Sunteți pe pagina 1din 32

Hardware

1 and software.
Networks

1. Hardware and software 7. What is a computer network?


2. Computer hardware 8. Network size
Motherboard
9. Network ownership
Microprocessor
Internal connectors and ports 10. Peer networks and client-server networks
Memories 11. Topologies
Internal and external storage units
12. Wired and wireless transmission methods
3. Computer software Twisted-pair cable networks
BIOS Fibre optics
Operating systems Wi-Fi technology
Programs and applications
13. Typical elements of a LAN network
4. The Linux System The network card
Features and advantages of Linux The switch
Main distributions of Linux The router
5. The physical and logical structure of information 14. TCP/IP communication
The logical structure of the hard disk
The file system 15. Routing or gateway
Files and folders 16. TCP/IP services
6. Mobile device hardware and software DNS name resolution service
Mobile device operating systems Static port servers: HTTP, FTP, POP3, etc.
Mobile device apps

10 Information and Communication Technologies - 4º ESO - Editorial Donostiarra


Hardware and software. Networks
1
Learn

1. Hardware and software


A computer consists basically of hardware and software.
We can define hardware as the physical part of the computer: both the box and the internal components (motherboard, hard
disk, etc.) and the elements connected to it (keyboard, mouse, monitor, printer, etc.)
The software consists of programs, instructions, computer applications and the operating system.

2. Computer hardware

„ Motherboard
„
The motherboard is the largest card with a printed circuit you see when you open a computer. All the other computer com-
ponents are inserted on it, as you will see. It includes connectors or communication ports with peripherals and can also incor-
porate video, audio and network devices, among others, depending on the characteristics of the computer.

EXTERNAL
PCI-E SLOTS CONNECTIONS

BIOS BATTERY

PCI SLOTS

MICROPROCESSOR
SOCKET

CHIPSET

SATA
CONNECTIONS MEMORY SLOTS

IDE CONNECTION POWER SUPPLY


CONNECTION

„ Microprocessor
„
The microprocessor is the most important part of the computer. It is responsible for
processing data, performing arithmetical-logical operations and controlling all the
other devices. It is characterised by its working frequency, measured in hertz, which
determines its operating speed.
A modern computer may have a 5 GHz processor, which means it can perform
5 billion basic operations every second.
In physical terms, it is a chip that contains a set of integrated circuits with millions of
transistors, plugged into a socket. It normally has a fan and heat sink above it to cool
it down, along with thermal paste, because if its temperature rises too high it can
block the computer.
The main microprocessor manufacturers are Intel and AMD.

Information and Communication Technologies - 4º ESO - Editorial Donostiarra 11


Hardware and software. Networks
1
Learn

The main components of the motherboard


Microprocessor The microprocessor is plugged in here. When you open the com-
socket puter, what you normally see is a large fan with an aluminium heat
sink below it. A thermal paste is added under the sink to improve
heat dispersal and, finally, the microprocessor is located above the
socket.

Chipset This is a set of chips on the motherboard that carries out communi-
cations between the microprocessor and the different components
connected to the motherboard. It controls the operating mode of
the board and determines its performance and characteristics. The
most important chip normally has an aluminium heat sink above
it, smaller than the microprocessor.

RAM memory slots RAM memory modules are plugged into these. These differ from
other slots in that they include clips to hold the module in place
and in that there may be empty slots but there will always be a
RAM module inserted.

ATX connector This connector joins the power supply to the motherboard through
cables, as shown in the picture. It requires sufficient power to work.

IDE and SATA These are the connections for the storage units: the hard disk, the
connections DVD-ROM, the DVD recorder, etc. The boards can have two types
of connection, IDE or SATA, or just one, depending on the age of
the computer. SATA connections are the more modern ones. The
picture shows the SATA (red) and IDE (blue) cables that connect the
motherboard to the storage units.

Expansion slots These are for inserting expansion cards, such as the graphics card,
sound card, network card, etc. These cards are sometimes integrat-
ed into the motherboard so the slots might be empty. There are
various types: PCI, AGP and PCI Express (PCI-E).

External These are ports for connecting to the network (RJ45) and external
connections devices, such as the keyboard (purple PS2), the mouse (green PS2),
headphones (audio jacks), USB memory cards, etc.

Chip and battery The BIOS is an integrated circuit that stores the computer booting
for BIOS program. It can normally be distinguished from others as it gen-
erally has the word BIOS written on it, as shown in the picture. To
prevent specific setup parameters from being deleted, the BIOS
requires a battery.

12 Information and Communication Technologies - 4º ESO - Editorial Donostiarra


Hardware and software. Networks
1
Learn

„ Internal
„ connectors and ports
The internal connectors are the expansion slots connected to the motherboard, to-
gether with the internal ports or interfaces. There are two types of slots:
•• PCI (peripheral component interconnect): these do not have a default use, they
allow new components, such as video, sound and network cards, among others, to
be added.
•• AGP (accelerated graphics port): this is used for graphics and connectivity. Its trans-
fer rate can be as high as 2 GB/s.
•• IDE (integrated device electronics) or ATA (advanced technology attachment):
these control mass storage devices, such as hard disks, CD-ROM, DVD, etc.
•• SATA (serial advanced technology attachment): this is a transmission interface
(combination of commands, methods and hardware) between the motherboard
and certain devices, such as the hard disk. It will replace the other interfaces.
An external SATA, eSATA, for external hard disks and other components is gaining
popularity. It will become a competitor to USB. SATA connector

Ports are used to connect input/output peripherals to the mother-


board: TYPES OF USB
•• USB (universal serial bus): permits interconnection with Type A Type B
practically any device. In addition, connection and recogni-
tion does not require the device to be rebooted (plug and Standard
play). The 2.0 standard reaches speeds of up to 60 MB/s USB
(480 Mbps).
The connection carries data and also electrical current. They can 5-pin
basically be classified as type A and type B (see table). mini USB
USB 3.0 reaches speeds of up to 600 MB/s (4,8 Gbps). There is
also the mini USB (for MP3 players, cameras, etc.) and the micro 8-pin
USB. USB 3.1, the successor to USB 3.0, increases the speed from mini USB
600 MB/s to 1.25 GB/s (10 Gbps). Micro USB
•• IEEE 1394 also known as Firewire by Apple and i.Link by
Sony): this is an interface that permits the interconnection
of cameras, videos, phones, external hard disks, printers Standard
and scanners with the computer. It reaches speeds of up to USB 3.0
400 Mbps (up to 800 Mpbs in the case of IEEE 1394b.
2.5 mm

USB 3.1 TYPE C CABLE

Micro USB
3.0
8.3 mm

Firewire 800 and Firewire 400 USB type C

•• Other connectors are:


RJ-45 network connector: to enable In- Parallel: this transmits data in parallel,
ternet connection. as the name suggests, and is used for
printers and scanners, although it is
being replaced by USB.
VGA (video graphics adapter) graphics ATX power connector
connector

(1) (2)
DVI-VGA (1) and HDMI (2) graphics Molex (3) and Molex-SATA (4) power
connectors connectors
(3) (4)

Information and Communication Technologies - 4º ESO - Editorial Donostiarra 13


Hardware and software. Networks
1
Learn

„ Memories
„
The smallest unit of information is There are several types of memory in a computer.
the bit, which represents a 1 or a 0.
Its multiples are powers of base 2:
•• RAM is the random-access memory, which means that any part of it can be accessed. It
2n. permits reading and writing. It is volatile: when the power supply is turned off, the infor-
mation stored in it is lost. It is the only one inserted into the motherboard.
byte 8 bits
kilobyte 1,024 bytes
Modern computers usually have between 8 and 16 GB (gigabytes) of RAM.
megabyte 1,024 KB •• ROM is read-only memory. It is not volatile: information is not lost when the computer is
gigabyte 1,024 MB turned off. It is ideal for storing basic hardware routines, such as the computer booting
terabyte 1,024 GB
petabyte 1,024 TB
program (BIOS) or memory testing.
•• Cache memory is faster and has a lower capacity than RAM. It serves as a bridge be-
tween the microprocessor and RAM. Computers include this memory in the micropro-
cessor chip.
A modern computer can have 6 MB (megabytes) of cache memory.

„ Internal
„ and external storage units
Storage units (or storage devices) are used to save information. They should not be confused
with the types of memory described in the previous section, which are not used to store data.
The internal storage units are hard disks. They can be of two types:
•• Hard disk drive (HDD). This uses a magnetic recording system to record digital data on
a series of platters or disks by means of a moving head. External communication can use
IDE or SATA.

Cache memory Controller


chip

Platters

Read
head

Motor

NAND memory chips

HDD hard disk SSD hard disk

•• Solid-state disk or solid-state drive (SSD). This stores information on non-volatile


NAND memory microchips. Unlike HHDs, SSDs do not contain moving parts, so they are
faster and more energy efficient. However, their life is limited to a given number of read-
write cycles.
External storage units include CDs, with a capacity of between 700 and 800 MB, DVDs (typical
capacity of 4.7 GB) and Blu-ray disks (capacity of up to 400 GB). Other external storage devices are
USB flash drives (or pen drives), which are now the most commonly used, and memory cards
(SD, MMC, etc.).

14 Information and Communication Technologies - 4º ESO - Editorial Donostiarra


Hardware and software. Networks
1
Learn

3. Computer software
We can define software as the computer’s logical support, consisting of a set of log-
ical components that make its operation possible. The operating system (Windows,
Linux, MacOS) and the programs and applications we use are all software.
When a computer is turned on, the first software to start working is the BIOS. Next,
the operating system is loaded and, finally the applications.

„ BIOS
„
The BIOS (basic input/output system) is the computer’s basic input and output sys- CR2032 battery and chip for BIOS
tem. It is a special program stored on a small device on the motherboard, as we have
seen. Once the hardware components start to boot up, the BIOS takes control of the
computer. When the BIOS has finished its task, it hands control of the computer over
to the next level: the operating system.

„ Operating
„ system
This is a program, already installed in the software or in the static memory, which
makes the hardware usable. Its purpose is to act as an interface between the user
and the computer, interpreting the user’s instructions and transmitting them to the The main menu for the BIOS setup program
hardware. In addition, it is responsible for controlling and operating all the computer
hardware and programs. Other functions include:
•• Enabling users to share the hardware
•• Enabling users to share data
•• Enabling users to plan resources
•• Facilitating data input and output
The most commonly used operating systems are Windows (in its different versions,
such as Windows 10, 8, 7, Vista, XP, etc.), Linux (Debian, Ubuntu, Red Hat, MAX, Linex,
Molinex, Guadalinex distributions among others) and Mac OS, Symbian OS and WAP.

„ Programs
„ and applications
A computer application is a program designed to facilitate a given type of work, while a program can be defined as a sequence
of instructions that a computer is capable of interpreting and executing. For example, the BIOS (the software stored in the ROM
that enables the computer to boot up and operate) is a program, as is the chip firmware. However, a word processor or a video
player are, technically speaking, computer applications.

Word processors Microsoft Word, LibreOffice Writer

Office automation Spreadsheets Microsoft Excel, LibreOffice Calc


systems Slide presentations Microsoft PowerPoint, LibreOffice Impress
Database managers Microsoft Access, LibreOffice Base
Browsers Mozilla Firefox, Google Chrome, Opera Browser, Safari, Microsoft Edge
Graphic design Adobe Photoshop, LibreOffice Draw, Inkscape, GIMP
Technical drawing Autodesk AutoCAD, QCAD, SketchUp
Utilities Antivirus, compressors (WinZIP, WinRAR, 7-Zip), burning software (Nero, ImgBurn), etc.
Games Minecraft, Clash of Clans, World of Warcraft, Fortnite, FIFA, etc.

Information and Communication Technologies - 4º ESO - Editorial Donostiarra 15


Hardware and software. Networks
1
Learn

4. The Linux system


In 1991, Finnish engineer Linus Torvalds developed Linux, the GNU GPL (General Public License)
free software operating system.
We have two options for installing Linux on a computer:
•• We can download the operating system kernel from the Internet and then download the
most common programs. This requires good knowledge and a lot of time.
•• We can use one of the Linux distributions. These come with the Linux kernel as well as
the libraries and tools of the GNU project and many other projects and software groups.
This is how the major Linux distributions have come about, which are the ones that users usually
download and install because they are easy to install and include the most common applica-
tions and their updates.
Linux uses packages. These are compressed files that allow us to install, compile, delete and
update applications. Each distribution has its own type of package.
There are many different package systems, but two formats are generally used: DEB, which is
Tux, the Linux mascot
managed by APT (Advanced Packaging Tool), and RPM (Red Hat Package Management).
DEB packages can be installed on the Debian distribution and derivatives (Ubuntu, MAX, etc.),
while RPM are for the Red Hat distribution and its derivatives (Fedora, Mandriva, SUSE, etc.).
One of the strengths of the Debian-based distribution is that it has a lot of software in its reposi-
tories. We also do not have to update the software manually because the system automatically
detects when an update is available and lets us download, update and configure all programs
with one click.

„ Features
„ and advantages of Linux
The main features of the Linux system are:
•• The programs are free, accessible from a public repository on the Internet, although some
applications are paid. These repositories ensure that all the packages work together and
that they fit and complement each other; this structure ensures a high level of security.
•• It is a multi-tasking, multi-threaded, cross-platform and portable system.
•• It is a multi-user system; this means that it can be used by several users simultaneously.
•• It is a robust, stable and fast system.
•• It is a free software system that can be modified by anyone and which has many applica-
tions on the Internet.

16 Information and Communication Technologies - 4º ESO - Editorial Donostiarra


Hardware and software. Networks
1
Learn

„ Main
„ distributions of Linux
The main distributions of Linux are:

Distribution Characteristics
Red Hat This is characterised by the use of RPM packages (Red Hat Package Manager). It
was one of the most popular distributions. Some of its more modern derivative
distributions, such as Mandrake, Fedora, Red Hat Enterprise and CentOS, are
used a lot in companies.
SUSE This has an installation tool called YaST, which is one of the easiest to use for
installing and managing Linux. Its development is ongoing and it is very much
geared towards the business world.
Debian The most characteristic feature of this distribution is that it is not owned by a
company; instead, it is developed by a large community of people all working
on the idea. It is one of the most stable and complete versions, and possibly the
most widespread one.
Ubuntu This distribution is very popular. It is based on Debian and usually geared towards
personal computers, but it provides support for servers too. Its objective is free
and easy use, smooth installation and regular update launches.

Arch Linux One of the heavyweights of the world of GNU/Linux distributions. To add compo-
nents to this modular distribution, we must install them all from scratch, so it is
more suited to advanced users. It is mainly open source and free software.

Lots of Linux distributions have been developed in Spain sponsored by public institutions such
as universities and governments of the autonomous communities. These distributions have
been developed to be used in education and infrastructure. Initially, most of these distributions
were based on Debian Woody but many have now adopted Ubuntu as their foundation.
Examples include:

MoLinux Castile-La Mancha LliureX Valencian Community


Guadalinex Andalusia gnuLinEX Extremadura
Trisquel Galicia Linkat Catalonia
Asturix Asturias mEDUXa Canary Islands
Vitalinux EDU Aragon MAX Madrid

There is a complete tree of Linux distributions on this page:


commons.wikimedia.org/wiki/File:Linux_Distribution_Timeline.svg

Information and Communication Technologies - 4º ESO - Editorial Donostiarra 17


Hardware and software. Networks
1
Learn

5. The physical and logical structure of information

A hard disk
„ The
„ logical structure of the hard disk
partitioned into 2
and 4 drives
In terms of logic, hard disks consist of a boot sector and one or more partitions.
The boot sector stores the table of partitions and a small boot-up program called the master
boot record (MBR).
The partitions act as zones or divisions of the disk. There are various reasons for creating more
than one partition. For example, separate partitions can be created to make data accessible to
different users, or to have more than one operating system on the same disk. Nowadays, it is
also common for the computer manufacturer to include a partition for recovering the computer
factory settings.
C Primary Partitions can be primary (containing the operating system) or extended.
drive partition

D „ The
„ file system
drive
E
The file system is a structure that permits both the storage of information in a partition and its
drive Extended modification or recovery. For the partition and its drives to be usable, it must first be assigned a
partition
file system. This operation is called formatting. Generally, each file system has been designed
F to obtain maximum performance with a specific operating system or medium.
drive

Operating system File system


Windows NTFS , FAT32
Linux Ext3, Ext4, ReiserFS
Mac OS HFS, HFS+
UNIX systems UFS, ZFS

„„
Files and folders
Files and folders are sets of information that are stored on the disk drive and identified by a
representative name (file name). Files can be created by users to store their work or they can be
C drive
(root)
part of the operating system or users’ application for their operation.
Each file is unique in its directory or folder and is identifiable by a name and an extension,
which usually indicates its content type. File names are subject to specific rules, depending on
Work
the operating system. As well as its name and extension, the system also saves the creation, last
modified and last accessed dates for each file. They can also have attributes such as “hidden”
Ana Carlos “system” or “read-only”, among others. Files can be categorised into two large groups: execut-
able and non-executable. An executable file is a file that contains a program or application.
Folders are file containers and are required to organise information in an orderly and efficient
manner. Given that a drive can hold thousands of files, it is necessary to group them to make
Letter.txt
them easy to access. Folders are also identified by name and form a tree structure. Starting with
the disk drive (root directory), we can create a series of folders at the first level (or parent fold-
ers); these can then contain other folders (subfolders or daughter folders of the parent folders)
Path in Windows:
and so on, creating a tree-like structure.
c:\work\ana\Letter.txt The path designates the exact position of a file or folder in the tree structure. Different operat-
Path in Linux: ing systems use different rules to write the path of a given file or folder (as shown in the figure).
/work/ana/Letter.txt

18 Information and Communication Technologies - 4º ESO - Editorial Donostiarra


Hardware and software. Networks
1
Learn

6. Hardware and software in mobile devices


Mobile devices have a number of specific characteristics meaning that the hardware and software on these devices is not
the same as on traditional computers:
•• The processor in a mobile device has less capacity, due to its small size and the need to reduce energy consumption.
•• Mobile devices incorporate different sensors, such as GPS, camera, accelerometer, gyroscope, etc.
•• Mobile devices require connectivity, i.e. a Wi-Fi, GPRS, 3G, 4G or other connections. This involves specific hardware
and an operating system to cover the specification.
•• The screens on mobile devices are smaller and essential for interaction with the user (by touchscreen). The most
widely used types are capacitive touchscreens and infrared LEDs.
•• Mobile devices should have a low energy consumption as they are battery powered.

Screen Micro SIM Microprocessor Camera Flash memory Loudspeaker


Wireless
aerial and
headphone
jack

3G or 4G modem

Wi-Fi and
Battery Bluetooth
Flash controller
memory
Microphone
Processor

Power
manager Battery

„„
Mobile device operating systems
The operating system is the software that enables us to use the phone or tablet hard-
ware and applications.
The two dominant operating systems in the mobile device market are:
•• Android. Developed by Google; it is open source, based on Linux. It is the most
widely used.
•• iOS. Apple’s operating system, for devices such as iPod, iPhone, iPad, etc. It is
notable for its simplicity and reliability.

„„
Mobile device applications
Programs or applications (apps) installed on mobile devices must be specially designed
for them because, as we have seen, these devices have numerous specific characteristics
(lower consumption, smaller screen, touchscreen user interaction, etc.).
Apps can be free or purchased; some require an Internet connection to work; they take
up little space and are easy to download (they can be downloaded from online stores, App Store
such as Google Play or the App Store, or accessed by writing their URL address in the
device browser).
Information and Communication Technologies - 4º ESO - Editorial Donostiarra 19
Hardware and software. Networks
1
Learn

7. What is a computer network?


A computer network is a set of computers and devices connected to each other for the purpose
of sharing information and resources. Resources that can be shared on a network include hard
Transmitter-receiver Channel
disks, printers, etc., but a network can also be used to share the program information and data
managed by different users.
In all networks or communications systems you will find an information transmitter and re-
Encoder-decoder
(network card) ceiver. The information travels via a channel or communication line. Finally, so it can be trans-
Transmitter-receiver
mitted on this line, the information has to be encoded (when it is transmitted) and decoded
(when it is received).

8. Network size
Local area networks (LAN)
The maximum coverage is one building. These are the most
common networks and can be found in many offices and
installations of all kinds.

Metropolitan area networks (MAN)


These cover a whole city, including different non-adjacent
buildings.

Wide area networks (WAN)


These are large-scale networks that connect devices in
different cities or countries or connect different LANs in a
company or organisation.

9. Network ownership
Depending on their level of access or privacy, networks can be:
•• Public networks. These are networks whose access is public and global, thus letting users communicate and share
information and services within the public area covered. The best example of a global public network is the Internet.
•• Private networks. These are networks restricted to the owner or its users (most commonly LANs). When typical Inter-
net public network tools (web, e-mail, FTP, etc.) are used in these networks, they are termed intranets.
•• Virtual private network (VPN). These are a type of network produced by the interconnection of various private net-
works, using the infrastructure of a global network.

10. Peer-to-peer networks and client-server networks


Networks can be organised in accordance with two types of functional approach:
•• Client-server networks. A server is a computer responsible for centralising or managing a given function required in
a network. It can share information, apply access rules to the information, define the users who can access the network
and control access to resources and devices, among other things. The other computers in the network are known as
clients or terminals and are stations from which users communicate with the central computer.
•• Point-to-point networks. These are also known as peer-to-peer networks. In these types of networks, all the nodes
or work stations act simultaneously as clients and servers.
20 Information and Communication Technologies - 4º ESO - Editorial Donostiarra
Hardware and software. Networks
1
Learn

11. Topologies
The topology is the way in which we can connect different work stations and transmission hardware (cables and other net-
work devices) in a local area network. There are a variety of topologies, almost all are based on three types: bus, star and ring.

Bus topology. The networks share the Ring topology. The information circu- Star topology. All computers are con-
same channel, called a bus, with a single lates in one direction and each compu- nected to a hub or a switch which
cable. No longer used. ter analyses whether it is the target for transmits the information.
the information.

Terminator Terminator

Ring topology

Bus topology
Star topology

12. Wired and wireless transmission methods


„„
Twisted-pair cable networks
The UTP (unshielded twisted pair) cable consists of copper or aluminium wires interlaced in
pairs to avoid interference. Depending on the number of wires used and the length of each
strand, different transmission speeds are obtained, which the industry calls the category (CAT).
It can transmit at a speed of 1 Gbps and the distance of propagation is usually 150 m. The con-
nector used is the RJ45.
The STP (shielded twisted pair) cable is a variant of the UTP which is even more secure in trans-
mission. It increases the amount of insulation around the group of cables and the immunity to
noise. It is more expensive.

„„
Optical fibre
An optical fibre cable consists of a group of very thin wires made of a transparent material (glass
or plastic) over which pulses of light representing transmitted data are sent. The light source can
be laser or LED.
It has a very high bandwidth: with speeds of 10 Gbps per fibre, it can reach total transmission
speeds of 10 Tbps. The main disadvantage is cost.

„„
Wi-Fi technology
Wi-Fi is a computer network data transmission system that uses radio waves. Wi-Fi networks
operate at a frequency band of 2.4 GHz with a speed of up to 11 Mbps (for the 802.11b speci-
fication), 54 Mbps (for 802.11g) and 150 Mbps (for 802.11n). The newest Wi-Fi signal (802.1AC)
reaches 450 Mbps in the 2.4 GHz band and 450 Mbps at 5 GHz. There are a variety of devices that
permit interconnection of Wi-Fi elements.
•• Wi-Fi routers receive the signal from the line offered by the telephone operator and
share it with Wi-Fi reception devices within its range. The router is frequently supplied
by the Internet provider to homes or companies that already have Wi-Fi technology.
•• Access points act as remote transmitters, i.e. in places where the router Wi-Fi signal is
not strong enough. They are also used in facilities where the router lacks this technology
and it is required.
There are three types of reception devices: Wi-Fi cards integrated into computer motherboards,
PCI network cards and USB cards.

Information and Communication Technologies - 4º ESO - Editorial Donostiarra 21


Hardware and software. Networks
1
Learn

13. Typical elements in a LAN network

„„
The network card
Network cards are devices that connect computers to the network. They are usually integrated
into the motherboards of modern computers.
Each network card has a unique identifier known as a MAC (media access control) address. No
two cards can have the same MAC address. This is useful for configuring safety systems in net-
works (e.g. to identify which computers can access a given Wi-Fi network), among other things.

„„
The switch
This device centralises the cabling for a star network and is thus the central node. The switch
receives the signal from a transmitting work station and redirects it to the port of the target
station. A switch can also act as a device for interconnecting networks or segments of LAN net-
works, connecting in turn to another switch.

„„
The router
This is a computer network interconnection device. Its main function is to send information
along the optimum route, i.e. it decides on the network address to which the information is
directed.
Generally, in most LAN networks, the router is the device that connects the network to the Inter-
net. Routers normally incorporate Wi-Fi technology.

14. TCP/IP communication


The network protocol is the software required for two computers in a network to communicate
with each other. As you know, computers have to speak the same language to share the infor-
mation and resources on a network: this language is the communication protocol.
There are various types of protocol, but nowadays most operating systems normally work with
the TCP/IP (transmission control protocol/Internet protocol), as this was the precursor to the
Internet. The TPC/IP permits heterogeneous networks with different operating systems to com-
municate with each other. It consists of the combination of two protocols: IP and TCP.
The TCP/IP is exclusively responsible for transporting and controlling these packets (datagrams),
sorting them properly and transmitting any detected errors.
The IP is responsible for addressing and the ports. Each node or element in a network (host)
must be identified by an exclusive IP address. The IP number consists of a set of four decimal
figures of one byte separated by dots, which can have values of 0 to 255. For example, the fol-
lowing would be an IP address: 195.235.165.34.

22 Information and Communication Technologies - 4º ESO - Editorial Donostiarra


Hardware and software. Networks
1
Learn

15. Routing or gateway


When two computers or hosts are on the same network, packet addressing is immediate. How-
ever, if they are not on the same network, the computers must be assigned a node or device
address, which is responsible for searching for the target address outside its network. The IP
address of this node is called the gateway. Normally, these addresses outside the network are
located by the router.
Each time the router connects to the Internet, the Internet service provider (ISP) assigns it an
IP address from its public network. Thus, the router works with two IP addresses: the LAN IP
and the WAN IP. With the LAN IP (or gateway address), the router communicates with the LAN
equipment; and with the WAN IP (or public IP address), which the router obtains from the ISP, it
communicates with other Internet nodes.

16. TCP/IP services


„„
DNS name resolution service
It is too complicated to remember all the different IP numbers of Internet servers. The DNS (do-
main name system) is similar to a telephone directory. Instead of remembering complicated IP
addresses, we can connect to a host more easily by using its DNS name.
For example, we can refer to the address 147.96.1.15 and the address www.ucm.es in the same
way. However, it is also necessary to resolve DNS names in smaller networks, such as LANs, espe-
cially if the computers in it are integrated in a domain.

„„
Static port servers: HTTP, FTP, POP3, etc.
TCP/IP supports the most popular Internet applications, such as file transfer (FTP), e-mail, WWW,
etc. When a computer wants to transmit data from one of these applications to another, the
TCP/IP transmits the destination address (IP) and the application identification port. This combi-
nation of IP address and port is known as a socket.
The ports for some of the most commonly used applications are:

Port Protocol Purpose


80 http Website access
21 ftp File transfer
23 telnet Remote access
110 pop3 Incoming e-mail
25 smtp Outgoing e-mail

Information and Communication Technologies - 4º ESO - Editorial Donostiarra 23


Hardware and software. Networks
1 Step-by-step practical

Practical 1. Discovering the hardware

„ Exercise
„ 1. Know your computer
In this exercise, you are going to learn about the characteristics of the
computer you are working on and the components installed in it. To do
this, you’ll first open a document with a template containing shaded cells
that you have to fill in, after which you’ll investigate what your computer
is like.
1. Open exercise P1_E1_yourcomputer.doc on the virtual CD.
2. On your computer, go to Mi PC and, in the window on the left, select
Ver información del sistema.
3. Select the Hardware tab and click on Administrador de disposi-
tivos. A drop-down menu will appear, as shown in the figure. Click on
the + sign for each and complete the grey shaded cells in the docu-
ment that ask for information on these components.
4. Save the file with the name P1_E1_namesurname.doc.

„ Exercise
„ 2. Analysis of the components of a computer
In this exercise, you will complete a table which shows a list of the main
components required in a computer. You’ll need to do an online search to
find the most desirable characteristics for each component.
1. Open exercise P1_E2_components.doc on the virtual CD.
2. Carefully read the instructions to the practical, especially the first col-
umn, and note the elements you need to find information on.
3. Search for the information and answer the questions
•• What is it for? How does it work?
•• What are its approximate measurements or size?
•• What type of connection does it use?
•• Characteristics: speed, capacity, bit width.
4. Do an online search for photos of each component and paste them in
the last column. Use the Paint program to crop the images if necessary.
5. Save the file with the name P1_E2_namesurname.doc.

„ Exercise
„ 3. Comparing and buying to suit your requirements
Imagine you have €350 to buy a computer. Logically, you will want to
get one with the best characteristics on the market. To do this, you must
search various online stores and compare all the computer components.
1. Open exercise P1_E3_comparing.doc on the virtual CD.
2. Complete the table with the price and store you choose for each com-
ponent. Remember that the final price (with VAT) must not exceed
€350.
3. Save the file with the name P1_E3_namesurname.doc.

24 Information and Communication Technologies - 4º ESO - Editorial Donostiarra


Hardware and software. Networks
Step-by-step practical
1

Practical 2. BIOS, operating systems, partitions

„ Exercise
„ 1. Finding out how to enter the BIOS on your computer
A computer’s BIOS is a firmware program that resides in a special memory
inserted in a chip on the computer motherboard. The word BIOS is an ac-
ronym for basic input/output system.
1. Create a text document and in it explain what the fundamental pur-
pose of the BIOS is, after using the Internet to help you find out.
2. Save the document with the name P2_E1_namesurname.
To enter your computer’s BIOS (also known as “entering setup”), you have
to press a key or combination of keys when the computer is booting up.
This key or combination of keys depends on the computer manufacturer.
Find out how to enter the BIOS on your computer at home.

The BIOS is the first program to execute when the computer


boots up, just before the operating system appears.

„ Exercise
„ 2. Comparison of operating systems
By way of introduction, in this exercise we are going to compare operat-
ing systems, their differences, versions, etc.
1. Open exercise P2_E2_os.doc on the virtual CD.
2. The first column in the table contains the names of different operat-
ing systems. Do an online search for sufficient information to com-
plete the other columns. The following websites might be useful:
•• es.wikipedia.org/wiki/Portal:Linux
•• historiade.org/windows
•• www.android.com/intl/es_es/history
3. Save the file with the name P2_E2_namesurname.doc.

„ Exercise
„ 3. Identifying partitions and disk units
1. Open exercise P2_E3_partitions.doc on the virtual CD. This doc- Primary
Extended
ument shows three figures with different distributions of hard disk
partitions. Answer the questions that come after it and save the doc-
ument with the name P2_E3_namesurname.
2. Right-click on the Mi PC or Equipo icon and choose the option Ad-
ministrar. In the new window, select Administración de discos.
This is the Windows tool for viewing and managing your comput-
er’s physical and logical units. In the second part of the document
P2_E3_namesurname, describe the type of units found and their
corresponding file systems.

Information and Communication Technologies - 4º ESO - Editorial Donostiarra 25


Hardware and software. Networks
1 Step-by-step practical

Practical 3. The control panel

„ Exercise
„ 1. Installing and uninstalling programs
The control panel tool Programas y características (Agregar o quitar
programas, in Windows XP) shows all the programs installed on the com-
puter. However, the method for installing an application consists of exe-
cuting its installation program. For example, to install the Firefox browser
follow these steps:
1. Go to Google (www.google.es) and type “firefox” in the search box.
2. Click on the first link found, which is for the official download site
(www.mozilla.org/es-ES), then click on Descarga gratuita.
3. If your browser blocks the download, click on the pop-up label indicat-
ing the protection and choose Descargar archivo. When the installa-
tion execution window opens, click on the Ejecutar button, wait for
the download and start the installation.
Link to Firefox download
4. Follow the steps in the installation wizard and then check that the
In general, a program is installed when a file with a name such as
Setup, Instalar, Install, or similar is executed. program appears in Inicio / Todos los programas. Execute it to make
sure it works.
5. Go back to Programas y características in the control panel. Locate
the installation of Mozilla Firefox and click on Quitar to uninstall the
program.

„ Exercise
„ 2. Scheduling and restoring backup copies
Windows includes a utility for scheduling when backup copies are made.
Backups are created and restored in different ways depending on the
Types of scheduled backup copies: version of Windows you are using. In any event, you should bear in mind
•• Total. A complete copy of all selected data. these three key aspects:
•• Differential. Only new or modified data since the last •• Determine what to backup: documents, configurations or even the
time a total copy was executed are copied.
whole system.
•• Incremental. Only new or modified data since the last
time a total or differential copy was executed are copied. •• Specify the storage format or target for the copy: you should select
the most appropriate medium for the amount of data to backup.
•• Choose the schedule or frequency for making the copy.
1. In Windows XP, go to Inicio / Todos los programas / Accesorios /
Herramientas del sistema / Copia de seguridad. (In Windows Vista
and Windows 7, this option is in the group of programs called Man-
tenimiento.)
2. Follow the steps of the wizard to schedule a backup of any folder in
Mis documentos, to be saved onto an external USB drive every Friday
at 3 pm.
3. You can temporarily change the date and time on your computer to
check that it works or access the system task scheduler to force exe-
cution. Next, delete the folder you have selected for a backup copy and
then restore it by executing the backup copy and restore utility.

26 Information and Communication Technologies - 4º ESO - Editorial Donostiarra


Hardware and software. Networks
Step-by-step practical
1

Practical 4. Range of voice and data installations

„ Exercise
„ 1. Identifying network range and ownership
1. Open exercise P4_E1_networkrange.doc on the virtual CD.
2. Complete the range column by writing “LAN”, “MAN” or “WAN” depend-
ing on the extension covered by each proposed network. Write “Pri-
vate”, “Public” or “VPN” in the ownership column, as required.
3. Find information on the concepts of PAN and CAN networks and give
a brief description of them in the corresponding sections at the end of
the document.
4. Save the document with the name P4_E1_namesurname.

„ Exercise
„ 2. Voice and data installations
Do an online search for information on structured cabling installations
(voice and data). Next, open the file P4_E2_structuredcabling.doc in
Unit 1 of the virtual CD and identify each of the elements, which are indicat-
ed by a letter in the following illustration.
Vertical cabling (backbone)

Structured cabling is the


way in which cables for
communications (voice and
data) in a local area network
are organised or structured,
taking into account current
needs and possible exten-
sions.

Optical Horizontal cabling or subsystem


fibre (CAT6 twisted pair)
Hybrid topologies are
obtained when a network
is installed throughout a
building, interconnecting
its floors. For example, the
layout on each floor is nor-
mally star (horizontal sub-
system) and the network
connection between floors
usually involves one or sev-
eral cables that form a bus
running through the build-
ing from top to bottom Servers
(vertical subsystem). This
vertical cabling is called the
backbone.

Fibre-optic link

Information and Communication Technologies - 4º ESO - Editorial Donostiarra 27


Hardware and software. Networks
1 Step-by-step practical

Practical 5. Sharing resources in Windows: folders and printers


„ Exercise
„ 1. Sharing folders
The resources that can be shared on networks are mainly folders and
printers. Logically, certain programs and databases can also be shared,
but in this case, it is the manufacturer of each program who establishes
the right procedure and type of installation required for the software to
work over a network.
We are going to share a folder on a computer and configure access to it
on another. You can do this exercise in pairs of computers. We’ll call the
sharing computer PC-A and the accessing computer PC-B.
Shared use of files and folders is a default service already activated in Win-
dows. To check that these settings are activated, follow these steps:
1. Go to Inicio / Panel de control / Redes e Internet / Centro de redes
y recursos compartidos.
2. Right-click on the link Conexión de área local and choose Propie-
dades.
3. In the local connection window, check that the service Compar-
tir impresoras y archivos para redes Microsoft is installed. If it is
not, this service can be installed by clicking on the Instalar button
(although Windows usually automatically installs it when a network
adapter is added).
By default, the Windows system establishes a simplified way of sharing
folders, which consists of accessing a folder shared among all members
of a work group, without the ability to specify individual permissions for
each. Nor does it enable permissions to be set for users who are not mem-
bers of the group. We recommend disabling this option to define permis-
sions more completely.
4. Close any open windows and go to Inicio / Equipo.
5. Go to Organizar / Opciones de carpeta y búsqueda and choose
the Ver tab.
6. In the options in this window, check whether the box Usar el asistente
para compartir (recomendado) is marked and uncheck it.
7. Close the tool window and click on Aceptar.
8. Using Windows Explorer, create a new folder on the PC-A hard disk
and name it Contenedor. Create two files in it.
9. Right-click on this folder and choose the Comartir con option fol-
lowed by Uso compartido avanzado. In the corresponding window,
also click on Uso compartido avanzado.
10. Tick the box Compartir esta carpeta and click on the Permisos but-
ton to go to the window where you can choose which users to give
permissions to. First click on the Todos group and then on the Quitar
button.

28 Information and Communication Technologies - 4º ESO - Editorial Donostiarra


Hardware and software. Networks
Step-by-step practical
1

11. Click on Agregar, write the name “User1” and click on Aceptar. For
this user, activate all permissions (total control, change and read).
12. Also add User2. However, for this user you are only going to activate
the read permission. Finally, click on Aceptar.
13. On PC-B, start a session as User1 and enter Windows Explorer. The shared folder Contenedor is shown as a
dependent element on computer PC-A, in the
14. Click on the Red icon in the folder tree (on the left). Also click on the Red (Network) environment.
name of the computer sharing the folder (PC-A).
15. The Contenedor resource will appear in PC-A. Now you can access
the files created in this folder. You can modify them and change their
name, as well as add new files.
16. Close the session for User1 on PC-B and open the session for User2.
17. Go to the shared folder in PC-A again. Now check that you can only
open the files, but not alter or delete them, given that you have re-
stricted the permissions for User2.

„ Exercise
„ 2. Sharing a printer
1. On PC-A, go to Inicio / Dispositivos e impresoras.
2. Right-click on the printer icon for this computer and choose the op-
tion Propiedades de la impresora.
3. In the next window, choose the Compartir tab, check the Compartir
esta impresora box and write “Imp_com” as the name to share. The
full name is proposed by default. Next click on Aceptar.
4. On PC-B, start a session as User1, who has full permissions.
5. On this computer, go to Inicio / Dispositivos e impresoras. We are
now going to install the printer shared on PC-A on this computer.
6. Click on the Agregar una impresora button (in the command bar
at the top of the window) and then choose the option Agregar una
impresora de red, inalámbrica o Bluetooth.
7. Windows will find the shared printer on PC-A in the network and then
automatically select it. Click on Siguiente.
8. On the following wizard screen, click on Siguiente to accept the pro-
posed name, which is the same as that of the printer on the computer
to which it is connected.
9. As a last step, you can print a test page. Click on Finalizar.

Information and Communication Technologies - 4º ESO - Editorial Donostiarra 29


Hardware and software. Networks
1 Step-by-step practical

Practical 6. Viewing our network data


„ „
Exercise 1. The ipconfig command
The ipconfig command shows complete information and data on the
computer’s TCP/IP setup. To use it, you have to open the CMD command
console.
1. Open the console by going to Todos los programas / Accesorios /
Símbolo de sistema or, in Inicio, go to Ejecutar, type “CMD” (with-
out inverted commas) and press Intro.
2. Type the ipconfig command and press Intro. Complete the first table
in the file P6_E1_ipconfg.doc on the virtual CD.
3. Now type ipconfg/all and press Intro to return to advanced setup.
Complete the second table in the same file.
4. Save the file with the name P6_E1_namesurname.doc.
„ „
Exercise 2. The ping command
Computers are identified by an IP address. In some cases they use domain
names (e.g. www.museoreinasofia.es). When you type the address in the
browser, the DNS server relates each domain name to its IP address.
The ping command sends test packets to the indicated IP address and, if
it is available, the response time enables us to check the quality of com-
munications between our computer and the computer to which we send
the IP.
1. Open the command console as in the previous exercise.
2. Type “ping www.museoreinasofa.es” and press Intro.
3. Open the document P6_E2_ping.doc and answer the questions on
the communication time.
4. Next, we’ll see how the DNS server associates an IP address with each
domain name and then see how long it takes to communicate with
the IP address. To do this, send a ping to the following addresses and
note the IPs and the average response time. You’ll find the table on
the second page of the document. Complete it.
5. Save the file with the name P6_E2_namesurname.doc.

„ „
Exercise 3. The tracert command
The tracert command sends packets and shows the route they take on
the network. Every time there’s a hop, it means the packet has moved to a
different computer, which can be in any part of the world. In this case, the
server, IP address and times are shown.
1. Open the command console as in the previous exercises.
2. Type “tracert www.museoreinasofa.com” and press Intro.
3. If you repeat the process with various addresses you’ll see that the
first hops are repeated, as these are the output from the router.
4. Open the document P6_E3_tracert.doc and complete the table in-
dicating how many hops are required for each address.
5. In the last column, type the IP addresses common to all hops.
6. Save the file with the name P6_E3_namesurname.doc.

30 Information and Communication Technologies - 4º ESO - Editorial Donostiarra


Hardware and software. Networks
Step-by-step practical
1

Practical 7. The Ubuntu 18 desktop: elements of GNOME 3


Ubuntu is one of the most common Linux distributions fir personal computers. We will use it in the following practicals.
A graphical environment is the way in which the different programs are displayed on screen as windows and how things like
files, directories and menus can be managed on screen.
In Windows, there is only one graphical environment; in Linux, there are lots of different ones.
Within Ubuntu, GNOME (an acronym for GNU Network Object Model Environment) is possibly the most popular Linux desktop.
The GNOME 3 desktop is easy to use. It lets users configure the system with a graphical interface that has the following ele-
ments:
•• Top bar. We use this to access windows and applications, the calendar, and system properties (such as sound, network
and energy). We can use the status menu in the top bar to change the volume and screen brightness, edit the wireless
connection, check the battery status, log out, switch users and shut down the computer.
•• Actividades (Activities). This allows access to open windows and applications.
•• Dash. To the left, underneath the activities menu, you can see your favourite applications and the applications that you
are running (shown with a dot). You can add and remove applications to suit your preferences.
•• Rejilla (Grid) button. This button is located in the bottom left. Click on it to display all of the applications installed on
your computer.

activities menu

notification
area

shortcuts
top bar

dash

Rejilla button

Information and Communication Technologies - 4º ESO - Editorial Donostiarra 31


Hardware and software. Networks
1 Step-by-step practical

Practical 8. Exiting Ubuntu. Sessions. Structure of the information


„ Exercise
„ 1. Sessions in Ubuntu
Click on system menu (on the right of the top bar) to obtain different
options for working with users. The log out session and switch user op-
tions are only displayed in the menu if there is more than one user ac-
count on the system. Besides these, we have:
•• Live session user. Use this to end the session or create new users.
•• The system shutdown button. A dialog box will appear with the op-
tions of rebooting the system (Restart) or shutting it down (Power
Off).

Try to reboot the system and create a new user with your name.

Directory Description
Binary files that are essential for sys-
/bin
tem operation
Files used to boot the system before
/boot
running the kernel „ Exercise
„ 2. How Linux structures information
/dev Configurations of installed devices
Linux structures the information on the hard drive in a different way to
This directory stores the configuration
/etc Windows. The Linux file system follows all the UNIX conventions. Among
files of the installed programs
other things, this means that it is not directly linked to the hardware struc-
/home Personal directories of users
ture.
Shared libraries needed by the system
/lib For example, this system does not use assign letters (C, D, E, etc.) to logical
and the different programs
drives in the way that Windows does. This means that there is no C drive;
Directory usually used for temporary
/mnt
drive mountings
instead, we have the hda device.
Application files that are not strictly The entire UNIX file system has a unique origin: the root, which is repre-
/opt sented by the symbol / (this root directory is not assigned a letter). All the
necessary for the system
Virtual file system where the memory files that the operating system can access are located within this directory.
/proc and kernel processes are stored and These files are organised into different directories. The mission and the
information is obtained from them name of these files are standard for all UNIX systems. The table on the left
The private directory of the superuser shows this structure.
/root
or root user The file path idea that we saw in the Windows system also applies to Li-
/sbin
Binary files that are essential to boot nux. Remember: the path is the complete sequence of directories that we
the system need to navigate through to reach a given file. The difference in Linux is
/sys
Files containing the system configura- that the different directories are separated by slashes (/). For example, the
tion parameters complete path to the file work.txt contained in the James directory of
Temporary files that are lost when the home is: /home/James/work.txt.
/tmp
computer is shut down
In Linux, extensions can also be used at the end of file names to indicate
The directory where the applications the type of file. Examples .txt (text files); .htm and .html (HTML files);
/usr
are stored
.png, .jpg and .jpeg (PNG or JPEG images).
Contains the data that continuously
/var change in the system, such as system
The mouse techniques for copying and moving files from one folder to
logs, print queues, mail, etc. another are similar to Windows too.

32 Information and Communication Technologies - 4º ESO - Editorial Donostiarra


Hardware and software. Networks
Step-by-step practical
1

Practical 9. Managing information in Linux


„ Exercise
„ 1. File browsers
Ubuntu GNOME has a browser called Archivos (Files) that we can access
from the dock. We can also open it with the Rejilla button (by clicking on Archivos application
Mostrar aplicaciones and opening the Archivos application).

„ Exercise
„ 2. Managing files and folders
Look at the figure in the margin. Let’s create the file and directory structu-
re in it. Click on the Archivos icon to go to your user’s working directory
that hangs from home (Carpeta personal). Inside your personal folder,
go to Documentos.
1. To create the Language folder, right-click and choose Carpeta nueva.
Type the name “Language” and press Intro. Do the same to create the
other folders until you have completed the tree in the figure.
2. To create the four text files (.odt extension), go to Mostrar aplicacio-
nes / LibreOffice Writer. For the presentation files (.odp extension),
do the same using LibreOffice Impress.
3. To create the image files (.png extension), we will take some screen-
shots. To do this, in Mostrar aplicaciones, simply click on the Captura
de pantalla application.
4. Once you have completed the file and directory tree, copy all the files
from the Language folder to the Office automation folder. Use the
same techniques for selecting and copying files as you do in Windows.
5. Rename the file photo1 in the Multimedia folder to landscape1. You
can do this by right-clicking the mouse.
6. Delete the file work1 in the Multimedia folder in one step by right-
clicking and selecting the Mover a la papelera option.
7. Take a screenshot of its final appearance and save it with the name
P9_namesurname.png.
Captura de pantalla application

„ Exercise
„ 3. Mounting and unmounting removable (USB) devices
Before graphical environments such as GNOME, if we wanted to read from
an external device, we had to mount and unmount the drive (to discon-
nect it).
None of these operations are required now.
1. Connect the device (e.g. a flash drive) and wait for the system to re-
cognise it.
2. Once connected, a window will automatically open displaying the
contents of the device.
3. When we have finished working with the files, we need to unmount
the device.
4. In the left dock, open the Archivos application, go to volume and click
on the Desmontar icon (marked with an arrow). Now you can safely
disconnect it. You can also right-click on the USB icon on the desktop
and select Expulsar.
Information and Communication Technologies - 4º ESO - Editorial Donostiarra 33
Hardware and software. Networks
1 Step-by-step practical

Practical 10. Compressing and decompressing files in Ubuntu


In Ubuntu, both the file compressor and decompressor are part of the sys-
tem itself. This means that we do not need to install additional programs
for these actions.

„ Exercise
„ 1. Compressing files
1. Go to the Documentos folder. Select several files at once (if there are
no files, create them as you did in Practical 9).
2. Right-click and select Comprimir.
3. Type the name P10_namesurname. Select the extension .zip. Click
on Create.

„ Exercise
„ 2. Decompressing files
1. There are different compressed file formats, such as ZIP, TAR.XZ or 7Z.
In Ubuntu, they all have a distinctive icon.
2. Double-click on the compressed file that you created earlier. A window
will open, displaying everything that it contains.
3. We can use the files in this window as though it were a normal folder.
We are going to extract all the files; to do this, click on the Extraer
button, select where you want to put them from the menu on the left
and then click on Extraer.

Practical 11. Identifying applications in Ubuntu


The basic version of Ubuntu GNOME contains a number of basic and ge-
neric tools.
The different autonomous communities have their own educational ver-
sions of Ubuntu GNOME. These generally include specific educational pro-
grams. However, we must install them first. We will see the steps for this
below.
The main applications in the basic version of Ubuntu GNOME include:
Office automation Internet browsers Sound
Images E-mail Video
To access an installed application, simply click on the Rejilla button in the
bottom left.
1. Open a text document and type the name of at least one application
that we can use to perform each of the following tasks: make a presen-
tation; take a screenshot; look at photos; have a videoconference; do
mathematical operations and create graphics.
2. Save the file with the name P11_namesurname.

34 Information and Communication Technologies - 4º ESO - Editorial Donostiarra


Hardware and software. Networks
Step-by-step practical
1

Practical 12. Shared folders in Ubuntu


Teamwork is the most logical way of working in the classroom and in com-
panies. Therefore, we need a common place where we can share the files
or documents that we create.
In schools, teachers often share a folder so that students can take files
from it and/or put files in it.
Let’s look at the two possible options:

Students have limited access to the folder


The first option is to make a folder available to students where they can
read or copy documents but not delete or edit them.
1. Create a new folder in your Documentos space and name it with your
name. In our example, the student is called Julia; so our folder looks
like this: /Carpeta personal/Documentos/Julia.
2. Right-click on the folder and choose Recurso compartido de red lo-
cal.
3. Check the Compartir esta carpeta box to share the folder. In Nombre
compartido, type the name of the folder you want to share.
4. Check the Acceso invitado box so that anyone can access this shared
resource, even students without a username and password for this
machine. If this first box is not checked, they will be able to read and
copy files, but not delete or edit them.
5. Click on Crear compartición.

Students have full access to the folder


The second option is to create a folder where anyone can leave files. Re-
member that everyone will see what is in there and anyone can edit or
delete the contents.
1. Create a new folder in your Documentos space and name it with your
name and surname. In our example, the student is called Julia Gómez;
so our folder looks like this: /Carpeta personal/Documentos/Julia_
Gomez.
2. Right-click on the folder and choose Recurso compartido de red lo-
cal.
3. Check the Compartir esta carpeta box to share the folder. In Nombre
compartido, type the name of the folder you want to share.
4. Check the Permitir a otras personas crear y eliminar archivos en
esta carpeta and Acceso invitado boxes.

To access all shared folders in Archivos, click on the Otras ubicaciones


option and select the relevant network and folder.

Information and Communication Technologies - 4º ESO - Editorial Donostiarra 35


Hardware and software. Networks
1 Step-by-step practical

Practical 13. Installing and uninstalling applications in Ubuntu


Linux uses what we call repositories. These are large databases or servers that host applications or programs that the system
needs. They include new packages and updates that are installed with a package management system. This means that they
contain packages not installed previously and they also keep your system up to date with their updates. There are two types
of repositories: official and unofficial.
The standard Ubuntu software repository is organised into four “components”: Main (officially supported software), Restrict-
ed (supported software that is not available under a completely free license), Universe (community maintained software, that
is, not officially supported software) and Multiverse (software that is not free). Ubuntu can also include other repositories
that are provided by developers or manufacturers.
Ubuntu repositories are usually managed through the Ubuntu Software Center, where we can manage the installation of
applications.

„ Exercise
„ 1. Installing an application
1. Click on the Software de Ubuntu icon that appears when we click
on the Rejilla button or when we click on the Actividades icon. Then
type “Software de Ubuntu” in the search menu.
2. In the top right, click on the magnifying glass to type the name of the
application that you want to find. Once you have located it, select it to
display all the details of the application: size, website, version, license,
etc. Reviews are also shown (these are comments that people make
about the application).
3. For example, search for the GIMP image editor, or Audacity, or VLC, etc.
4. Click on the Instalar button. The appli-
cation will download and install auto-
matically.

„ Exercise
„ 2. Uninstalling an application
To uninstall an application, we perform the same operation but in reverse:
1. Click on the Software de Ubuntu icon.
2. Select an application that you know is already installed (for example,
one that you installed in the last exercise).
3. Now, the Iniciar, Desinstalar and Per-
misos options will appear on the menu.
Click on Desinstalar to uninstall it.

For enquiring minds!


Installing applications using the MATE terminal
The apt-get command is the package manager that runs from the MATE terminal. We start by updating repositories. Exam-
ple: sudo apt-get update
To use this command, we need to add the install option from the application that we want to install. Example: sudo
apt-get install nameofapplication
Note: When it is updating repositories, if the manager tells us that there are a lot of updates, we can install them like this:
sudo apt-get upgrade
To uninstall applications from the terminal with the apt-get command, we run the command in the MATE terminal as
follows: sudo apt-get remove nameofapplication

36 Information and Communication Technologies - 4º ESO - Editorial Donostiarra


Hardware and software. Networks
Extend your knowledge
1

Extension 1. Dismantling your computer and identifying its parts


You will need the following tools: Phillips screwdriver, notebook and pen (to note
down the order and location of the parts).
1. Before removing a part, draw it in your notebook and make the necessary
notes on its location, how it is installed, etc., so that you can put it back in its
place later.
2. Remove each part from the computer.
3. Draw a table and note: in the first column, the name of the part (model and
version); in the second, the type of connector (if it has one); in the third,
where it is connected; and in the last, a small drawing of the part. Save the
document with the name X1_namesurname.
4. Reassemble the computer and check that it works.

Extension 2. The netstat command


The netstat command gives a list of the computer’s active connections (both in-
coming and outgoing) and enables us to establish their origin (IP address). We can
also detect incoming connections and network intrusions in our system.
1. Open the command console and type “netstat”. The response shows the IP
address followed by a colon and the port number. The port is the number in-
dicated in the application or protocol in use (e.g. 80 is the http protocol for
websites).
2. In an empty document, write down the open ports (listening) and the con-
nected ports (established).
3. Save the document with the name X2_namesurname.

Extension 3. Testing more than 200 Linux distributions without installing them
As you know, Windows is the most popular operating system, but Linux has the
advantages of freedom of distribution and security.
On one website, Distrotest.net, we can simulate more than 200 different distri-
butions of Linux without installing the software. On the Linux distribution that we
are simulating, we can test the installed programs and install (and uninstall) other
programs. Note: you only have 1 GB of total space and your session cannot last
more than 30 minutes.
Go to https://distrotest.net and test two distributions (for example, Debian and an
educational version from an autonomous community of your choice). Talk to your
classmates to make sure that you all choose different ones. Discuss the main appli-
cations and their differences with your classmates or write them down in a docu-
ment and save it with the name A3_namesurname.

Extension 4. Creating users in Windows


To create a user in Windows:
1. Go to the control panel and choose the Cuentas de usuario (Windows XP) or
Agregar o quitar cuentas de usuario (Windows 7) option.
2. Choose the Crear una cuenta nueva option.
3. Create an administrator account with the password tomato and two user1
and user2 accounts with the passwords lettuce and onion, respectively. Test
this by ending the session and entering with all the accounts.

Information and Communication Technologies - 4º ESO - Editorial Donostiarra 37


Hardware and software. Networks
1 Review

UNIT SUMMARY

 Computer hardware
 The internal components of a computer are:
•• Motherboard. This is a printed circuit board into which the other computer components are inserted.
•• Microprocessor. This performs all calculation operations and controls all the other devices.
•• Internal connectors. These are all the expansion slots connected to the motherboard.
•• Ports. These are used to connect input/output peripherals to the motherboard.
•• Memories. There are various types, such as RAM, ROM, cache, etc.
•• Graphics card. This transmits information to the screen.
•• Storage units. These are used to store information. The most important one is the hard disk.
•• Power supply. This supplies electricity to the other components.

 Computer software
 We can define software as the computer’s logical support, consisting of a set of logical components that make its opera-
tion possible. The operating system (Windows, Linux, MacOS) and the programs and applications we use are all software.
 The advantages of the Linux system are: the programs are available for free from a secure repository; it is a multi-tasking,
multi-threaded and cross-platform system; it can be used by several users; it is robust, stable and fast, and it is free and
modifiable by anyone.

 Hardware and software in mobile devices


 Mobile devices have a number of specific factors that mean their hardware and software are not the same as on com-
puters: lower capacity processor; incorporated sensors, connectivity requirements; smaller touchscreen; low energy con-
sumption requirements, among others.

 Computer networks
 A computer network is a set of computers and devices that are interconnected with the aim of sharing information and
resources: hard disks, printers, etc.
 The most commonly used protocol (common rule system) nowadays in computer networks is TCP/IP, which is that of the
Internet network.
 Networks can be classified using different categories:
Local area network (LAN), wireless LAN (WLAN)
By extension Metropolitan area network (MAN)
Wide area network (WAN)
Public network
By ownership Private network
Virtual private network (VPN)
Guided (wired)
By connection method Unguided (wireless)
Client-service network
By functional relationship Point-to-point network
Bus topology
By topology Ring topology
Star topology

 Typical elements of a LAN network are:


•• A switch: device that centralises the cabling for a star network and acts as its central node.
•• A repeater: hardware device that amplifies or regenerates the transmission signal.
•• A router: hardware or software device for computer network interconnection.
 The command window (or MS-DOS window) lets you quickly see the setup of a computer network (IP, subnet mask,
gateway, DNS). We use the ipconfig command to do this. We use the ping command to test the network.
38 Information and Communication Technologies - 4º ESO - Editorial Donostiarra
Hardware and software. Networks
Review
1

COMPREHENSION ACTIVITIES

When you have completed the topic, do the following exercises. You can complete them online by going to the relevant
unit on the publisher’s website (www.editorialdonostiarra.com) and hand them in as PDFs.

 Computer hardware
1.  Briefly explain the function of each of the following computer components: hard disk, RAM memory card, expansion
card, microprocessor.
2.  Draw the back of a computer CPU and identify the ports you know.
3.  Explain the difference between ATX, IDE and SATA connectors.
4.  What is connected in the expansion slots and what is connected in the RAM slots?
5.  Indicate which element you would connect to each of the following connections on the motherboard: socket, memory
slot, AGP slot, PCI slot.
6.  How does memory differ from a storage device?

 Computer software
1.  What does the program stored in the computer’s BIOS do when the computer is booted?
2.  What are the two most important versions of Linux, from which the main distributions are derived? Which two package
formats are used?

 The physical and logical structure of information. Hardware and software


in mobile devices
1.  What is the boot sector of the hard drive? What is it for? What are partitions used for?
2.  What are the five main differences in features between the hard and software of a mobile device and the hard and
software of a traditional computer?

 Computer networks
1.  Explain what a computer network is. List the computer networks you use in your daily life.
2.  Explain the different areas of coverage of a LAN, MAN and WAN network. Give an example of each.
3.  Draw a diagram representing the connection in different types of network: bus, ring and star.
4.  What is a twisted-pair cable? And an RJ45 connector?
5.  What are the minimum elements required to set up a LAN network?
6.  Explain what the gateway and DNS are.
7.  In relation to Practical 6, document the computer network in your computer room, drawing a table of the setup of all
the computers (IP, subnet mask, gateway, DNS). To do this, go to the setup menu of your local network. You can also use
screen shots. Include the work group you belong to and the shared folders and printers.
8.  In relation to Practical 6, explain the MS-DOS ping and ipconfig commands. Open the command window and write
the command ipconfig/all. What differences can you see compared to the ipconfig command?
Information and Communication Technologies - 4º ESO - Editorial Donostiarra 39
Hardware and software. Networks
1 Review

MULTIMEDIA ACTIVITIES

When you have studied the topic, test your knowledge by doing the following online exercises, which you can find in the
relevant unit on the publisher’s website (www.editorialdonostiarra.com). You can hand them in as PDFs.

1. Computer hardware test


Open exercise Unit01 01 Computer hardware test in Unit 1 of the virtual CD and test your
knowledge.
There is only one correct answer to each question.
Once you have finished, you can print the test as a PDF and give it to your teacher with the
mark that you obtained.

2. Computer software test


Open exercise Unit01 02 Computer software test in Unit 1 of the virtual CD and test your
knowledge.
There is only one correct answer to each question.
Once you have finished, you can print the test as a PDF and give it to your teacher with the
mark that you obtained.

3. Test on the physical and logical structure of information and hardware and
software on mobile devices
Open exercise Unit01 03 Test on the physical and logical structure of information
and hardware and software on mobile devices in Unit 1 of the virtual CD and test your
knowledge.
There is only one correct answer to each question.
Once you have finished, you can print the test as a PDF and give it to your teacher with the
mark that you obtained.

4. Computer networks test


Open exercise Unit01 04 Computer networks test in Unit 1 of the virtual CD and test your
knowledge.
There is only one correct answer to each question.
Once you have finished, you can print the test as a PDF and give it to your teacher with the
mark that you obtained.

40 Information and Communication Technologies - 4º ESO - Editorial Donostiarra


Hardware and software. Networks
Review
1

MOBILE APPS

 Fing, a network scanner app


Fing lets you scan a network to find all the computers connected to it, obtain data on their net-
work cards and even find out which services are available on each one.
1. Install the Fing app on your mobile device.
2. Click on the arrow to refresh the information (at the top).
3. Create a text document and write your answers to the following questions in it:
a) How many devices are connected to the network?
b) What are the data upload and download speeds of this network?
c) Select one of the connected devices and write down the following information about it:
IP, MAC (if available) and open ports.
4. Save the document with the name App_namesurname.

ONLINE ACTIVITIES
 Buying and assembling computers
1. Open a word processor and create a new blank document. Do an online search for information on computer prices.
Choose two comparable computers (both laptops or desktops) but with very different prices. Draw a table to compare
the specifications of each. Giving your opinion and using technical arguments, explain the reason for the price differ-
ence.
2. Next, go to a website that allows you to build your own computer by parts (e.g. the website www.pccomponentes.com/
configurador.php). Download images of the parts you need and paste them into the text document.
3. Next, in a spreadsheet, write the name of each component and its individual price and calculate the total price.
4. Save both files with the name Internet1_namesurname.

 Searching for and downloading objects for SketchUp


1. Open SketchUp and go to Ayuda / Comunidad de usuarios. A page in your browser will open (if your version of
SketchUp doesn’t have this option, or it’s not installed, go directly to 3dwarehouse.sketchup.com).
2. Type “motherboard” in the search box. Explore the options designed in SketchUp by other users and download the
model you think is most complete.
3. You can complete the drawing of the motherboard with a case or any other components you think of, or download
other models until your drawing of a computer is complete.
4. Save the file with the name Internet2_namesurname.skp.

ON THE INTERNET: USEFUL ADDRESSES


www.euskalnet.net/apetxebari/topologias.htm Work focused on hardware and network topologies.
www.aulawiki.info/redes and www.aulawiki.info/ampliacion Courses on networks by Rogelio Montañana, a Computer Ser-
vice Analyst at the University of Val.
www.educa2.madrid.org/web/albor ALBOR (Acceso Libre de Barreras al Ordenador) is an online community that provides
solutions and technical help for people with disabilities to access computers.
computerhoy.com, www.adslzone.net, elchapuzasinformatico.com, hipertextual.com/software and www.genbeta.com Inter-
esting websites with the latest hardware and software news.

Information and Communication Technologies - 4º ESO - Editorial Donostiarra 41

S-ar putea să vă placă și