CS 101 – Nov. 20 Communication, continued (Ch. 15) Cryptography –examples Error detection Local Area Networks –Different ways to hook up machines.

Slides:



Advertisements
Similar presentations
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Advertisements

Computer Networking (Appendix C) Objectives
Networks Types. Spring 2002Computer Network Applications Data Transfer During the ’70s: Minicomputers became affordable; Need to communicate information;
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Telecommunications Chapter 5 Chapter 5 Telecommunications
Distributed Systems Distributed Algorithms 1 Brendan Tangney Distributed Systems (Distributed Algorithms – A Problem Based Learning Approach)
Two Network Types Defined by DISTANCE LAN WAN. NETWORKS LAN LOCAL AREA NETWORK.
Shared vs. Switched Ethernet (Modeling and Simulation using OPNET)
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
Network Concepts. Networks LAN WAN Main Concepts n Protocol n Media n Topology.
CS335 Networking & Network Administration Wednesday, April 7 PacketsPackets, Frames, and Error DetectionFramesError Detection.
Bob Baker Communications Bob Baker September 1999.
LAN Risanuri Hidayat. LAN-Local Area Network A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects.
Understanding Networks II. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Department of Information Engineering 1 Objectives A basic understanding of the following –What is Internet? –What is client-server computing? –What is.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
Core 3: Communication Systems. On any network there are two types of computers present – servers and clients. By definition Client-Server architecture.
Chapter 8 LAN Technologies and Network Topology Direct Point-to-Point Communication Local Area Networks (LANs) LAN Topologies Ethernet Token Ring FDDI.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Network Topologies An introduction to Network Topologies and the Link Layer.
Networks. Bus Network Terminator‘Workstation’ ‘Client’ ‘Terminal’ ‘Node’ Computer Terminator Backbone Server (optional)
Module 4 - Networking MIS5122: Enterprise Architecture for the IT Auditor.
Chapter 4.  Understand network connectivity.  Peer-to-Peer network & Client-Server network  Understand network topology  Star, Bus & Ring topology.
Chapter 20 Networks. 4 Questions that need to be answered concerning networks? –How will each computer be identified? –What kind of wire should you run.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
For Beginners.  Network architecture, is the logical and structural layout of the network consisting of transmission equipment, software and communication.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Dale & Lewis Chapter 15 Networks. What is a computer network? A collection of computing devices that are connected in various ways in order to communicate.
Introduction network Protocol
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
PPT Slides by Dr. Craig Tyran & Kraig Pencil Computer Networking – Part 1 MIS 320 Kraig Pencil Summer 2014.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
CPS 356: Introduction to Computer Networks Lecture 7: Switching technologies Ch 2.8.2, 3.1, 3.4 Xiaowei Yang
Telecommunications & Networks. Lally School of M&T- MicroComputing Lecture Topics 1. Telecommunication Networks 2. Network Components 3. Network Topologies.
Lesson 3—Networking BASICS1 Networking BASICS Network Design Unit 2 Lesson 3.
Local Area Network Daniel Shin CS 147, Section 3 November 18, 2008.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
Protocols. Protocol Set of rules that govern: Connection Communication data transfer Protocols regulate: access method allowed physical topologies types.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
Ch 5. Link layer and Local Area Networks Myungchul Kim
© 2006 Pearson Education Canada Inc.C-1 Appendix C Networking PowerPoint Presentation Jack Van Deventer Ward Eagen.
Day10 LAN. Why? Allow more than one machine to share –Resources –Internet connectivity –Information.
© 2003 Prentice Hall, Inc.C-1 Appendix C Computer Networking Information Systems Today Leonard Jessup and Joseph Valacich.
1 CS4550: Computer Networks II Review Data Link Layer.
Network Topologies.
Chapter2 Networking Fundamentals
Lecture (Mar 23, 2000) H/W Assignment 3 posted on Web –Due Tuesday March 28, 2000 Review of Data packets LANS WANS.
CS 111 – Sept. 13 Error detection Error correction Review/practice chapter 1 questions Commitment: –Please read sections 2.1 and 2.2.
CS 101 – Nov. 23 Communication, continued LANs –Bus (ethernet) communication –Token ring communication How the Internet works: TCP/IP.
Lecture 6 Networked Systems Network Operating Systems Introduction to Sockets HTTP – FTP – TCP - UDP Client-Server Model.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Prepared by:Ronnel P. Agulto, CpE Objectives Different types of topologies; Their advantages & disadvantages How to choose an appropriate topologies in.
NETWORK TOPOLOGY Network topology is the study of the arrangement or mapping of the elements of a network,especially the physical.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
Shape of a Network. Topology  The way the computers are __  Four different __  __.
1 Multiple Access: Ethernet Section Point-to-Point vs. Broadcast Media Point-to-point –PPP for dial-up access –Point-to-point link between Ethernet.
What Is a Network? Definition of a Network Computer Networking Introduction Uses for a Computer Network Two Major Types of Networks 1.
Q and A, Ch , Ch 15 IS 333 Victor Norman. Exponential Backoff Q: Why does it choose to use randomness and doubling delay time to recover from collisions?
Class Notes CS403- Internet Technology Prepared by: Gulrez Alam Khan.
Network types Point-to-Point (Direct) Connection Dedicated circuit boards connected by cable; To transfer data from A to B: – A writes on its circuit board;
Protocols.
Shuffle Exchange Point-to-point, Bus, Ring, Star, Mesh
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
CS 457 – Lecture 6 Ethernet Spring 2012.
CS 101 – Nov. 18 Finish image enhancement Communication (Chapter 15)
Presentation transcript:

CS 101 – Nov. 20 Communication, continued (Ch. 15) Cryptography –examples Error detection Local Area Networks –Different ways to hook up machines

Encryption examples Caesar cipher √ Cryptogram One-time Pad & Japanese Naval Codes –Dictionary table –Additive table –Destroy each page as you use it

Breaking codes Like solving a cryptogram Distribution of letters (‘e’ versus ‘q’) Digraphs, trigraphs Common words Eric Nave’s “Betrayal at Pearl Harbor”

Errors in transmission Random flipping of bits Prepare by using parity bit –Add 9 th bit to each byte –Goal is that each byte has even # of 1’s –Receiver checks each byte –Doesn’t solve every error!

Local Area Networks Sharing resources in a lab –File server –Printer Communication based on topology –point-to-point  –star  –bus (like speaking at dinner table) –ring (need token to send message)

Bus topology All machines share the same channel All continuously listening “Ethernet” protocol (dinner table) –don’t talk when someone else is talking –collisions Amplify signal with repeaters

Token ring Fast messaging over larger distances Logically arranged in loop Messaging: Token passed around the ring. –Am I busy? –From –To –message

Token action When you receive token: Is the message for me? –If so, read and change to ack. –If not, just pass token. Do I need token? –Wait until it comes back as not “busy”

Example 4 machines: A, B, C, D. A has message for C. –When A gets token, writes message for C. –B passes token. –C receives msg, sends ack message to A. –D passes token. –A receives ack, clears token. …

Example #2 We have 4 machines A, B, C, D. What happens when… –Token starts at D. –A has a message for C. –C has a message for A. –B has a message for D. …………………………………………