Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction to Computer Science

Similar presentations


Presentation on theme: "Introduction to Computer Science"— Presentation transcript:

1 Introduction to Computer Science
Networks Welcome to Introduction to Computer Science: Networks. This is Lecture c. The component, Introduction to Computer Science, provides a basic overview of computer architecture; data organization, representation, and structure; structure of programming languages; and networking and data communication. It also includes some basic terminology from the world of computing. Lecture c This material (Comp 4 Unit 6) was developed by Oregon Health & Science University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information Technology under Award Number 90WT0001. This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. To view a copy of this license, visit Health IT Workforce Curriculum Version 4.0

2 Learning Objectives - 1 Define what a communication network is (Lecture a) Explain the purposes and benefits of a communication network. (Lecture a) Explain the Internet and World Wide Web, their histories, and their structures. (Lecture a) Describe different ways of connecting to the Internet. (Lecture a) The objectives for this unit on Networks are to: Define what a communication network is, Explain the purposes and benefits of a communication network, Explain the Internet and World Wide Web, their histories, and their structures, Describe different ways of connecting to the Internet,

3 Learning Objectives - 2 Explain the basics of network addressing
Internet Protocol (IP) addresses Domain names Lease vs. purchase from an Internet service provider (Lecture b) Introduce network classification by the coverage size. (Lecture b) Explain basics of network addressing: IP addresses and domain names, and how they can be leased or purchased from an Internet service provider. Introduce network classification by the coverage size.

4 Learning Objectives - 3 Describe different network topologies. (Lecture c) Outline different standards and protocols that govern wired and wireless communications. (Lecture c) Describe different network topologies. Outline different standards and protocols that govern wired and wireless communications.

5 Learning Objectives - 4 Describe benefits and disadvantages of wireless communication. (Lecture d) Describe a typical wireless network setup. (Lecture d) Describe network hardware. (Lecture d) Introduce networking logical models and discuss Open Systems Interconnection (OSI) model. (Lecture e) Describe benefits and disadvantages of wireless communication Describe a typical wireless network setup. Describe network hardware. And, finally, to introduce networking logical models and discuss Open Systems Interconnection, or OSI model.

6 Network Topologies Refers to network layout Two types exist
Physical: How devices in the network are connected with wires and cables Logical: How devices appear connected to the user, i.e. how data flow through the network regardless of physical design How a network is organized or laid out is referred to as its topology. Two types of network topologies exist. Physical topology details how the network is physically designed; in other words how devices in the network are connected with wires and cables. Logical topology illustrates how devices appear to the user to be connected; in other words, how data flows through the network, regardless of its physical design.

7 Main Types of Physical Topologies
First, consider physical topologies. There are many physical topology types. The main types are shown in the figure on the screen: ring, mesh, star, fully connected, line, tree, and bus topology. The next few slides show some of these in more detail. (Malyszkz, 2011, PD-US

8 Physical Topologies - Bus
Host is connected to other host by a single network cable with connectors If cable breaks, whole network goes down! Not in use since late 1990s One physical topology is known as a bus. In the figure on the slide, each host is connected to every other host by a single network cable with connectors. Each green dot in the figure represents a host. If any cable breaks, then the whole network goes down. Obviously, this type of network was not very reliable or scalable and has not been in use since the late 1990s. (Foobaz, 2006, PD-US)

9 Physical Topologies – Fully Connected and Mesh
Each host is connected to every other host, usually by a switch or direct connection Some networks are partial – not full – mesh topologies Another type of physical topology is mesh. With mesh topologies, each host is connected to every other host in the network by a switch or by a direct connection to another host without the use of a switch. The image on the screen shows a full mesh topology where each host is directly connected to every other host in the network. This type of physical topology usually relates to routers, not to computers, because when computers are in a full mesh, they are typically interconnected by a switch. In other words, all of the devices will connect to the switch, not to each other. (Foobaz, 2006, PD-US)

10 Physical Topologies - Ring
Each host is connected to the network in a closed loop or ring Found in highly secure environments Typically utilize a token passing scheme, Only one machine can transmit on the network at a time Another physical topology is the ring. Within a ring topology, each host is connected to the network in a closed loop or ring. This is an uncommon network type, usually found in highly secured environments. Ring topologies typically use an electronic token-passing scheme, which controls access to the network. By using this type of topology, only one machine can transmit on the network at any given time. (Foobaz, 2006, PD-US)

11 Physical Topologies - Star
Each network host is connected to a central switch Most common type Easiest type to set up and maintain All traffic passes through the switch The physical star topology is the most common topology type. It is the easiest to set up and maintain. In this type of environment, all traffic passes through the switch that is at the middle or at the hub of the network. At the ends of the star are end devices. Examples of end devices are computers and printers. Note that an extended star topology exists when a number of switches are connected to each other. This diagram does not show any end devices. In an extended star topology, all hosts can communicate with all other hosts, assuming a proper design; internet protocol, or IP addressing; and appropriate network permissions. (Foobaz, 2006, PD-US)

12 Network Standards and Protocols - 1
Institute of Electrical and Electronics Engineers (IEEE) Creates and publishes networking and many other standards Wired network governed by IEEE standard Wireless network governed by IEEE standard Standards ensure compatibility of products from various vendors The Institute of Electrical and Electronics Engineers, or IEEE, creates and publishes networking and other standards. Wired networks are governed by IEEE standard while wireless networks are governed by IEEE standard. Establishing standards is important since it ensures compatibility of products from various vendors.

13 Network Standards and Protocols - 2
Protocols govern communications Example: You install an Intel NIC on your computer and your friend installs a 3Com NIC on her computer. Both computers can communicate flawlessly because both NICs adhere to IEEE standards for network communication. Protocols govern communications used by the various products you might install on your computer. For example, say that you purchase and install an Intel network interface card, or NIC. Your friend installs a 3Com NIC on their computer. Both computers can communicate flawlessly over the network because both NICs adhere to the applicable IEEE standards for network communication.

14 Standardized Communications
IPs are a global standard IP addressing is required to function properly IP addressing allows any device with Internet access to communicate with another TCP/IP transports HTTP across the Internet for delivery to its destination Protocols such as HTTP allow any browser to talk to any Web server Internet protocols are a global standard. This ensures interoperability between the hardware and software installed on computers. For example, IP addressing is required for home and office networks to function properly. IP addressing allows any device with Internet or network access to communicate with any other device on the Internet. The Transmission Control Protocol Internet Protocol, or TCP/IP, transports hypertext transfer protocol, or HTTP across the Internet for delivery to its destination. HTTP is the hypertext transfer protocol used on the World Wide Web. Protocols such as HTTP allow any Web browser to talk to any Web server.

15 Network Standards Ethernet Token ring Wi-Fi WiMAX
WAP (Wireless Application Protocol) RFID (Radio frequency Identification) Bluetooth Network standards include Ethernet, token ring, Wi-Fi, WIMAX, the wireless application protocol, or WAP, the radio frequency identification, or RFID, and Bluetooth. These standards will be described in more detail.

16 Ethernet Network Standard
Concepts developed IEEE Standard 802.3 Defines standards for wiring and signaling Standard defines frame formats, etc. Widely used today Starting with the Ethernet network standard, Ethernet gets its name from the physical concept of ether. In the late 1800s, scientists thought that some then-unknown medium was responsible for housing light particles as they passed through the air. The name they gave to this unknown medium was ether. Ethernet cables and Ethernet as a standard were developed between 1973 and Ethernet is encompassed and promulgated in IEEE standard Ethernet's standard defines the standardization and rules that relate to wiring and signaling. It defines frame formats and how large fields are within frames. Ethernet is widely used in wired networking. A frame is an electronic construct that organizes electronic communication into fields of fixed sizes. Switches and other devices are able to understand the contents of a frame and use information in its fields to forward electronic communication throughout the network.

17 Token Ring Network Standard
Concepts developed in 1985 IEEE standard Named after its logical topology Communicating devices need to possess the digital token that is passed around the ring Put out of business by Ethernet The token ring network standard was developed in approximately 1985 and is part of the IEEE standard. Token ring is named after its logical topology, since its physical topology is a star. In this type of topology, devices connect to each other, usually by a switch. When devices connect to a switch through an Ethernet cable, communicating devices need to possess the digital or electronic token that is passed around the ring. Again, this is a logical ring, so the token passes from device to device. Therefore, a device passes the electronic token to the switch, which passes it to another device, and so on. Devices pass the token until they need to communicate on the network. Then they hold the token until they are finished communicating. In essence, Ethernet made token ring obsolete because Ethernet is much faster and easier to implement. To use a token ring network type, users must install token ring NICs and switches.

18 Wi-Fi Network Standard
Concepts evolved 1997 – today IEEE standard for wireless LANs Family of wireless protocols Standard defines throughput, frame formats, etc. Uses frequencies (channels) for wireless communication A uses 5.0 GHz wireless band B/G uses 2.4 GHz wireless band N uses both bands The Wi-Fi network standard relates to wireless devices. It began its evolution in 1997 and continues today. Wireless communication is based on the standard for wireless local area networks, or LANs. In fact, Wi-Fi and are synonyms, because they relate to the family of wireless protocols A, B, G, and the Draft N protocol. The standard defines throughput and frame formats that relate to the equipment being used for wireless communication. When communication moves from a computer onto a wireless NIC, and then ultimately into the air, how does electronic communication get into the air? With a wired connection, how does the communication from a computer move from the NIC onto a piece of wire? All of this is governed by the standard for wireless and standard for wired communication. The standard defines frame formats. In other words, the standard defines the format of the electronic communication pieces so they can make the jump from the NIC onto the actual wire itself. 802.11A uses the 5.0 gigahertz wireless band for its communication B and G both use the 2.4 gigahertz wireless band. Note that the 2.4 gigahertz frequency range operates in the same range as microwaves and older telephones. So a user communicating wirelessly in a home and running a microwave at the same time would experience interference to the wireless signal. The microwave would consume all of the wireless bandwidth, causing wireless communication to function less than perfectly, if at all. 802.11N on the other hand, uses both 5.0 and 2.4 gigahertz frequencies for its communication. This is why N is so much faster than the A, B, or G types.

19 WiMAX Network Standard
Developed in 2001 IEEE standard for WAN wireless Telecommunications protocol provides fixed and fully mobile internet access Example WiMAX access was used to assist with communications in Aceh, Indonesia, after the tsunami in December WiMAX provided broadband access that helped regenerate communication to and from Aceh. The WIMAX network standard was developed in 2001 and is referred to as the IEEE standard that relates to WAN wireless networking. It is the telecommunications protocol that provides fixed and fully mobile Internet access. Note that WIMAX is different from Wi-Fi. Here is an example to clarify this point. WIMAX access was used to assist with communications in the Aceh, Indonesia area after the tsunami in December WIMAX provided broadband access that helped regenerate communication to and from this province when no other communication was available. People with network devices were able to connect to the Internet using WIMAX connectivity.

20 Wireless Application Protocol (WAP)
Open international standard for application-layer network communications in a wireless-communication environment Standard describes a protocol suite allowing the interoperability of WAP equipment and software Concept developed ca. 1997 Most use involves accessing mobile web from a mobile phone or from a PDA The wireless application protocol or WAP is an open international standard for application layer network communications in a wireless communication environment. The standard describes a protocol suite - a protocol suite is a number of protocols that are grouped together - allowing the interoperability of WAP equipment and software with many different network technologies. The concept was developed in approximately 1997 and is still relevant today. Most uses of WAP involve accessing the Internet from a smart phone, a mobile phone, or a Personal Digital Assistant, also known as a PDA.

21 Radio-Frequency Identification (RFID)
Tag incorporated into an object, communicates using radio waves Most contain at least two parts Integrated circuit stores information Antenna for sending/receiving signals Many organizations govern standard International Organization for Standardization (ISO) International Electrotechnical Commission (IEC) The radio frequency identification standard, or RFID, incorporates the use of an RFID tag in an object and then communicates using radio waves. Most RFID tags contain at least two parts. First, there is the circuitry that stores information about the item related to the RFID tag. Then there is the antenna for sending and receiving signals. Many organizations govern this standard, including the International Standards Organization, or ISO, and the International Electrotechnical Commission, or IEC. In stores, RFID tags are placed on clothing, expensive items, and items that are easy to shoplift. They are heavily used for inventorying medical supplies and medicine. In fact, in many medical offices, if an employee needs to remove medicine from a cabinet, the RFID tag records its movement, and may even ask the employee to remove it from inventory.

22 Bluetooth IEEE 802.15 standard Concept developed ca. 1994 to present
Open wireless technology standard for exchanging data over short distances Used by Medical implants Keyboard/mouse Cell phone headsets The IEEE standard that is relevant to Bluetooth was developed in approximately 1994 and is evolving to this day. Bluetooth represents an open, wireless technology standard for exchanging data over short distances, usually about 30 to 50 feet from fixed and mobile devices. Bluetooth is used in devices such as medical implants, keyboards, mouse devices, cell phone headsets, and other devices. A Bluetooth USB dongle with a 100 m range. (Mmckinley, 2009, PD-US)

23 Networks Summary – Lecture c
Describe different network topologies List and describe different network standards and protocols This concludes lecture c of Networks. In summary, this lecture discussed: Different network topologies And different network standards and protocols

24 Networks References – 1 – Lecture c
Wikipedia. Computer network. [Internet].2010 [cited 2011 Nov 07]. Available from: Wikipedia. Local area network. [Internet].2010 [cited 2011 Nov 07]. Available from: Wikipedia. Metropolitan area networks. [Internet].2010 [cited 2011 Nov 07]. Available from: Wikipedia. Network topology. [Internet].2010 [cited 2011 Nov 07]. Available from: Wikipedia. Institute of Electrical and Electronics Engineers. [Internet].2010 [cited 2011 Nov 07]. Available from: Wikipedia. Communications protocol. [Internet].2010 [cited 2011 Nov 07]. Available from: Wikipedia. Ethernet. [Internet].2010 [cited 2011 Nov 07]. Available from: References slide. No audio.

25 Networks References – 2 – Lecture c
Wikipedia. IEEE [Internet].2010 [cited 2011 Nov 07]. Available from: Wikipedia. Wi-Fi. [Internet].2010 [cited 2011 Nov 07]. Available from: Wikipedia. WiMAX. [Internet].2010 [cited 2011 Nov 07]. Available from: Wikipedia. Wireless Application Protocol. [Internet].2010 [cited 2011 Nov 07]. Available from: Wikipedia. Radio-frequency identification. [Internet].2010 [cited 2011 Nov 07]. Available from: References slide. No audio. Images Slide 5: Screenshot of Computer Name/Domain Changes window. (PD-US, 2011) Slide 7: Network Topologies [image on the Internet]. Maksim (24 April 20144) [cited 2017 March 01]. Retrieved March 2017 from: (PD-US, 2011) Slide 8: Bus Network [image on the Internet]. Myself, (19 February 2008) [cited 2011 Nov 07]. Retrieved Jan 2012 from: (PD-US, 2011)

26 Networks References – 3 – Lecture c
Images Slide 9: NetworkTopology - Mesh [image on the Internet]. Foobaz, (6 February 2014) [cited 2011 Nov 07]. Retrieved Jan 2012 from: (PD-US, 2011) Slide 9: NetworkTopology – Fully Connected [image on the Internet]. Foobaz, (16 October 2016) [cited 2011 Nov 07]. Retrieved Jan 2012 from: (PD-US, 2011) Slide 10: Ring Network [image on the Internet]. Foobaz, (19 February 2008) [cited 2011 Nov 07]. Retrieved Jan 2012 from: (PD-US, 2011) Slide 11: Star Network [image on the Internet]. Foobaz, (19 February 2008) [cited 2011 Nov 07]. Retrieved Jan 2012 from: (PD-US, 2011) Slide 22: Bluetooth USB Dongle [image on the Internet]. Mmckinley (01 January 2009) [cited 2011 Nov 07]. Retrieved Jan 2012 from: (PD-US, 2011) References slide. No audio.

27 Introduction to Computer Science Networks Lecture c
This material was developed by Oregon Health & Science University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information Technology under Award Number 90WT0001. No audio.


Download ppt "Introduction to Computer Science"

Similar presentations


Ads by Google