Professional Documents
Culture Documents
Instant Download PDF Invitation To Computer Science 7th Edition Schneider Solutions Manual Full Chapter
Instant Download PDF Invitation To Computer Science 7th Edition Schneider Solutions Manual Full Chapter
https://testbankfan.com/product/invitation-to-computer-
science-7th-edition-schneider-test-bank/
https://testbankfan.com/product/invitation-to-computer-
science-6th-edition-schneider-solutions-manual/
https://testbankfan.com/product/invitation-to-computer-
science-6th-edition-schneider-test-bank/
https://testbankfan.com/product/invitation-to-psychology-7th-
edition-wade-solutions-manual/
Oceanography An Invitation to Marine Science 9th
Edition Garrison Solutions Manual
https://testbankfan.com/product/oceanography-an-invitation-to-
marine-science-9th-edition-garrison-solutions-manual/
https://testbankfan.com/product/invitation-to-psychology-7th-
edition-wade-test-bank/
https://testbankfan.com/product/oceanography-an-invitation-to-
marine-science-9th-edition-garrison-test-bank/
https://testbankfan.com/product/essentials-of-meteorology-an-
invitation-to-the-atmosphere-7th-edition-ahrens-solutions-manual/
https://testbankfan.com/product/invitation-to-health-17th-
edition-hales-solutions-manual/
Invitation to Computer Science, 7th Edition 7-1
Chapter 7
Computer Networks and Cloud Computing
A Guide to this Instructor’s Manual:
We have designed this Instructor’s Manual to supplement and enhance your teaching
experience through classroom activities and a cohesive chapter summary.
This document is organized chronologically, using the same headings that you see in the
textbook. Under the headings you will find: lecture notes that summarize the section, Teaching
Tips, Class Discussion Topics, and Additional Projects and Resources. Pay special attention to
teaching tips and activities geared towards quizzing your students and enhancing their critical
thinking skills.
In addition to this Instructor’s Manual, our Instructor’s Resources also contain PowerPoint
Presentations, Test Banks, and other supplements to aid in your teaching experience.
At a Glance
• Overview
• Teaching Tips and Quick Quizzes
• Class Discussion Topics
• Additional Projects
• Additional Resources
• Key Terms
© 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Invitation to Computer Science, 7th Edition 7-2
Lecture Notes
Overview
Chapter 7 introduces the concept of computer networks. It describes the different kinds of
networks, wired and wireless. It explains how local area networks, wide area networks, and the
Internet function. The chapter explains what a protocol is, and introduces the layers of protocol
hierarchy that make networks functions. These layers include the physical layer, the data link
layer, the network layer, the transport layer, and the application layer. For each layer the
chapter describes sample protocols, for example, TCP/IP and HTTP, among others. Finally the
chapter discusses the benefits and services we have come to take for granted, and a history of
the development of the Internet and the World Wide Web.
Teaching Tips
7.1 Introduction
1. The invention of the computer network has, and continues to have, a revolutionary
impact on society. Discuss possibilities from spread of information and commerce.
2. Introduce the term switched, dial-up telephone lines, which carry an analog signal. A
modem changes either the amplitude or frequency of a standard carrier wave to encode
ones and zeros. Bandwidth is the speed of transmission of the binary signal. Ask
students if they have ever had dial-up Internet service.
3. Introduce the term broadband, for high-speed network connections. Home connections
typically use either digital subscriber lines (DSL), or cable modems. Compare the
range of speeds with dial-up speeds, and note the asymmetric download versus upload
speeds. Commercial and institutional access uses dedicated lines: introduce the terms
Ethernet and Fast Ethernet. Discuss newer standards for gigabit networking,
including the gigabit Ethernet standard adopted by the IEEE (Institute of Electrical
and Electronics Engineers).
4. Introduce the term wireless data communication. Emphasize the new and growing
importance world wide of mobile computing. Introduce the term wireless local area
© 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Invitation to Computer Science, 7th Edition 7-3
network (WLAN), such as you might find in libraries or coffee shops. Other related
terms to introduce: Wi-Fi (Wireless Fidelity), IEEE 802.11 wireless network
standards, Wi-Fi hot spot, and metropolitan Wi-Fi. Describe two alternative wireless
systems: Bluetooth and wireless wide area network (WWAN).
5. Introduce the term local area network (LAN); LANs are centered on a single locality,
typically privately managed. LAN topologies are varied and important: e.g., bus, ring,
and star. LANs may be wired using a shared cable system, with a single cable strung
through a building. If distances are too great for a single cable, multiple cables
connected by a repeater or bridge implement the shared cable model. The alternative
uses a switch: a wiring closet connects each Ethernet jack to the switch, where the
shared cable resides.
6. Introduce the term wide area network (WAN); WANs are networks that span large
distances, and involve external providers. WANs use dedicated point-to-point lines
between computers, rather than shared lines. Introduce the term store-and-forward,
packet-switched technology as typical of WANs; packets of data are sent from node to
node. Internet service providers (ISPs) provide access to the Internet through their
WAN. Emphasize the hierarchy of layers of ISPs required to form the Internet.
Quick Quiz 1
1. Internet service with speeds greater than 256K Mbps is called ________________.
Answer: Broadband
2. (True or False) A Wi-Fi hot spot is when computers can connect to the Internet through
a nearby wireless base station that is wired to a network.
Answer: True
3. (True or False) Users need to use an Internet Service Provider to access a LAN.
Answer: False
4. Name a common topology for local area networks (LANs).
Answer: One of: star, bus, or ring
5. Most WANs use _________________ technology to transmit messages.
Answer: store-and-forward, packet-switched
Teaching Tip Encourage students to explore the website for the Internet Society.
www.isoc.org/internet
© 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Invitation to Computer Science, 7th Edition 7-4
2. Introduce the term Physical layer protocols. Emphasize the low level of these
protocols. The bulleted list at the start of the Physical Layer section (page 357) is an
important list to go over, highlighting an example for each. It might be instructive to
bring in some old cables to bring home to students that these standards change over
time.
3. The data link layer is responsible for error detection and correction and framing.
Introduce the term Medium Access Control protocols, which mediate which nodes can
use a shared line at a given time, and how collisions are handled. When connections are
point-to-point, Layer 2b protocols handle errors. Introduce the term Logical Link
Control protocols and the ARQ algorithm for this purpose. The ARQ algorithm
requires the receiver to check for errors in the transmitted packet, and to send an
acknowledgement message (ACK) if the packet has no errors.
4. Introduce the term Network layer protocols. These protocols control how message
pass across a network of computers: an agreed-upon addressing method for telling
where the destination is, and a process for finding a route from any node to any other.
Introduce the term IP (Internet Protocol), the current standard for the Internet.
Introduce the terms host names and IP addresses for human and machine addressing.
The Domain Name System (DNS) maps human-friendly host names to their IP
addresses. Introduce the term routing, and emphasize the complexity of network
routing tasks: networks can be huge, it must be done quickly, and networks are
constantly changing.
5. Introduce the term Transport layer protocols. These protocols control how to route
messages to specific applications running on a given computer. Introduce the term port
number, and show students the Assigned Numbers on the Internet for which port
numbers belong to which standard applications. Use the post office metaphor for
discussing the unreliability of the Network layer, and the use to TCP (Transport
Control Protocol) for making reliable message delivery.
© 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Invitation to Computer Science, 7th Edition 7-5
Quick Quiz 2
2. Introduce the term resource sharing, another service of the Internet: sharing of
physical and logical resources (printers, servers, software, and data). Introduce the
terms print servers and file servers. Discuss the importance of the client/server
computing model; where some nodes provide services and others are clients using the
services. A distributed database shares information across the Internet; a data
warehouse stores massive amounts of data. Introduce the terms groupware and wiki
for collaborative software (talk about the impact of Wikipedia).
3. Introduce the term Electronic commerce (ecommerce). Ask how often students use the
Internet for ecommerce. Talk about the globalization of the marketplace through e-
commerce.
1. Discuss the limitations of the client/server model (initial costs, operating costs,
upgrades, etc.).
2. Explain that with cloud computing servers can be located anywhere and do not need to
be maintained by the organization. Cloud-based servers can be part of an integrated
collection of servers, called a server farm. The term virtualization means the
separation of a service from the entity providing the service.
© 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Invitation to Computer Science, 7th Edition 7-6
3. Many types of cloud services exist, such as infrastructure services, application services,
and the most sophisticated, the platform and development services.
Refer students to the following page for the full “Brief History of the
Teaching Tip Internet” document referred to in the text:
http://www.isoc.org/internet/history/brief.shtml
2. In 1962, Licklider (at MIT) described “The Galactic Network.” Note how similar this
vision is to the modern Internet. Stress the importance of ARPA to early development,
and moving from theoretical ideas about protocols, packets, and routing to real systems.
ARPANET began in the late 1960s; email was developed in 1972 and grew quickly.
Other independent networks developed: HEPNet, CSNET, MFENet, SNA, and
DECNet.
3. Introduce the term internetworking, developed to bring order to the chaos of networks.
Any WAN can do what it wants internally, but must use standard addressing and
protocols for communication with other WANs. Introduce the term gateway, a device
for translating between WANs. TCP/IP was the agreed “language” for internetwork
communications. Was modified to work with LANs in the early 1980s. Introduce the
ideas of Telnet and FTP as additional applications. NSFNet was designed in mid 1980s
as an alternative to ARPANET, not restricted to military grantees.
4. Introduce the term World Wide Web, and discuss its origins as a user-friendly tool for
information sharing about high-energy physics. Introduce the term hypertext. Note the
importance of its usability and intuitive interface, easy integration of multimedia, and
the fact that its technology was made freely available initially.
2. How do the different layers of the protocol hierarchy interact with each other? Why do
we need to have two different layers that work on error detection and correction?
© 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Invitation to Computer Science, 7th Edition 7-7
3. What are some positives that have occurred with the development of the Internet and
the World Wide Web? What are some problems associated with these tools?
4. Name some ways in which computer network systems use the concept of abstraction to
make the task of building a functioning network feasible.
Additional Projects
1. Look up online information about the UDP transport level protocol. How does it differ
from TCP, and when is it used?
2. Form a group of students and act out the Medium Access Control protocol used by
shared-line Ethernet networks. Each student is a node in the network. Each student
should work out the answer to an arithmetic problem, and then should broadcast it by
speaking out loud. When two students speak at once, it’s a collision. Use the specified
collision recovery approach. How well does it work to ensure that each person gets to
communicate?
3. Research the meaning of the four groups of numbers in an IP address. What do they
mean? Why does a lab computer on campus have a certain set of numbers? How about a
computer off campus?
Additional Resources
1. A copy of an article by Licklider about his vision for human-computer interaction and
computer networks: ftp://gatekeeper.research.compaq.com/pub/DEC/SRC/research-
reports/SRC-061.pdf
Key Terms
Acknowledgement message (ACK): A network control message that says that your
message correctly arrived at its destination.
Application layer protocols: The rules for implementing the end-user services provided by
a network.
ARQ algorithm: Automatic repeat request algorithm, the basis for all data link control
protocols in current use.
Bandwidth: Capacity for transmitting data.
Blog: A web-based publication consisting of virtually any periodic articles that its writer(s)
wish to share with the general public.
© 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Invitation to Computer Science, 7th Edition 7-8
Gigabit networking: Transmission lines that support speeds of 1 billion bits per second
(Gbps).
Groupware: Software that facilitates the efforts of individuals connected by a network and
working on a single shared project.
Host name: The symbolic, character-oriented name assigned to a host computer.
Hypertext: A collection of documents interconnected by pointers, called links.
Hypertext Transfer Protocol (HTTP): The protocol used by the World Wide Web to
transfer pages of information coded in hypertext markup language (HTML).
IEEE (Institute of Electrical and Electronics Engineers): International professional
society responsible for developing industrial standards in the area of telecommunications.
IEEE 802.11 wireless network standards: Another name for Wi-Fi.
Internet: A huge, interconnected “network of networks” that includes nodes, LANs,
WANs, bridges, routers, and multiple levels of ISPs.
Internet forums: Support the real-time exchange of messages. In addition to simply
posting a message that can be read at a later time, they also support interactive messaging—
what the sender types appears immediately on the screen of one or more individuals,
allowing for the direct exchange of ideas.
Internet Service Provider (ISP): A business whose purpose is to provide access from a
private network (such as a corporate or university network) to the Internet, or from an
individual’s computer to the Internet.
Internet Society: A nonprofit, nongovernmental, professional society composed of more
than 100 worldwide organizations (e.g., foundations, governmental agencies, educational
institutions, companies) in 180 countries united by the common goal of maintaining the
viability and health of the Internet.
Internetworking: A concept first developed by Robert Kahn or ARPA, that any WAN is
free to do whatever it wants internally.
IP (Internet Protocol): The network layer in the Internet.
IP address: The 32-bit binary address that the Internet uses to actually identify a given host
computer.
Local area network (LAN): A network that connects hardware devices such as computers,
printers, and storage devices that are all in close proximity.
Logical link control protocols: Ensure that the message traveling across this channel from
source to destination arrives correctly.
Medium access control protocols: Determine how to arbitrate ownership of a shared line
when multiple nodes want to send messages at the same time.
Metropolitan Wi-Fi: Installing Wi-Fi routers every few blocks throughout a city to provide
convenient, low-cost wireless Internet access to all residents.
Mobile computing: The ability to deliver data to users regardless of their location.
Modem: A device that modulates, or alters, a standard analog signal called a carrier so that
it encodes binary information.
Network layer protocols: Ensure that a message is delivered from the site where it was
created to its ultimate destination.
Node: An individual computer on a network; also called a host.
Packet: An information block with a fixed maximum size that is transmitted through the
network as a single unit.
Physical layer protocols: Govern the exchange of binary digits across a physical
communication channel, such as a fiber-optic cable, copper wire, or wireless radio channel.
© 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Invitation to Computer Science, 7th Edition 7-10
© 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Invitation to Computer Science, 7th Edition 7-11
router, that is no more than a few hundred feet away. This base station is then connected to
a traditional wired network, such as a DSL or cable modem to provide full Internet access.
Wireless wide area network (WWAN): Nodes (often a table or smart phone) transmit
messages to a remote base station provided by a telecommunications company, which may
be located many miles away. The base station is usually a large cellular antenna placed on
top of a tower or building, providing both long-distance voice and data communication
services to any system within sight of the tower.
World Wide Web: The hypertext information system developed by Tim Berners-Lee at
CERN in the late 1980s.
© 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Another random document with
no related content on Scribd:
— Je ne suis pas un enfant, dit papa. Ce n’est pas toi qui te
seras renseigné, ce sera moi… Et d’ailleurs, je te garantis qu’ils n’en
sauront rien. Dis-moi seulement le nom…
— La maison Gaudron, de Caen. Elle a plus de cinquante ans
d’existence.
— C’est déjà une recommandation, dit papa… Voyons… il est
sept heures. Je saurai dans une demi-heure tout ce que j’ai besoin
de savoir. A condition, toutefois, que ces demoiselles du téléphone
veuillent bien y mettre de la complaisance…
— Louise, dit-il à la femme de chambre, demandez-moi
Gutenberg 22.64… Arthur, dit-il à Robert, est encore à son bureau.
Sa maison de banque est en relations avec tout ce qu’il y a
d’intéressant en Normandie.
— Papa est bien d’avis que je ne dois pas faire attendre mon
patron ?… J’ai un poste important dans la maison. Et j’ai dit que je
ne serais absent que deux jours…
— Ah non, dit maman, tu arrives ! Tu vas bien rester une semaine
avec nous. Tu n’as pas bonne mine, tu sais, mon garçon…
— Si on l’attend là-bas, dit papa, il ne faut pas plaisanter.
— D’ailleurs, je reviendrai dans très peu de jours. Caen n’est pas
au bout du monde.
Robert pensait : C’est vrai qu’il ne me sera pas impossible de
revenir de temps en temps passer quelques heures avec eux.
Papa fut appelé au téléphone… Il revint quelques minutes après.
— … Oui, la maison est sérieuse. Pas de premier ordre : on ne
dit cela que de trois ou quatre grandes banques. Mais enfin c’est
assez bon… on peut même dire : bon…
— Tu me conseilles toujours, papa, de partir demain ?
— C’est ridicule, dit maman.
— Il ne faut pas mécontenter son patron, dit papa.
— Alors, dit Robert, je prendrai le train de Cherbourg, qui est, je
crois, à 1 h. 30.
— Je reviendrai déjeuner avec vous, dit papa.
— C’est décidément plus sage de s’en aller, dit encore Robert…
Il était soulevé de bonheur. Il fut d’une gaieté folle pendant tout le
dîner.
On déjeuna le lendemain avant midi. Papa partit ensuite avec
Robert. Il le quitta à la gare Saint-Lazare, car on l’attendait au
bureau. Et le train de la ligne de Cherbourg ne partait qu’une demi-
heure après.
Robert était installé dans son compartiment quand il aperçut tout
à coup, courant sur le quai, sa sœur Jenny… Elle tenait à la main un
télégramme…
— Voici une dépêche qui vient d’arriver pour toi ! dit Jenny tout
essoufflée. Nous avons pris sur nous, maman et moi, de l’ouvrir, et
je crois que nous avons bien fait. Je me suis procuré une auto et je
te réponds qu’elle a rudement marché pour venir directement à la
gare.
La dépêche disait :
Gaudron.
FIN
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must, at
no additional cost, fee or expense to the user, provide a copy, a
means of exporting a copy, or a means of obtaining a copy upon
request, of the work in its original “Plain Vanilla ASCII” or other
form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using
the method you already use to calculate your applicable
taxes. The fee is owed to the owner of the Project
Gutenberg™ trademark, but he has agreed to donate
royalties under this paragraph to the Project Gutenberg
Literary Archive Foundation. Royalty payments must be paid
within 60 days following each date on which you prepare (or
are legally required to prepare) your periodic tax returns.
Royalty payments should be clearly marked as such and
sent to the Project Gutenberg Literary Archive Foundation at
the address specified in Section 4, “Information about
donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.