Define terms related to the Internet (Browser, URL, Frames, Plug-ins, Java, Search Engines) ... A browser is an application that facilitates the displaying of information ...
An Image/Link below is provided (as is) to download presentationDownload Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.Content is provided to you AS IS for your information and personal use only. Download presentation by click this link.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.During download, if you can't get a presentation, the file might be deleted by the publisher.
E N D
Presentation Transcript
ICS124
Session 4
Introduction to Networking 1 Objectives:
By the end of this session, the student will be able to:
Describe how data is represented for transmission
Decode a bit pattern from transmitted data
List the two methods modems use to modulate a carrier wave
Diagrammatically represent data streams using the two modulation types
Define Bandwidth
Rank various communications types in order of bandwidth
List the two methods of modem synchronization
Contrast the modem synchronization methods in relation to speed and content
List the three modes of data flow
Provide an analogy of each of these methods to demonstrate how each method functions
List three ways users can interact with a computer system
Distinguish each of these through discussion of how the data is accessed, and where the data is processed
List the three network topologies
Diagram each of the topologies and show where each will fail
List four components of a network
Describe the purpose of each component
Define the term protocol
Give examples of protocols
Use TCP/IP utilities to map a network
Define terms related to the Internet (Browser, URL, Frames, Plug-ins, Java, Search Engines)
Differentiate between the types of search engines in order to more effectively search the Internet 2 Introduction to Networking Background
There are various ways that users can interact with a computer system.
terminal to multi-user system
PC to multi-user system
PC on a network
The basics are the same for each of these methods. As the complexity of these methods increases, the user is provided more access to the data in the computer system. 3 Introduction to Networking, continued How data is represented
Computers store data in binary form. We have looked at the storage of binary data in RAM and ROM as the states of switches:
a switch turned on represents a 1 bit
a switch turned off represents a 0 bit
This binary form can also be represented using electrical pulses, where
the presence of a voltage represents a 1
the absence of a voltage represents a 0
+5V-
0V-
In this waveform do we have:
00101011001100? or
0000110011001111000011110000? or
something else? 4 Introduction to Networking, continued How data is represented, continued
The only way to know is by measuring the waveform against time:
1
0
seconds
IF we are transmitting at a rate of:
1 bit per second, then the bit stream would be 00101011001100
2 bits per second, then the bit stream would be 0000110011001111000011110000
Serial port
During the first week we briefly mentioned the serial port on a PC. Its function is to transmit or receive one bit at a time. The typical maximum rate of serial ports on PCs is 115,400 bits per second, or 115,400 baud
The serial port is only able to transmit data about 15.3m (50') before the electrical properties of the wire seriously degrade the signal (at 20Kbps). 5 Introduction to Networking, continued Modems
A means to send data over longer distances has been devised using older technologies (such as the phone) and newer technologies that are specifically designed for computer equipment.
A modem is a device that modulates a digital data onto an analog signal, and demodulates the analog signal, providing digital data.
An analog signal, called a carrier, can be modulated in two basic ways:
amplitude
frequency
6 Introduction to Networking, continued Modems, continued
amplitude - two wave-forms with different amplitude
The crests and troughs line up.
The height, amplitude, of the waves are different (1:2) 7 Introduction to Networking, continued Modems, continued
frequency - two wave-forms with different frequency
The amplitude of the waves are the same
The number of repetitions per unit time, frequency, are different (1:1.5) 8 Introduction to Networking, continued Modems, continued
By altering the amplitude or the frequency of the carrier wave, information can be transmitted. These are how the two types are radio transmissions are classified. The AM radio uses Amplitude Modulation to transmit the audio, and the FM radio uses Frequency Modulation.
This is an example of how digital information may be transmitted on a carrier:
9 Introduction to Networking, continued Bandwidth
Although the PC can transmit data at very high rates, modems are restricted in their speed due to the limitations of the phone system.
The amount of data that can be transmitted per second using any particular medium is defines its bandwidth.
The greater the bandwidth, the more data that can be transmitted in time.
Other communications types
There are other communications types that yield better bandwidth:
ISDN (Integrated Services Digital Network)
ADSL (Asymmetric Digital Subscriber Line)
cable
T1
Each of these technologies require more expensive equipment to be installed. 10 Introduction to Networking, continued Other communications types, continued
The approximate speed of each of these technologies is:
ISDN - 128Kbps
1M DSL - 1Mbps
cable - 1.2Mbps
T1 - 1.5Mbps
Synchronization
When talking about the number of bits per second being transmitted, a means for each side of the communications link needs to be synchronized so that the bits are properly interpreted.
There are two schemes to transmit data that takes the synchronization into account:
asynchronous transmission
synchronous transmission 11 Introduction to Networking, continued Asynchronous transmission
Asynchronous transmission is based on one character being sent at a time. The line remains idle until a start bit is sent. When the start bit is received, the receiver starts a timer to accept the bits at a predetermined speed. After the character sent, 1 or more stop bits are then sent:
idle............ S 0 0 1 10 1 0 1 S idle................................
In this example the word-size was defined to be 8-bits (ie. ASCII-8), with 1 stop bit.
Synchronous transmission
Synchronous transmission is based on large messages being sent at a time. A message is preceded by a pattern of bits that allow the clocks/timers at both the sending and receiving sides to synchronize.
12 Introduction to Networking, continued Asynchronous/Synchronous transmissions
A representation of the two transmissions methods is:
Because there are no start and stop bits for each character in synchronous transmission, it is faster than asynchronous transmissions.
Asynchronous transmission increases the number of bits sent by a factor of 10/8 (1.25) assuming 8 bits, no parity, 1 stop bit. To send 1KB of data:
8192 data bits
+2048 start and stop bits
=====
10240 total bits sent
The serial port on a PC is asynchronous. 13 Introduction to Networking, continued Data flow directions
The data in a communications link can flow in one-way or two-way directions. This is defined by the terms:
Simplex
Half-duplex
Full-duplex
Simplex
The data flows in one direction only. This is like listening to the radio in your car, all the information flows to you. You don't send information back through the radio.
Half-Duplex
The data flows in two directions, but only not simultaneously. This is like a polite conversion. The first person talks while the second person listens. When the first person stop talking the second person is then free to talk, while the first person listens. 14 Introduction to Networking, continued Full-Duplex
The data flows in both directions simultaneously. Each side of the conversation can listen and talk at the same time.
15 Introduction to Networking, continued Background, revisited
There are various ways that users can interact with a computer system.
terminal to multi-user system
PC to multi-user system
PC on a network
Terminal to multi-user computer
A terminal is a specialized piece of hardware that contains the monitor and keyboard and some means of data transmission.
The terminal has no processing or storage capabilities. It simply provides an interface to a multi-user, central computer system.
All processing and storage is on the central computer.
Predominate technology up to the mid to late-eighties. 16 Introduction to Networking, continued Terminal to multi-user computer 17 Introduction to Networking, continued PC to multi-user computer
Once PCs made their appearance in the workplace, they provided a means for users to perform some local processing and storage. However, the mainframe or multi-user system still provided centralized processing and storage, the PC was just an adjunct.
Data is commonly transferred between the PC and the mainframe. To transfer from PC to mainframe is to upload, the reverse is to download.
File transfers can be accomplished using standardized protocols such as Xmodem, Ymodem, Zmodem and Kermit.
In this type of environment, the PC needs to run specialized software that emulates the older terminals. For UNIX systems the terminal type that is most commonly emulated is the VT100. For IBM mainframes, the 3270 terminal.
VT100 - can be emulated using HyperTerminal (distributed with Windows)
3270 - can be emulated using IBM Communications Manager (licensed software) 18 Introduction to Networking, continued PC to multi-user computer 19 Introduction to Networking, continued PC on a network
Although mainframe and multi-user computers are still very much a part of business today as they still outperform the best PCs. However, by networking computers data can be shared and processed outside of the mainframe.
The following sections deal with the technology of networking. 20 Introduction to Networking, continued Network topologies
A computer can be connected to only one other computer, or it can be connected to a network of computers. The network can be laid out in different arrangements, or topologies.
The topologies that we will look at are:
Star network
Ring network
Bus network
There are variations on these networks.
Star network
A central computer is responsible for controlling all activity on the network. The workstations communicate with the central computer for all requests.
The problem with this arrangement is if the central computer fails, the network fails. Also, the speed of the network will be restricted by the speed of the central computer. 21 Introduction to Networking, continued Ring network
The computers are arranged in a ring, where a computer only talks to the computer beside it.
The problem with this arrangement is that if one computer fails, then the ring is broken and the network fails. The advantage of the ring network is that there is no risk that messages will collide with each other (see Bus Network).
Bus network
The computers are all connected to a common line. Any computer can talk to any other computer in this network.
The advantage of the bus network is that if any computer fails, the network continues to operate. The problem with this network is if more than one machine sends a message at the same time (collision).
The problem of collisions is why the ring network can support more computers than the bus network. 22 Introduction to Networking, continued Network topologies, continued
This is a diagram of each of the network topologies:
23 Introduction to Networking, continued Classification of networks
A network can be classified as either:
Wide Area Network (WAN)
Local Area Network (LAN)
A WAN refers to a network that spans a large geographic area, from the size of a city to a global network.
A LAN refers to a network that spans a small geographic area, from an office to complex of buildings such as a school campus.
Components of networks
There are various devices that are part of connecting computers and networks together. The short list discussed here is:
Network Interface card
Bridge
Gateway
Router 24 Introduction to Networking, continued Network Interface Card
The Network Interface Card (NIC) is used to connect a computer to a particular type of network. An Ethernet NIC will not run on a Token Ring network, and vice versa.
The wiring of the network is connected to the NIC.
Bridge
A bridge is a means to connect two similar networks. If a message is destined for a computer on another network that is also connected to bridge, the bridge will forward the message onto the second network
Gateway
A gateway is used to connect two dissimilar networks. Some form of protocol conversion may take place.
Router
A router is very much like a bridge, and can even incorporate gateway functions. However, it is more complex in that it looks for ways to send traffic through a network of networks, and find the best route for the message. 25 Introduction to Networking, continued Sample network
This is a diagram of the various components of the network 26 Introduction to Networking, continued Protocols
A protocol is a set of rules by which communications are controlled. If a set of computers use the same protocol, then they will be able to communicate with each other.
If the protocol is standardized internationally, then regardless of the computer system, and provided the protocol was properly implemented then the computer system will be able to communicate with any other computer system that implements the same protocol.
The protocol for the Internet is TCP/IP (Transmission Control Protocol / Internet Protocol).
Some other protocols are IPX/SPX, NetBios, IEEE802.2, DECnet, AppleTalk
27 Introduction to Networking, continued Protocols, continued
There are protocols that allow for the TCP/IP protocol to be used over a serial connection (a modem). Two are mentioned here:
SLIP
PPP
SLIP
Is an acronym for Serial Line Interface Protocol. This is an older protocol that supports TCP/IP only. The IP address of the PC as well as the IP address of the server that you are dialling into must be known. (more on IP Addresses later).
PPP
Is an acronym for Point-to-Point Protocol. This newer protocol supports TCP/IP as well as other protocols. Furthermore, multiple protocols can be running simultaneously through PPP (the term ‘protocol stack’ refers to the protocols that are available/running on a machine). PPP will automatically configure itself during the connection to determine what IP address to use for the PC as well as the server. 28 Introduction to Networking, continued TCP/IP Applications
There are two TCP/IP applications that are commonly used. It is important to note that these applications are specific to TCP/IP networks. They are not defined for other protocols.
The applications are:
telnet
ftp
Telnet
Telnet is a terminal emulation package. This utility will be used in our labs when connecting to the RS/6000 (UNIX). Telnet will be configured to emulate a VT100 terminal.
FTP
FTP is an acronym for File Transfer Protocol. This application will also be used in our labs to transfer data between the PC and the RS/6000. 29 Introduction to Networking, continued IP Addresses
In order to determine where a packet needs to be sent, or where to send a response, addresses are used.
A TCP/IP address is normally displayed in 'dotted-decimal' notation. The address consists of 4 numbers (each between 1 and 254) separated by a period. For example: 142.204.57.135
(the 0 and 255 values have special meaning that will not be discussed here)
The following is an Instructor-led in-class exercise to see these addresses in action: 30 Introduction to Networking, continued IP Addresses, continued
Determine what the IP address of your PC is
Send a 'test' message to the Instructor's PC
Send a 'test' message to 142.204.57.135
Determine the route that your message took going to the Instructor's PC
Determine the route that your message took going to 142.204.57.135 31 Introduction to Networking, continued The Internet
This is a diagram of the Internet (www.lumeta.com), colour coded by IP address 32 Browsers and the Internet 33 Browsers and the Internet Background
A browser is an application that facilitates the displaying of information retrieved from the Internet.
Although many people have surfed the web, not everybody has learned some of the basic definitions used in the web.
This will be a general discussion of terminology and structure of browsers, as well as a brief look at search engines.
I am making an assumption that everybody is familiar with a GUI interface, and know how to use scroll bars, pull-down menus and buttons.
34 Browsers and the Internet, continued Browsers
This is a diagram of a browser with the parts labelled: Welcome Banner Pull-down menus Buttons Address window Browser control
panel Browser display
window Status line 35 Browsers and the Internet, continued Browsers, continued
There are terms used in the Internet, usually in conjunction with browsers.
URL
Frames
Plug-ins
Java
Search engine
These terms will be defined in the next few pages. 36 Browsers and the Internet, continued URL
URL is an acronym for Uniform Resource Locator. It is the name given to a particular site or page within a site.
The URL is composed of:
The domain is structured as a hierarchy of nodes, like a company's organizational chart. At the top of the Internet is the root node (symbol is '.', but nobody uses it). The next level is the top-level domains such as .com .ca .net. The last levels are used to identify the company or name and then the server or partition. 37 Browsers and the Internet, continued URL, continued
The most common top level domains are:
The following slides show the progression from a file, to the top level domain of:
ilearn.senecac.on.ca/homepage/Travis.Mander/index.html
(this is representative only) 38 Browsers and the Internet, continued URL, continued
ilearn.senecac.on.ca/homepage/Travis.Mander/index.html
ilearn 39 Browsers and the Internet, continued URL, continued
ilearn.senecac.on.ca/homepage/Travis.Mander/index.html
ilearn www senecac 40 Browsers and the Internet, continued URL, continued
ilearn.senecac.on.ca/homepage/Travis.Mander/index.html
on 41 Browsers and the Internet, continued URL, continued
ilearn.senecac.on.ca/homepage/Travis.Mander/index.html
ca 42 Browsers and the Internet, continued URL, continued
ilearn.senecac.on.ca/homepage/Travis.Mander/index.html
. 43 Browsers and the Internet, continued Frames
Frames are means to subdivide the browser display window into multiple, independently control windows. In this example, there are five frames in the browser display window.
44 Browsers and the Internet, continued Plug-ins
Plug-ins are additional software modules that can be hooked into the browser to enhance its functionality.
Some common plugins are RealPlayer, Adobe Acrobat Reader, Quicktime.
To find out what plugins are installed in a browser enter the following command in the address window:
about:plugins 45 Browsers and the Internet, continued Java
Java is a programming language developed by Sun Microsystems. It is very popular on the Internet because it is platform independent.
Platform independent
When a program is written, it is usually targeted to run on a specific operating system. For example if you take an application that was written for the Mac and try to run it on a Windows95 PC, it will not run.
Java is different, in that the Java code can run on any machine IF it has a Java Virtual Machine installed.
The JVM is written for a specific operating system. The Java code is written to run on the JVM. Therefore any Java programs can run any operating system.
46 Browsers and the Internet, continued Search engines
The Internet is a vast landscape (cyberscape?) of computers with useful and useless data / information / misinformation, etc.
To try and find anything on the Internet is an impossible task without some means to sift through the sites and categorize the data.
A search engine provides this functionality (assuming that you can find a site for a search engine).
Knowing how some of the search engines behave will help you make intelligent decisions as to which engine to use for which purpose.
Some engines try to catalogue all the words it finds on the sites, others are research based where people sift though the sites and catalogue the sites using predefined criteria.
47 Browsers and the Internet, continued Search engine types
In general there are three classes of 'Search Engines':
Directory
Human researchers organize sites by content categories
Search engine
Software that resides at a site and uses a set of rules to automatically catalogue internet sites
Metasearch site
Software that searches 'search engines'
48 Browsers and the Internet, continued Search engines - Directories
Well-organized categories let user switch from browsing to searching in a certain area. Finds only keywords (not any word on any site). Reviews entries before including, links to articles written for NetGuide NetGuide 49 Browsers and the Internet, continued Search engines - Search Engines
Very fast. Indexes every word of every page of every site. Fast. Unique search options let you restrict searches. Very comprehensive. Excels at finding current news Powerful and well organized. Groups results by subject, type, source and language Numerous search options. Comprehensive directory. Good returns on simple searches Searches newsgroups, FAQs and e-mail addresses. Extras such as foreign language searches, and searches by geographic regions Good returns for simple searches. Provides related hints and an array of extra content. Provides directory as well. Results ranked by algorithm based on number of links from other pages 50 Browsers and the Internet, continued Search engines - Metasearch Engines
Accepts search terms and submits to several popular search engines; eliminates duplicates and ranks by relevancy Well-designed, easy-to-use interface 51 OSI Reference Model
FOR INTEREST ONLY OSI Reference Model Background
The OSI Reference Model (Open Systems Interconnection) was developed by the International Standards Organization (ISO).
Protocols can be defined using this model. There are 7 layers to the model. Each layer solves a small portion of the problem of getting data from one location to another, independent of what technology exists at each end of the communications link:
7 - Application Layer
6 - Presentation Layer
5 - Session Layer
4 - Transport Layer
3 - Network Layer
2 - Data Link Layer
1 - Physical Layer
It is not carved in stone, it is a model to work towards when creating a protocol. For example, TCP/IP has only 4 layers. Some of the OSI layers are combined into one TCP/IP layer (1+2 and 5+6+7). OSI Reference Model, continued abc abc abc abc abc Sending computer Receiving computer OSI Reference Model, continued Application Layer
Users interact with the application layer.
Presentation Layer
Syntax and representation of data is handled here (ASCII, EBCDIC), encryption/decryption, compression/decompression of data.
Session Layer
Control mechanisms to establish, maintain and synchronize communication. Control of Full Duplex / Half Duplex sessions is an example.
Transport Layer
Provides end-to-end accountability through use of sequence numbers and acknowledgements
OSI Reference Model, continued Network Layer
Addresses are managed at this layer, as well as routing and congestion control.
Data Link Layer
Data packets are encoded/decoded into bits. The bits are transmitted in groups of bits called frames.
Physical Layer
This layer maintains the physical circuits between two devices. It provides the means to send/receive data on a carrier.