Top Banner
INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology
66

INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Dec 25, 2015

Download

Documents

Morgan Lawson
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

INFSCI 00102015 Summer Term

LEC6.ppt

Becoming Skilled at Information Technology

Page 2: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

2

IS 0010 - Summer 2015

Tentative Schedule Week of

(Monday)

1 11-May x2 18-May x3 25-May Memorial Day (no classes)4 1-Jun x5 8-Jun x6 15-Jun x7 22-Jun x8 29-Jun9 6-Jul Exam

10 13-Jul11 20-Jul Presentations12 27-Jul Final work due

Page 3: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Assignments due next class

• The exam questions assignment is due next class• WepagePart1.ppt is due next class

3

Page 4: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Current assignment summary• Bring an INFSCI article to each class

– Due: each class … (ref LEC1)

• Start reading the text– Due: before the exam … (ref LEC1)

• Watch “Code Wars” video– http://www.intellectualtakeout.org/library/video-podcast-media/video-code-wars-america%E2%80%99s-

cyber-threat– Due: before the exam … (ref LEC1)

• Exam questions assignment– Due: one week before the exam (6/29/15) … (ref LEC2)

• WebpagePart1.ppt (ref LEC5)

– Due: one week before the exam (6/29/15)

• GroupProject.ppt• Spreadsheet.doc << new << due end of term• Extra articles

– Net Neutrality due: 6/1/15 … (ref LEC2)– Patriot Act due: 6/8/15 … (ref LEC3)– Drones due 6/22/15 … (ref LEC5)

4

Page 5: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Looking aheadchapters for text version 6

• Future topics include:– Webpage online, spreadsheet, javascript, database +++

• There are a lot of good sources for learning and developing fluency with these topics. The associated text chapters include:– Spreadsheet: 13,14– Javascript:17,18– Database: 15,16

Page 6: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Lecture Notes

• You now have:– LEC1.ppt, LEC2.ppt, LEC3.ppt, LEC4.ppt,

LEC5.ppt, LEC6.ppt– CH1v6.ppt, CH2v6.ppt, CH3v6.ppt,

CH4v6.ppt, CH5v6.ppt, CH7v6.ppt– WebpagePart1.ppt– GroupProject.ppt– Spreadsheet.doc

6

Page 7: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

7

Current reading list

• Read Chapters 1,2,3,4,5,7,8,9 (Versions 5 and 6)• Read Chapters 1,2,3,4,5,8,9,11(Old Version 4)

• No assigned due date (reference class discussion)

Page 8: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Five civilian uses of drones(National Geographic - 2013)

• Five civilian uses of drones:• 1. Hurricane Hunting• Drones can charge into the heart of a storm without risking human life and limb. That's one reason NASA, the National Oceanic and

Atmospheric Administration (NOAA), and Northrop Grumman teamed up on a three-year, $30-million experiment to use long-range Unmanned Aerial Vehicles (UAV) to spy on storms as they evolve.

• 2. 3-D Mapping• Small, lightweight drones may look like simple model airplanes, but they can survey landscapes with thousands of digital images that can

be stitched together into 3-D maps. Military and other government satellites produce similar maps, but emerging UAV technology can put that capability in the hands of small companies and individuals, to be customized and used for a seemingly endless variety of applications.

• 3. Protecting Wildlife• The U.S. government already uses drones to protect its lands and the species that inhabit them. The Department of the Interior, the

Bureau of Land Management, and the United States Geological Service use UAVs, to monitor wildlife populations or map roads and wetlands for land management purposes.

• Drones also lend punch in the fight against poaching. With funding from Google, the conservation giant WWF plans to launch surveillance drones this year in skies over Africa, where poaching is driving iconic species like rhinos toward extinction and is fueling a massive illegal trade in wildlife items like horns and ivory.

• 4. Farming• Farmers use drone technology to monitor fields and deliver pesticides, water, or fertilizers. Drones can help by identifying exactly where

such resources are needed and delivering them there, is better for the environment and for a farmer's bottom line.• Drone cameras an spot where nitrogen levels are low, or watch the growth of a specific field section, or use of infrared light cameras can

reveal plant health by reflecting how efficient photosynthesis is in various plants.• 5. Search and Rescue• An injured victim of an automobile accident in Saskatchewan, Canada, in May 2013 may have been the first person to have his life saved

by a search-and-rescue drone. A ground search and an air ambulance helicopter with night-vision gear failed to find him but a drone with heat-sensing equipment, launched by the Mounties, found the victim before a potentially fatal night outdoors in subfreezing temperatures.

8

Page 9: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Drones• http://blogs.discovermagazine.com/drone360/2015/06/18/huge-iceberg-collapse-

captured-in-drone-video/• 5 uses of drones: http://news.nationalgeographic.com/news/2013/12/131202-drone-

uav-uas-amazon-octocopter-bezos-science-aircraft-unmanned-robot/• http://www.techworld.com/picture-gallery/personal-tech/6-best-uses-of-drones-in-

business-3605145/#8• Yesterday, Federal Aviation Administration Deputy Administrator Michael Whitaker

said that “within a year” a plan would be in place for commercial drones to operate in a public space. Reuters followed the announcement up with a very short report saying that Amazon “expects to have drone technology ready” as soon as these plans are announced. (6/18/15 gizmodo.com)

9

Page 10: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Amazon delivery

• http://www.youtube.com/watch?v=Le46ERPMlWU

Page 11: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Group project

• Groups meet at the end of class

• GroupProject.ppt

11

Page 12: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Goto Spreadsheet.doc

• Spreadsheet.doc

12

Page 13: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Representing information digitally

• Reference text chapter 7

Page 14: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Telecommunicationsdigital

• Telecommunications: communicating over a distance

• How to communicate (over a distance):– Voice– Data– Image– Video

Page 15: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Digital

• How to represent data digitally continued

Page 16: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Text representation (data)

Binary Oct Dec Hex Character

100 0000 100 64 40 @

100 0001 101 65 41 A

100 0010 102 66 42 B

100 0011 103 67 43 C

Binary Oct Dec Hex Character

110 0000 140 96 60 `

110 0001 141 97 61 a

110 0010 142 98 62 b

110 0011 143 99 63 c

Page 17: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Binary to decimal

• The binary (base two) numeral system has two possible values, often represented as 0 or 1, for each place-value. In contrast, the decimal (base ten) numeral system has ten possible values (0,1,2,3,4,5,6,7,8, or 9) for each place-value.

Page 18: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Binary to decimalref: http://www.sciencehq.com/computing-technology/binary-to-decimal-conversion.html

Page 19: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Binary to Decimalconversion example

reference: http://learn-networking.com/network-design/a-guide-to-network-math

Page 20: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Representing information

• How can we represent 1111 using fewer symbols? Can we use just one symbol?

Page 21: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Hex

• Ref: text v5/6 chapter 7

• Ref: text v4 chapter 8

Page 22: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Hexadecimal

• From Greek, hexadecimal is a word meaning "sixteen." • Decimal=10 • Hexadecimal=16 • In the hexadecimal system, 6 letters are added to the

standard 0-9 Arabic Numerals, to give you a numbering system with base 16, instead of base ten.

• Decimal : 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 • Hexadecimal: 0 1 2 3 4 5 6 7 8 9 A B C D E F

Page 23: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.
Page 24: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Color

• How do we see color?

24

Page 25: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

How do we see color?• The retina of the eye contains two types of photoreceptors which are sensitive to light: cones

and rods. Rods process light at lower levels of illumination while cones process at higher levels. The light energy which is absorbed by the cones and rods is converted into chemical and electrical signals. These signals are processed by the neurons of the eye and the brain.

• Three different types of cone cells in the eye process different wave lengths of the visible spectrum.

• Cones are used to perceive color. There are three types, each being more sensitive to a different part of the visible spectrum. The three types are called

• •short-wavelength sensitive cones• •middle-wavelength sensitive cones• •long-wavelength sensitive cones• They are also called S-cones, M-cones and L-cones. Sometimes they are referred to as R-

cones, G-cones and B-cones (for red, green and blue), however that is a simplification and not quite accurate. For example, the very short wavelengths will only stimulate the S-cones, but the color sensation will have both a reddish and a bluish component.

• Perceived Color• The color we perceive is the result of comparisons of the amount of light absorbed by the

different cone types. What the different types of cone cells output is processed by our visual system to determine the color we perceive. This process occurs at different stages, starting at the retina and ending at the cerebral cortex in the brain.

• http://www.eye-therapy.com/Color/• http://www.pantone.com/pages/Pantone/Pantone.aspx?pg=19357&ca=29

Page 26: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Frequency spectrum - colors

26

Page 27: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

RGB Color Values

• Colors are displayed combining RED, GREEN, and BLUE light.

• HTML colors are defined using a hexadecimal (hex) notation for the combination of Red, Green, and Blue color values (RGB). The lowest value that can be given to one of the light sources is 0 (hex 00). The highest value is 255 (hex FF).

• Hex values are written as 3 double digit numbers, starting with a # sign.

Page 28: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

RGB• The RGB color space is an additive color space in which red, green, and blue light are

combined in various ways to create other colors. • Zero intensity for each component gives the darkest color (no light, considered the black), and

full intensity of each gives a white;• A secondary color is formed by the sum of two primary colors of equal intensity: cyan is

green+blue, magenta is red+blue, and yellow is red+green.• The HTML standards have listed only 16 valid color names (which is limited):

aqua, black, blue, fuchsia, gray, green, lime, maroon, navy, olive, purple, red, silver, teal, white, and yellow.

• If you want valid HTML use the HEX values instead : Six digit hexadecimal color codes like '#99CCFF' or '#0033CC'

• When written, RGB values are commonly specified using three integers between 0 and 255, representing red, green, and blue intensities, in that order. For example:

– (0, 0, 0) is black – (255, 255, 255) is white – (255, 0, 0) is red – (0, 255, 0) is green – (0, 0, 255) is blue – (255, 255, 0) is yellow – (0, 255, 255) is cyan – (255, 0, 255) is magenta

Page 29: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

HTML Colorshttp://www.w3schools.com/html/html_colors.asp

Color Color HEX Color RGB

  #000000 rgb(0,0,0)

  #FF0000 rgb(255,0,0)

  #00FF00 rgb(0,255,0)

  #0000FF rgb(0,0,255)

  #FFFF00 rgb(255,255,0)

  #00FFFF rgb(0,255,255)

  #FF00FF rgb(255,0,255)

  #C0C0C0 rgb(192,192,192)

  #FFFFFF rgb(255,255,255)

Page 30: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

HTML attributes to specify color• HTML Attributes to Specify Color <BODY BGCOLOR="#ff6600"> sets the background color for the page as a whole.

Compatibility Notes: The <body> bgcolor attribute ++ is not supported in HTML5Reference: http://www.w3schools.com/tags/att_body_bgcolor.asp

Page 31: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

31

Color

• This is a site Color Schemes for matching colors for your web page

• http://www.hypergurl.com/colormatch.php

Page 32: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Panda

• Text v4 chapter 8 / Text v6 chapter 7

Page 33: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Networking

• Reference text chapter 3

Page 34: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Communicating information

• Invent a 7 letter alphabet

• How many bits to represent a letter?

• How many bits in the word BAD?

• Transmit the word BAD

34

Page 35: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Invent a code to represent letters:

1 A 0 0 0 2n >= 72 B 0 0 1 n = 3 3 C 0 1 04 D 0 1 15 E 1 0 06 F 1 0 17 G 1 1 08 ? 1 1 1

B A D B 0 0 1 BA 0 0 1 0 0 0 BAD 0 0 1 0 0 0 0 1 135

Page 36: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Signals and information

• Analog and digital signals:

• Analog signal communicating digital information:

36

Page 37: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Transmission error?

• How can we detect a transmission error?

37

Page 38: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Parity

Ref text v6 page 199

Ref text v4 page 241

Page 39: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Simple error detection

• A parity bit is a bit that is added to ensure that the number of bits with value of one in a given set of bits is always even or odd. Parity bits are used as the simplest error detecting code.

• As for binary digits, there are two variants of parity bits: even parity bit and odd parity bit. – An even parity bit is set to 1 if the number of ones in a

given set of bits is odd (making the total number of ones, including the parity bit, even).

– An odd parity bit is set to 1 if the number of ones in a given set of bits is even (making the total number of ones, including the parity bit, odd).

Page 40: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Error checking

EVENPARITY

B A D BAD 0 0 1 0 0 0 0 1 1 1

40

Page 41: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Packet Switching Illustration

Page 42: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

POTS / PSTN

• Plain Old Telephone System

• Public Switched Telephone Network

Page 43: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Circuit switched vs packet switched networks

Page 44: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Networksgeographic

• PAN = Personal Area Network

• LAN = Local Area Network

• MAN = Metropolitan Area Network

• WAN = Wide Area Network

• http://www.techopedia.com/2/29090/networks/lanwanman-an-overview-of-network-types

Page 45: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Other network acronyms

• PAN– NFC

• WLAN

45

Page 46: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

LAN

• Networking information

• LAN Ethernet, Token ring, other

Page 47: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

LAN EXAMPLE:• CSMA/CD Ethernet

• In networking, the term protocol refers to a set of rules that govern communications. Protocols are to computers what language is to humans.

• The Ethernet protocol specifies a set of rules for constructing and transferring frames.

• The IEEE standard 802.3 standardizes the operation of a CSMA/CD network.

Page 48: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Ethernet

• In 1973, at Xerox PARC researcher Bob Metcalfe designed and tested the first Ethernet network.

• Ethernet uses Manchester Encoding for coding the data bits on the outgoing signal.

Page 49: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Ethernet Terminology• Medium - Ethernet devices attach to a common medium that provides a

path along which the electronic signals will travel. Historically, this medium has been coaxial copper cable, but today it is more commonly a twisted pair or fiber optic cabling.

• Node - Devices that attach to that segment are stations or nodes.• Packet - The nodes communicate in short messages called packets,

which are variably sized “chunks” of information. (also called frames ..)

Page 50: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

CSMA/CD

• What is CSMA/CD

• What uses CSMA/CD

• How does CSMA/CD work?

Page 51: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

• Short for Carrier Sense Multiple Access / Collision Detection, a set of rules determining how network devices respond when two devices attempt to use a data channel simultaneously (called a collision). Standard Ethernet networks use CSMA/CD to physically monitor the traffic on the line at participating stations. If no transmission is taking place at the time, the particular station can transmit. If two stations attempt to transmit simultaneously, this causes a collision, which is detected by all participating stations. After a random time interval, the stations that collided attempt to transmit again. If another collision occurs, the time intervals from which the random waiting time is selected are increased step by step. This is known as exponential back off. CSMA/CD is a type of contention protocol.  Networks using the CSMA/CD procedure are simple to implement but do not have deterministic transmission characteristics. The CSMA/CD method is internationally standardized in IEEE 802.3 and ISO 8802.3.

Page 52: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Traditional Ethernet

• Ethernet and CSMA/CD (IEEE 802.3)• Carrier sense multiple access with collision

detection• Four procedures:

– If medium is idle transmit– If medium is busy, listen until idle and then transmit– If collision is detected, cease transmitting– After a collision, wait a random amount of time before

retransmitting

Page 53: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Linear Bus

• A linear bus topology consists of a main run of cable with a terminator at each end. All nodes (file server, workstations, and peripherals) are connected to the linear cable. Ethernet and LocatTalk networks use a linear bus topology

Page 54: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.
Page 55: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

CSMA/CD example

• (See next slide)

• A transmits at t0

• Both B and C are ready to transmit at t1

• B senses A’s transmission and defers

• A’s transmission hasn’t reached C yet so C transmits

Page 56: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.
Page 57: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

1 byte = 8 bits 1 nibble = 4 bits

Page 58: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Ring

Page 59: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Token Ring

• Status of Token Ring Protocol

• Token Ring Protocol was patented by IBM in 1981. IBM enjoyed early success with this network arrangement until Ethernet became the standard for local area networks (LANs). It is still used today in some specialized installations.

59

Page 60: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Token ring

• The ring initializes by creating a token, which is a special type of frame that gives a station permission to transmit.

• The token circles the ring like any frame until it encounters a station that wishes to transmit data.

• This station then "captures" the token by replacing the token frame with a data-carrying frame, which encircles the network.

• Once that data frame returns to the transmitting station, that station removes the data frame, creates a new token and forwards that token on to the next node in the ring.

Page 61: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Switched Ethernet

• Switched EthernetModern Ethernet implementations often look nothing like their historical counterparts. Where long runs of coaxial cable provided attachments for multiple stations in legacy Ethernet, modern Ethernet networks use twisted pair wiring or fiber optics to connect stations in a radial pattern. Where legacy Ethernet networks transmitted data at 10 megabits per second (Mbps), modern networks can operate at 100 or even 1,000 Mbps!

Page 62: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Ethernet Hubs and Switches

• Shared medium hubs

• Switched LAN hubs x

Page 63: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

IEEE standards• 802.11b, g, n, etc

– The IEEE standard for wireless networking– New >> 802.11ac

• 802.3– IEEE standard for CSMA/CD (Ethernet) access

method

Page 64: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Analog waves

Page 65: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Metaphor

• Computer metaphor – an icon or image used as representative or symbolic of a computation (text v4 page 31 / text v5 page 41)

Page 66: INFSCI 0010 2015 Summer Term LEC6.ppt Becoming Skilled at Information Technology.

Metaphor -example