Introduction to Computing Environments
Introduction to Computing Environments E 115
Popular in Course
Popular in Engineering and Tech
This 3 page Class Notes was uploaded by Harrison Welch on Thursday October 15, 2015. The Class Notes belongs to E 115 at North Carolina State University taught by Staff in Fall. Since its upload, it has received 9 views. For similar materials see /class/223868/e-115-north-carolina-state-university in Engineering and Tech at North Carolina State University.
Reviews for Introduction to Computing Environments
Report this Material
What is Karma?
Karma is the currency of StudySoup.
Date Created: 10/15/15
nClass 2 Fall 2008 Campus Resource and Computing Basics Ob39ectives Investigate the clientserver relationship Discuss the Virtual Computing Lab Discover how programs and users from one machine can have access to resources on another machine Discuss different protocols used in remote access as well as displaying these over network connections To define what exactly constitutes a network in terms of medium hardware and topology Premise Up until now we have discussed computer use as it pertains to our local resources that is resources available in person However there is a vast amount of computing especially in the background ofthis campusthat is done remotely ie not at the computer in which the user is operating How is this done What methods does the user employ to remotely use another computer39s resources Even more basic then that what exactly is a network In this lecture we will discuss how we can deliver resources of one computer to another through the use of these networks We will then discuss what comprises a network from hardware to the translation of data from computer to computer nClass 2 Fall 2008 Networks no matterthe configuration or range must be made out of physical connections We call these connections mediums Answerthe following questions concerningthe different mediumsthrough which networkstravel 1 What are two other names for an 39ethernet cable Network Hardware After we lay the cords and configure the mediums in which our network can travel we have to have central quothubsquot of hardware in which to bridge our networks and computers These pieces of hardware can take all shapes and sizes and come in varying levels of security 2 Between a hub and a switch which has more control overwho receives data Network Topology Overall a network is organized into some physical divisions We call this division topology Through different arrangements of our network mediums and hardware we can achieve different levels of reliability and speed throughout all of the computers and can even customtailor the topology to match whatever level of ease of setup vs quality we want 3 0f the four network topologies which would be most affected by a failed or removed node 4 How is a node identified on a network Fri E Networks can exist in many forms shapes and sizes Behind all types of configuration we have a fundamental layout that has been the basis for building the Internet in which we are all so dependent Understandingthis configuration is the keyto understanding what is going on behind the topic of networking InClass 2 Fall 2008 5 What technology takes control of addressing on a network 6 What technology allows you to use domain names instead of network addresses 7 What s the role of a server in the classic clientserver relationship NC State has within its resources the power to deliver students anywhere software normally only available through a lab machine accessed locally Using a system called the Virtual Computing Lab VCL you can pre load a dedicated computer with software and then exploit its resources remotely 8 What is the protocol used most ofthe time when you access VCL Remote Connections Now that we have established what physically makes up a network we can discuss the software side of a network and how computers can make connections to other computers for various reasons This could include browsing websites to remotely accessingusing another computer39s resources 9 What feature of SSH makes it nearly impervious to attack 10 What protocol allows for graphical interfaces on most Linux and UNIX computers