Sie sind auf Seite 1von 37

Chapter-3 : Mobile Hardware and Networking

Concepts

Learning Objective
• Computer Hardware Setup
• Networking of Computers
• Mobile Hardware Devices
• Use of mobile phones
• Use of applets
• Wireless Networks - Basic concepts.

1
100 Hrs. Information Technology Training © IT Directorate, ICAI
Introduction
• Computers, Mobiles and Networking have been technology buzzwords
since the last 25 years. Computers and Mobiles have consistently reduced
in size and increased in power. Interconnectivity is now instantaneous.

• Computers are now an integral part of business and home environments.


Knowledge about their setup and configuration is essential for optimal
usage. Mobile Phones are no less than computers with respect to
features and information processing capabilities. The impact of
Computers and Mobiles is augmented manifold when they are networked
i.e. interconnected to each other. This networking or connectivity is
achieved through a number of channels: Wired and Wireless networks,
GSM and emerging technologies like NFC.

2
100 Hrs. Information Technology Training © IT Directorate, ICAI
Types of Computer

3
100 Hrs. Information Technology Training © IT Directorate, ICAI
Desktop Computers
Desktop computers are designed for use at a
desk or table. They are typically larger and
more powerful than other types of personal
computers. Desktop computers are made up
of separate components. The main
component, called the system unit, is usually a
rectangular case that sits on or underneath a
desk. Other components, such as the monitor,
mouse, and keyboard, connect to the system
unit.

100 Hrs. Information Technology Training © IT Directorate, ICAI


Laptop Computers
Laptop computers are lightweight mobile PCs with
a thin screen. They are often called notebook
computers because of their small size. Laptops can
operate on batteries, so you can take them
anywhere. Unlike desktops, laptops combine the
CPU, screen, and keyboard in a single case. The
screen folds down onto the keyboard when not in
use.

100 Hrs. Information Technology Training © IT Directorate, ICAI


Handheld Computers
Handheld computers, also called personal digital
assistants (PDAs), are battery-powered computers
small enough to carry almost anywhere. Although
not as powerful as desktops or laptops, handhelds
are useful for scheduling appointments, storing
addresses and phone numbers, and playing games.
Some have more advanced capabilities, such as
making telephone calls or accessing the Internet.
Instead of keyboards, handhelds have touch
screens that you use with your finger or a stylus (a
pen-shaped pointing tool).

100 Hrs. Information Technology Training © IT Directorate, ICAI


Tablet PCs
Tablet PCs are mobile PCs that combine
features of laptops and handhelds. Like
laptops, they're powerful and have a built-in
screen. Like handhelds, they allow you to write
notes or draw pictures on the screen, usually
with a tablet pen instead of a stylus. They can
also convert your handwriting into typed text.
Some Tablet PCs are “convertibles” with a
screen that swivels and unfolds to reveal a
keyboard underneath.

100 Hrs. Information Technology Training © IT Directorate, ICAI


Parts of Computers

8
100 Hrs. Information Technology Training © IT Directorate, ICAI
System Unit
The system unit is the core of a computer system. Usually it's a rectangular box placed
on or underneath your desk. Inside this box are many electronic components that
process information. The most important of these components is the central
processing unit (CPU), or microprocessor, which acts as the "brain" of your computer.
Another component is random access memory (RAM), which temporarily stores
information that the CPU uses while the computer is on. The information stored in
RAM is erased when the computer is turned off.
 
Almost every other part of your computer connects to the system unit using cables.
The cables plug into specific ports (openings), typically on the back of the system unit.
Hardware that is not part of the system unit is sometimes called a peripheral
device or device.

9
100 Hrs. Information Technology Training © IT Directorate, ICAI
Storage &Hard disk drive
 
Storage:
Your computer has one or more disk drives—devices
that store information on a metal or plastic disk. The
disk preserves the information even when your
computer is turned off. Storage is also called
secondary memory.

Hard disk drive:


Your computer's hard disk drive stores information
on a hard disk, a rigid platter or stack of platters with
a magnetic surface. Because hard disks can hold
massive amounts of information, they usually serve
as your computer's primary means of storage,
holding almost all of your programs and files. The
hard disk drive is normally located inside the system
unit.

10
100 Hrs. Information Technology Training © IT Directorate, ICAI
CD and DVD drives
Nearly all computers today come equipped with a CD or DVD drive, usually located on
the front of the system unit. CD drives use lasers to read (retrieve) data from a CD, and
many CD drives can also write (record) data onto CDs. If you have a recordable disk
drive, you can store copies of your files on blank CDs. You can also use a CD drive to
play music CDs on your computer.

DVD drives can do everything that CD drives can, plus read DVDs. If you have a DVD
drive, you can watch movies on your computer. Many DVD drives can record data onto
blank DVDs.

11
100 Hrs. Information Technology Training © IT Directorate, ICAI
Mouse
A mouse is a small device used to point and select items on
your computer screen. Although mouse come in many
shapes, the typical mouse does look a bit like an actual
mouse. It's small, oblong, and connected to the system unit
by a long wire that resembles a tail. Some newer mouse are
wireless.

A mouse usually has two buttons: a primary button (usually


the left button) and a secondary button. Many mice also have
a wheel between the two buttons, which allows you to scroll
smoothly through screens of information

When you move the mouse with your hand, a pointer on your
screen moves in the same direction. (The pointer's
appearance might change depending on where it's positioned
on your screen.) When you want to select an item, you point
to the item and then click (press and release) the primary
button. Pointing and clicking with your mouse is the main way
to interact with your computer. There are optical mouse
12
which works on laser beam instead of roller ball.
100 Hrs. Information Technology Training © IT Directorate, ICAI
Keyboard
A keyboard is used mainly for typing text into your computer. Like the keyboard on a
typewriter, it has keys for letters and numbers, but it also has special keys:
 
– The function keys, found on the top row, perform different functions depending
on where they are used.
– The numeric keypad, located on the right side of most keyboards, allows you to
enter numbers quickly.
– The navigation keys, such as the arrow keys, allow you to move your position
within a document or webpage.

You can also use your keyboard to perform many of the same tasks you can perform
with a mouse. 13
100 Hrs. Information Technology Training © IT Directorate, ICAI
Monitor
A monitor displays information in visual
form, using text and graphics. The
portion of the monitor that displays the
information is called the screen. Like a
television screen, a computer screen
can show still or moving pictures.
 
There are two basic types of
monitors: CRT (cathode ray tube)
monitors and LCD (liquid crystal display)
monitors. Both types produce sharp
images, but LCD monitors have the
advantage of being much thinner and
lighter. CRT monitors, however, are
generally more affordable. LCD monitor (left); CRT monitor (right)

14
100 Hrs. Information Technology Training © IT Directorate, ICAI
Printer
A printer prints data from a computer onto paper. You don't need a printer to use your
computer, but having one allows you to print e‑mail, cards, invitations, announcements, and
other materials. Many people also like being able to print their own photos at home.
 
The two main types of printers are inkjet printers and laser printers. Inkjet printers are the
most popular printers for the home. They can print in black and white or in full colour and
can produce high-quality photographs when used with special paper. Laser printers are
faster and generally better able to handle heavy use.

Fig: Inkjet printer (left); laser printer (right) 15


100 Hrs. Information Technology Training © IT Directorate, ICAI
Modem
To connect your computer to the Internet, you need a modem. A modem is a device
that sends and receives computer information over a telephone line or high-speed
cable. Modems are sometimes built into the system unit, but higher-speed modems
are usually separate components.

Modem Wireless Modem

16
100 Hrs. Information Technology Training © IT Directorate, ICAI
Network Interface cards(NIC)/ Ethernet cards
• An Ethernet card is one kind of network adapter. These adapters support
the Ethernet standard for high-speed network connections via cables.
Ethernet cards are sometimes known as network interface cards (NICs).

• Ethernet cards may operate at different network speeds depending on the


protocol standard they support. Old Ethernet cards were capable only of
the 10 Mbps maximum speed offered by Ethernet originally. Modern
Ethernet adapters support the 100 Mbps Fast Ethernet standard and an
increasing number now also offer Gigabit Ethernet support at 1 Gbps (1000
Mbps).

17
100 Hrs. Information Technology Training © IT Directorate, ICAI
Computer Networks
A computer network is an interconnected group of computers. Networks may be classified by the network layer at
which they operate according to basic reference models considered as standards in the industry, such as the five-layer
Internet Protocol Suite model (TCP model). While the seven-layer Open Systems Interconnection (OSI) reference model
is better known in academia, the majority of networks use the Internet Protocol Suite (IP).

By scale, Computer networks may be classified according to the scale: Personal area network (PAN), Local Area
Network (LAN), Campus Area Network (CAN), Metropolitan area network (MAN), or Wide area network (WAN).
As Ethernet increasingly is the standard interface for networks, these distinctions are more important to the network
administrator than the user. Network administrators may have to tune the network, to correct delay issues and achieve
the desired performance level.

By connection method, Computer networks can also be classified according to the hardware technology that is used to
connect the individual devices in the network such as Optical fiber, Ethernet, Wireless LAN, HomePNA, or Power line
communication.

•Ethernets use physical wiring to connect devices. Often they employ hubs, switches, bridges, gateways and/or routers.
•Wireless LAN technology is built to connect devices without wiring. These devices use a radio frequency to connect

18
100 Hrs. Information Technology Training © IT Directorate, ICAI
Computer Network Continue…
By functional relationship (Network Architectures)
Computer networks may be classified according to the functional relationships which
exist between the elements of the network, e.g., Active Networking, Client-server and
Peer-to-peer (workgroup) architectures.

By network topology
Computer networks may be classified according to the network topology upon which
the network is based, such as Bus network, Star network, Ring network, Mesh
network, Star-bus network, Tree or Hierarchical topology network, etc.
 
Network Topology signifies the way in which intelligent devices in the network see
their logical relations to one another. The use of the term “logical” here is significant.
That is, network topology is independent of the “physical” layout of the network. Even
if networked computers are physically placed in a linear arrangement, if they are
connected via a hub, the network has a Star topology, rather than a Bus Topology. In
this regard the visual and operational characteristics of a network are distinct; the
logical network topology is not necessarily the same as the physical layout.

100 Hrs. Information Technology Training © IT Directorate, ICAI


Types of Networks
Personal Area Network (PAN)
A personal area network (PAN) is a computer network used for communication among
computer devices close to one person. Some examples of devices that may be used in a PAN
are printers, fax machines, telephones, PDAs or scanners. The reach of a PAN is typically
within about 20-30 feet (approximately 6-9 meters).
 
Local Area Network (LAN)
A network covering a small geographic area, like a home, office, or building. Current LANs are
most likely to be based on Ethernet technology. For example, a library will have a wired or
wireless LAN for users to interconnect local devices (e.g., printers and servers) and to connect
to the internet.

Campus Area Network (CAN)


A network that connects two or more LANs but that is limited to a specific and contiguous
geographical area such as a college campus, industrial complex, or a military base.

100 Hrs. Information Technology Training © IT Directorate, ICAI


Types of Network Continue…
Metropolitan Area Network (MAN)
A Metropolitan Area Network is a network that connects two or more Local Area Networks or
Campus Area Networks together but does not extend beyond the boundaries of the immediate
town, city, or metropolitan area. Multiple routers, switches & hubs are connected to create a
MAN.
Wide Area Network (WAN)
A WAN is a data communications network that covers a relatively broad geographic area (i.e.
one city to another and one country to another country) and that often uses transmission
facilities provided by common carriers, such as telephone companies. WAN technologies
generally function at the lower three layers of the OSI reference model: the physical layer, the
data link layer and the network layer.
Global Area Network (GAN)
Global area networks (GAN) specifications are in development by several groups, and there is
no common definition. In general, however, a GAN is a model for supporting mobile
communications across an arbitrary number of wireless LANs, satellite coverage areas, etc. The
key challenge in mobile communications is “handing off” the user communications from one
local coverage area to the next. In IEEE Project 802, this involves a succession of terrestrial
Wireless local area networks (WLAN
21
100 Hrs. Information Technology Training © IT Directorate, ICAI
Networks – Internet Protocol
In modern practice, the interconnected networks use the Internet Protocol. There
are at least three variants of internetwork, depending on who administers and who
participates in them:

Intranet:An intranet is a set of interconnected networks, using the Internet Protocol


and uses IP-based tools such as web browsers and ftp tools, that is under the control
of a single administrative entity. Most commonly, an intranet is the internal network
of a company or other enterprise.

Extranet:An extranet is a network or internetwork that is limited in scope to a single


organization or entity but which also has limited connections to the networks of one
or more other usually, but not necessarily, trusted organizations or entities

Internet:Intranets and extranets may or may not have connections to the Internet. If
connected to the Internet, the intranet or extranet is normally protected from being
accessed from the Internet without proper authorization. The Internet is not
considered to be a part of the intranet or extranet, although it may serve as a portal
for access to portions of an extranet.
22
100 Hrs. Information Technology Training © IT Directorate, ICAI
Mobile Hardware
  Devices
Mobile Hardware Devices have three main features, common to most them:
•Mobile devices provide wireless communication to a base station (a personal
computer, or a whole telephone, or data network)
•Mobile devices must be small to be portable
•Mobile devices must remain operational for several hours or days without a
battery recharge.

100 Hrs. Information Technology Training © IT Directorate, ICAI


Smartphones
Smartphones combine the functionality of Personal Digital Assistants(PDAs),
wireless PCs, phones, and even digital cameras in one handset, making them a
powerful business tool.
Because greater functionality is built-in, smartphones can do things much more
quickly than their standard mobile phone and PDA precursors

Benefits:
Keeping you organised
Flexible working
Information at your fingertips
Never out of touch
Better information sharing
Greater functionality
Faster communication

100 Hrs. Information Technology Training © IT Directorate, ICAI


Mobile Security
 Mobile devices need to be secure just like any other computing devices. But due
to their transportable nature, some of the security techniques will be a bit
different. It is recommend that you prepare for the possibility of a stolen, lost,
damaged, or compromised device. The following methods can help you to recover
from these problems and also aid you in preventing them from happening.Many
mobile devices are not capable of providing strong security assurances to end
users and organizations .

E.g.:
1. Stolen and Lost Devices
2. Compromised and Damaged Devices
3. Selective Wipe

100 Hrs. Information Technology Training © IT Directorate, ICAI


Mobile Device Architecture and Information classification
 
Like other computers, mobile device architectures are composed of a stack of
hardware, firmware, and software.

Device Owner & Information Owner


 A Device Owner is an entity that has purchased and maintains ownership of a mobile
device.
 
An Information Owner is an entity whose information is stored and/or processed on a
device. An Information Owner can be an application-specific provider, a digital product
provider, or an enterprise that allows access to resources from mobile devices, for
example.
 Every mobile device has a single Device Owner and one or more Information Owners.
100 Hrs. Information Technology Training © IT Directorate, ICAI
Use of Mobile Phones
 
Mobile phones are used for a variety of purposes, including keeping in touch
with family members/ friends, conducting business, and having access to a
telephone in the event of an emergency. Some people carry more than one
cell phone for different purposes, such as for business and personal use.
Multiple SIM cards may also be used to take advantage of the benefits of
different calling plans—a particular plan might provide cheaper local calls,
long-distance calls, international calls, or roaming.

•General Usage
•While driving
•In schools
•Mobile banking and payments
•Two-way Interactive Text Messaging Applications
•Tracking and privacy
•Health effects
•Environmental impact
 

100 Hrs. Information Technology Training © IT Directorate, ICAI


Use of Applets
 An applet is a software component that runs in the context of another program, for
example a web browser. An applet usually performs a very narrow function that has no
independent use. Hence, it is an application let.

An applet provides functionality or performance beyond the default capabilities of its


container (the browser). At the same time, an applet’s capabilities are restricted by the
container. An applet is written in a language that is different from the scripting or HTML
language which invokes it.

Prior to the World Wide Web, the built-in writing and drawing programmes that came
with Windows were sometimes called applets.
 
On the Web, using Java language, an applet is a small programme that can be sent along
with a Web page to a user. Java applets can perform interactive animations, immediate
calculations, or other simple tasks without having to send a user request back to the
server.

100 Hrs. Information Technology Training © IT Directorate, ICAI


Basic Concepts & Types of Wireless Networks
Wireless networks utilize radio waves and/or microwaves to maintain
communication channels between computers. Wireless networking is a more
modern alternative to wired networking that relies on copper and/or fiber optic
cabling between network devices.

Wireless is rapidly gaining in popularity for both home and business networking.
Popular wireless local area networking (WLAN) products conform to the 802.11 "Wi-
Fi" standards. Wireless networks are built using network adapters (NICs), access
points (APs), and routers.

Different Types of Wireless Network


 Although we use the term wireless network loosely, there are in fact three different
types of network.
•Wide area networks that the cellular carriers create,
•Wireless local area networks, that you create, and
•Personal area networks, that create themselves.
They all have a part to play in developing wireless solutions, separately or in various
combinations. This section describes these different types of network, and explains
where each can add value.

100 Hrs. Information Technology Training © IT Directorate, ICAI


Pros & Cons to a "Wireless" Network

Pros:
• Mobility
• Setup
• Lack of mess
 
Cons:
• Speed
• Reliability
• Distance sensitive

100 Hrs. Information Technology Training © IT Directorate, ICAI


Roaming among Wireless Local Area Networks

There are two definitions for wireless LAN roaming:

Internal Roaming: The Mobile Station (MS) moves from one access point (AP) to
another AP within a home network because the signal strength is too weak.
An authentication server (RADIUS) performs the re-authentication of MS via 802.1x.

External Roaming: The Mobile Station (client) moves into a WLAN of another
Wireless Internet Service Provider (WISP) and takes their services (Hotspot).
The user can independently of his home network use another foreign network,
if this is open for visitors. There must be special authentication and billing systems
for mobile services in a foreign network.
100 Hrs. Information Technology Training © IT Directorate, ICAI
Bluetooth and WiFi
•Bluetooth signal can be considered to be •Wi-Fi is better suited for operating full-scale
narrowband, while Wi-Fi (802.11a/g), networks because it enables a faster
which is really many narrowband signals connection, better range from the base
combined to create a much larger station, and better security (if configured
bandwidth signal to counteract the properly) than Bluetooth.
reflections or multi-path interference.

•Bluetooth technology is useful when •To connect a Bluetooth device to a mobile


transferring information between two or device, Bluetooth first needs to be enabled.
more devices that are near each other Then the Bluetooth device needs to be
when speed is not an issue, such as synchronized to the mobile device. This is
telephones, printers, modems and known as pairing or linking. It sometimes
headsets. It is best suited to low-bandwidth requires a pin code. When synchronized, the
applications like transferring sound data device needs to be connected. Finally, the
with telephones (i.e. with a Bluetooth Bluetooth connection should be tested. It can
headset) or byte data with hand-held connect several devices, simultaneously.
computers (transferring files) or keyboard
and mice.

100 Hrs. Information Technology Training © IT Directorate, ICAI


Infrared and Bluetooth
•Infrared is shorter wavelength technology that requires a straight line of sight
between source and target.
•Bluetooth is a longer wavelength technology which also has the advantage of a
radial range of sight between source and target.

RFID(Radio Frequency Identification


RFID is the wireless non-contact use of radio-frequency electromagnetic
fields to transfer data, for the purposes of automatically identifying and
tracking tags attached to objects.

NFC(Near Field Communication


NFC is a set of standards for smartphones and similar devices to establish
radio communication with each other by touching them together or bringing
them into close proximity, usually no more than a few centimeters.

100 Hrs. Information Technology Training © IT Directorate, ICAI


Connectivity Technologies
•Wi-Fi Network Connectivity
•Mobile Networking and Synchronization
•GSM(Global System for Communications) Cellular Connectivity
•1G
•2G
•2.5G
•3G like WCDMA,EV-DO,HSPA
•4G

100 Hrs. Information Technology Training © IT Directorate, ICAI


Multiple Choice Questions
1. Which is NOT a network topology
Bus
Ring
Mesh
Bridge
2.PAN (Personal Area Networks) do NOT require
Bluetooth
Infrared
Ethernet Cards
Printers
3.Jailbreaking is used in the context of
Smartphones
iOS devices
Rooting Equipment
Android
4.‘Selective Wipe’ is generally used by
Organizations
Individuals
Thieves
Jailbreakers
100 Hrs. Information Technology Training © IT Directorate, ICAI
Multiple Choice Questions Continue…
5.In which context does the Device manufacturer not operate?
Hardware context
Firmware Context
Application Context
Operating System Context
6.What is Zidisha?
Mobile Operating System
Telecom Service Provider
Microlending Platform
Mobile Manufacturer
7.WiFi is a common name for
802.11
802.11a
802.11b
802.11g
8.What is wardriving?
Creating Viruses
Guessing Passwords
Using Hotspots
Seeking Vulnerabilities in a Wireless LAN
100 Hrs. Information Technology Training © IT Directorate, ICAI
Multiple Choice Questions Continue..
9.Which of the following require line-of-sight?
Bluetooth
Infrared
GSM
Wi-Fi
10.What is ‘Internet Pass Through’
Mobile Phone accessing Internet through PC
PC accessing Internet through Mobile
Mobile Phone using GPRS
Mobile Phone using bluetooth

  Answers
1 2 3 4 5 6 7 8 9 10

D C B A C C C D B A

100 Hrs. Information Technology Training © IT Directorate, ICAI

Das könnte Ihnen auch gefallen