BBC MICRO:BIT Lesson 6 Networking. Digital devices can be networked together to exchange data. You are going to create a very simple network using two.

Slides:



Advertisements
Similar presentations
Technology ICT Option: Data Representation. Data Representation In our everyday lives, we communicate with each other using analogue data. This data takes.
Advertisements

Communicating Information: Web Design. It’s a big net HTTP FTP TCP/IP SMTP protocols The Internet The Internet is a network of networks… It connects millions.
Interprocess Communications
IT Systems What Number? EN230-1 Justin Champion C208 –
Review of Chapters 12, 13 & 14 Transport Layer Session Layer Presentation Layer.
1 Lecture 30 Introduction to Data Communications Overview  Lecture Objectives.  Data Communications: Basics.  Major Issues in Data Communications. 
Data Representation (in computer system) Computer Fundamental CIM2460 Bavy LI.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
ASCII & Gray Codes.
THE OSI MODEL KUDIRAT FAWEHINMI COSC 541.
Lesson Objectives Explain the use of binary codes to represent characters Explain the term “Character set” Describe with examples (for examples ASCII and.
CHARACTERS Data Representation. Using binary to represent characters Computers can only process binary numbers (1’s and 0’s) so a system was developed.
Data Communications and Networks
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
ROM Read Only Memory “…computer memory on which data has been prerecorded. Once data has been written onto a ROM chip, it cannot be removed and can only.
Characteristics of Communication Systems
Requirements for an Internet Connection The Internet is the largest data network on earth. Connection to the Internet can be broken down into the physical.
Computer Structure & Architecture 7c - Data Representation.
Mr C Johnston ICT Teacher
Chapter 7 Low-Level Protocols
Lesson 4.7. Identity Matrix:  If you multiply a matrix by an identity matrix (I) the result is the same as the original matrix.  If Matrix A is a square.
Specview 32 Release 2.5 Enhancements
Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 05 Network Protocols.
©Brooks/Cole, 2003 Model and protocol  A model is the specification set by a standards organization as a guideline for designing networks.  A protocol.
AS Computing Data Transmission and Networks. Transmission error Detecting errors in data transmission is very important for data integrity. There are.
IR Communication Materials taken from a variety of sources including IR Remote for the Boe-Bot by Andy Lindsay.
Data Communications and Networks
IR Communication Materials taken from a variety of sources including IR Remote for the Boe-Bot by Andy Lindsay.
TCP/IP (Transmission Control Protocol / Internet Protocol)
3.2 Software Fundamentals. A protocol is a formal description of digital message formats and the rules for exchanging those messages in or between computing.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
Department of Industrial Engineering Sharif University of Technology Session# 10.
LO1 Know types of Network Systems and Protocols. Application Layer Protocols.
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
TCP =Transmission Control Protocol IP = Internet Protocol TCP/IP Protocol.
Modems How They Work. Modem A device used by a PC to communicate over a phone line or cable A device used by a PC to communicate over a phone line or.
Homework Explain these terms in your own words. If they are not your own words, they need to be in quotes with a source given. Sources 1.Wilson 2.Webopedia.
CSC 335 Data Communications and Networking Lecture 4b: Communication and Multiplexing Dr. Cheer-Sun Yang.
1 Chapter Overview Modems The Internet and Web Browsers.
M204 - Data Representation
Semester 1 v CCNA 1 Module 1:Introduction. Semester 1 v Connecting to the Internet.
Code Division Multiple Access. 2 Code Division Multiplexing Also known as code division multiple access An advanced technique that allows multiple devices.
Peer to peer networks. Peer to peer is when digital devices communicate wirelessly with each others without the need for a transmitter. Wi-Fi Direct 1-
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
09/06/ Data Representation ASCII, Binary Denary Conversion, Integer & Boolean data types.
A SSIGNMENT #3 Com tech. ANSL HTML Hypertext Markup Language, a standardized system for tagging text files to achieve font, color, graphic, and hyperlink.
A+ Computer Repair Lesson 3: Number System. Objectives Define binary, decimal, octal, and hexadecimal numbering systems. Define binary, decimal, octal,
Understanding Computers
Data Representation. In our everyday lives, we communicate with each other using analogue data. This data takes the form of: Sound Images Letters Numbers.
WHAT IS BINARY? Binary is a number system that only uses two digits: 1 and 0. Any information that processed by a computer it is put into sequence of.
Nat 4/5 Computing Science Data Representation Lesson 3: Storing Text
Sequencing Learning Objective: to be able to design algorithms that use sequencing.
HTTP AND ABSTRACTION ON THE INTERNET
Data Transfer ASCII FILES.
Introducing the World Wide Web
Understand the OSI Model Part 2
Learning Objective: to be able to design programs that use sequencing.
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Data Encoding Characters.
Sending Bits on the Internet
Web Development & Design Chapter 1, Sections 4, 5 & 6
Topologies, Protocols and Layers
Unit Network Topologies, protocols and layers Lesson 2
BBC Microbit.
Computers & Programming Languages
SENDING BINARY MESSAGES WITH THE INTERNET SIMULATOR
Network Protocol Layers
Logic Gates Practical Objective: to develop an understanding of logic circuits and truth tables.
Protocol Application TCP/IP Layer Model
WJEC GCSE Computer Science
Presentation transcript:

BBC MICRO:BIT Lesson 6 Networking

Digital devices can be networked together to exchange data. You are going to create a very simple network using two micro:bits. Connect the two micro:bits with crocodile clips as shown.

Protocols Devices need to follow a set of rules to communicate over a network, each device on the same network must follow the same set of rules. This set of rules is known as a protocol. Here is the protocol we are going to use on our micro:bit network: Transmit a 0 by sending a signal through pin 1 for 200 milliseconds Transmit a 1 by sending a signal through pin 1 for 400 milliseconds If a signal is detected on pin 1 for 200 milliseconds interpret it as a 0 If a signal is detected on pin 1 for 400 milliseconds interpret it as a 1

Activity 6.1 Below is a list of common protocols, use internet research to help you to complete the table. ProtocolDescription TCP/IP HTTP HTTPS SMTP POP3 FTP

Writing the Protocol This program creates the protocol that will allow the micro:bits to communicate. Note: this program works best if both micro:bits are plugged into a USB port. If button A is pressed a signal will be sent through pin 1 for 200 milliseconds and the other micro:bit will display a 0 on the screen. If button B is pressed a signal will be sent through pin 2 for 400 milliseconds and the other micro:bit will display a 1 on the screen.

Activity 6.2 Implement the protocol program shown on the previous slide and test it. Comment the code explaining what each part does. Place a screenshot of your code here.

Representing Characters We can now send sequences of binary digits between our micro:bits but how can we turn these into characters? Computers use coding systems to represent characters using binary numbers, one of these systems is ASCII (American Standard Code for Information Interchange) SPACE M N A O B P C Q D R E S F T G U H V I W J X K Y This table shows some of the binary codes used to represent characters using ASCII.

Activity 6.3 Write a short message, convert it into ASCII codes and send it to your learning partner using your micro:bit network. CharacterCharacter Code

Automatic Conversion We can change the program so that it automatically converts the binary code into a character. Each time the micro:bit receives 1 bit it adds it to the character variable until there are 7 bits. When there are 7 bits they will be converted into a character and displayed. Update your program, the code you need to change/add is highlighted.

Activity 6.4 Update your protocol program as shown on the previous slide. Comment the code to explain what each part does. Place a screenshot of your code here.

Extension Improve your protocol program to make it play one sound when a 0 is received and another sound when a 1 is received. Place a screenshot of your code here.