Professional Documents
Culture Documents
opasdfghjklzxcvbnmqwertyuiopasdfgh
jklzxcvbnmqwertyuiopasdfghjklzxcvb
nmqwertyuiopasdfghjklzxcvbnmqwer
DATA COMMUNICATION AND
COMPUTER NETWORKING
tyuiopasdfghjklzxcvbnmqwertyuiopas
Masters of Finance and Control
dfghjklzxcvbnmqwertyuiopasdfghjklzx
Amity University
cvbnmqwertyuiopasdfghjklzxcvbnmq
Semester IV
wertyuiopasdfghjklzxcvbnmqwertyuio
pasdfghjklzxcvbnmqwertyuiopasdfghj
klzxcvbnmqwertyuiopasdfghjklzxcvbn
mqwertyuiopasdfghjklzxcvbnmqwerty
uiopasdfghjklzxcvbnmqwertyuiopasdf
ghjklzxcvbnmqwertyuiopasdfghjklzxc
vbnmqwertyuiopasdfghjklzxcvbnmrty
uiopasdfghjklzxcvbnmqwertyuiopasdf
ghjklzxcvbnmqwertyuiopasdfghjklzxc
vbnmqwertyuiopasdfghjklzxcvbnmqw
ertyuiopasdfghjklzxcvbnmqwertyuiop
Preface
2
material contains a sufficiently material to assist better grasp and
understanding of the subject. The reader will find perfect accuracy with
regard to answers of the exercise questions. For the convenience of the
students I have also included multiple questions and case study in this Study
Material for better understanding of the subject.
I hope that this Material will prove useful to both students and
teachers. The contents of this Study Material are divided into five chapters
covering various aspects of the syllabus of MFC and other related courses.
At the end of this Material three assignments have been provided which are
related with the subject matter.
I have taken considerable amount of help from various literatures,
journals and medias. I express my gratitude to all those personalities who
have devoted their life to knowledge, from whom I could learn and on the
basis of those learning now, I am trying to deliver my knowledge to others
through this material.
It is by God‘s loving grace that he brought me in to this world and
blessed me with loving and caring parents, my respected father Mr. Manohar
Lal Arora and my loving mother Mrs. Kamla Arora, who have supported me
in this Study Material.
Words may not be enough for me to express my deep sense of
gratitude and indebtedness to Dr. Shipra Maitra, Director (Amity College of
Commerce & Finance, Amity University, Noida) for the benevolent
guidance, constructive criticism and constant encouragement throughout the
period I have been involved in this Study Material.
I am thankful to my beloved wife Mrs. Deepti Arora, without whose
constant encouragement, advice and material sacrifice, this achievement
would have been a far of dream.
3
Index
4
32. 2 Data Transmission media
33. 2.1 Introduction 31
34. 2.2 Coaxial cable 31
35. 2.3 Twisted pair cabling 35
36. 2.3.1 Unshielded twisted pair
37. 2.3.2 Shielded twisted pair
38. 2.4 Fiber optics 38
39. 2.5 Multiplexing 39
40. 2.5.1 Introduction
41. 2.5.2 Types of multiplexing
42. 2.5.2.1Frequency division multiplexing
43. 2.5.2.2Time division multiplexing
44. 2.5.2.3Statistical multiplexing
45. 2.6 Types of data communication 40
46. 2.6.1 Simplex communication
47. 2.6.2 Half duplex communication
48. 2.6.3 Full duplex communication
49. 2.7 Emulation of full duplex in 45
shared physical media
2.7.1 Time division duplexing
2.7.2 Frequency division duplexing
50. 2.7.3 Echo cancellation
End Chapter Quizzes 48
5
65. 3.4.6 Wireless network
66. 3.4.6.1Types of wireless networks
67. 3.4.7 Mobile devices networks
68. 3.4.7.1Uses of mobile devices networks
69. 3.4.8 Global area networks
70. 3.4.9 Virtual private network
71. 3.4.10 Internetwork
72. 3.5 Views of network 67
73. 3.6 Network topology 68
74. 3.6.1 Bus
75. 3.6.2 Ring
76. 3.6.3 Star
77. 3.6.4 Mesh
78. 3.7 Switching 81
79. 3.7.1 Circuit switching
80. 3.7.2 Packet switching
81. 3.7.3 History of packet switching
82. 3.7.4 Connectionless and connection oriented packet switching
83. 3.7.5 Packet switching in networks
End Chapter Quizzes 91
6
103. 4.8.11 Leisure activities
104. 4.8.12 Marketing
105. 4.9 Internet access 121
106. 4.10 Social impact of internet 123
107. 4.11 Complex architecture 124
108. 4.12 Internet protocols 125
109. 4.12.1 Internet protocol suite
110. 4.12.2 History of internet protocol
111. 4.12.3 Layers in internet protocol suits
112. 4.12.4 Implementations
End Chapter Quizzes 136
113. 5 Multimedia
114. 5.1 Introduction 139
115. 5.2 History of multimedia 141
116. 5.3 Major features of multimedia 142
117. 5.4 Multimedia applications 143
118. 5.5 Multimedia and the future 144
119. 5.6 Categorization of multimedia 146
120. 5.7 Uses of multimedia 146
121. 5.7.1 Creative industries
122. 5.7.2 Commercial
123. 5.7.3 Entertainments and fine arts
124. 5.7.4 Education
125. 5.7.5 Engineering
126. 5.7.6 Industry
127. 5.7.7 Mathematical and scientific research
128. 5.7.8 Medicine
129. 5.7.9 Miscellaneous
130. 5.8 Structuring information in a multimedia form 152
End Chapter Quizzes 154
7
CHAPTER ONE
Data transmitted may be analog or digital (i.e. digital bit stream) and
modulated by means of either analog modulation or digital modulation using
line coding. The concept of digital communication is typically associated
with digital representation of analog signals, including source coding and
Pulse-code modulation, but that may also be covered in a textbook on data
transmission.
8
1.2 Applications and history of data transmission
Data (mainly but not exclusively informational) has been sent via non-
electronic (e.g. optical, acoustic, mechanical) means since the advent of
communication. Analog signal data has been sent electronically since the
advent of the telephone. However, the first data electromagnetic
transmission applications in modern time were telegraphy (1809) and
teletypewriters (1906), which are both digital signals. The fundamental
theoretical work in data transmission and information theory by Harry
Nyquist, Ralph Hartley, Claude Shannon and others during the early 20th
century, was done with these applications in mind.
9
has been possible using Integrated Services Digital Network (ISDN)
services. Since the end of 1990th, broadband access techniques such as
ADSL, Cable modems, fiber-to-the-building (FTTB) and fiber-to-the-home
(FTTH) have become wide spread to small offices and homes. The current
tendency is to replace traditional telecommunication services by packet
mode communication such as IP telephony and IPTV.
10
baseband channel, for example a serial cable or fiber optics, by means of a
line coding method, for example Manchester coding. This results in a pulse
amplitude modulated signal, also known as a pulse train. Analog data
transmission implies that the data is transferred over an analog passband
channel, for example a filtered telephone access network cupper wire or a
wireless channel, by means of some digital modulation scheme such as PSK,
FSK or ASK. Note that the latter sometimes is considered as a digital signal,
sometimes as an analog signal, depending on how digital signal is defined.
Also note that some textbooks on Digital data transmission, for example,
cover both digital and analog data transmission schemes as defined here, i.e.
both line coding and digital modulation schemes.
11
There are 3 different transmission modes characterized according to the
direction of the exchanges:
1.4.1 Simplex
1.4.1 Simplex
1.4.2 Half-duplex
It is (sometimes called an alternating connection or semi-duplex) is a
connection in which the data flows in one direction or the other, but not both
at the same time. With this type of connection, each end of the connection
12
transmits in turn. This type of connection makes it possible to have
bidirectional communications using the full capacity of the line.
13
1.5 Other modes of data transfer
There are few other modes of data transmission, which are as follows:
In a serial connection, the data are sent one bit at a time over the
transmission channel. However, since most processors process data in
parallel, the transmitter needs to transform incoming parallel data into serial
data and the receiver needs to do the opposite.
14
The serial-parallel transformation is done in almost the same way
using a shift register. The shift register shifts the register by one position to
the left each time a bit is received, and then transmits the entire register in
parallel when it is full:
15
These channels may be:
16
1.6 Merits and demerits of parallel data transmission over
serial transmission
1.6.1 Merits
1.6.2 Demerits
1. The difficulty of readying and simultaneously releasing nine bits at
their starting gates.
2. The problem of assuring the concurrent arrival of all transmitted bits
at their receiving gates for proper interpretation.
3. The cost of expensive cable instead of twisted – pair wires for
connections to external devices.
17
1.7.1 Transmission Channel
18
1.7.2 The basics of electromagnetic waves
19
1.7.3 Types of physical media
1.7.3.2. Aerial media : It refers to the air or a vacuum which allow the
circulation of electromagnetic waves and various types of radio-electric
waves.
20
Interference (often called noise) refers to any perturbations that locally
modify the signal form. Generally, there are of the following types:
21
A telephone line, for example, has a bandwidth of between 300 and 3400
Hertz approximately for an attenuation rate of 3 dB.
C = W log2 (1 + S/N)
22
1.10.1 Analog Transmission
23
the 0 in the middle represents 0 x 2¹; and the 1 to the far left represents 1 x
2². The decimal equivalent of 101 is (1 x 2²) + (0 x 2¹) + (1 x 2º) = 4 + 0 + 1
= 5. In a standard code used by most computers, the letter "A" is expressed
in 8 bits as 01000001.
24
1.10.3 Translating Information
Computers translate information from the computer user into binary
code in a process called digital encoding. Letters can be encoded by
replacing every letter with its numerical position (1-26) in the alphabet, and
then converting these decimal numbers into binary equivalents. A sound can
be encoded as a series of numbers that measure its pitch and volume at each
instant in time. An image can be encoded as a sequence of numbers that
represent the color and brightness of each portion of the picture. The
computer is able to decode information by converting the numbers back into
letters, sounds, or images. In the 1960s, computer scientists discovered how
to translate audio and video information into computer data, by expressing
every point in a color video image and every instant of sound as a string of
1s and 0s. TV programs and movies that have been digitized in that way can
be held in the memory of a computer as easily as textual documents.
However, encoding TV images required a huge number of 1s and 0s (or
bits). One TV signal sent digitally meant 90 million bits per second, which
was highly impractical, since it would take several channels to convey a
single digital TV signal. However, with the invention of digital compression
25
in the late 1980s, the pictures could be transmitted in a highly abbreviated
form.
26
modulation transmission. Three types of analog transmission are defined
depending on which parameter of the carrier wave is being varied:
27
data in an analog manner. The solution to this problem was the modem. It
performs the following functions:
28
is never null. As a result, the receiver can determine whether a signal is
present or not.
29
The need for a low signal transmission current
30
1.11.4 Delay Encoding (by Miller)
31
1.12 Asynchronous and Synchronous transmission
32
transmission information (called STOP bit, there may even be several STOP
bits).
33
the transmission using clock signals built into each component. A continual
stream of data is then sent between the two nodes. Due to there being no
start and stop bits the data transfer rate is quicker although more errors will
occur, as the clocks will eventually get out of sync, and the receiving device
would have the wrong time that had been agreed in protocol (computing) for
sending/receiving data, so some bytes could become corrupted (by losing
bits). Ways to get around this problem include re-synchronization of the
clocks and use of check digits to ensure the byte is correctly interpreted and
received.
34
Chapter One
Introduction to Data Transmission
End Chapter Quizzes
1. In simplex transmission
A. Data format is simple
B. Data transmission is one way
C. Data can be transmitted to one way only
D. None of the above
3. In asynchronous transmission
A Inter character gape is fixed
B Inter character gape is variable
C Inter character gape is always zero
D None
35
D None
6. Baud, the unit for measuring the data transmission speed, is equal to
A 1 bit per second
B 1 byte per second
C 2 bytes per second
D None of the above
36
9. What is telecommunications?
A Any linking of two computers
B Linking two computers through the telephone system
C Linking computer systems through direct high speed links
D All of the above
37
CHAPTER – TWO
2.1 Introduction
Media is the general term used to describe the data path that forms
the physical channel between the sender and receiver. Media can be twisted
pair wire such as that used for telephone installation, coaxial cable of various
sizes and electrical characteristics, fiber optics and wireless supporting either
light waves or radio waves. Wire or fiber optic media are referred to as
bounded media. Wireless media are sometimes referred to as unbounded
media. There are different types of physical channels (communication
media) through which data can be transmitted from one point to another.
Some of the most common data transmission media are described as follows:
Coaxial cable has long been the preferred form of cabling, for the
simple reason that it is inexpensive and easily handled (weight, flexibility,
etc.). A coaxial cable is made of up a central copper wire (called a core)
surrounded by an insulator, and then a braided metal shield.
38
The jacket protects the cable from the external environment. It is
usually made of rubber (or sometimes Polyvinyl Chloride (PVC) or
Teflon).
The shield (metal envelope) surrounding the cables protects the data
transmitted on the medium from interference (also called noise) that
could corrupt the data.
The insulator surrounding the central core is made of a dielectric
material that prevents any contact with the shield that could cause
electrical interactions (short circuit).
The core, which actually transports the data, generally consists of a
single copper strand or of several braided strands.
Thanks to its shield, coaxial cable can be used over long distances at
high speed (unlike twisted pair cable), however it is usually used for basic
installations. Note that there are also coaxial cables that have a double shield
(one insulating layer, one shield layer) and coaxial cables with four shields
(two insulating layers, two shield layers).
39
connecting it directly to the network card. It is able to transport a signal
up to around 185 metres without line loss.
It is part of the RG-58 family whose impedance (resistance) is 50 ohms.
The different types of thin coaxial cables are differentiated by the central
part of the cable (core).
Cable Description
RG-58 / U Central core consisting of a single copper strand
RG-58 A/U Braided
RG-58 C/U Military version of RG-58 A/U
RG-59 Wide band transmission (cable television)
Thicker diameter, recommended for higher
RG-6
frequencies than RG-59
RG-62 Arcnet Network
40
connection to the central part of the Thinnet by piercing the insulating
envelope. The transceiver cable (drop cable) connects to an AUI
(Attachment Unit Interface) connector, also called a DIX (Digital Intel
Xerox) connector or a DB 15 (SUB-D 15) connector.
41
BNC terminator: this is placed at each end of a cable in a Bus
network to absorb interference signals. It is connected to earth. A bus
network cannot function without them. It would stop working.
42
A cable is often made of several twisted pairs grouped together
inside a protective jacket. The twisting eliminates noise (electrical
interference) due to adjacent pairs or other sources (motors, relays,
transformers). Twisted pair is therefore suitable for a local network with few
nodes, a limited budget and simple connectivity. However, over long
distances at high data rates it does not guarantee data integrity (i.e. loss-less
data transmission).
43
Category 2: Data transmission up to a maximum of 4 Mbit/s (RNIS).
This type of cable contains 4 twisted pairs
Category 3: 10 Mbit/s maximum. This type of cable contains 4
twisted pairs and 3 twists per foot
Category 4: 16 Mbit/s maximum. This type of cable contains 4
copper twisted pairs
Category 5: 100 Mbit/s maximum. This type of cable contains 4
copper twisted pairs
Category 5e: 1000 Mbit/s maximum. This type of cable contains 4
copper twisted pairs
Most telephone installations use UTP cable. Many buildings are pre-
wired for this type of installation (often in sufficient number to satisfy future
requirements). If the pre-installed twisted pair is of good quality, it can be
used to transfer data in a computer network. Attention must be paid,
however, to the number of twists and other electrical characteristics required
for quality data transmission. UTP's major problem is that it is particularly
susceptible to interference (signals from one line mixing with those of
another line). The only solution to this is shielding.
44
protection against interference). It also allows faster transmission over a
longer distance.
Light-weight
45
Immune to noise
Low attenuation
Tolerates data rates on the order of 100 Mbps
Bandwidth from tens of megahertz to several gigahertz (monomode
fiber).
2.5 Multiplexing
2.5.1 Introduction
46
2.5.2.1 Frequency-division multiplexing
47
2.6 Types of Data communication
48
commands, but they can continue to transmit radio signals through their
antennas. Some early satellites (such as Sputnik 1) were designed as
transmit-only spacecraft. Pioneer 6 has transmitted for decades without
being able to receive anything.
49
only one direction at a time with this being regulated by the traffic
controllers.
50
Examples: Telephone, Mobile Phone, etc.
There are several benefits to using full-duplex over half-duplex, which are:
51
2.7 Emulation of full-duplex in shared physical media
52
networks and Bluetooth, can be considered as Time Division Duplex
systems, albeit not TDMA with fixed frame-lengths.
53
bandwidth allocation flexibility as all base stations and sectors will be forced
to use the same uplink/downlink ratio)
Echo cancellation is at the heart of the V.32, V.34, V.56, and V.90
modem standards. Echo cancellers are available as both software and
hardware solutions. They can be independent components in a
communications system or integrated into the communication system's
central processing unit. Devices that do not eliminate echo in their systems
sometimes will not produce good full-duplex performance.
54
Chapter Two
Data Transmission Media
End Chapter Quizzes
2. In MODEMS
A Several digital signals are multiplexed
B Digital signal changes some characteristics of a carrier wave
C Digital signal is amplified
D None of the above
55
C Frequency division multiplexing
D None of the above
56
9. ISDN is a(n) --- technology
A Twisted pair
B Coaxial and fiber
C Wireless
D All fiber
57
CHAPTER THREE
DATA NETWORKS
3.1 Introduction
58
All networks are interconnected to allow communication with a variety of
different kinds of media, including twisted-pair copper wire cable, coaxial
cable, optical fiber, and various wireless technologies.
Before the advent of computer networks that were based upon some
type of telecommunications system, communication between calculation
machines and early computers was performed by human users by carrying
instructions between them. Many of the social behavior seen in today's
Internet was demonstrably present in nineteenth-century telegraph networks,
and arguably in even earlier networks using visual signals.
In September 1940 George Stibitz used a teletype machine to send
instructions for a problem set from his Model K at Dartmouth College in
New Hampshire to his Complex Number Calculator in New York and
received results back by the same means. Linking output systems like
teletypes to computers was an interest at the Advanced Research Projects
Agency (ARPA) when, in 1962, J.C.R. Licklider was hired and developed a
working group he called the "Intergalactic Network", a precursor to the
ARPANet.
In 1964, researchers at Dartmouth developed the Dartmouth Time
Sharing System for distributed users of large computer systems. The same
year, at MIT, a research group supported by General Electric and Bell Labs
used a computer (DEC's PDP-8) to route and manage telephone connections.
Throughout the 1960s Leonard Kleinrock, Paul Baran and Donald Davies
59
independently conceptualized and developed network systems which used
datagrams or packets that could be used in a packet switched network
between computer systems. 1965 Thomas Merrill and Lawrence G. Roberts
created the first wide area network(WAN). The first widely used PSTN
switch that used true computer control was the Western Electric 1ESS
switch, introduced in 1965.
In 1969 the University of California at Los Angeles, SRI (in
Stanford), University of California at Santa Barbara, and the University of
Utah were connected as the beginning of the ARPANet network using 50
kbit/s circuits. Commercial services using X.25, an alternative architecture
to the TCP/IP suite, were deployed in 1972.
Computer networks, and the technologies needed to connect and
communicate through and between them, continue to drive computer
hardware, software, and peripherals industries. This expansion is mirrored
by growth in the numbers and types of users of networks from the researcher
to the home user.
Today, computer networks are the core of modern communication.
For example, all modern aspects of the Public Switched Telephone Network
(PSTN) are computer-controlled, and telephony increasingly runs over the
Internet Protocol, although not necessarily the public Internet. The scope of
communication has increased significantly in the past decade and this boom
in communications would not have been possible without the progressively
advancing computer network.
60
3.3 Network classification
3.3.2 Scale
61
3.3.4 Network topology
62
examples of devices that are used in a PAN are printers, fax machines,
telephones, PDAs and scanners. The reach of a PAN is typically about 20-30
feet (approximately 6-9 meters), but this is expected to increase with
technology improvements.
63
central router, could be called "layer 3 switches" because they only have
Ethernet interfaces and must understand IP. It would be more correct to call
them access routers, where the router at the top is a distribution router that
connects to the Internet and academic networks' customer access routers.
The defining characteristics of LANs, in contrast to WANs (wide area
networks), include their higher data transfer rates, smaller geographic range,
and lack of a need for leased telecommunication lines. Current Ethernet or
other IEEE 802.3 LAN technologies operate at speeds up to 10 Gbit/s. This
is the data transfer rate. IEEE has projects investigating the standardization
of 100 Gbit/s, and possibly 400 Gbit/s.
64
(metropolitan area network), but is generally limited to a smaller area than a
typical MAN. This term is most often used to discuss the implementation of
networks for a contiguous area. This should not be confused with a
Controller Area Network. A LAN connects network devices over a relatively
short distance. A networked office building, school, or home usually
contains a single LAN, though sometimes one building will contain a few
small LANs (perhaps one per room), and occasionally a LAN will span a
group of nearby buildings. In TCP/IP networking, a LAN is often but not
always implemented as a single IP subnet.
65
a relatively broad geographic area (i.e. one city to another and one country to
another country) and that often uses transmission facilities provided by
common carriers, such as telephone companies. WAN technologies
generally function at the lower three layers of the OSI reference model: the
physical layer, the data link layer, and the network layer.
66
3.4.6.1 Types of wireless networks
a. Wireless PAN
b. Wireless LAN
67
Wi-Fi: Wi-Fi is a commonly used wireless network in computer
systems to enable connection to the internet or other devices that have
Wi-Fi functionalities. Wi-Fi networks broadcast radio waves that can
be picked up by Wi-Fi receivers attached to different computers or
mobile phones.
Fixed Wireless Data: This implements point to point links between
computers or networks at two locations, often using dedicated
microwave or laser beams over line of sight paths. It is often used in
cities to connect networks in two or more buildings without physically
wiring the buildings together.
c. Wireless MAN
68
operation and support station; it then connects to the switching station
where the call is transferred to where it needs to go. GSM is the most
common standard and is used for a majority of cell phones.[4]
Personal Communications Service (PCS): PCS is a radio band that
can be used by mobile phones in North America. Sprint happened to
be the first service to set up a PCS.
D-AMPS: D-AMPS, which stands for Digital Advanced Mobile
Phone Service, is an upgraded version of AMPS but it is being phased
out due to advancement in technology. The newer GSM networks are
replacing the older system.
1. Wireless networks have had a significant impact on the world as far back
as World War II. Through the use of wireless networks, information could
be sent overseas or behind enemy lines easily, efficiently and more reliably.
Since then, wireless networks have continued to develop and their uses have
grown significantly. Cellular phones are part of huge wireless network
systems. People use these phones daily to communicate with one another.
Sending information overseas is possible through wireless network systems
using satellites and other signals to communicate across the world.
Emergency services such as the police department utilize wireless networks
to communicate important information quickly. People and businesses use
wireless networks to send and share data quickly whether it be in a small
office building or across the world.
69
telecom infrastructure is poor or there is a lack of resources, as in most
developing countries.
70
local coverage area to the next. In IEEE Project 802, this involves a
succession of terrestrial WIRELESS local area networks (WLAN).
3.4.10 Internetwork
71
3 (the 'network' layer) of the OSI Basic Reference Model, such as a router.
Any interconnection among or between public, private, commercial,
industrial, or governmental networks may also be defined as an
internetwork. In modern practice, the interconnected networks use the
Internet Protocol. There are at least three variants of internetwork,
depending on who administers and who participates in them:
Intranet
Extranet
Internet
Intranet
Extranet
72
An extranet is a network or internetwork that is limited in scope to a
single organization or entity but which also has limited connections to the
networks of one or more other usually, but not necessarily, trusted
organizations or entities (e.g. a company's customers may be given access to
some part of its intranet creating in this way an extranet, while at the same
time the customers may not be considered 'trusted' from a security
standpoint). Technically, an extranet may also be categorized as a CAN,
MAN, WAN, or other type of network, although, by definition, an extranet
cannot consist of a single LAN; it must have at least one connection with an
external network.
Internet
73
about the reachability of their address spaces through the Border Gateway
Protocol (BGP), forming a redundant worldwide mesh of transmission paths.
74
extension of an intranet that allows secure communications to users outside
of the intranet (e.g. business partners, customers). Informally, the Internet is
the set of users, enterprises and content providers that are interconnected by
Internet Service Providers (ISP). From an engineering standpoint, the
Internet is the set of subnets, and aggregates of subnets, which share the
registered IP address space and exchange information about the reachability
of those IP addresses using the Border Gateway Protocol. Typically, the
human-readable names of servers are translated to IP addresses,
transparently to users, via the directory function of the Domain Name
System (DNS).
Over the Internet, there can be business-to-business (B2B), business-
to-consumer (B2C) and consumer-to-consumer (C2C) communications.
Especially when money or sensitive information is exchanged, the
communications are apt to be secured by some form of communications
security mechanism. Intranets and extranets can be securely superimposed
onto the Internet, without any access by general Internet users, using secure
Virtual Private Network (VPN) technology. When used for gaming one
computer will have to be the server while the others play through it.
75
Network topology has two types:
a. Physical
b. logical
3.6.1 Bus
3.6.2 Ring
3.6.3 Star
3.6.4 Mesh
o partially connected
o fully connected (sometimes known as fully
redundant)
76
Multidrop buses have the advantage of simplicity and extensibility,
but electronically are limited to around 200–400 MHz (because of
reflections on the wire from the printed circuit board (PCB) onto the die) and
10–20 cm distance (SCSI-1 has 6 metres). Multidrop standards such as PCI
are therefore being replaced by point-to-point systems such as PCI Express.
Multidrop buses are also used by vending machine controllers to
communicate with the vending machine's components, such as a currency
detector (coin or note reader). Not surprisingly, these MDB buses
communicate with the MDB protocol, a 9-bit serial protocol.
Bus network
77
are several common instances of the bus architecture, including one in the
motherboard of most computers, and those in some versions of Ethernet
networks. Bus networks are the simplest way to connect multiple clients, but
may have problems when two clients want to transmit at the same time on
the same bus. Thus systems which use bus network architectures normally
have some scheme of collision handling or collision avoidance for
communication on the bus, quite often using Carrier Sense Multiple Access
or the presence of a bus master which controls access to the shared bus
resource.
A true bus network is passive – the computers on the bus simply listen
for a signal; they are not responsible for moving the signal along. However,
many active architectures can also be described as a "bus", as they provide
the same logical functions as a passive bus; for example, switched Ethernet
can still be regarded as a logical bus network, if not a physical one. Indeed,
the hardware may be abstracted away completely in the case of a software
bus. With the dominance of switched Ethernet over passive Ethernet, passive
bus networks are uncommon in wired networks. However, almost all current
wireless networks can be viewed as examples of passive bus networks, with
radio propagation serving as the shared passive medium.
78
3.6.1.1 Advantages and disadvantages of a bus network
79
3.6.2 Ring network
80
3.6.2.1 Advantages and disadvantages of a ring network
Very orderly network where every device has access to the token and
the opportunity to transmit
Performs better than a star topology under heavy network load
Can create much larger network using Token Ring
Does not require network server to manage the connectivity between
the computers
Misconceptions
81
"Rings prevent collisions." The term "ring" only refers to the layout of
the cables. It is true that there are no collisions on an IBM Token
Ring, but this is because of the layer 2 Media Access Control method,
not the physical topology (which again is a star, not a ring.) Token
passing, not rings, prevent collisions.
82
network has an active central node that usually has the means to prevent
echo-related problems.
83
Isolation of devices: Each device is inherently isolated by the link
that connects it to the hub. This makes the isolation of the individual
devices fairly straightforward, and amounts to disconnecting the
device from the hub. This isolated nature also prevents any non-
centralized failure to affect the network.
Benefits from centralization: As the central hub is the bottleneck,
increasing capacity of the central hub or adding additional devices to
the star, can help scale the network very easily. The central nature also
allows the inspection traffic through the network. This can help
analyze all the traffic in the network and determine suspicious
behavior.
Simplicity: The topology is easy to understand, establish, and
navigate. The simple topology obviates the need for complex routing
or message passing protocols. As noted earlier, the isolation and
centralization simplifies fault detection, as each link or device can be
probed individually.
84
Network size is limited by the number of connections that can
be made to the hub, and performance for the entire network is
capped by its throughput. While in theory traffic between the
hub and a node is isolated from other nodes on the network,
other nodes may see a performance drop if traffic to another
node occupies a significant portion of the central node's
processing capability or throughput.
Furthermore, wiring up of the system can be very complex.
ken passing is not restricted to rings.
85
Mesh networks are self-healing: the network can still operate even
when a node breaks down or a connection goes bad. As a result, this network
is very, very reliable. This concept is applicable to wireless networks, wired
networks, and software interaction. The animation at right illustrates how
wireless mesh networks can self form and self heal.
Examples
86
The Naval Postgraduate School, Monterey CA, demonstrated a
wireless mesh network for border security. In a pilot system, aerial
cameras kept aloft by balloons relayed real time high resolution video
to ground personnel via a mesh network.
An MIT Media Lab project has developed the XO-1 laptop or
"OLPC" which is intended for under-privileged schools in developing
nations and uses mesh networking (based on the IEEE 802.11s
standard) to create a robust and inexpensive infrastructure. The
instantaneous connections made by the laptops are claimed by the
project to reduce the need for an external infrastructure such as the
internet to reach all areas, because a connected node could share the
connection with nodes nearby. A similar concept has also been
implemented by Greenpacket with its application called SONbuddy.
In Cambridge, UK, on the 3rd June 2006, mesh networking was used
at the ―Strawberry Fair‖ to run mobile live television, radio and
internet services to an estimated 80,000 people.
The Champaign-Urbana Community Wireless Network (CUWiN)
project is developing mesh networking software based on open source
implementations of the Hazy-Sighted Link State Routing Protocol and
Expected Transmission Count metric.
SMesh is an 802.11 multi-hop wireless mesh network developed by
the Distributed System and Networks Lab at Johns Hopkins
University. A fast handoff scheme allows mobile clients to roam in
the network without interruption in connectivity, a feature suitable for
real-time applications, such as VoIP.
87
Many mesh networks operate across multiple radio bands. For
example Firetide and Wave Relay mesh networks have the option to
communicate node to node on 5.2 GHz or 5.8 GHz, but communicate
node to client on 2.4 GHz (802.11). This is accomplished using SDR
(Software-Defined radio.)
The SolarMESH project examined the potential of powering 802.11-
based mesh networks using solar power and rechargeable batteries.
Legacy 802.11 access points were found to be inadequate due to the
requirement that are continuously powered. The IEEE 802.11s
standardization efforts are considering power save options, but solar-
powered applications might involve single radio nodes where relay-
link power saving will be inapplicable.
3.7 Switching
Two different switching techniques are used inside the telephone
system. These techniques are as follows:
3.7.1 Circuit Switching
3.7.2 Packet Switching
88
Let us look at a simple telephone call. When we remove the receive
from the telephone and dial a telephone number, the telephone company
searches its database to determine which circuit should be used to deliver the
telephone call. If it is a long distance call, the switch knows it must connect
to another telephone company office, where a switch called a tandem is
located. The tandem switch will then use a circuit that connects it to another
office, the toll office switch. This process continues until there are circuits
connected from the originator to the destination. These circuits cannot be
used for any other telephone call; they are dedicated to this one call until the
call is complete. Once the call is complete, the circuits can then be released
and used for another call.
89
conversations going on at once over the same facility. This is better than
wasting the circuit for one transmission, but it could still be better. Imagine
having no channels. Transmissions are sent over the same circuit as needed,
but there are no limits to the number of conversations that can be sent over
the same facility at the same time.
90
communication channel is effectively divided into an arbitrary number of
logical variable bit-rate channels or data streams. Each logical stream
consists of a sequence of packets, which normally are forwarded by a
network node asynchronously in a first-come first-serve fashion.
Alternatively, the packets may be forwarded according to some scheduling
discipline for fair queuing or differentiated and/or guaranteed Quality of
service. In case of a shared physical media, the packets may be delivered
according to some packet-mode multiple access scheme.
The trick is being able to place the data units in the proper order when
they are received. If data units are routed over different paths, it is highly
likely that the first data unit may be received after subsequent data units,
which means the order of transmission is now mixed up. The protocols used
in packet-switching networks have the ability to reassemble the data units
into their proper order.
91
Packet switching is favored over circuit switching for many different
reasons. It is more reliable than circuit switching because if a particular
circuit in the network should fail, the routers in the network simploy route
data units over different circuits, taking a different route altogether. In a
circuit-switched network, this is not possible. If a circuit fails in the middle
of a transmission, the entire connection must be released and a new one
established, which means the conversation must start over again (think of
being disconnected from a telephone call; the whole process of connecting
must be repeated).
Packet switching is not new. The industry recognized the need for a
more efficient way of transmitting data over long-haul networks and
deployed the first X.25 networks in the 1960s. These packet-switching
networks were used by many corporations for years, and many still use them
today. Many corporations are looking toward the Internet and a packet-
switching network using TCP/IP as their WAN solution.
In Packet switching the packets come in several forms. These forms are as
follows:
a) Data Packets : Data packets contain message segments as well as
sequence and routing information.
b) Control Packets : They are the brief messages – transmission requests
and acceptances, acknowledgements of data packet receipts – that
keep traffic flowing smoothly. These control packets initiate and
maintain communication.
92
3.7.3 History of packet switching
Baran's study made its way to Robert Taylor and J.C.R. Licklider at
the Information Processing Technology Office, both wide-area network
evangelists, and it helped influence Lawrence Roberts to adopt the
technology when Taylor put him in charge of development of the
ARPANET. Baran's packet switching work was similar to the research
93
performed independently by Donald Davies at the National Physical
Laboratory, UK. In 1965, Davies developed the concept of packet-switched
networks and proposed development of a UK wide network. He gave a talk
on the proposal in 1966, after which a person from the Ministry of Defense
told him about Baran's work. Davies met Lawrence Roberts at the 1967
ACM Symposium on Operating System Principles, bringing the two groups
together. Interestingly, Davies had chosen some of the same parameters for
his original network design as Baran, such as a packet size of 1024 bits.
Roberts and the ARPANET team took the name "packet switching" itself
from Davies's work.
94
This precludes the need for a dedicated path to help the packet find its way
to its destination. Each packet is dispatched and may go via different routes.
At the destination, the original message/data is reassembled in the correct
order, based on the packet sequence number. Thus a virtual connection, also
known as a virtual circuit or byte stream is provided to the end-user by a
transport layer protocol, although intermediate network nodes only provides
a connectionless network layer service.
Multiplex
techniques
Circuit mode
(constant bandwidth)
Statistical multiplexing
(variable bandwidth)
Related topics
95
3.7.5 Packet switching in networks
96
require these technologies to be able to forward variable-length packets at
multigigabit speeds across the network.
97
Chapter Three
Data Networks
End Chapter Quizzes
1. In circuit switching
A Data is stored at intermediate nodes
B Transmission path is set before data transfer
C Dedicated communication link is not required
D None of the above
2. When the time to establish link is large and the size of data is
small, the preferred mode of data transfer is
A Circuit switching
B Packet switching
C Time division multiplexing
D None of the above
98
B Ring
C Bus
D None
8. Ethernet uses
A Bus
B Mesh
C Ring
D None of the above
99
9. Wide area network always require
A High band width communication links
B High speed processors
C Same type of processors
D None of the above
100
CHAPTER FOUR
4.1 Introduction
101
The Internet carries various information resources and services, such
as electronic mail, online chat, file transfer and file sharing, online gaming,
and the inter-linked hypertext documents and other resources of the World
Wide Web (WWW).
4.2 Terminology
The terms Internet and World Wide Web are often used in every-day
speech without much distinction. However, the Internet and the World Wide
Web are not one and the same. The Internet is a global data communications
system. It is a hardware and software infrastructure that provides
connectivity between computers. In contrast, the Web is one of the services
communicated via the Internet. It is a collection of interconnected
documents and other resources, linked by hyperlinks and URLs. The term
internet is written both with capital and without capital, and is used both
with and without the definite article.
The USSR's launch of Sputnik spurred the United States to create the
Advanced Research Projects Agency, known as ARPA, in February 1958 to
regain a technological lead. ARPA created the Information Processing
Technology Office (IPTO) to further the research of the Semi Automatic
Ground Environment (SAGE) program, which had networked country-wide
radar systems together for the first time. J. C. R. Licklider was selected to
head the IPTO, and networking as a potential unifying human revolution.
102
Licklider moved from the Psycho-Acoustic Laboratory at Harvard
University to MIT in 1950, after becoming interested in information
technology. At MIT, he served on a committee that established Lincoln
Laboratory and worked on the SAGE project. In 1957 he became a Vice
President at BBN, where he bought the first production PDP-1 computer
and conducted the first public demonstration of time-sharing. At the IPTO,
Licklider got Lawrence Roberts to start a project to make a network, and
Roberts based the technology on the work of Paul Baran, who had written an
exhaustive study for the U.S. Air Force that recommended packet switching
(as opposed to circuit switching) to make a network highly robust and
survivable. After much work, the first two nodes of what would become the
ARPANET were interconnected between UCLA and SRI (later SRI
International) in Menlo Park, California, on October 29, 1969. The
ARPANET was one of the "eve" networks of today's Internet.
X.25 was independent of the TCP/IP protocols that arose from the
experimental work of DARPA on the ARPANET, Packet Radio Net and
Packet Satellite Net during the same time period. Vinton Cerf and Robert
Kahn developed the first description of the TCP protocols during 1973 and
103
published a paper on the subject in May 1974. Use of the term "Internet" to
describe a single global TCP/IP network originated in December 1974 with
the publication of RFC 675, the first full specification of TCP that was
written by Vinton Cerf, Yogen Dalal and Carl Sunshine, then at Stanford
University. During the next nine years, work proceeded to refine the
protocols and to implement them on a wide range of operating systems.
104
funded national computer network with free dial-up access in cities
throughout the U.S. that had been in operation since the 1970s. This network
was eventually interconnected with the others in the 1980s as the TCP/IP
protocol became increasingly popular. The ability of TCP/IP to work over
virtually any pre-existing communication networks allowed for a great ease
of growth, although the rapid growth of the Internet was due primarily to the
availability of commercial routers from companies such as Cisco Systems,
Proteon and Juniper, the availability of commercial Ethernet equipment for
local-area networking, and the widespread implementation of TCP/IP on the
UNIX operating system.
Although the basic applications and guidelines that make the Internet
possible had existed for almost two decades, the network did not gain a
public face until the 1990s. On 6 August 1991, CERN, a pan european
organisation for particle research, publicized the new World Wide Web
project. The Web was invented by English scientist Tim Berners-Lee in
1989. An early popular web browser was ViolaWWW, patterned after
HyperCard and built using the X Window System. It was eventually
replaced in popularity by the Mosaic web browser. In 1993, the National
Center for Supercomputing Applications at the University of Illinois
released version 1.0 of Mosaic, and by late 1994 there was growing public
interest in the previously academic, technical Internet. By 1996 usage of the
word Internet had become commonplace, and consequently, so had its use as
a synecdoche in reference to the World Wide Web.
105
Meanwhile, over the course of the decade, the Internet successfully
accommodated the majority of previously existing public computer networks
(although some networks, such as FidoNet, have remained separate). During
the 1990s, it was estimated that the Internet grew by 100% per year, with a
brief period of explosive growth in 1996 and 1997. This growth is often
attributed to the lack of central administration, which allows organic growth
of the network, as well as the non-proprietary open nature of the Internet
protocols, which encourages vendor interoperability and prevents any one
company from exerting too much control over the network. comScore, a
global Internet information provider, reported that the number of unique
users reached the 1 billion mark in December 2008. Based on the research
figures, Asia Pacific countries had the most internet users accounting for
41 percent, followed by Europe (28 percent), North America (18 percent),
Latin America (7 percent) and last was Middle East & Africa (together
5 percent). China topped the country-wise list with 17.8 percent of the global
internet audience. Of the various group of websites, Google websites were
visited by 778 million unique visitors topping the list. They were followed
by Microsoft, Yahoo, AOL websites along with Wikipedia and sister project
sites.
106
4.5 Today's Internet
The My Opera Community server rack. From the top, user file storage
(content of files.myopera.com), "bigma" (the master MySQL database
server), and two IBM blade centers containing multi-purpose machines
(Apache front ends, Apache back ends, slave MySQL database servers, load
balancers, file servers, cache servers and sync masters).
107
4.6 Internet structure
There have been many analyses of the Internet and its structure. For
example, it has been determined that the Internet IP routing structure and
hypertext links of the World Wide Web are examples of scale-free networks.
GEANT
GLORIAD
The Internet2 Network (formally known as the Abilene Network)
JANET (the UK's national research and education network)
These in turn are built around relatively smaller networks. See also the
list of academic computer network organizations. In computer network
diagrams, the Internet is often represented by a cloud symbol, into and out of
which network communications can pass.
ICANN
108
The Internet Corporation for Assigned Names and Numbers (ICANN)
is the authority that coordinates the assignment of unique identifiers on the
Internet, including domain names, Internet Protocol (IP) addresses, and
protocol port and parameter numbers. A globally unified namespace (i.e., a
system of names in which there is at most one holder for each possible
name) is essential for the Internet to function. ICANN is headquartered in
Marina del Rey, California, but is overseen by an international board of
directors drawn from across the Internet technical, business, academic, and
non-commercial communities. The US government continues to have the
primary role in approving changes to the root zone file that lies at the heart
of the domain name system. Because the Internet is a distributed network
comprising many voluntarily interconnected networks, the Internet has no
governing body. ICANN's role in coordinating the assignment of unique
identifiers distinguishes it as perhaps the only central coordinating body on
the global Internet, but the scope of its authority extends only to the
Internet's systems of domain names, IP addresses, protocol ports and
parameter numbers. On November 16, 2005, the World Summit on the
Information Society, held in Tunis, established the Internet Governance
Forum (IGF) to discuss Internet-related issues.
109
After English (29% of Web visitors) the most requested languages on
the World Wide Web are Chinese (19%), Spanish (9%), Japanese (6%),
French (5%) and German (4%). By region, 40% of the world's Internet users
are based in Asia, 26% in Europe, 17% in North America, 10% in Latin
America and the Caribbean, 4% in Africa, 3% in the Middle East and 1% in
Australia.
Within the limitations imposed by the small screen and other limited
facilities of such a pocket-sized device, all the services of the Internet,
including email and web browsing, may be available in this way. Service
110
providers may restrict the range of these services and charges for data access
may be significant, compared to home usage.
4.8.1 Why do people use internet : People use the internet due
to following reasons:
One of the great things about the Web is that it puts information into
your hands that you might otherwise have to pay for or find out by
less convenient means.
111
To correspond with faraway friends
To meet people
The Web is generally a very friendly place. People love getting email
from strangers, and friendships are quick to form from casual
correspondence. The "impersonal" aspect of email tends to encourage people
to reveal surprisingly personal things about themselves. When you know you
will never have to meet someone face-to-face, you may find it easier to tell
them your darkest secrets. Cyber-friendships have often developed into real
life ones too. Many people have even found love on the Net, and have gone
on to marry their cyber-partner.
Did you think you were alone in your obsession with a singer, TV
programme, author, hobby? Chances are there's and Internet group for
people like you, discussing every little detail of your obsession right now.
112
To have fun
There's no doubt that the Internet is a fun place to be. There's plenty to
keep you occupied on a rainy day.
To learn
To buy things
To advertise a product
113
visit a 10 page ad - but these advertisements are very useful to anyone
genuinely interested in finding out about their products. Companies may also
give away some information for free as an incentive for people to visit their
pages.
To sell a product
To make money
114
others. Other rewards come from the prestige of having their site
recognised as something good and the contact inspired by their pages
with others sharing the same interest.
4.8.3 E-mail
115
Internet. Even today it can be important to distinguish between Internet and
internal e-mail systems. Internet e-mail may travel and be stored
unencrypted on many other networks and machines out of both the sender's
and the recipient's control. During this time it is quite possible for the
content to be read and even tampered with by third parties, if anyone
considers it important enough. Purely internal or intranet mail systems,
where the information never leaves the corporate or organization's network,
are much more secure, although in any organization there will be IT and
other personnel whose job may involve monitoring, and occasionally
accessing, the e-mail of other employees not addressed to them. Today you
can send pictures and attach files on e-mail. Most e-mail servers today also
feature the ability to send e-mail to multiple e-mail addresses.
116
sender and recipient and allow for information to be very easily sent and
replied to.
117
years has advocated his vision of a Semantic Web. Cailliau went on early
retirement in January 2005 and left CERN in January 2007.
The World Wide Web enabled the spread of information over the
Internet through an easy-to-use and flexible format. It thus played an
important role in popularising use of the Internet, to the extent that the
World Wide Web has become a synonym for Internet, with the two being
conflated in popular use.
118
services also use HTTP to allow software systems to communicate in order
to share and exchange business logic and data.
Software products that can access the resources of the Web are
correctly termed user agents. In normal use, web browsers, such as Internet
Explorer, Firefox and Apple Safari, access web pages and allow users to
navigate from one to another via hyperlinks. Web documents may contain
almost any combination of computer data including graphics, sounds, text,
video, multimedia and interactive content including games, office
applications and scientific demonstrations. Through keyword-driven Internet
research using search engines like Yahoo! and Google, millions of people
worldwide have easy, instant access to a vast and diverse amount of online
information. Compared to encyclopedias and traditional libraries, the World
Wide Web has enabled a sudden and extreme decentralization of
information and data.
Using the Web, it is also easier than ever before for individuals and
organisations to publish ideas and information to an extremely large
audience. Anyone can find ways to publish a web page, a blog or build a
website for very little initial cost. Publishing and maintaining large,
professional websites full of attractive, diverse and up-to-date information is
still a difficult and expensive proposition, however. Many individuals and
some companies and groups use "web logs" or blogs, which are largely used
as easily updatable online diaries. Some commercial organisations
encourage staff to fill them with advice on their areas of specialization in the
hope that visitors will be impressed by the expert knowledge and free
information, and be attracted to the corporation as a result. One example of
this practice is Microsoft, whose product developers publish their personal
119
blogs in order to pique the public's interest in their work. Collections of
personal web pages published by large service providers remain popular, and
have become increasingly sophisticated. Whereas operations such as
Angelfire and GeoCities have existed since the early days of the Web, newer
offerings from, for example, Facebook and MySpace currently have large
followings. These operations often brand themselves as social network
services rather than simply as web page hosts.
120
industries. An accountant sitting at home can audit the books of a company
based in another country, on a server situated in a third country that is
remotely maintained by IT specialists in a fourth. These accounts could have
been created by home-working bookkeepers, in other remote locations,
based on information e-mailed to them from offices all over the world. Some
of these things were possible before the widespread use of the Internet, but
the cost of private leased lines would have made many of them infeasible in
practice.
An office worker away from his desk, perhaps on the other side of the
world on a business trip or a holiday, can open a remote desktop session into
his normal office PC using a secure Virtual Private Network (VPN)
connection via the Internet. This gives the worker complete access to all of
his or her normal files and data, including e-mail and other applications,
while away from the office. This concept is also referred to by some network
security people as the Virtual Private Nightmare, because it extends the
secure perimeter of a corporate network into its employees' homes.
4.8.6 Collaboration
121
Internet "chat", whether in the form of IRC chat rooms or channels, or
via instant messaging systems, allow colleagues to stay in touch in a very
convenient way when working at their computers during the day. Messages
can be exchanged even more quickly and conveniently than via e-mail.
Extensions to these systems may allow files to be exchanged, "whiteboard"
drawings to be shared or voice and video contact between team members.
Version control systems allow collaborating teams to work on shared sets of
documents without either accidentally overwriting each other's work or
having members wait until they get "sent" documents to be able to make
their contributions.
122
Internet. The origin and authenticity of the file received may be checked by
digital signatures or by MD5 or other message digests.
123
Webcams can be seen as an even lower-budget extension of this
phenomenon. While some webcams can give full-frame-rate video, the
picture is usually either small or updates slowly. Internet users can watch
animals around an African waterhole, ships in the Panama Canal, traffic at a
local roundabout or monitor their own premises, live and in real time. Video
chat rooms and video conferencing are also popular with many uses being
found for personal webcams, with and without two-way sound. YouTube
was founded on 15 February 2005 and is now the leading website for free
streaming video with a vast number of users. It uses a flash-based web
player to stream and show the video files. Users are able to watch videos
without signing up; however, if they do sign up, they are able to upload an
unlimited amount of videos and build their own personal profile. YouTube
claims that its users watch hundreds of millions, and upload hundreds of
thousands, of videos daily.
124
and the ability to call or receive a call from a traditional telephone is
available. Simple, inexpensive VoIP network adapter are available that
eliminate the need for a personal computer. Voice quality can still vary from
call to call but is often equal to and can even exceed that of traditional calls.
Remaining problems for VoIP include emergency telephone number dialling
and reliability. Currently, a few VoIP providers provide an emergency
service, but it is not universally available. Traditional phones are line-
powered and operate during a power failure; VoIP does not do so without a
backup power source for the phone equipment and the Internet access
devices.
125
content so that they may not be easily accessed or obtained without elaborate
circumvention. In Norway, Denmark, Finland and Sweden, major Internet
service providers have voluntarily (possibly to avoid such an arrangement
being turned into law) agreed to restrict access to sites listed by police.
While this list of forbidden URLs is only supposed to contain addresses of
known child pornography sites, the content of the list is secret.
The Internet has been a major source of leisure since before the World
Wide Web, with entertaining social experiments such as MUDs and MOOs
being conducted on university servers, and humor-related Usenet groups
receiving much of the main traffic. Today, many Internet forums have
sections devoted to games and funny videos; short cartoons in the form of
Flash movies are also popular. Over 6 million people use blogs or message
boards as a means of communication and for the sharing of ideas.
126
attempted to put restrictions on both industries' use of the Internet, this has
generally failed to stop their widespread popularity. One main area of leisure
on the Internet is multiplayer gaming. This form of leisure creates
communities, bringing people of all ages and origins to enjoy the fast-paced
world of multiplayer games. These range from MMORPG to first-person
shooters, from role-playing games to online gambling. This has
revolutionized the way many people interact and spend their free time on the
Internet. While online gaming has been around since the 1970s, modern
modes of online gaming began with services such as GameSpy and MPlayer,
to which players of games would typically subscribe. Non-subscribers were
limited to certain types of gameplay or certain games.
Many use the Internet to access and download music, movies and
other works for their enjoyment and relaxation. As discussed above, there
are paid and unpaid sources for all of these, using centralized servers and
distributed peer-to-peer technologies. Some of these sources take more care
over the original artists' rights and over copyright laws than others. Many
use the World Wide Web to access news, weather and sports reports, to plan
and book holidays and to find out more about their random ideas and casual
interests.
People use chat, messaging and e-mail to make and stay in touch with
friends worldwide, sometimes in the same way as some previously had pen
pals. Social networking websites like MySpace, Facebook and many others
like them also put and keep people in contact for their enjoyment. The
Internet has seen a growing number of Web desktops, where users can
access their files, folders, and settings via the Internet. Cyberslacking has
become a serious drain on corporate resources; the average UK employee
127
spends 57 minutes a day surfing the Web at work, according to a study by
Peninsula Business Services.
4.8.12 Marketing
The Internet has also become a large market for companies; some of
the biggest companies today have grown by taking advantage of the efficient
nature of low-cost advertising and commerce through the Internet, also
known as e-commerce. It is the fastest way to spread information to a vast
number of people simultaneously. The Internet has also subsequently
revolutionized shopping—for example; a person can order a CD online and
receive it in the mail within a couple of days, or download it directly in some
cases. The Internet has also greatly facilitated personalized marketing which
allows a company to market a product to a specific person or a specific
group of people more so than any other advertising medium.
128
4.9 Internet access
129
phone network. Web browsers such as Opera are available on these
advanced handsets, which can also run a wide variety of other Internet
software. More mobile phones have Internet access than PCs, though this is
not as widely used. An Internet access provider and protocol matrix
differentiates the methods used to get online.
Chris Young was voted into the 2007 Major League Baseball All-Star Game
on the internet via the All-Star Final Vote.
130
others. It is also possible to find a large circle of existing acquaintances,
especially if a site allows users to utilize their real names, and to allow
communication among large existing groups of people.
131
millionths of an ounce. Others have estimated this at nearer 2 ounces (50
grams).
132
another via intermediate (transit) networks and thus is the layer that
establishes internetworking and the Internet, and lastly, at the bottom, is a
software layer that provides connectivity between hosts on the same local
link (therefore called Link Layer), e.g., a local area network (LAN) or a dial-
up connection. This model is also known as the TCP/IP model of
networking. While other models have been developed, such as the Open
Systems Interconnection (OSI) model, they are not compatible in the details
of description, nor implementation.
133
referred to as TCP/IP. IP is the primary protocol in the Internet Layer of the
Internet Protocol Suite and has the task of delivering distinguished protocol
datagrams (packets) from the source host to the destination host solely based
on their addresses. For this purpose the Internet Protocol defines addressing
methods and structures for datagram encapsulation. The first major version
of addressing structure, now referred to as Internet Protocol Version 4 (IPv4)
is still the dominant protocol of the Internet, although the successor, Internet
Protocol Version 6 (IPv6) is being actively deployed worldwide.
The Internet Protocol Suite, like many protocol suites, may be viewed
as a set of layers. Each layer solves a set of problems involving the
transmission of data, and provides a well-defined service to the upper layer
protocols based on using services from some lower layers. Upper layers are
logically closer to the user and deal with more abstract data, relying on
lower layer protocols to translate data into forms that can eventually be
physically transmitted. The TCP/IP model consists of four layers (RFC
134
1122). From lowest to highest, these are the Link Layer, the Internet Layer,
the Transport Layer, and the Application Layer.
Application Layer
Transport Layer
Internet Layer
Link Layer
135
4.12.2 History of internet protocol
By the summer of 1973, Kahn and Cerf had worked out a fundamental
reformulation, where the differences between network protocols were hidden
by using a common internetwork protocol, and, instead of the network being
responsible for reliability, as in the ARPANET, the hosts became
responsible. Cerf credits Hubert Zimmerman and Louis Pouzin, designer of
the CYCLADES network, with important influences on this design. With the
role of the network reduced to the bare minimum, it became possible to join
almost any networks together, no matter what their characteristics were,
thereby solving Kahn's initial problem. One popular saying has it that
TCP/IP, the eventual product of Cerf and Kahn's work, will run over "two
tin cans and a string." There is even an implementation designed to run using
homing pigeons, IP over Avian Carriers, documented in RFC 1149.
136
A computer called a router (a name changed from gateway to avoid
confusion with other types of gateways) is provided with an interface to each
network, and forwards packets back and forth between them. Requirements
for routers are defined in (Request for Comments 1812). The idea was
worked out in more detailed form by Cerf's networking research group at
Stanford in the 1973–74 period, resulting in the first TCP specification
(Request for Comments 675) (The early networking work at Xerox PARC,
which produced the PARC Universal Packet protocol suite, much of which
existed around the same period of time (i.e. contemporaneous), was also a
significant technical influence; people moved between the two). DARPA
then contracted with BBN Technologies, Stanford University, and the
University College London to develop operational versions of the protocol
on different hardware platforms. Four versions were developed: TCP v1,
TCP v2, a split into TCP v3 and IP v3 in the spring of 1978, and then
stability with TCP/IP v4 — the standard protocol still in use on the Internet
today.
137
representatives, promoting the protocol and leading to its increasing
commercial use. Kahn and Cerf were honored with the Presidential Medal of
Freedom on November 9, 2005 for their contribution to American culture.
138
connected via two routers and the
corresponding layers used at each hop
The functional groups of protocols and methods are the Application Layer,
the Transport Layer, the Internet Layer, and the Link Layer (RFC 1122). It
should be noted that this model was not intended to be a rigid reference
model into which new protocols have to fit in order to be accepted as a
standard.
Routing protocols like BGP and RIP which run over TCP/UDP,
may also be considered part of the Internet Layer.
Internet OSPF for IPv4 was initially considered IP layer protocol since it
runs per IP-subnet, but has been placed on the Link since RFC
2740.
139
The following table shows the layer names and the number of layers
in the TCP/IP model as presented in widespread university course textbooks
on computer networking used today.
Five layers Five layers Five layers Four layers Four layers Four layers
Host-to-host
L4 Transport Transport Transport Transport Transport
or transport
Data link
Network
L2 Data link (Network
access Host-to- Network
interface) Link
network interface
These textbooks are secondary sources that may contravene the intent of
RFC 1122 and other IETF primary sources.
140
seven-layer OSI model. Others have attempted to map the Internet Protocol
model onto the seven-layer OSI Model. The mapping often results in a five-
layer TCP/IP model, wherein the Link Layer is split into a Data Link Layer
on top of a Physical Layer. Especially in literature with a bottom-up
approach to computer networking, where physical layer issues are
emphasized, an evolution towards a five-layer Internet model can be
observed out of pedagogical reasons.
The Internet protocol stack has never been altered by the Internet
Engineering Task Force (IETF) from the four layers defined in RFC 1122.
The IETF makes no effort to follow the seven-layer OSI model and does not
refer to it in standards-track protocol specifications and other architectural
documents. The IETF has repeatedly stated that Internet protocol and
architecture development is not intended to be OSI-compliant. RFC 3439,
addressing Internet architecture, contains a section entitled: "Layering
Considered Harmful".
141
4.12.4 Implementations
142
Chapter Four
Internet & Internet Protocols
End Chapter Quizzes
2. The X.25 set of standards covers how many layers of the OSI
model?
A One
B Three
C Two
D Four
143
4. A protocol is really
A A set of demands
B A set of rules
C A translation book for diplomats
D A call with very high authorization
144
C Microwaves
D None of the above
145
CHAPTER FIVE
MULTIMEDIA
5.1 Introduction
Multimedia is simply multiple forms of media integrated together.
Media can be text, graphics, audio, animation, video, data, etc. An example
of multimedia is a web page on the topic of Mozart that has text regarding
the composer along with an audio file of some of his music and can even
include a video of his music being played in a hall. Besides multiple types of
media being integrated with one another, multimedia can also stand for
interactive types of media such as video games CD ROMs that teach a
foreign language, or an information Kiosk at a subway terminal. Other terms
that are sometimes used for multimedia include hypermedia and rich media.
The term Multimedia is said to date back to 1965 and was used to
describe a show by the Exploding Plastic Inevitable. The show included a
performance that integrated music, cinema, special lighting and human
performance. Today, the word multimedia is used quite frequently, from
DVD's to CD ROMs to even a magazine that includes text and pictures.
146
When Windows reached about version 3, and Intel was making the
386, the SoundBlaster equipped PC was beginning to approach the Mac in
sound capabilities it but still had a long way to go as far as video. The
Pentium processor, VGA graphics and Windows 95 nearly closed the gap
with the Mac and today's with fast Pentiums, new high definition monitors
and blazing fast video cards the PC has caught up with the Mac and
outperforms television. There are a number of terrific software packages that
allow you to create multimedia presentations on your computer. Perhaps the
best and most widely known is Microsoft's PowerPoint. With PowerPoint a
user can mix text with pictures, sound and movies to produce a multimedia
slideshow that's great for boardroom presentations or a computer kiosk but
difficult to distribute.
Eventually, in the not too distant future, the digital movie imbedded in
web pages will become the presentation delivery system of choice relegating
PowerPoint to the dustbins of software. If you have ever browsed a DVD
movie disk on your computer you've seen that future.
Text
Still images
Sound
Movies
Animations
Special Effects
147
Text, still images and the video portion of movies are functions of your
monitor, your video card and the software driver that tells Windows how
your video card works. Your monitor is essentially a grid of closely spaced
little luminous points called pixels which can be turned on and off like tiny
light bulbs. For the sake of simplicity we'll extend our above example to say
that the little bulbs can be lighted with a number of colors. Just how close
together those points of light are packed is a function of your monitor. The
number of colors that the luminescent points can display is a function of the
monitor in concert with the video card. (If you're wondering what a video
card is, follow the cable from your monitor to your computer.)
148
5.3 Major characteristics of multimedia
149
simulations whose co-efficients, events, illustrations, animations or videos
are modifiable, allowing the multimedia "experience" to be altered without
reprogramming. In addition to seeing and hearing, Haptic technology
enables virtual objects to be felt. Emerging technology involving illusions of
taste and smell may also enhance the multimedia experience.
150
5.5 Multimedia and the Future
151
Multimedia can arguably be distinguished from traditional motion
pictures or movies both by the scale of the production (multimedia is usually
smaller and less expensive) and by the possibility of audience interactivity or
involvement (in which case, it is usually called interactive multimedia).
Interactive elements can include: voice command, mouse manipulation, text
entry, touch screen, video capture of the user, or live participation (in live
presentations).
152
adjective) also describes electronic media devices used to store and
experience multimedia content. Multimedia is similar to traditional mixed
media in fine art, but with a broader scope. The term "rich media" is
synonymous for interactive multimedia. Hypermedia can be considered one
particular multimedia application.
153
text or may be considered interactive if the user interacts by turning pages at
will. Books may also be considered non-linear if the pages are accessed non-
sequentially. The term "video", if not used exclusively to describe motion
photography, is ambiguous in multimedia terminology. Video is often used
to describe the file format, delivery format, or presentation format instead of
"footage" which is used to distinguish motion photography from
"animation" of rendered motion imagery. Multiple forms of information
content are often not considered multimedia if they don't contain modern
forms of presentation such as audio or video. Likewise, single forms of
information content with single methods of information processing (e.g.
non-interactive audio) are often called multimedia, perhaps to distinguish
static media from active media. Performing arts may also be considered
multimedia considering that performers and props are multiple forms of both
content and media.
154
A presentation using Powerpoint. Corporate presentations may combine all
forms of media content.
155
Multimedia finds its application in various areas including, but not
limited to, advertisements, art, education, entertainment, engineering,
medicine, mathematics, business, scientific research and spatial temporal
applications. Several examples are as follows:
5.7.2 Commercial
156
CD-ROMs or online. Some video games also use multimedia features.
Multimedia applications that allow users to actively participate instead of
just sitting by as passive recipients of information are called Interactive
Multimedia. In the Arts there are multimedia artists, whose minds are able to
blend techniques using different media that in some way incorporates
interaction with the viewer. One of the most relevant could be Peter
Greenaway who is melding Cinema with Opera and all sorts of digital
media. Another approach entails the creation of multimedia that can be
displayed in a traditional fine arts arena, such as an art gallery. Although
multimedia display material may be volatile, the survivability of the content
is as strong as any traditional media. Digital recording material may be just
as durable and infinitely reproducible with perfect copies every time.
5.7.4 Education
157
5.7.5 Engineering
5.7.6 Industry
5.7.8 Medicine
158
5.7.9 Miscellaneous
A good site must be made with a specific purpose in mind and a site
with good interactivity and new technology can also be useful for attracting
visitors. The site must be attractive and innovative in its design, function in
terms of its purpose, easy to navigate, frequently updated and fast to
download. When users view a page, they can only view one page at a time.
As a result, multimedia users must create a ‗mental model of information
structure‘.
159
production should always be a landmark, able to be accessed from anywhere
within a multimedia piece.
160
Chapter Five
Multimedia
End Chapter Quizzes
2. A ---- image is defined as a grid whose cells are filled with colours.
A Bitmap
B Vector
C Printed
D Interactive
4. The bitmap file format supports upto ---- bit depth colour.
A 23
B 24
161
C 25
D 26
162
9. ---- is a technique in which you define the start image and the end
image
A Morphing
B Tweening
C Multimedia
D None of the above
163
Answer key to End Chapter Quizzes
Chapter One
1) b 2) b 3) b 4) b 5) c 6) a 7) c 8) a 9) b 10) c
Chapter Two
1) a 2) b 3) c 4) b 5) c 6) b 7) c 8) b 9) a 10) a
Chapter Three
1) b 2) b 3) c 4) b 5) b 6) c 7) b 8) a 9) d 10) a
Chapter Four
1) a 2) b 3) b 4) b 5) a 6) a 7) d 8) c 9) c 10) c
Chapter Five
1) d 2) a 3) a 4) b 5) a 6) c 7) b 8) c 9) a 10) c
164
BIBLIOGRAPHY
(I) Books :
1. I. T. Journal Weekly.
2. Journal of Data Communication.
165
Suggested Books
Data Communication and Computer Networking
166