2004-2005 academic year, spring semester

42
2004-2005 Academic Year, Spring Semester 2004-2005 Academic Year, Spring Semester Bilkent University - Faculty of Art, Bilkent University - Faculty of Art, Design and Architecture - Department of Design and Architecture - Department of Communication and Design Communication and Design CS 153 CS 153 Introduction to Introduction to Computing I Computing I Lesson 2 Lesson 2

Upload: technical-dude

Post on 04-Jun-2015

799 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: 2004-2005 Academic Year, Spring Semester

2004-2005 Academic Year, Spring Semester2004-2005 Academic Year, Spring SemesterBilkent University - Faculty of Art, Design and Bilkent University - Faculty of Art, Design and Architecture - Department of Communication Architecture - Department of Communication

and Designand Design

CS 153 Introduction CS 153 Introduction

to Computing Ito Computing I Lesson 2Lesson 2

Page 2: 2004-2005 Academic Year, Spring Semester

NetworkNetwork

A group of computers and associated A group of computers and associated devices connected by communications devices connected by communications facilities (both hardware and software) facilities (both hardware and software) to share information and peripheral to share information and peripheral devices, such as printers and modems. devices, such as printers and modems.

Any time you connect 2 or more Any time you connect 2 or more computers together so that they can computers together so that they can share resources, you have a computer share resources, you have a computer network. Connect 2 or more networks network. Connect 2 or more networks together and you have an internet. together and you have an internet.

Page 3: 2004-2005 Academic Year, Spring Semester

Types of NetworksTypes of Networks

Server BasedServer Based Single or multiple servers “serve” the Single or multiple servers “serve” the

resources (data and even the processing resources (data and even the processing power) to the clients.power) to the clients.

Thin Client, Thick Client?Thin Client, Thick Client?

Peer to PeerPeer to Peer The members of the network share each The members of the network share each

other’s resourcesother’s resources HybridHybrid

Most of the networks fall on this category, Most of the networks fall on this category, combination of both technologies.combination of both technologies.

Page 4: 2004-2005 Academic Year, Spring Semester

Types of Network( Size)sTypes of Network( Size)s LANLAN

Local Area NetworkLocal Area NetworkA data communications network covering a small A data communications network covering a small

area, usually within the confines of a building or area, usually within the confines of a building or floors within a building; a relatively high-speed floors within a building; a relatively high-speed computer communications network for in-building computer communications network for in-building data transfer and applications. Cheap, and easy to data transfer and applications. Cheap, and easy to setup!setup!

Examples:Examples: A company network of several hundered PCs that might A company network of several hundered PCs that might

be partly open to public.be partly open to public. A home network of few PCs.A home network of few PCs.

Uses: Uses: EthernetEthernet Token Ring (no longer widely used)Token Ring (no longer widely used)

Page 5: 2004-2005 Academic Year, Spring Semester

Ethernet, Token RingEthernet, Token Ring

Ethernet

Token Ring

Page 6: 2004-2005 Academic Year, Spring Semester

Types of Network( Size)sTypes of Network( Size)s WANWAN

Wide Area Network. The networks of LANs and some more...Wide Area Network. The networks of LANs and some more...A system of interconnecting many computers over a large A system of interconnecting many computers over a large

geographic area, making use of telephone lines, satellite links, geographic area, making use of telephone lines, satellite links, and other long-range communications technologies. Because and other long-range communications technologies. Because of the much greater hardware expense, reduced bandwidth, of the much greater hardware expense, reduced bandwidth, and the reliance on existing infrastructure that is shared by and the reliance on existing infrastructure that is shared by general-purpose communications, different protocols are used general-purpose communications, different protocols are used in WANs from those typically used in LANs. in WANs from those typically used in LANs.

Examples:Examples: Internet!Internet! Army, police networks.Army, police networks. Private large firms networks.Private large firms networks.

Uses: Uses: Modem (MOdulator DEModulator): standard phone lines (called Modem (MOdulator DEModulator): standard phone lines (called

POTS (Plain Old Telephone Service)POTS (Plain Old Telephone Service) PSTN (Public Switched Telephone Network)), PSTN (Public Switched Telephone Network)), ISDN (Integrated Services Digital Network), ISDN (Integrated Services Digital Network), Frame Relay, Frame Relay, ATM (Asynchronous Transfer Mode) ATM (Asynchronous Transfer Mode) or other high speed services or other high speed services

Page 7: 2004-2005 Academic Year, Spring Semester

Types of Network Types of Network ConnectionsConnections

BUS

STAR

TOKEN RING

Page 8: 2004-2005 Academic Year, Spring Semester

Types of Network Types of Network ConnectionsConnections

BUSBUS PC to PC (to PC to PC...)PC to PC (to PC to PC...) For each pair of For each pair of

connection 2 Network connection 2 Network Cards Required.Cards Required.

StarStar PCs to a Hub or Switch.PCs to a Hub or Switch. A hub/switch is needed and A hub/switch is needed and

for per connection a for per connection a network card is needed.network card is needed.

Page 9: 2004-2005 Academic Year, Spring Semester

Types of Network Types of Network Connections (cont’d)Connections (cont’d)

RingRing Better than BUS.Better than BUS. For each computer a Network For each computer a Network

Card is enough.Card is enough. If connected A If connected A B B C C D D

A A If A wants to send data to C, it If A wants to send data to C, it

sends to B, B forwards to C.sends to B, B forwards to C.

Performance of these Performance of these connections:connections: Star >= Bus > RingStar >= Bus > Ring

Page 10: 2004-2005 Academic Year, Spring Semester

Hub, Switch and RouterHub, Switch and Router

HubHub Most simple central connection device. It Most simple central connection device. It

basicly connects all the computers that are basicly connects all the computers that are connected to it.connected to it.

The problem with a hub is: when two PC’s The problem with a hub is: when two PC’s are talking at the full speed, the other PC’s are talking at the full speed, the other PC’s connected to Hub have connection speed connected to Hub have connection speed problems.problems.

SwitchSwitch Same as Hub, but solves the speed problem Same as Hub, but solves the speed problem

of the hub.of the hub.

Page 11: 2004-2005 Academic Year, Spring Semester

Hub, Switch and RouterHub, Switch and Router

RouterRouter Routers allow completely different Routers allow completely different

networks, (ie LANs or WANs) to talk to each networks, (ie LANs or WANs) to talk to each other.other.

The networks are connected through a The networks are connected through a router.router.

Consider a home network (LAN) is Consider a home network (LAN) is connected to the Internet through ADSL. connected to the Internet through ADSL. You cannot connect ADSL modem directly to You cannot connect ADSL modem directly to a switch or a hub. You need a router to a switch or a hub. You need a router to seperate the LAN and the Internet (WAN). seperate the LAN and the Internet (WAN).

Page 12: 2004-2005 Academic Year, Spring Semester

Types of CablesTypes of Cables Twisted PairTwisted Pair

CheapCheap Telephone linesTelephone lines SlowSlow

CoaxialCoaxial TVTV FastFast

Fiber OpticFiber Optic ExpensiveExpensive Longest RangeLongest Range Highest SpeedHighest Speed

Coaxial Twisted Pair

Fiber Optic

Page 13: 2004-2005 Academic Year, Spring Semester

Some Examples of Some Examples of Connections and SpeedsConnections and Speeds

Speed of connection is measured Speed of connection is measured through bits per second.through bits per second.

Page 14: 2004-2005 Academic Year, Spring Semester

Carrier Technology Description Speed* Physical Medium

Dial-up Access On demand access using a modem and regular telephone line.

2400 bps to 56 Kbps Twisted pair (regular phone lines)

ISDN Dedicated telephone line and router required.

64 Kbps to 128 Kbps Twisted pair

Cable Special cable modem and cable line required.

512 Kbps to 10 Mbps Coaxial cable; in some cases telephone lines used for upstream requests.

ADSLAsymmetric Digital Subscriber Line

This technology uses the unused digital portion of a regular copper telephone line (i.e. your fax line) to transmit and receive information. ADSL is asymmetric since it recieves at 6 to 9 Mbps per second but can only send data at between 16 to 640 Kbps. A special modem and adapter card are required.

128 Kbps to 9 Mbps Twisted pair (used as a digital, broadband medium)

Page 15: 2004-2005 Academic Year, Spring Semester

Carrier Technology Description Speed* Physical Medium

Wireless (LMCS) Access is gained by connection to a high speed cellular like local multi-point communications system (LMCS) network via wireless transmitter/receiver.

2 Mbps or more Airwaves Requires outside

antenna.

Satellite The computer sends request for information to an ISP via normal phone dial-up communications and data is returned via high speed satellite to rooftop dish, which relays it to the computer via a decoder box.

400 Kbps Airwaves Requires outside

antenna.

Frame Relay Provides a type of "party line" connection to the Internet.

Requires a FRAD (Frame Relay Access Device) similar to a modem, or a DSU/CSU.

56 Kbps to 1.544 Mbps

Various

Page 16: 2004-2005 Academic Year, Spring Semester

Carrier Technology Description Speed* Physical Medium

Fractional T1 (Flexible DS1)

Only a portion of the 23 channels available in a T1 line is actually used.

64 Kbps to 1.544 Mbps

Twisted-pair or coaxial cable

T1 Special lines and equipment (DSU/CSU and router) required.

1.544 Mbps Twisted-pair, coaxial cable, or optical fiber

T3 Typically used for ISP to Internet infrastructure.

44.736 Mbps Optical fiber

OC-1 Typically used for ISP to Internet infrastructure within Internet infrastructure.

51.84 Mbps Optical fiber

OC-3 Typically used for large company backbone or Internet backbone.

155.52 Mbps Optical fiber

Page 17: 2004-2005 Academic Year, Spring Semester

Connection of NetworksConnection of Networks

GatewayGateway A device that connects two dissimilar networks.A device that connects two dissimilar networks.

If you want to connect a ATM network to a ISDN use If you want to connect a ATM network to a ISDN use GatewayGateway

BridgeBridge A device that connects LANs, of the same type.A device that connects LANs, of the same type.

RouterRouter A device that connects several networks. A router A device that connects several networks. A router

is smart enough to pick the right path for is smart enough to pick the right path for communications traffic. If there is a partial failure communications traffic. If there is a partial failure of the network, a router looks for an alternate of the network, a router looks for an alternate route. route.

Page 18: 2004-2005 Academic Year, Spring Semester

Some Network ServersSome Network Servers File ServerFile Server

Serves only files. Has huge amount of disk space.Serves only files. Has huge amount of disk space. If you request something from this server, it sends the If you request something from this server, it sends the

file.file. Client ServerClient Server

Serves processing power. Has huge amount of Serves processing power. Has huge amount of memory and very powerful processors.memory and very powerful processors.

If you request something from this server, it sends the If you request something from this server, it sends the result to your screen.result to your screen.

Web ServerWeb Server Has specialized software for serving web pages.Has specialized software for serving web pages. Has very fast disks, big memory, fast internet Has very fast disks, big memory, fast internet

connection.connection. If it server dynamic web pages, should have fast If it server dynamic web pages, should have fast

processor.processor.

Page 19: 2004-2005 Academic Year, Spring Semester

The InternetThe Internet Internet is the collection of the different Internet is the collection of the different

networks. Internet has started in 1969 as networks. Internet has started in 1969 as a military project for reliable and secure a military project for reliable and secure form of communication for the possibility form of communication for the possibility of nuclear war. It expanded in 1970s for of nuclear war. It expanded in 1970s for researchers and scientists to researchers and scientists to communicate their ideas and interests communicate their ideas and interests with their long-distance colleagues. with their long-distance colleagues. Starting from the end of 1980s, it has Starting from the end of 1980s, it has been developing very fast. been developing very fast.

Homework:Homework: Read and check related links at Read and check related links at

http://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internet Read “A brief history of the Internet” from Read “A brief history of the Internet” from

httphttp://www.isoc.org/internet/history/://www.isoc.org/internet/history/

Page 20: 2004-2005 Academic Year, Spring Semester

Possible Usages of the Possible Usages of the InternetInternet

The good:The good: The World Wide WebThe World Wide Web Remote accessRemote access CollaborationCollaboration File-sharingFile-sharing Cultural awarenessCultural awareness

And the bad:And the bad: Child abuseChild abuse Copyright infringementCopyright infringement VirusesViruses Security crackingSecurity cracking Dated technologyDated technology Self-destructive subculturesSelf-destructive subcultures

Page 21: 2004-2005 Academic Year, Spring Semester

The Domain Name System : The Domain Name System : DNS!DNS!

The unique name that identifies an The unique name that identifies an Internet site. Domain Names always Internet site. Domain Names always have 2 or more parts, separated by have 2 or more parts, separated by dots. The part on the left is the most dots. The part on the left is the most specific, and the part on the right is specific, and the part on the right is the most general. For example:the most general. For example: Nasa.govNasa.gov Stanford.eduStanford.edu Bilkent.edu.trBilkent.edu.tr Garanti.com.trGaranti.com.tr

Page 22: 2004-2005 Academic Year, Spring Semester

The Domain Name The Domain Name SystemSystem

ConsiderConsiderwww.bcc.bilkent.edu.trwww.bcc.bilkent.edu.tr

www:www: is the server’s name.is the server’s name.

bccbcc: is a subdomain.: is a subdomain.

bilkentbilkent: is the domain name.: is the domain name.

eduedu: domain suffix.: domain suffix.

trtr: is the country (tr suffix is controlled : is the country (tr suffix is controlled by only METU). by only METU).

Page 23: 2004-2005 Academic Year, Spring Semester

Country SuffixesCountry Suffixes

http://ftp.ics.uci.edu/pub/websoft/http://ftp.ics.uci.edu/pub/websoft/wwwstat/country-codes.txtwwwstat/country-codes.txt .tr: Turkey.tr: Turkey .uk: United Kingdom.uk: United Kingdom .us: United States (but nearly no sites .us: United States (but nearly no sites

have .us in USA, why?)have .us in USA, why?) .fr: France.fr: France .de: Germany.de: Germany .tv: Tuvalu (www.mtv.tv etc.) (why?).tv: Tuvalu (www.mtv.tv etc.) (why?)

Page 24: 2004-2005 Academic Year, Spring Semester

TuvaluTuvalu

Page 25: 2004-2005 Academic Year, Spring Semester

Domain SuffixesDomain Suffixes AERO Air-transport industryAERO Air-transport industry BIZ BusinessesBIZ Businesses COM Unrestricted (but intended for commercial registrants)COM Unrestricted (but intended for commercial registrants) COOP CooperativesCOOP Cooperatives EDU Educational institutionsEDU Educational institutions GOV GovernmentGOV Government INFO Unrestricted useINFO Unrestricted use INT Organizations established by international treaties INT Organizations established by international treaties

between governmentsbetween governments MIL MilitaryMIL Military MUSEUM MuseumsMUSEUM Museums NAME For registration by individualsNAME For registration by individuals NET Unrestricted (but intended for network providers, etc.)NET Unrestricted (but intended for network providers, etc.) ORG Unrestricted (but intended for organizations that do not ORG Unrestricted (but intended for organizations that do not

fit elsewhere) fit elsewhere) PRO Accountants, lawyers, physicians, and other professionalsPRO Accountants, lawyers, physicians, and other professionals

Page 26: 2004-2005 Academic Year, Spring Semester

Domain Suffixes (Turkey)Domain Suffixes (Turkey)

Homework: find all the domain Homework: find all the domain names at Turkish .tr suffix, with who names at Turkish .tr suffix, with who can apply for it., restrictions, and can apply for it., restrictions, and yearly fees.yearly fees.

Page 27: 2004-2005 Academic Year, Spring Semester

IPIP

IP is Internet Protocol.IP is Internet Protocol. Every computer connected to the Every computer connected to the

Internet should have an IP address.Internet should have an IP address. The IP address of The IP address of

Bilkent University web page is Bilkent University web page is 139.179.10.16139.179.10.16

Mtv’s web site is 217.147.241.192Mtv’s web site is 217.147.241.192 Computer Science Department’s Computer Science Department’s

secretery’s machine is: 139.179.21.51...secretery’s machine is: 139.179.21.51...

Page 28: 2004-2005 Academic Year, Spring Semester

Back To DNSBack To DNS

Each computer can be associated with a Each computer can be associated with a name.name.

Each computer must have a IP address.Each computer must have a IP address. Internet works on IP protocol. How do I Internet works on IP protocol. How do I

know which computer has which IP?know which computer has which IP? DNS Servers tell you that!DNS Servers tell you that! www.mtv.tv www.mtv.tv DNS Server DNS Server

217.147.241.192 217.147.241.192 Go to Go to 217.147.241.192217.147.241.192

Page 29: 2004-2005 Academic Year, Spring Semester

EmailEmail Electronic MailElectronic Mail [email protected]@bilkent.edu.tr [username]@[domain][username]@[domain] DNS Server of [domain], tells to your DNS Server of [domain], tells to your

mail server which server to drop the mail server which server to drop the mails.mails.

POP3: protocol to POP3: protocol to

get your mailsget your mails SMTP: protocol to SMTP: protocol to

deliver your mailsdeliver your mails

Page 30: 2004-2005 Academic Year, Spring Semester

Email FieldsEmail Fields To: To: write the full email address of the recipientwrite the full email address of the recipient CcCc: (carbon copy) other recipients 1 or more : (carbon copy) other recipients 1 or more

(each email is separated by comma or (each email is separated by comma or semicolon from the next - each recipient will semicolon from the next - each recipient will see the emails of the others)see the emails of the others)

BccBcc: (blind carbon copy) other recipients in the : (blind carbon copy) other recipients in the list will not be seen by others) list will not be seen by others)

SubjectSubject: Subject of the e-mail goes here. : Subject of the e-mail goes here.

Page 31: 2004-2005 Academic Year, Spring Semester

Common Email ActionsCommon Email Actions

reply allreply all: Your reply to the message : Your reply to the message goes to all recipients in from and cc goes to all recipients in from and cc fields.fields.

replyreply: Your reply to the message : Your reply to the message goes to the recipient in goes to the recipient in fromfrom field. field.

forwardforward: To forward the e-mail to : To forward the e-mail to others.others. Do not do SPAM!Do not do SPAM! Read http://www.spam.org.trRead http://www.spam.org.tr

Page 32: 2004-2005 Academic Year, Spring Semester

Ways of E-mailWays of E-mail

Web BasedWeb Based mail.yahoo.commail.yahoo.com www.hotmail.comwww.hotmail.com www.gmail.comwww.gmail.com https://charon.bcc.bilkent.edu.tr/basilixhttps://charon.bcc.bilkent.edu.tr/basilix

POP3 BasedPOP3 Based E-mail clientsE-mail clients

Pine: login to your unix account, type pine, and your Pine: login to your unix account, type pine, and your Bilkent mails are there.Bilkent mails are there.

Outlook Express, Office Outlook, The Bat, EudoraOutlook Express, Office Outlook, The Bat, Eudora

Page 33: 2004-2005 Academic Year, Spring Semester

Remote Connection: Remote Connection: TelnetTelnet

Telnet is an application program that allows Telnet is an application program that allows remote log in to computer systems on the remote log in to computer systems on the Internet. By Telnet, a user can remotely Internet. By Telnet, a user can remotely contact any e-mail account or even contact contact any e-mail account or even contact Internet resources.Internet resources. HostnameHostname: you will supply a server name or full : you will supply a server name or full

domain name for this field.domain name for this field. UsernameUsername: you will type your username.: you will type your username. PasswordPassword: you will type your password here but : you will type your password here but

it will be displayed in the form of astrixes (*****).it will be displayed in the form of astrixes (*****).

After entering to the system you can just After entering to the system you can just run that operating system's commands.run that operating system's commands.

Page 34: 2004-2005 Academic Year, Spring Semester

File Transfer Protocol: File Transfer Protocol: FTPFTP

One of the most common uses of computer to One of the most common uses of computer to computer communications is to transfer files. computer communications is to transfer files.

Programs that manage this process include many Programs that manage this process include many file management features. Such a program will file management features. Such a program will also handle the process of connecting to the also handle the process of connecting to the other computer such as a FTP Server. other computer such as a FTP Server.

Many of the names of these programs include the Many of the names of these programs include the letters letters FTPFTP, which stands for File Transfer , which stands for File Transfer Protocol.Protocol.

DownloadingDownloading means to transfer a file to your means to transfer a file to your computer from elsewhere.computer from elsewhere.

UploadingUploading means to transfer a file from your means to transfer a file from your computer to another.computer to another.

Transfer TypesTransfer Types: ASCII, Binary : ASCII, Binary

Page 35: 2004-2005 Academic Year, Spring Semester

Web Browser and WWWWeb Browser and WWW World Wide Web is a technology based upon hypertext World Wide Web is a technology based upon hypertext

which means that selected words in the text can forward which means that selected words in the text can forward the user to other locations in the WWW. These words are the user to other locations in the WWW. These words are links to other documents which may take the form of text, links to other documents which may take the form of text, images, movie or sound files.images, movie or sound files.

Browsers are software/program whose role is to present Browsers are software/program whose role is to present information resources on the Internet into a format with information resources on the Internet into a format with the capability of displaying graphical images, movies, and the capability of displaying graphical images, movies, and sound as well as text.sound as well as text.

In its simplest form, a browser such as Internet Explorer In its simplest form, a browser such as Internet Explorer or Firefox will read a “page” or file from a server which is or Firefox will read a “page” or file from a server which is stored in a special format called stored in a special format called HTMLHTML. This format allows . This format allows text, image, movie and sound files to appear in side-by-text, image, movie and sound files to appear in side-by-side. Thus, when directing or “pointing” a browser to a side. Thus, when directing or “pointing” a browser to a certain “page”, the browser automatically decodes its certain “page”, the browser automatically decodes its HTML commands, including the text and images, and then HTML commands, including the text and images, and then presents them on the computer screen.presents them on the computer screen.

Page 36: 2004-2005 Academic Year, Spring Semester

Hypertext Transfer Hypertext Transfer Protocol: HTTPProtocol: HTTP

Hyper Text Transfer Protocol is the Hyper Text Transfer Protocol is the standard protocol or language that standard protocol or language that allows hypertext information to be allows hypertext information to be transferred between computers on the transferred between computers on the Internet. Internet.

Hypertext is the basis for “linking” Hypertext is the basis for “linking” documents to one another and then documents to one another and then navigating with the aid of a WWW navigating with the aid of a WWW browser program. Hypertext allows the browser program. Hypertext allows the reader to move easily from one reader to move easily from one document to another via a hyperlink. document to another via a hyperlink.

Page 37: 2004-2005 Academic Year, Spring Semester

HyperlinkHyperlink The unique feature of hypertext, a The unique feature of hypertext, a

hyperlink is simply a special word, hyperlink is simply a special word, phrase, or object that takes the reader to phrase, or object that takes the reader to another page. another page.

A text hyperlink is denoted by a different A text hyperlink is denoted by a different color. In many browsers, the hyperlink is color. In many browsers, the hyperlink is underlined and blue in color. Once the underlined and blue in color. Once the mouse pointer is moved onto a mouse pointer is moved onto a hyperlink, the pointer arrow changes hyperlink, the pointer arrow changes into a hand which means that it into a hand which means that it acknowledges the hyperlink. acknowledges the hyperlink.

Page 38: 2004-2005 Academic Year, Spring Semester

Unified Resource Unified Resource Locator: URLLocator: URL An acronym for Uniform Resource Locator, a URL is An acronym for Uniform Resource Locator, a URL is

a form of address or, more specifically, the a form of address or, more specifically, the description of the location for a resource on the description of the location for a resource on the Internet. It is also referred to as a Location, or Internet. It is also referred to as a Location, or simply a WWW address.simply a WWW address.

http://www.bilkent.edu.tr/~ussakli/index.htmlhttp://www.bilkent.edu.tr/~ussakli/index.html http:// http:// protocol name. protocol name. www.bilkent.edu.tr www.bilkent.edu.tr domain name domain name /~ussakli /~ussakli folder name in the domain. folder name in the domain. /index.html /index.html the file name to open in the domain. the file name to open in the domain.

BookmarkBookmark is a browser function that keeps a link to is a browser function that keeps a link to desired pages. To make a bookmark, simply find the desired pages. To make a bookmark, simply find the desired web site and click on Bookmarks|Add desired web site and click on Bookmarks|Add Bookmark and the site is stored in the bookmark file. Bookmark and the site is stored in the bookmark file. To return to a bookmarked location, simply click on To return to a bookmarked location, simply click on Bookmarks and select the bookmark to return to.Bookmarks and select the bookmark to return to.

If an address starts with If an address starts with httpshttps: (HyperText Transfer : (HyperText Transfer Protocol, Secure.) then it is a good indication that Protocol, Secure.) then it is a good indication that information transfers are secure.information transfers are secure.

Page 39: 2004-2005 Academic Year, Spring Semester

Some ProtocolsSome Protocols

Http: Hypertext transfer protocolHttp: Hypertext transfer protocol Ftp: File transfer protocolFtp: File transfer protocol Email: (opens your e-mail program)Email: (opens your e-mail program) Gopher: Gopher is a Client and Gopher: Gopher is a Client and

Server style program’s protocol.Server style program’s protocol. News: (opens your news reader)News: (opens your news reader)

Page 40: 2004-2005 Academic Year, Spring Semester

Search EnginesSearch Engines Due to the increasing amount of information on the Due to the increasing amount of information on the

World Wide Web, universities and companies have World Wide Web, universities and companies have constructed search engines which enable the user constructed search engines which enable the user to locate indexes according to subject, author, to locate indexes according to subject, author, dates, titles, or simply keywords.dates, titles, or simply keywords.

Some engines search titles or headers of Some engines search titles or headers of documents, others search the documents documents, others search the documents themselves, and still others restrict their search to themselves, and still others restrict their search to only indexes and/or directories.only indexes and/or directories.

Most used search engines: Most used search engines: www.google.comwww.google.com search.msn.comsearch.msn.com www.yahoo.comwww.yahoo.com www.altavista.comwww.altavista.com

Page 41: 2004-2005 Academic Year, Spring Semester

End of LessonEnd of Lesson

But!But! I asked you what was Kibi Byte, Mebi I asked you what was Kibi Byte, Mebi

Byte, Gibi Byte.Byte, Gibi Byte. Actually the term Actually the term kilo kilo in kilobyte means in kilobyte means

1000 bytes1000 bytes. But it actually represents 1024 . But it actually represents 1024 bytes. In order to clearify the difference bytes. In order to clearify the difference between 1024 and 1000, it’s proposed to between 1024 and 1000, it’s proposed to use kibi for 1024 and use kilo for 1000 use kibi for 1024 and use kilo for 1000 bytes. Will we use kibi instead of kilo in the bytes. Will we use kibi instead of kilo in the future? Who knows?future? Who knows?

Page 42: 2004-2005 Academic Year, Spring Semester

Homework (%5)Homework (%5)1.1. Name 2 Peer to Peer networks.Name 2 Peer to Peer networks.2.2. Read and check related links at http://en.wikipedia.org/wiki/InternetRead and check related links at http://en.wikipedia.org/wiki/Internet3.3. Read “A brief history of the Internet” from http://www.isoc.org/internet/history/Read “A brief history of the Internet” from http://www.isoc.org/internet/history/4.4. List 10 web page addresses and do the following decompositon.List 10 web page addresses and do the following decompositon.

http://www.bilkent.edu.tr/~ussakli/index.htmlhttp://www.bilkent.edu.tr/~ussakli/index.html http:// http:// protocol name. protocol name. www.bilkent.edu.tr www.bilkent.edu.tr domain name domain name /~ussakli /~ussakli folder name in the domain. folder name in the domain. /index.html /index.html the file name to open in the domain. the file name to open in the domain.

5.5. Send a e-mail to me with the topic “Homework Question 5” and your name and Send a e-mail to me with the topic “Homework Question 5” and your name and number at the body, of which I cannot see who you send the mail to. (so my number at the body, of which I cannot see who you send the mail to. (so my outlook will say Undisclosed recipients at to: field of the mail I receive.)outlook will say Undisclosed recipients at to: field of the mail I receive.)

6.6. Search and find five FTP Client Programs and a FTP Server program using Search and find five FTP Client Programs and a FTP Server program using your favorite web search engine. (Do not just take the list from your friends.)your favorite web search engine. (Do not just take the list from your friends.)

7.7. Define the cycle of processing and state which computer hardware is used in Define the cycle of processing and state which computer hardware is used in the cycle of processing. Which stages do we store data, if we don’t store the the cycle of processing. Which stages do we store data, if we don’t store the data what happens?data what happens?

8.8. Give two reasons why today we start to have 64 bit processors(i.e. Athlon 64, Give two reasons why today we start to have 64 bit processors(i.e. Athlon 64, Itanium). Wasn’t 32 bit processor (i.e. Pentium 4, Athlon XP) enough for todays Itanium). Wasn’t 32 bit processor (i.e. Pentium 4, Athlon XP) enough for todays computing needs?computing needs?

9.9. What is a DVD and name and list the capacities of a DVD.What is a DVD and name and list the capacities of a DVD.

Submit your work to [email protected], Topic: ID Number Surname Name Submit your work to [email protected], Topic: ID Number Surname Name Homework 5.Homework 5.