These hubs merely act as junction boxes for extending the network.
They cannot amplify or split signals.
Intelligent hubs : These hubs have special instructions stored in the ROM that help in
signal regeneration and path selection. An intelligent hub has the ability to choose
the path where the signal has to reach instead of sending the signals along all paths.
They can also choose the quickest path for sending the signal.
b) Repeaters
The signals that pass in the network media (cables) are prone to weakening called
as attenuation. This results in loss of signals. In order to prevent this, a repeater is
used to boost the signal allowing it to travel over longer cable distances.
c) Switches
Switches operate at the data link layer and are responsible for receiving and
transmitting frames. Switches use MAC (Message Authentication Code) address
from the host’s NIC cards to filter the network. Switches work in full-duplex mode
(100 Mbps) where the signals can be transmitted and received between the switch
and the computer simultaneously. Switches are available in configuration of
8/16/24/32 ports for connecting computers.
d) Bridges
Bridges are used to cross from one circuit, channel or element over to another. It is a
device that connects two LAN segments together, which may be of similar or
dissimilar types, such as Ethernet and Token Ring. A bridge is inserted into a
network to segment it and keep traffic contained within the segments to improve
performance. Bridges learn from experience and build and maintain address tables
of the nodes on the network. By monitoring which station acknowledged receipt of
the address, they learn which nodes belong to the segment.
Bridges are protocol independent; routers are protocol dependent. Bridges are faster
than routers because they do not have to read the protocol to glean routing
information. Bridges with more than two ports (multiport bridges) perform a switching
function. Today's LAN switches are really multiport bridges that can switch at full wire
speed.
e) Multiplexers
These devices use a technique called as multiplexing where many different
signals are combined and transmitted and at the receiving end, they are
demultiplexed to reach the appropriate destination. The transmission signals of cable
TV is an example of multiplexing where multiple channels are send in a single
coaxial cable and the demultiplexer present in the TV recognizes the appropriate
signal.
Inter-network Connectivity
Any network consisting of two or more networks is called as an inter-network. The
Internet is an example of this. An inter-network may have different types of networks
like Ethernet, Token ring, and ATM. The following devices can be used to expand an
inter-network by connecting it to other network.
a) Routers
A device that forwards data packets from one local area network (LAN) or wide area
network (WAN) to another. Based on routing tables and routing protocols, routers
read the network address in each transmitted frame and make a decision on how to
send it based on the most expedient route (traffic load, line costs, speed, bad lines,
etc.). Routers work at layer 3 in the protocol stack, whereas bridges and switches
work at the layer 2.
Routers are used to segment LANs in order to balance traffic within workgroups and
to filter traffic for security purposes and policy management. Routers are also used
at the edge of the network to connect remote offices.
b) Brouters
Brouters are a combination of a router and a bridge.
c) Gateways
These are sophisticated devices combining both hardware and software. Gateway
helps in connecting disparate networks. They take care of protocol conversion so
that data received from any network can be interpreted in your network and used.
d) CSU/DSU
Channel Service Unit/Digital Service Unit help in using the existing telephone line for
transmitting signals. Apart from sending signals CSU/DSU also shield your network
from voltage currents that come through the telephone network.
Network Topology
The term topology, or more specifically, network topology, refers to the
arrangements or physical layout of computers, cables, and other components on the
network. The three popular topologies are bus, star and ring. Each topology has its
strengths and weakness.
These are the three major topologies used in networks. Ethernet uses bus, hub and
switch topologies. Token Ring uses ring and switch.
Patch Chord
Patch Chord is just an UTP cable with RJ-45 connectors connected at both the ends.
The patch chord may be straight cable or cross over cable depending upon the
application where it is used.
RJ 45 Jack
Both the T-568A and the T-568B standard Straight-Through cables are used most often as
patch cords for your Ethernet connections. If you require a cable to connect two Ethernet
devices directly together without a hub or when you connect two hubs together, you will need
to use a Crossover cable instead.
6 RJ-45 Crossover Ethernet Cable
1. Pull the cable off the reel to the desired length and cut using wire cutters or
scissors. If you are pulling cables through holes, it's easier to attach the RJ-45 plugs
after the cable is pulled. The total length of wire segments between a PC and a
switch or between two PC's cannot exceed 100 Meters (328 feet) for 100BASE-TX
and 300 Meters for 10BASE-T.
2. Start on one end and strip the cable jacket off (about 1") using a wire stripper
or a knife. Be extra careful not to nick the wires, otherwise you will need to start over.
3. Spread, untwist the pairs, and arrange the wires in the order of the desired
cable end. Flatten the end between your thumb and forefinger. Trim the ends of the
wires so they are even with one another, leaving only 1/2" in wire length. If it is longer
than 1/2" it will be out-of-spec and susceptible to crosstalk. Flatten and insure there
are no spaces between wires.
4. Hold the RJ-45 plug with the clip facing down or away from you. Push the
wires firmly into the plug. Inspect each wire is flat even at the front of the plug. Check
the order of the wires. Double check again. Check that the jacket is fitted right
against the stop of the plug. Carefully hold the wire and firmly crimp the RJ-45 with
the crimp tool.
5. Check the color orientation, check that the crimped connection is not about to
come apart, and check to see if the wires are flat against the front of the plug. If even
one of these are incorrect, you will have to start over. Test the Ethernet cable.
TCP/IP
TCP/IP stands for Transmission Control Protocol/Internet Protocol. It was
developed for the US Department of Defense to allow communication between
different types of computer and networks. Now it is a widely used networking
protocol. TCP and IP are the two best known protocols in the suite. The
Transmission Control Protocol (TCP) provides reliable sequence delivery of packets
between clients. The Internet Protocol (IP) provides packet delivery between hosts.
IP Addressing
In a TCP/IP environment communication between hosts and servers on the
internetwork is transparent. This is because each node using the TCP/IP protocol
suite has at least one unique 32 bit Internet Protocol (IP) address.
A router “reads” the destination address in an IP packet and makes a routing
decision based on this address. All hosts on an inter-network require unique
addresses. IP address can be represented as a group of four decimal number (in the
range 0 to 255), separated by decimal points. This is known as dotted decimal
notation.
They can also be represented in binary or hex. Each IP address identifies a hosts
within the inter-network. Part of an IP address identifies a particular network, part
identifies a subnet and part identifies a specific host within that sub-network.
An IP address can be represented in dotted decimal notation or binary or
hexadecimal notation. For example :
Dotted decimal 130.57.30.56
Binary 10000010.00111001.00011110.00111000
Hexadecimal 82.39.IE.38
IP Address Classes
Depending on your networking requirements, you are assigned (by your service
provider) specific classes of IP address. They are five classes of IP addresses: A, B,
C, D and E.
Class A: Address range from 1 to 126. These addresses use the first byte to specify
the network and the last three bytes to specify the host. Class A addresses are
assigned to system in a small number of networks and a large number of hosts.
Class B: Address range from 128 to 191. These addresses use the first two bytes to
specify the network and next two bytes to specify the host. Class B addresses are
assigned to systems in universities and commercial organizations.
Class C: Address range from 192 to 223. These addresses use the first three bytes
to specify the network and the last byte to specify the host. Class C addresses are
assigned to systems in a network with small number of hosts.
Class D: Address range from 224 to 239. These addresses are used for
broadcasting messages over an inter-network. These addresses are also used for
multicasting.
Class E: Address range from 240 to 255. These addresses are reserved for research
purposes and future use.
Subnet Mask
Subnet is a physical segment in a TCP/IP environment that uses IP addresses
derived from a single network ID.
Subnetting: One part is used to identify the segment as a unique network other part
used to identify the hosts. This is known as subnetting.
Local Area Network (LAN) A network of computers that share hardware, software,
and data in small geographic area.
Modem A device that converts a digital signal to an analog signal
and vice versa.
Newsgroups An informal network of computers that allows the posting
and reading of messages in newsgroups that focuses on
specific topics.
Plug-ins Software that enhances the value of a browser by
increasing its features.
Router A special computer that directs communications traffic
when several networks are connected together.
Uniform ResourceA unique address on the WWW.
Locator (URL)
Web pages Documents that contain text, graphics, sound, and/or
video and have built-in connections called hyperlinks.
Exercise 3:
Complete each of the statements below by filling in the blanks with terms found in
the Computer Network Concepts module.
12. 12. The largest and most popular part of the Internet is the
_____________________.
18. 18. Computers on the Internet have a standard way to transfer copies of files.
This program is called _________________________________.
Exercise Key
Here are five common-sense techniques and strategies to solve common computer
hardware problems.
(1) Trial-and-error
Personal computers are highly modular by design. The most powerful trouble-
shooting technique is to isolate the problem to a specific component by trial-and-
error. Swap compatible components and see if the system still works. Try different
peripherals on different machines and see if the same problem occurs. Make one
change at a time.
More than 70% of all computer problems are related to cabling and connections.
Ensure all cables are connected firmly. IDE and SATA cables and power cables can
often go loose. Ensure microprocessor, memory modules, and adapters such as
video card and sound card are inserted correctly and didn't "pop-up" during
transportation.
Take notes of what you have done and all the error messages. You may need to use
them later. For instance, when you see an unusual blue screen with an error
message, copy the entire message onto a piece of paper. In many situations, that
message may point to the right direction in getting the problem solved quickly.
It's OK to open a computer case and take a look inside. There is only 5V and 12V
DC voltage supplied to the components outside the power supply. Of course, still
always power down and unplug the power cord first.
Most cases and power supplies these days are made and tested in China and other
Asian countries where 220V electricity is used. Desktop computer power supplies do
not switch the power voltage automatically. If the factory forgets to turn the manual
switch back to 110V for the North American market after testing, the power supply
would appear DEAD if you use on a 110V-outlet. Therefore, always check the
voltage setting on the back of a new power supply FIRST if it appears dead.
Do not expect an ATX power supply to work by simply plugging the power and
turning on the switch. ATX power supplies are soft-switched on and off by the
motherboard and BIOS. Therefore, you must plug it to a working motherboard with a
working microprocessor, memory and video card to work. If your computer does not
turn on after you turn on the power switch, it may not necessarily mean a dead
power supply. The problem might be with the motherboard, microprocessor,
memory or video card instead. You must examine all these components to isolate
the problem.
The most effective technique to tell if a power supply is causing any problem is to
use a different one to see if it solves the problem. Alternatively, you can plug the old
power supply to an existing, working computer to see if it works there.
More than 70% of all computer problems are related to cabling and connections.
Ensure that you all the power plugs are connected firmly, including power
connections to your motherboard and all the drives.
Make sure the cooling fan inside the power supply is working all the time. Reach
out to feel the fan behind your case often. Clean the fan if necessary. If your case
feels warmer than room temperature, check the power supply fan first.
System has no power at all. Power light does not illuminate, fan inside the
power supply does not turn on, and indicator light on keyboard does not turn
on.
System does not boot from hard disk drive, can be booted from floppy disk
drive.
After install an expansion card (network card, tape drive card, etc.) the system
no longer works properly.
Incorrect information
Check the configuration Review system's equipment.
entered into the
program. Replace any Make sure correct
configuration (setup)
incorrect information. information is in setup.
program.
Screen is blank.
Keyboard failure.
No color on screen.
C: drive failure.
10 [boot loader]
timeout=30
default=scsi(0)disk(0)rdisk(0)partition(1)\winnt
[operating systems]
scsi(0)disk(0)rdisk(0)partition(1)\winnt = "Windows NT" /NODEBUG C:\ = "Previous
Operating System on C:\"
11 The following list describes the meaning of the data in the Boot.ini file:
• The "timeout" variable specifies how long Windows waits before choosing the
default operating system.
• The "default" variable specifies the default operating system.
• The term "scsi(0)" means that the primary controller (that is frequently the only
controller) is responsible for the device. If there are two SCSI controllers, and the
disk is associated with the second controller, the controller is named "scsi(1)".
If the system uses IDE, enhanced IDE (EIDE), or Enhanced Small Device
Interface (ESDI) drives, or if the system uses a SCSI adapter that does not have a
built-in BIOS, replace "scsi" with "multi".
• The term "disk(0)" refers to the SCSI logical unit (LUN) to use. This may be a
separate disk, but most SCSI setups have only one LUN for each SCSI ID.
• The term "rdisk(0)" refers to physical disk 1.
• The term "partition(1)" is the partition on the first drive in the computer. If there are
two partitions, partition C is partition(1) and partition D is partition(2).
• A multi-boot parameter calls for checking the Winnt folder to start from a specified
SCSI controller's disk and partition.
• "/NODEBUG" specifies that no debugging information is being monitored.
Debugging information is useful only for developers.
• You can add the /SOS option to display driver names while the drivers are being
loaded. By default, the OS Loader screen only shows progress dots.
• "Previous Operating System on C:\" implies that the "previous operating system" is
MS-DOS, because "C:\" is an MS-DOS path.
Edited By
Graison Varghese