Microcomputer Systems 810:023 Spring 2007


Final Exam Study Guide and list of topics.
See you at 10 a.m. Monday


Two links to LOGO turtle graphics examples, tutorials and where to download the one we downloaded in the Studio 2 class.

  1. logo.html includes the Friday lab examples.

  2. http://cns2.uni.edu/~jacobson/logo/ includes other examples and link to LOGO 1 is for MSWLogo download via the Setup Kit.

Email submission assignment on Vigenere ciphertext cracking with a Java Applet: Decipher this ciphertext and drop jacobson@cns.uni.edu proof you "cracked" it.

VIP: Quiz number 6 and class in NOT in Wright 112 lab. Its in Studio 2.


VIP Note: Assignment due on Monday, April 9th about Sending and Receiving E-Mail with SMTP and POP.

Vigenere cipher method of encrypting plaintext to ciphertext. Please do the suggested exercise and send me email to show that you decrypted the message. jacobson@cns.uni.edu

Flash examples from Studio 2 hands-on classes.

  1. Assignment due on Monday, April 9th about Sending and Receiving E-Mail with SMTP and POP.

  2. VIP for QUIZ 5: CRC example explained in detail.

    CRC Do Questions 1 and 2: CRC Practice Questions. Be sure to do these to practice the CRC concept and ensure you get the correct 4 redundancy bits!

    CRC example 1 and an additional solved CRC with CRC example 2

  3. Due on Friday and included on the quiz on Monday 04/02. We did this DOS or Command prompt material on 03/23 in WRT 112 lab class. We also made a BATCH file. Input and Output redirection and Pipes. You will be given the syntax for an Command Prompt commands you need to use to answer a question.

  4. SCANNERS: Scanners PowerPoint presentation published to web. How scanners work, etc. What is interpolation? How does it relate to Resolution? What are the 5 essential characteristics for scanners? Note: The color or black or white issues is probably a non-issue in 2007! So there are only FOUR essential characteristics to know.

  5. Secret Key encryption and Caesar ciphers.

    What are the two different types of encryption?

       Substitution:    PANTHERS becomes encrypted as SDQWKHUV with key = 3
                                                               Caesar cipher.
    
       Substitution:    PANTHERS
                        QBOUIFST
                        RCPVJGTU
                        SDQWKHUV <------- with key = 3
    
    
       Substitution:    PANTHERS is the plaintext and
                        SDQWKHUV is the ciphertext.
    
       Transposition:   PANTHERS becomes TSNRAEPH 
    
       Transposition:   PANTHERS becomes TSNRAEPH 
                        12345678         48372615
     
                        as the orgiginal message is scrambled and rearranged.
                        All the characters (letters) are the same,
                        but they are out of order, so the message is
                        encrypted and disgquised that way.
    
       Transposition:   PANTHERS is the plaintext and 
                        TSNRAEPH is the ciphertext.
    
    Caesar cipher encryption of Panthers by 25 different keys.

  6. Quiz #5 on Monday, April 2nd (in regular classroom).


We have StudioIT 2 reserved on the following dates and times:

   April  4th from 9-11am - Wednesday
   April  6th from 9-11am - Friday
   April 13th from 9-11am - Friday
   April 16th from 9-11am - Monday

   810:021  9 MWF   http://www.cns.uni.edu/~jacobson/c021.html

   810:023 10 MWF   http://www.cns.uni.edu/~jacobson/c023.html

Flash examples for and from Wednesday 03/21 class.

Class in Studio IT 2 (room 136 of ITTC) on Wednesday 03/21

Up just one floor from our classroom.

Class in WRT 112 lab on Friday 03/23

Class in Studio IT 2 on Monday 03/26


Secret Key encryption and Caesar ciphers.

QUIZ FOUR: Quiz Four Topics, SABIN 227 Friday class announcement (Friday, March 2nd lab).


The Filter, Forward, Flood Switch Table group exercise SOLUTION. You have this as a handout from the Wednesday, February 28th class. It was done as a group exercise. If you think you find any mistakes in the solution, please email me.

Friday, 2/23 Switches and Bridges using GIMP to diagram the difference between a Switch forwarding, filtering and flooding a received packet.

switch =  Network device that filters, forwards, and floods frames based 
          on the destination address of each frame. The switch operates 
          at the data link layer of the OSI model.   

          Filter frame or Forward frame or Flood frame
Updated graphic: Switches and Bridges and frame Filter (RED), frame Flood (BLUE) or frame Forward (PURPLE).
Bridges and Switches additional material. Good explanations from previous semesters.
Midterm gradebook, but without the HW entered yet.


Carrier Sense Multiple Access/Collision Detection assignment. Due on 2/28/Wednesday...

Here is an old note about CSMA/CD and repeaters and segments too.

QUIZ FOUR ON WEDNESDAY March 7th - the Monday, February 26th class covered the EFERA material. We will continue with Error detection, which is the 2nd E in EFERA acronym. The CSMA/CD versus CSMA/CA homework relates to the A in EFERA, for Access Control.

Hamming codewords for Error Detection and Error Correction. Compare to even and odd parity (error detection). Compare to CRC = Cyclic Redundancy Check error detection/correction.



CSMA/CD: Previous semester's email note about Carrier Sense Multiple Access / Collision Detection.

Subnet Masks and IP numbers.


There are 5 issues to consider when connecting two nodes or computers with some media like cable. They are EFERA.
Encoding, Framing, Errors, Reliability and Access are E, F, E, R, A.
Encoding
Encoding the digital data on the signals that the analog media can transmit, and decoding it back to the digital binary pattern when received.
Framing
Sentinel approach and byte count approach to know the end of a frame. Detecting the exact start of a frame is the other issue. "Not me" and "Mine" example.
Error detection
Even and odd parity. Hamming codewords. CRC (Cyclic Redundancy Check)
Reliable delivery
Sliding windows. Timers and ACKs. Automatic resend after timer goes off if no ACK from destination host.
Access control
CSMA/CD we have already studied. The CSMA/CA and token passing we have yet to study, but will look at them later on.

sunny.uni.edu and chmod and octal and Unix review of Valentines Day class.
Quiz #3 is on Friday. UPDATED 02/07 due date
ASSIGNMENT: 3 more questions, from section 1.2 of the book.
  1. The homework due date will be extended until Monday, February 12th. If I receive any questions about the Jeanna Matthews homework (and I mean specific questions, good enough to find some hints or answer even if I do NOT have my textbook with me), I will post resources or hints on the web site. Be sure to use www.google.com if you need to, for trying to answer questions that do not seem to have enough background in the textbook.

    What is a datagram? First link on www.google.com search gives:

    1. datagram definition (usually used for UDP), contrasted to packet definition (usually used for TCP).

    2. UDP and datagrams. What services does UDP provide that the IP layer does not?

    3. What is a packet, and how does it differ from a datagram?

    4. Learn more about TCP and why it is more reliable than UDP.

    5. Wikipedia link to User DATAGRAM Protocol, aka UDP is the TLA for User Datagram Protocol.


    What do these UDP and IP and TCP headers look like?

    1. Here is UDP format and here is another UDP format and explanation.

    2. TCP header format by freesoft, and TCP header format by networksorcery, and finally the CISCO version of TCP header formats.

    3. The format of IP packets for the IP layer is at: www.cisco.com site.

  2. Subnets, IP numbers, NIC addresses: Base two and base ten and binary. Multiplying by 10 or 100 or 1000 or 10,000is soooooooooo easy, whether in decimal OR in binary! Multiply by 2 or 4 or 8 or 16 is a cinch in binary.

  3. Click to see Subnet Mask concepts illustrated using Excel and Photoshop. Study in conjunction with your review of Quiz One and network 191.202.0.0 with its subnet mask of 255.255.224.0 allowing up to 8 different subnets.

    Another version Subnet Mask emphacizing different concepts. The Tuesday evening email explanation of the two IP and subnet masking illustrations.


  4. The sunny.uni.edu account for all of those in 810:023. If you missed that class, it should explain enough to bring you up to speed. If you were at that class, and you want to get the software so you can play with or work on sunny.uni.edu from home, it explains that too.

  5. The ABCs of TCP/IP should help you to better understand the lectures and the Jeanna Matthews textbook exercises and capture files.

  6. Monday, February 5th quiz one question two review is an excellent preparation for quiz two.

  7. Protocol stack Do Not Throw layers matched to MAC addresses, IP numbers and Port numbers.


  8. Assignment due on February 7th is Page 14 Questions from the Jeanna Matthews book. Also Sabin 227 announcement for February 9th lab.

    UPDATED 02/07 due date ASSIGNMENT: 3 more questions, from section 1.2 of the book.


  9. Week #3 readings (January 22nd and 24th) are one on binary subnet mask values and another on binary basics and IP numbers and subnetting, with class A, class B, and class C information. We'll cover this on Friday 01/26 in reviewing for the Monday 01/29 quiz.

  10. Legal Subnet mask values for x, or y or z depending on class A or B or C. Recall that w.x.y.z is the way we refer to IP numbers in dotted decimal notation. Each letter w or x or y or z represents on octet of 8 bits.

  11. PowerPoint Slides: IP addressing, subnet masks and IP numbers.

  12. Please Do Not Throw Sausage Pizza Away and the SEVEN layers of the OSI Networking Model.


Quiz Schedule. Monday, January 29th is the first quiz.

Capture files to play with for ethereal.

January 12th lab questions.

Ethereal capture file from CEEE.

  june21st2004B.eth  june22nd2004.eth

Networking terms and concepts - This LAN is your LAN. This LAN in my LAN folksong lyrics by Woody Guthrie.

Spring 2007 course reviews/previews


  1. Here is Binary (base two) along with some information on Hexadecimal (base 16), Octal (base 8) and our good friend, decimal (base ten).

  2. Class #1 (Monday, January 9th) handouts are one on binary subnet mask values and another on binary basics and IP numbers and subnetting, with class A, class B, and class C information. We'll cover this in classes 2 and 3.

  3. PowerPoint Slides: IP addressing, subnet masks and IP numbers.

    Slides: Chapter 11 IP, subnet masks for OLDER BROWSERS and CEEE lab.



The Spring 1999 web page, the Spring 2000 page, Spring 2001 810:023 page, Spring 2002 810:023 page, Spring 2003 810:023 web page, Spring 2004 810:023 web page, Spring 2005 810:023 web page and the Spring 2006 810:023 web page all are useful to see what kinds of topics are covered in this class. Keep in mind, the rate of change for networks, PCs and operating systems means the class will change quite a bit in response.

Grades for quiz one and quiz two. Reminder: Quiz three on Friday, February 16th in ITTC 27/28 classroom.