G4120: Introduction to Computational Biology

Size: px
Start display at page:

Download "G4120: Introduction to Computational Biology"

Transcription

1 ICB Fall 2009 G4120: Computational Biology Oliver Jovanovic, Ph.D. Columbia University Department of Microbiology & Immunology Copyright 2009 Oliver Jovanovic, All Rights Reserved.

2 Growth of GenBank

3 A Brief History of BC Tally systems African & European 8500 BC Prime system African 1000 BC Abacus Chinese & Babylonian 100 BC Antikythera mechanism Greek 1500 Mechanical calculator Leonardo da Vinci 1621 Slide rule William Oughtred 1642 Arithmetic Machine Blaise Pascal 1822 Difference Engine Charles Babbage 1831 Computer program Lady Ada Lovelace 1936 Z1 Computer Konrad Zuse 1936 Turing Machine Alan Turing 1938 Boolean Circuits Claude Shannon 1943 COLOSSUS Alan Turing 1945 von Neumann Machine John von Neumann 1947 Transistor William Shockley, John Bardeen & Walter Brattain 1958 Integrated Circuit Jack Kilby & Robert Noyce 1964 Mouse & Graphical User Interface Douglas Engelbart

4 The Era of Modern 1969 ARPAnet UCLA, Stanford, UC Santa Barbara & University of Utah 1969 UNIX Ken Thompson & Dennis Ritchie, Bell Laboratories 1973 C Dennis Ritchie & Brian Kernighan, Bell Laboratories 1973 Ethernet Robert Metcalfe, Harvard University/Xerox PARC 1973 FTP Alex McKenzie, BBN 1974 TCP Vint Cerf & Robert Kahn 1975 Microsoft Corporation Bill Gates & Paul Allen 1976 Apple Computer Steve Wozniak & Steve Jobs 1978 Usenet Tom Truscott, Jim Ellis & Steve Bellovin 1981 IBM PC IBM Corporation 1982 TCP/IP ARPA 1984 DNS Jon Postel 1984 Macintosh Apple Computer 1985 Windows Microsoft Corporation 1986 NeXT Computer Steve Jobs 1989 HTML & HTTP Tim Breners-Lee, CERN 1990 BSD Unix NR1 University of California, Berkeley 1991 Linux Linus Torvalds 1993 Mosaic Marc Andreessen 2001 OS X Apple Computer 2004 Google Larry Page & Sergey Brin 2008 Cloud Amazon ECC and EBS

5 Growth of the Internet Overview In 1981, there were 213 computers acting as Internet hosts. By the beginning of 1994, 2.2 million computers were acting as hosts. Currently, it is estimated that over 700 million Internet hosts exist.

6 Computers in Biology Algorithms An algorithm is simply a series of steps used to solve a problem. One of a computer s great strengths is its ability to rapidly and accurately repeat recursive steps in an algorithm. Many algorithms of use to biologists could not be practically applied without computers. Early algorithms for comparing sequences to each other attempted to find optimal alignments. With the tremendous growth of sequence data, many modern search algorithms use heuristic (rule of thumb) approaches which may not find Early algorithms for searching sequence data for significant matches depended on consensus sequences. It rapidly became clear that biologically significant sequences rarely perfectly matched a consensus, and more sophisticated approaches were adopted, including the use of matrices, Markov chains and hidden Markov models. Data Storage and Databases The tremendous growth of sequence and other biological data has made storing such data in digital form on modern computers a necessity. More and more of this data is being stored in databases to make it easier to retrieve and analyze. A database is a structured collection of data stored on a computer that can be accessed using a query language, which greatly simplifies asking questions of the data. The current trend is to make biological databases Internet accessible. Internet The World Wide Web computer protocols (HTML and HTTP) that are the foundation of much of the modern Internet were originally developed by Tim Breners-Lee at CERN to allow scientists to share research data. Computational biology uses applications with Internet connectivity (EndNote, MacVector), Internet applications (DNA Artist), Web applications (BLAST, GenMark, Phylodendron) and Internet databases (GenBank, PubMed), among other Internet host resources.

7 History of Computational Biology 1869 DNA Johann Friedrich Miescher 1924 Chromosomal DNA Robert Feulgen 1928 Transforming principle Franklin Griffith 1944 DNA transformation Oswald Avery, Maclyn McCarty & Colin MacLeod 1948 Information Theory Claude Shannon 1949 Chargaff s Rule Erwin Chargaff 1953 Double helix James Watson & Francis Crick 1955 Protein sequencing Fred Sanger 1961 Codons Sidney Brenner & Francis Crick 1966 Genetic code Marshall Nirenberg, Robert Holley & Har Khorana 1970 Restriction enzyme Hamilton Smith, Johns Hopkins 1970 Needleman-Wunsch S. Needleman & C. Wunsch 1971 MEDLINE NIH/NLM 1977 DNA sequencing Allan Maxam & Walter Gilbert/Frederick Sanger 1977 Staden programs Roger Staden 1981 Smith-Waterman Temple Smith & Michael Waterman 1982 GenBank LANL/EMBL/NCBI 1988 NCBI NIH/NLM 1988 FASTA William Pearson & David Lipman 1988 DNA Strider Christian Marck 1990 BLAST Stephen Altschul & David Lipman, NCBI 1994 DNA computer Leonard Adelman 1997 PubMed NCBI

8 The Genomics Era Overview of Published Genomes 1980 øx174 (5,386 bp) 1981 Human mitochondria (16,569 bp) 1981 Poliovirus (7,440 bp) 1990 Human Genome Project 1992 The Institute for Genomic Research 1994 RK2 (60,099 bp) 1995 Haemophilus influenzae (1.8 Mb) 1995 Mycoplasma genitalium (0.58 Mb) 1996 Methanococcus jannaschii (1.6 Mb) Growth of Sequenced Prokaryotic Genomes 1996 Saccharomyces cerevisiae (12.1 Mb) 1997 Escherichia coli (4.7 Mb) 1998 Celera, Inc Caenorhabditis elegans (97 Mb) 2000 Drosophila melanogaster (180 Mb) 2000 Arabidopsis thaliana (115 Mb) 2001 Salmonella typhimurium (4.8 Mb) 2001 Homo sapiens (2.9 Gb) 2002 Mus musculus (2.9 Gb) 2003 Nanoarchaeum equitans (0.49 Mb) 2004 Legionella pneumophila (3.4 Mb) 2005 Pan troglodytes (2.8 Gb) Source: David W. Ussery, Genome Update: 161 prokaryotic genomes sequenced, and counting, Microbiology Feb;150 (Pt. 2):

9 Evolution of Operating Systems Unix Apple Windows

10 Macintosh OS X Architecture Classic OS X 10.4 (and below) provides support through the Classic Environment for older Macintosh applications (OS 9 and below) User Experience The layer with which most users interact with the Macintosh includes Aqua (the graphical user interface (GUI) of OS X), Dashboard (which manages and displays desktop widgets), Spotlight (which provides system wide search and indexing through the use of metadata) and Accessibility (assistive technology for the disabled).

11 Computers and Sequence Analysis SeqMatrix E. coli promoter output: DNA Location: 3,075 Spacer Length: 11 Similarity Score: CGACATTGCTTGACCC <11> GCGTGTTCAATTCG

12 Computers and Phylogenetic Analysis

13 Computers and Data Visualization

14 Computers and Multimedia L Birmingham IncP-a...[gi:508311] Related Sequences, PubMed, Taxonomy LOCUS BIACOMGEN bp DNA linear BCT 08-JUL-1994 DEFINITION Birmingham IncP-alpha plasmid (R18, R68, RK2, RP1, RP4) complete genome. ACCESSION L27758 VERSION L GI: KEYWORDS complete genome. SOURCE Birmingham IncP-alpha plasmid (plasmid Birmingham IncP-alpha plasmid, kingdom Prokaryotae) DNA. ORGANISM Birmingham IncP-alpha plasmid broad host range plasmids. REFERENCE 1 (bases 1 to 60099) AUTHORS Pansegrau,W., Lanka,E., Barth,P.T., Figurski,D.H., Guiney,D.G., Haas,D., Helinski,D.R., Schwab,H., Stanisich,V.A. and Thomas,C.M. TITLE Complete nucleotide sequence of Birmingham IncP-alpha plasmids: compilation and comparative analysis JOURNAL J. Mol. Biol. 239, (1994) MEDLINE FEATURES Location/Qualifiers source /organism="birmingham IncP-alpha plasmid" /plasmid="birmingham IncP-alpha plasmid" /db_xref="taxon:35419" BASE COUNT a c g t ORIGIN 1 ttcacccccg aacacgagca cggcacccgc gaccactatg ccaagaatgc ccaaggtaaa 61 aattgccggc cccgccatga agtccgtgaa tgccccgacg gccgaagtga agggcaggcc 121 gccacccagg ccgccgccct cactgcccgg cacctggtcg ctgaatgtcg atgccagcac 181 ctgcggcacg tcaatgcttc cgggcgtcgc gctcgggctg atcgcccatc ccgttactgc 241 cccgatcccg gcaatggcaa ggactgccag cgccgcgatg aggaagcggg tgccccgctt 301 cttcatcttc gcgcctcggg cctcgaggcc gcctacctgg gcgaaaacat cggtgtttgt etc.

15 Software Applications Microsoft Office Microsoft s office suite, including Word, Excel and PowerPoint. Office 2003 and 2007 for Windows or Office 2004 and 2008 for Mac can be downloaded for free by students at Macintosh uses have an alternative in Apple s ilife. Apple s Keynote is particularly good presentation software. EndNote Bibliographic search and storage utility. The latest version, EndNote X2, for Windows or Mac can be downloaded for free by students at Antivirals If running Windows, make sure to download Symantec AntiVirus, update it, and keep it updated. It is not essential for Mac users. Symantec AntiVirus 11 for Windows can be downloaded for free by students at

16 Internet Addressing IP Address (Internet Protocol Address) An IP address is a 32 bit number, written in the form of four decimal numbers in the range that are separated by dots (e.g ). Columbia University Medical Center (CUMC) IP addresses will always have the format x.x or x.x. Subnet Mask A subnet mask allows for defining a local network, called a subnet, within a larger network. CUMC subnet masks will always have the format Router A device that routes packets of data between networks. A router sits between your computer and local area network and the networks beyond it. CUMC router IP addresses will always have the format x.1 or x.1. DNS (Domain Name Server) These specialized servers automatically translate an easy to remember domain name (e.g. microbiology.columbia.edu) into the appropriate IP address (e.g ). CUMC DNS IP addresses are and Ethernet Address A unique 48 bit number, usually written in the form of 12 hexadecimal digits separated by colons in groups of two (e.g. 00:03:93:bc:3c:18), which is assigned to every piece of network hardware, including Ethernet cards and AirPort cards. It is also called a MAC (media access control) address. Search Domains This optional information is automatically appended to names you type in Internet applications. If you have defined a search domain of columbia.edu, typing www will take you to

17 CUMC Internet Setup Overview The CUMC (Columbia University Medical Center) campus network has two core routers, both redundantly linked to a router in each building. Each floor of a building then has its own router. Several microwave links and a high speed cable connect the core routers to the downtown Columbia campus, which has multiple high speed cable connections to the rest of the Internet. The CUMC network is walled off from the rest of the Internet by a firewall and is centrally administered by a group called CUMC IT. See for details. You will need an IP Address for Internet access from your lab. To register a computer for access from a lab, see for details, and use the New IP Request form. For Internet access from a dorm room, see cumc.columbia.edu/it/getting_started/resnet.html for details. You will need to provide your computer s Ethernet adapter hardware address, also known as Media Access Control (MAC) address. This is a 12 digit hexadecimal number (e.g. 00:00:af:a0:b1:89). If you have problems getting connected, try calling the CUMC computer help line at 5-HELP. Network Settings IP Address: x.x or x.x Subnet Mask: Router: x.1 or x.1 DNS Servers

18 Columbia University Setup Apple Mail Apple s client, officially supported by Columbia University, features sophisticated sorting and junk mail filtering capabilities, linked to the Address Book application. Follow these configuration instructions: Outlook Express Window s client, officially supported by Columbia Univesity. Follow these configuration instructions: Off Campus Access If you are not on your regular computer, you should still be able to access your through CubMail, a web based system: Cisco VPN Client If you are traveling, or live in non campus housing and need to connect to a server on campus, or want to be able to read journal articles as if you were on a Columbia computer, you will need to install Cisco VPN (Virtual Private Network) client software on your computer. Windows or Mac versions of software can be downloaded and configured by following these instructions:

19 References Recommended Macintosh OS X Books Mac OS X Tiger Unleashed by John Ray & William C. Ray Mac OS X: The Missing Manual, Tiger Edition by David Pogue Mac OS X Tiger Killer Tips by Scott Kelby Mac OS X Tiger Timesaving Techniques by Larry Ullman & Mark Liyange Recommended Computational Biology Books Fundamental Concepts of Bioinformatics by Dan E. Krane & Michael L. Rayme Developing Bioinformatics Computer Skills by Cynthia Gibas & Per Jambek Bioinformatics: A Practical Guide to the Analysis of Genes and Proteins, Third Edition edited by Andreas D. Baxevanis & B. F. Francis Ouellette BLAST: An Essential Guide to the BASIC Local Alignment Search Tool by Ian Korf, Mark Yandell & Joseph Bedell

G4120: Introduction to Computational Biology

G4120: Introduction to Computational Biology ICB Fall 2004 G4120: Computational Biology Oliver Jovanovic, Ph.D. Columbia University Department of Microbiology Copyright 2004 Oliver Jovanovic, All Rights Reserved. The Binary Language of Computers

More information

FIVE ERAS IN COMPUTER DEVELOPMENT Pre-History Electronics Mini Micro Network

FIVE ERAS IN COMPUTER DEVELOPMENT Pre-History Electronics Mini Micro Network FIVE ERAS IN COMPUTER DEVELOPMENT Pre-History Electronics Mini Micro Network PRE-HISTORY ERA The abacus is believed to have been invented in 4 th century B.C. PRE-HISTORY ERA The Antikythera mechanism,

More information

Genome and DNA Sequence Databases. BME 110/BIOL 181 CompBio Tools Todd Lowe March 31, 2009

Genome and DNA Sequence Databases. BME 110/BIOL 181 CompBio Tools Todd Lowe March 31, 2009 Genome and DNA Sequence Databases BME 110/BIOL 181 CompBio Tools Todd Lowe March 31, 2009 Admin Reading: Chapters 1 & 2 Notes available in PDF format on-line (see class calendar page): http://www.soe.ucsc.edu/classes/bme110/spring09/bme110-calendar.html

More information

CS 140: Introduction to Computer Science A Brief History of Computer Science. Edwin Rodríguez

CS 140: Introduction to Computer Science A Brief History of Computer Science. Edwin Rodríguez CS 140: Introduction to Computer Science A Brief History of Computer Science Edwin Rodríguez Cal Poly Pomona Department of Computer Science CS 140 - A Brief History of Computer Science / 1 What is Computing

More information

01 Introduction. The timeline

01 Introduction. The timeline 01 Introduction The pre-mechanical era The mechanical era The electromechanical era The electronic era The microelectronic era The roadmap for the next 10 years alessandro bogliolo isti information science

More information

The Internet and HTML. Jen Golbeck College of Information Studies University of Maryland

The Internet and HTML. Jen Golbeck College of Information Studies University of Maryland The Internet and HTML Jen Golbeck College of Information Studies University of Maryland 1 A Short History of the Internet 1969: Origins in government research Advanced Research Projects Agency (ARPAnet)

More information

architecture: what the pieces are and how they fit together names and addresses: what's your name and number?

architecture: what the pieces are and how they fit together names and addresses: what's your name and number? Communications and networking history and background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and

More information

Basic Concepts of DNA, Proteins, Genes and Genomes

Basic Concepts of DNA, Proteins, Genes and Genomes Basic Concepts of DNA, Proteins, Genes and Genomes Kun-Mao Chao 1,2,3 1 Graduate Institute of Biomedical Electronics and Bioinformatics 2 Department of Computer Science and Information Engineering 3 Graduate

More information

A Genomic Timeline Tim Shank 2003

A Genomic Timeline Tim Shank 2003 A Genomic Timeline Tim Shank 2003 1800s 1865 Gregor Mendel reports the results of his pea plant expts, from which he discerned several fundamental laws of heredity. His results appeared in an obscure journal

More information

GenBank: A Database of Genetic Sequence Data

GenBank: A Database of Genetic Sequence Data GenBank: A Database of Genetic Sequence Data Computer Science 105 Boston University David G. Sullivan, Ph.D. An Explosion of Scientific Data Scientists are generating ever increasing amounts of data. Relevant

More information

RETRIEVING SEQUENCE INFORMATION. Nucleotide sequence databases. Database search. Sequence alignment and comparison

RETRIEVING SEQUENCE INFORMATION. Nucleotide sequence databases. Database search. Sequence alignment and comparison RETRIEVING SEQUENCE INFORMATION Nucleotide sequence databases Database search Sequence alignment and comparison Biological sequence databases Originally just a storage place for sequences. Currently the

More information

By : Khalid Alfalqi Department of Computer Science, Umm Al-Qura University

By : Khalid Alfalqi Department of Computer Science, Umm Al-Qura University By : Khalid Alfalqi Department of Computer Science, Umm Al-Qura University History of Web History of the Internet Basic Web System Architecture URL DNS Creating Static and Dynamic Information Security

More information

VIA CONNECT PRO Deployment Guide

VIA CONNECT PRO Deployment Guide VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

Introduction to Web Technology. Content of the course. What is the Internet? Diana Inkpen

Introduction to Web Technology. Content of the course. What is the Internet? Diana Inkpen Introduction to Web Technology Content of the course Diana Inkpen The Internet and the WWW. Internet Connectivity. Basic Internet Services. University of Ottawa School of Information Technology and Engineering

More information

Internet for Everyone In-Room Instructions January 2011 Version 1.3

Internet for Everyone In-Room Instructions January 2011 Version 1.3 Internet for Everyone In-Room Instructions January 2011 Version 1.3 Everywhere Internet 2006 Page 1 of 17 Connecting your computer to the Everywhere Internet network in your room 1. You need a network

More information

TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa

TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa Education & Training Plan CompTIA N+ Specialist Program Student Full

More information

SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet

SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet SWE 444 Internet and Web Application Development Introduction to Web Technology Dr. Ahmed Youssef Internet It is a network of networks connected and communicating using TCP/IP communication protocol 2

More information

Education & Training Plan IT Network Professional with CompTIA Network+ Certificate Program with Externship

Education & Training Plan IT Network Professional with CompTIA Network+ Certificate Program with Externship Testing Services and Programs 1200 N. DuPont Highway Dover, DE 19901 https://www.desu.edu/academics/mycaa Contact: Amystique Harris-Church 302.857.6143 achurch@desu.edu Education & Training Plan IT Network

More information

Introduction to Databases and Data Mining

Introduction to Databases and Data Mining Introduction to Databases and Data Mining Computer Science 105 Boston University David G. Sullivan, Ph.D. Welcome to CS 105! This course examines how collections of data are organized, stored, and processed.

More information

Education & Training Plan IT Network Professional with CompTIA Network+ Certificate Program with Externship

Education & Training Plan IT Network Professional with CompTIA Network+ Certificate Program with Externship University of Texas at El Paso Professional and Public Programs 500 W. University Kelly Hall Ste. 212 & 214 El Paso, TX 79968 http://www.ppp.utep.edu/ Contact: Sylvia Monsisvais 915-747-7578 samonsisvais@utep.edu

More information

Sequence Formats and Sequence Database Searches. Gloria Rendon SC11 Education June, 2011

Sequence Formats and Sequence Database Searches. Gloria Rendon SC11 Education June, 2011 Sequence Formats and Sequence Database Searches Gloria Rendon SC11 Education June, 2011 Sequence A is the primary structure of a biological molecule. It is a chain of residues that form a precise linear

More information

Bioinformatics Grid - Enabled Tools For Biologists.

Bioinformatics Grid - Enabled Tools For Biologists. Bioinformatics Grid - Enabled Tools For Biologists. What is Grid-Enabled Tools (GET)? As number of data from the genomics and proteomics experiment increases. Problems arise for the current sequence analysis

More information

01 - Introduction. Internet Technology. MSc in Communication Sciences 2010-11 Program in Technologies for Human Communication.

01 - Introduction. Internet Technology. MSc in Communication Sciences 2010-11 Program in Technologies for Human Communication. MSc in Communication Sciences 2010-11 Program in Technologies for Human Communication Davide Eynard nternet Technology 01 - ntroduction 2 Welcome! My name is Davide Eynard davide.eynard@usi.ch This course

More information

High-Speed Broadband Internet Guide

High-Speed Broadband Internet Guide High-Speed Broadband Internet Guide Welcome Welcome to SkyBest High-Speed Broadband Internet. SkyBest High-Speed Broadband Internet allows for rapid downloading of large files, such as music and graphics.

More information

Ch. 10 Software Development. (Computer Programming)

Ch. 10 Software Development. (Computer Programming) Ch. 10 Software Development (Computer Programming) 1 Definitions Software or Program Instructions that tell the computer what to do Programmer Someone who writes computer programs 2 Instruction Set A vocabulary

More information

Biological Databases and Protein Sequence Analysis

Biological Databases and Protein Sequence Analysis Biological Databases and Protein Sequence Analysis Introduction M. Madan Babu, Center for Biotechnology, Anna University, Chennai 25, India Bioinformatics is the application of Information technology to

More information

VIA COLLAGE Deployment Guide

VIA COLLAGE Deployment Guide VIA COLLAGE Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

Connecting with Computer Science, 2e. Chapter 5 The Internet

Connecting with Computer Science, 2e. Chapter 5 The Internet Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

Protein Protein Interactions (PPI) APID (Agile Protein Interaction DataAnalyzer)

Protein Protein Interactions (PPI) APID (Agile Protein Interaction DataAnalyzer) APID (Agile Protein Interaction DataAnalyzer) 23 APID (Agile Protein Interaction DataAnalyzer) Integrates and unifies 7 DBs: BIND, DIP, HPRD, IntAct, MINT, BioGRID. Includes 51,873 proteins 241,204 interactions

More information

1 You will need the following items to get started:

1 You will need the following items to get started: QUICKSTART GUIDE 1 Getting Started You will need the following items to get started: A desktop or laptop computer Two ethernet cables (one ethernet cable is shipped with the _ Blocker, and you must provide

More information

High-Speed Broadband Internet Guide

High-Speed Broadband Internet Guide High-Speed Broadband Internet Guide Welcome Welcome to SkyBest High-Speed Broadband Internet. SkyBest High-Speed Broadband Internet allows for rapid downloading of large files, such as music and graphics.

More information

Efficient Parallel Execution of Sequence Similarity Analysis Via Dynamic Load Balancing

Efficient Parallel Execution of Sequence Similarity Analysis Via Dynamic Load Balancing Efficient Parallel Execution of Sequence Similarity Analysis Via Dynamic Load Balancing James D. Jackson Philip J. Hatcher Department of Computer Science Kingsbury Hall University of New Hampshire Durham,

More information

Introduction to Network Security Lab 1 - Wireshark

Introduction to Network Security Lab 1 - Wireshark Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication

More information

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network

More information

BMC Bioinformatics. Open Access. Abstract

BMC Bioinformatics. Open Access. Abstract BMC Bioinformatics BioMed Central Software Recent Hits Acquired by BLAST (ReHAB): A tool to identify new hits in sequence similarity searches Joe Whitney, David J Esteban and Chris Upton* Open Access Address:

More information

Searching Nucleotide Databases

Searching Nucleotide Databases Searching Nucleotide Databases 1 When we search a nucleic acid databases, Mascot always performs a 6 frame translation on the fly. That is, 3 reading frames from the forward strand and 3 reading frames

More information

Core Bioinformatics. Degree Type Year Semester. 4313473 Bioinformàtica/Bioinformatics OB 0 1

Core Bioinformatics. Degree Type Year Semester. 4313473 Bioinformàtica/Bioinformatics OB 0 1 Core Bioinformatics 2014/2015 Code: 42397 ECTS Credits: 12 Degree Type Year Semester 4313473 Bioinformàtica/Bioinformatics OB 0 1 Contact Name: Sònia Casillas Viladerrams Email: Sonia.Casillas@uab.cat

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

Figure 1: Genome sizes of different organisms.

Figure 1: Genome sizes of different organisms. How big are genomes? Genomes are now being sequenced at such a rapid rate that it is fair to say that it is becoming routine. As a result, there is a growing interest in trying to understand the meaning

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Fall 2009. Lecture 1. Operating Systems: Configuration & Use CIS345. Introduction to Operating Systems. Mostafa Z. Ali. mzali@just.edu.

Fall 2009. Lecture 1. Operating Systems: Configuration & Use CIS345. Introduction to Operating Systems. Mostafa Z. Ali. mzali@just.edu. Fall 2009 Lecture 1 Operating Systems: Configuration & Use CIS345 Introduction to Operating Systems Mostafa Z. Ali mzali@just.edu.jo 1-1 Chapter 1 Introduction to Operating Systems An Overview of Microcomputers

More information

Computer Network & ICT Support Technician

Computer Network & ICT Support Technician Computer Network & ICT Support Technician The general competencies and skills enlisted in this document encompass the principle background needed for a Computer Network & ICT Support Technician to carry

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

Bioinformatics Resources at a Glance

Bioinformatics Resources at a Glance Bioinformatics Resources at a Glance A Note about FASTA Format There are MANY free bioinformatics tools available online. Bioinformaticists have developed a standard format for nucleotide and protein sequences

More information

Genome Explorer For Comparative Genome Analysis

Genome Explorer For Comparative Genome Analysis Genome Explorer For Comparative Genome Analysis Jenn Conn 1, Jo L. Dicks 1 and Ian N. Roberts 2 Abstract Genome Explorer brings together the tools required to build and compare phylogenies from both sequence

More information

Managing and Conducting Biomedical Research on the Cloud Prasad Patil

Managing and Conducting Biomedical Research on the Cloud Prasad Patil Managing and Conducting Biomedical Research on the Cloud Prasad Patil Laboratory for Personalized Medicine Center for Biomedical Informatics Harvard Medical School SaaS & PaaS gmail google docs app engine

More information

Networking Basics for Automation Engineers

Networking Basics for Automation Engineers Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------

More information

Chapter 11 Cloud Application Development

Chapter 11 Cloud Application Development Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How

More information

A Tutorial in Genetic Sequence Classification Tools and Techniques

A Tutorial in Genetic Sequence Classification Tools and Techniques A Tutorial in Genetic Sequence Classification Tools and Techniques Jake Drew Data Mining CSE 8331 Southern Methodist University jakemdrew@gmail.com www.jakemdrew.com Sequence Characters IUPAC nucleotide

More information

Lab 4.5.4 Diagramming External Traffic Flows

Lab 4.5.4 Diagramming External Traffic Flows Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1

More information

1.1 Prior Knowledge and Revision

1.1 Prior Knowledge and Revision 1.1. PRIOR KNOWLEDGE AND REVISION 3 1.1 Prior Knowledge and Revision This topic assumes you already have some background knowledge of the Internet. You may have studied The Internet unit of Intermediate

More information

CA106 Web Design. Dr. Dónal Fitzpatrick, School of Computing Room l2.48, Extension 8929, dfitzpat@computing.dcu.ie

CA106 Web Design. Dr. Dónal Fitzpatrick, School of Computing Room l2.48, Extension 8929, dfitzpat@computing.dcu.ie CA106 Web Design Dr. Dónal Fitzpatrick, School of Computing Room l2.48, Extension 8929, dfitzpat@computing.dcu.ie History of the Internet Terminals attached to mainframe computer From mid 1960 s packet-switching

More information

TCP/IP works on 3 types of services (cont.): TCP/IP protocols are divided into three categories:

TCP/IP works on 3 types of services (cont.): TCP/IP protocols are divided into three categories: Due to the number of hardware possibilities for a network, there must be a set of rules for how data should be transmitted across the connection media. A protocol defines how the network devices and computers

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which

More information

Version 5.0 Release Notes

Version 5.0 Release Notes Version 5.0 Release Notes 2011 Gene Codes Corporation Gene Codes Corporation 775 Technology Drive, Ann Arbor, MI 48108 USA 1.800.497.4939 (USA) +1.734.769.7249 (elsewhere) +1.734.769.7074 (fax) www.genecodes.com

More information

CISC 1600 Introduction to Multi-media Computing

CISC 1600 Introduction to Multi-media Computing CISC 1600 Introduction to Multi-media Computing Spring 2012 Instructor : J. Raphael Email Address: Course Page: Class Hours: raphael@sci.brooklyn.cuny.edu http://www.sci.brooklyn.cuny.edu/~raphael/cisc1600.html

More information

1865 Discovery: Heredity Transmitted in Units

1865 Discovery: Heredity Transmitted in Units 1859 Discovery: Natural Selection Genetic Timeline Charles Darwin wrote On the Origin of Species by Means of Natural Selection, or the Preservation of Favored Races in the Struggle for Life. 1865 Discovery:

More information

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time Essential Curriculum Computer Networking 1 PC Systems Fundamentals 35 hours teaching time Part 1----------------------------------------------------------------------------------------- 2.3 hours Develop

More information

Lab 4.5.2 Diagramming Intranet Traffic Flows

Lab 4.5.2 Diagramming Intranet Traffic Flows Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1

More information

How To Understand The History Of The Web (Web)

How To Understand The History Of The Web (Web) (World Wide) Web WWW A way to connect computers that provide information (servers) with computers that ask for it (clients like you and me) uses the Internet, but it's not the same as the Internet URL

More information

Course Descriptions. preparation.

Course Descriptions. preparation. Course Descriptions CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

138 To satisfy a prerequisite, the student must have earned a letter grade of A, B, C or CR in the prerequisite course, unless otherwise stated.

138 To satisfy a prerequisite, the student must have earned a letter grade of A, B, C or CR in the prerequisite course, unless otherwise stated. Computer Science and Information Systems: Information Technology - Networking CSIT 131 Word (1) (Formerly CSIS 127) Word word processing software. Prepares individuals who are seeking to become a Microsoft

More information

LAN TCP/IP and DHCP Setup

LAN TCP/IP and DHCP Setup CHAPTER 2 LAN TCP/IP and DHCP Setup 2.1 Introduction In this chapter, we will explain in more detail the LAN TCP/IP and DHCP Setup. 2.2 LAN IP Network Configuration In the Vigor 2900 router, there are

More information

TCP/IP Protocol Suite. Marshal Miller Chris Chase

TCP/IP Protocol Suite. Marshal Miller Chris Chase TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets

More information

Lab - Observing DNS Resolution

Lab - Observing DNS Resolution Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the Nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the Nslookup Command on Mail

More information

Communications and Networking

Communications and Networking Communications and Networking History and Background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and

More information

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Networks II Agenda Introduction to networking architecture Historical

More information

A Brief History of the Internet. Chris Brooks Computing, Python, and Robots

A Brief History of the Internet. Chris Brooks Computing, Python, and Robots A Brief History of the Internet Chris Brooks Computing, Python, and Robots Outline Prehistory Birth of the Internet The Web is Born The Dot-Com Gold Rush Web 2.0 - everything old is new again The future?

More information

Using a simple crossover RJ45 cable, you can directly connect your Dexter to any computer.

Using a simple crossover RJ45 cable, you can directly connect your Dexter to any computer. Dexter is a network device using the Ethernet protocol to connect and communicate with other devices on the network: Computers, routers, DHCP servers. Thus you have to setup your Dexter and your network

More information

Connecting with Computer Science Chapter 1 Review:

Connecting with Computer Science Chapter 1 Review: Connecting with Computer Science Chapter 1 Review: Key Terms: Abacus: (6) Assembly Language: (13) A counting device with sliding beads. Used mainly for adding and subtracting. A Human-readable language

More information

Introduction to Genome Annotation

Introduction to Genome Annotation Introduction to Genome Annotation AGCGTGGTAGCGCGAGTTTGCGAGCTAGCTAGGCTCCGGATGCGA CCAGCTTTGATAGATGAATATAGTGTGCGCGACTAGCTGTGTGTT GAATATATAGTGTGTCTCTCGATATGTAGTCTGGATCTAGTGTTG GTGTAGATGGAGATCGCGTAGCGTGGTAGCGCGAGTTTGCGAGCT

More information

BLAST. Anders Gorm Pedersen & Rasmus Wernersson

BLAST. Anders Gorm Pedersen & Rasmus Wernersson BLAST Anders Gorm Pedersen & Rasmus Wernersson Database searching Using pairwise alignments to search databases for similar sequences Query sequence Database Database searching Most common use of pairwise

More information

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved. IP Addressing and Subnetting 2002, Cisco Systems, Inc. All rights reserved. 1 Objectives Upon completion, you will be able to: Discuss the Types of Network Addressing Explain the Form of an IP Address

More information

IT 3202 Internet Working (New)

IT 3202 Internet Working (New) [All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any

More information

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)

More information

s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] Topic break down Topic No. of Questions Topic 1: Network Architecture 183 Topic 2: Network Operations 149

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and

More information

H0/H2/H4 -ECOM100 DHCP & HTML Configuration. H0/H2/H4--ECOM100 DHCP Disabling DHCP and Assigning a Static IP Address Using HTML Configuration

H0/H2/H4 -ECOM100 DHCP & HTML Configuration. H0/H2/H4--ECOM100 DHCP Disabling DHCP and Assigning a Static IP Address Using HTML Configuration H0/H2/H4 -ECOM100 DHCP & HTML 6 H0/H2/H4--ECOM100 DHCP Disabling DHCP and Assigning a Static IP Address Using HTML 6-2 H0/H2/H4 -ECOM100 DHCP DHCP Issues The H0/H2/H4--ECOM100 is configured at the factory

More information

Multi-Homing Dual WAN Firewall Router

Multi-Homing Dual WAN Firewall Router Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet

More information

Five Phases. The History of the Internet and World-Wide-Web. Long Distance LAN. internet. Internet. Tool Building

Five Phases. The History of the Internet and World-Wide-Web. Long Distance LAN. internet. Internet. Tool Building Five Phases The History of the Internet and World-Wide-Web Charles Severance Michigan State University Long Distance Networking 1966-1973 Network of Networks internet 1974-1985 internet becomes Internet

More information

Masters of Science in Information Technology

Masters of Science in Information Technology Objective: At the end of this module, you must be able to 1. Establish a basic understanding of the Internet 2. Understand the Internet's evolution What is Internet? Internet is a vast collection of different

More information

How to Guide: StorageCraft Cloud Services VPN

How to Guide: StorageCraft Cloud Services VPN How to Guide: StorageCraft Cloud Services VPN CONTENTS Executive Summary...3 Setting up the VPN...4 Connecting to the VPN from a single computer...5 Providing a LAN site with access to the VPN...6 Conclusion...12

More information

White Paper How to Remotely Access Ethernet I/O Over the Internet

White Paper How to Remotely Access Ethernet I/O Over the Internet White Paper How to Remotely Access Ethernet I/O Over the Internet ACROMAG INCORPORATED Tel: (248) 295-0880 30765 South Wixom Road Fax: (248) 624-9234 P.O. BOX 437 Wixom, MI 48393-7037 U.S.A. Copyright

More information

Pairwise Sequence Alignment

Pairwise Sequence Alignment Pairwise Sequence Alignment carolin.kosiol@vetmeduni.ac.at SS 2013 Outline Pairwise sequence alignment global - Needleman Wunsch Gotoh algorithm local - Smith Waterman algorithm BLAST - heuristics What

More information

IT4504 - Data Communication and Networks (Optional)

IT4504 - Data Communication and Networks (Optional) - Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication

More information

A Heterogeneous Internetworking Model with Enhanced Management and Security Functions

A Heterogeneous Internetworking Model with Enhanced Management and Security Functions Session 1626 A Heterogeneous Internetworking Model with Enhanced Management and Security Functions Youlu Zheng Computer Science Department University of Montana Yan Zhu Sybase, Inc. To demonstrate how

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://ti.uni-due.de/ti/en/education/teaching/ss13/netlab Equipment for each group: - 1 Server computer (OS: Windows Server 2008 Standard)

More information

Page 1 of 7. Computer Networking

Page 1 of 7. Computer Networking Page 1 of 7 Computer Networking 7.1 What Is Computer Networking? A computer network consists of several computers that are connected to one another using devices that allow them to communicate. Computer

More information

Interactive telecommunication between people Analog voice

Interactive telecommunication between people Analog voice History background on Circuit switch and Packet based switch network Telephony Interactive telecommunication between people Analog voice Transmitter/receiver continuously in contact with electronic circuit

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp

Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic

More information

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer) Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI

More information

Bio-Informatics Lectures. A Short Introduction

Bio-Informatics Lectures. A Short Introduction Bio-Informatics Lectures A Short Introduction The History of Bioinformatics Sanger Sequencing PCR in presence of fluorescent, chain-terminating dideoxynucleotides Massively Parallel Sequencing Massively

More information

Using MIS 3e Chapter 6A Appendix

Using MIS 3e Chapter 6A Appendix Study Questions Using MIS 3e Chapter 6A Appendix How the Internet Works David Kroenke Q1: How does email travel? Q2: What is a communications protocol? Q3: What are the functions of the five TCP/IP-OSI

More information

You will work in groups of two on the labs. It is OK to talk to others and help each other in the lab.

You will work in groups of two on the labs. It is OK to talk to others and help each other in the lab. ECE4110 Internetworking Programming Version 1/6/2006 Instructor: John Copeland Office: TTh VL-292B, MWF Centergy 5138 Email: john.copeland@ece.gatech.edu Phone: 404-894-5177 (MWF) Class Hours: T/Th 12:05-1:55

More information