Professional Documents
Culture Documents
Computer Communication
and Networking
Data "highway"
PC4
Shared hard
Shared laser File server disk
printer
"Public" files
PC1, PC2, PC3, print PC1’s private files
files PC2’s private files
PC3’s private files
PC/AT models. Data are communicated internally through a high-speed data bus in the PC system
units and in the PS/2 Model 30. A simplified diagram of the major data communications flow
paths of a typical IBM work stations with shared resources is shown in Figure 6.1(a). Figure 6.1(b)
illustrates the software communicating with each other.
A higher speed micro channel is used for internal data transfers in other PS/2 models. For data
communications with the outside world, however, the data streams of all these system units are
broken down into 8-bit bytes by the hardware.
Although all PC data are stored and communicated as bits, rules must be followed during stor-
age and transfer of data. The central processing unit (CPU) and all its peripherals must ‘‘speak the
same language’’. Conventions must be followed otherwise the devices provided for use with the
PC are likely to be incompatible with each other. Rules and conventions must also be followed in
the design and fabrication of devices used for external communications between the personal
computer and other computer systems. These rules and conventions have been primarily devel-
oped by the organizations shown in Table 6.1.
Table 6.1 Standards Organizations
Organization Description
IEEE: The Institute of Electrical and Electronic Engineers (IEEE) is an American profes-
sional group that establishes electrical standards. The organization has a micro-
processor standards committee that sets electrical and electronic standards for
the design of microcomputer components and systems.
(Contd...)
Figure 6.2
A wire pair
Figure 6.3
A coaxial cable
Central
PVC Insulation Copper wire
Copper mesh
Figure 6.4
Illustrating Transmitting Receiving
Antennas antennas
microwave
communication
from one point to
another
In between
Repeaters
Transmitting station
Receiving station
transmitting station and the last repeater is placed in line-of-sight of the receiving station. Two
consecutive repeaters are also placed in line-of-sight of each other. The data signals are received,
amplified, and re-transmitted by each of these stations.
Advantages and Limitations of Microwave Transmission
Microwave systems permit data transmission rates of about 16 Giga (1 giga = 109) bits per second.
At such high frequency, a microwave system can carry 250,000 voice channels at the same time.
However, the capital investment needed to install microwave links is very high and hence they are
mostly used to link big metropolitan cities which have heavy telephone traffic between them.
6.2.4 Communications Satellite
The main problem with microwave communications is that the curvature of the earth, mountains,
and other structures often block the line-of-sight. Due to this reason, several repeater stations are
normally required for long distance transmission which increases the cost of data transmission
between two points. This problem is overcome by using satellites which are relatively newer and
more promising data transmission media.
A communication satellite is basically a microwave relay station placed precisely at 36,000
km above the equator where its orbit speed exactly matches the earth’s rotation speed. Since a
satellite is positioned in a geo-synchronous orbit, (i.e. the orbit where the speed of the satellite
matches the earth’s rotation speed), it appears to be stationary relative to earth and always stays
over the same point with respect to earth. This allows a ground station to aim its antenna at a fixed
point in the sky. The Indian satellite, INSAT-1B, is positioned in such a way that it is accessible
from any place in India.
Figure 6.5
Illustrating
Satellite in Space
satellite
communication
from one point to
6 GHz 4 GHz
another
Transmitting Receiveing
Station on earth Station on earth
the time this signal reaches the satellite it becomes weak due to distance travelled of 36,000 km.
The satellite amplifies the weak signals and sends then back to the earth at a frequency of 4 GHz.
These signal are received at a receiving station on the earth. It may be noted that the transmitting
frequency is different from the receiving frequency of the satellite in order to avoid interference of
the powerful re-transmission signal with the weak incoming signal.
Advantages and Limitations
The main advantage of satellite communication is that it is a single microwave relay station visible
from any point of a very large area on the earth. For example, satellites used for national trans-
mission are visible from all parts of the country. Thus transmission and reception can be between
any two randomly chosen places in that area. Moreover, transmission and reception costs are
independent of the distance between the two points. In addition to this, a transmitting station can
receive back its own transmission and check whether the satellite has transmitted the information
correctly. If an error is detected, the data would be retransmitted.
A major drawback of satellite communications has been the high cost of placing the satellite
into its orbit. Moreover, a signal sent to a satellite is broadcasted to all receivers within the satelli-
te’s range. Hence necessary security measures need to be taken to prevent unauthorized tampering
of information.
6.2.5 Optical Fibers
In fiber optics, semiconductor lasers transmit information in the form of light along hair-thin glass
(optical) fibers at the speed of light i.e. 186,000 miles per second with no significant loss of inten-
sity over very long distances. As shown in Figure 6.6, the system basically consists of fiber optic
cables that are made of tiny threads of glass or plastic. Towards its source side is a converter that
converts electrical signals into light waves. These light waves are transmitted over the fiber.
Another converter placed near the sink converts the light waves back to electrical signals by pho-
toelectric diodes. These electrical signals are amplified and sent to the receiver.
Fiber-optic transmission systems are already on the market, and their popularity is growing
rapidly.
Figure 6.6
Transmission
through Electrical Electrical
Signal Optical fibre Signal
optical fibers Electrical Light to
to light electrical
wave converter wave converter
Light waves Light waves
Figure 6.7
Typical PC Telephone
system
communication
Internal modem
with peripherals
Monitor
Display
attachment
Printer
Printer
attachment
C.P.U
Disc drive
Disc drive
attachment
Keyboard
Keyboard
attachment
Mouse
Mouse
attachment
6.3.1 Bandwidth
Bandwidth is the transmission capacity of a computer or communications channel. For pure digi-
tal transmission, it is measured in bits or bytes per second. When digital data is converted to fre-
quencies for transmission over carrier-based networks, bandwidth is still stated in bits or bytes per
second. However, when frequencies are used as the transmission signal rather than on-off pulses,
bandwidth may also be measured in cycles per second, or Hertz. The bandwidth is the difference
between the lowest and the highest frequencies transmitted. In this case, the frequency will be
equal to or greater than the bits per second.
6.3.2 Baud Rate
Baud rate is the transmission speed of a communications channel. Baud rate is commonly used to
represent bits per second. For example, 4800 baud is 4,800 bits per second of data transfer. In a
typical personal computer transmission, 10 bits are used for each character, thus 4800 baud is
equivalent to 480 characters or bytes of data transmitted per second.
6.3.3 Bits per Second and Baud
Data transmission rates expressed in bits/second are unambiguous and indicate the exact rate of
data transfer. The baud rate, however, refers to the rate of transitions impressed onto a transmis-
sion line. As there are a number of ways to represent a bit (or a series of bits) as transitions on a
transmission path, there is only a loose correlation between the bit rate as expressed in bits/second
and the signalling rate as expressed in baud. Some encoding schemes, such as Manchester encod-
ing, require two bauds per bit. Other schemes, such as a Nonreturn to Zero or NRZ encoding, use a
single baud per bit. However, some schemes encode more than one bit with each baud and, thus, it
may be seen that the baud rate of a data stream can be higher or lower than the bit rate. As a result,
the bandwidth required to transmit at a given rate is a function of the encoding scheme used.
However, the signalling rate rarely differs from the bit rate by more than a factor of 2 or 4 when
wire-line transmission is used.
6.3.4 Digital and Analog Transmission
Data is propagated from one point to another by means of electrical signals which may be in digi-
tal or analog form. As shown in Figure 6.8(a), in an analog signal the transmitted power varies
over a continuous range, as in sound, light and radio waves. The amplitude (V) of analog signals is
measured in volts and its frequency (f) in hertz (Hz). The higher the frequency of the signal, the
more number of times it crosses the time axis. However, a digital signal is a sequence of voltage
pulses represented in binary form (see Figure 6.8(a).
Computer generated data is digital whereas the telephone lines used for data communication in
computer networks are usually meant for carrying analog signals. When digital data are to be sent
over an analog facility, the digital signals must be converted to analog form. The technique by
which a digital signal is converted to its analog form is known as modulation. The reverse process,
that is the conversion of analog signal to its digital form, at a destination device, is called demo-
dulation. An analog to digital signal converter converts analog to digital signal as shown in Figure
6.8(b).
bpbonline all rights reserved
224 Computer Fundamentals
t
0 1/ f 2/f
_V
1 1 1 1
0 0 0 0
t
A-D Converter
6.3.5 Modems
The process of modulation and demodulation, that is, the conversion of digital data to analog form
and vice-versa, is carried out by a special device called a modem (modulator/demodulator).
Hence, when an analog facility is used for data communication between two digital devices (say a
terminal and a computer), two modems are required, one near each digital device. As shown in
Figure 6.9(a), the digital signal generated at the terminal is converted to analog form by the mod-
ulator of the modem placed near it. The analog signal is transmitted through the telephone lines
and then converted to digital form by the demodulator of the modem placed near the computer.
This digital data is processed by the computer. The processed digital information is modulated to
analog form and returned via the telephone line to the terminal where the analog signals are
demodulated to digital form for display on the terminal.
0 1 1 0 0 1 1 0
Modulator Demodulator
Terminal compute
Demodulator Modulator
0 1 0 0 0 1 0 0
Figure 6.10
Data lines
Parallel data Data bits
transfer 8
Receiving Transmitting
device 7 device
1
Example Example
memory Parity C.P.U
16-bit data bus, such as the IBM PC AT, contain 16 parallel data lines for communication with
internal devices. Data lines are often round, shielded cables. Such cables are also used with most
dot-matrix parallel printers and the IBM PC computers.
Parallel Input/Output (I/O)
Parallel data transfer requires that a cable containing at least eight data lines be installed between
two communicating computers. At short distances (less than 100 feet), this can be done at an
affordable cost. For long-distance transfers, however, it is more economical to use the existing
telephone equipment than to instal expensive parallel signal amplifiers and parallel cables. Hence
the design of the telephone lines and that of equipment makes it necessary to go to serial data
transfer in order to be able to use this equipment.
6.3.7 Serial Input/Output
In serial data communications, data bits are transferred one at a time between the source and the
destination. Compared to the simultaneous transfer of groups of eight data bits that takes place in
parallel communications, serial data communication does not move data, as fast as parallel data
transfer does . Serial data transfer is chosen when the economics and practicality of hardware
design and installation dictate that it must be chosen.
As shown in Figure 6.11, the transmitting device in the personal computer sends eight simul-
taneous bits of data to the serial conversion hardware, but data bits move sequentially from that
equipment to the receiving station. The parallel data bit stream must be converted to a serial form
by using a high-quality combination of hardware and software for data transfer between one com-
puter and another device.
Figure 6.11
Parallel
Serial data transfer data bits
Receiving 8 Transmitting
device device
Parallel to 7
serial
conversion 6
Serial to 5
parallel
4
conversion
3 3
2 2
Serial data bits
Example
personal 1 4 5 6 7 8 1 Example
computer another
computer
Figure 6.12
Direction of data
flow
Data flow
Transmitter Receiver
Simplex configuration
Transmitter Receiver
& &
Receiver Transmitter
Half-duplex
configuration
Transmitter Receiver
& &
Receiver Transmitter
Full-duplex
configuration
sent in one contiguous stream. This is in total contrast with asynchronous transmission, in which
each data character is preceded and followed by one or more bits signalling the start and stop of
each character.
Marking line
Start
bit Data bits
Data flow
* May be 8th data
bit or parity bit
The start bit is always preceded by a low-voltage signal on the data line, called a marking line
or marking state, that provides a clear contrast for detecting the beginning of a new start bit. At the
end of every train of eight data bits is a caboose called a stop bit. (There may actually be one, one
and one-half or two stop bits at the end of each character, but one stop bit is used for most IBM PC
communications.) The stop bit is a low-voltage marker that tells the receiving device that one
entire byte has been transmitted. It also returns the data line to the marking state. These start and
stop bits frame each transmitted byte so that the 1s and 0s in that byte are clearly segregated from
the 1s and 0s that come down the line later.
6.4.2 Synchronous Data
Synchronous data are transmitted in blocks. Also, synchronization information is either provided
within the blocks for long-distance transmission or provided on a separate data line for local
transmission. Figure 6.13 (b) shows data flags at the beginning and at the end to tell the receiving
device where the blocks of data start and end.
The individual 8-bit groups of 1s and 0s are not framed by synchronizing bits as they are in the
asynchronous communication mode. In fact, synchronous data transfer may not be character-
oriented at all. The data link control of synchronous protocols may be either character-oriented or
bit-oriented. Character-oriented protocols recognize bytes of data as specific characters, whereas
bit-oriented protocols do not impose character assignments to transmitted data bits.
Advantages of Synchronous Communication
The synchronous communication method offers three advantages over the asynchronous method.
These are:
(a) The elimination of synchronizing bits results in a higher ratio of data bits to total bits trans-
ferred.
(b) The synchronous method also allows a user to transmit data that is not made up of 8-bit
characters.
(c) Allows the personal-computer user to communicate with mainframe networks that use syn-
chronous mode communication.
Disadvantages of Synchronous Communication
Synchronous data transfer is normally limited to business applications. The hardware and software
required to support this method of data link control is very expensive for PC users. Many home-
computer owners will have difficulty justifying the high cost. The cost of synchronous hardware
and software combinations can be many times that of asynchronous hardware and software
combinations. With new introductions of products that use increasingly large scale chip integra-
tion, this cost difference should reduce with time.
6.4.3 Serial Data Transfer and Networking
Although most of the IBM PC internal communications are in the parallel mode, most other com-
munications with which the user interacts are in the serial mode. Communication of data between
the PC and other computer systems is typically done over distances greater than 100 feet, making
serial communications the only economically feasible technique to use. It is less expensive to use
the existing telephone lines and the equipment that support serial communications than to install
parallel communication cables and parallel signal-amplifying equipment. Because of the PC’s
heavy dependence on serial data communications for interacting with the outside world, we shall
concentrates on the details of serial data transfer.
6.4.4 Serial Data Transfer Speeds and Baud Rate
In serial communications, data-transfer rates are measured in bits per second (bps). The term used
to describe the total number of binary signal events occurring every second is baud rate. Baud rate
is directly related to the duration of the voltage signal used to represent a binary digit. The follow-
ing formula is an exact mathematical definition of the term:
1
Baud rate =
Bit signal duration
By decreasing the duration of the bit signal (bit time), you can increase the baud rate, and con-
versely, by increasing the duration of the bit signal, you can decrease the baud rate. Baud rates
available for communications are normally discreet values determined by communications
hardware and selected through communications software. For most communications applications
of the personal computer, the baud rate used will also equal the data transfer bit rate. Business
applications that require rapid data transfers may require the use of devices that superimpose sev-
eral binary data signals on each binary signal event, thereby making the data transfer bit rate
higher than the baud rate. For communications at 450 baud and less, the baud rate and bit rate are
the same. For communications above 450 baud, the baud rate and bit rate are usually different.
These terms will always be correct regardless of the transfer technique used. Table 6.2 provides
information regarding communication parameters for different service organizations available on
international networks such as Internet.
Table 6.2 Information utility communication parameters
Figure 6.14
Asynchronous and
synchronous AB C DE F GH I J MN
transmission Asynchronous KL
system Transmission
ABCDEFGHIJK LMN
Synchronous
Transmission
Bisync protocol is character-oriented, meaning that each character has a specified boundary.
Each character is not provided with synchronizing bits, as is the case with asynchronous data.
Instead, bisync synchronization is performed at the beginning of each data message. The trans-
mitting station sends two or more leading pad characters to the receiving station before data are
transmitted. The leading pad character is an alternating 1 and 0 bit pattern that allows the receiving
station clock to synchronize with the transmitting station clock. The bisync protocol requires that a
data bit be transmitted during every bit interval. Before data transmission can begin, character
synchronization must take place. A signal is required to provide the receiver with the length of
individual data units and a mark that identifies the start of a data unit boundary. The synchronous
idle character (SYN) is used to perform this handshaking. Two or more of these characters are
provided at the start of each bisync data stream.
6.4.7 SDLC and HDLC Protocols
The synchronous Data Link Control (SDLC) and High-Level Data Link Control (HDLC) syn-
chronous data-transfer protocols are not used by home-computer owners because of their high ini-
tial cost, but they are becoming world standards for business communications. Because of the
business interest in SDLC and HDLC protocols, they will be reviewed briefly in this text.
The actual data transmitted under SDLC/HDLC is called an information field. That field is
simply a serial stream of binary numbers. The field may be any length from zero data bits upto a
maximum that is determined by memory size or the protocol implemented. The data stream is bit-
oriented, meaning that no character boundaries are provided with the data. If the data contains
characters, the receiving device must segregate them after receipt of the data.
Differences between Bisync and HDLC Protocols
(a) Pauses in data transmission are allowed in bisync but not in SDLC/HDLC.
(b) There is no SDLC/HDLC equivalent of the bisync SYN character.
(c) Both SDLC and HDLC require continuous data transmission until the entire information
field is transmitted. If a pause or break occurs in the data transmission, the transmitting
device assumes an error has occurred and aborts the transmission.
Framing of HDLC Fields
SDLC/HDLC data, like bisync data, are provided with only one set of framing data for the entire
stream compared to the framing provided with each character in asynchronous communications.
As shown in Figure 6.15, the SDLC/HDLC information fields are framed by several data fields.
Each information unit begins with a beginning flag and ends with an ending flag. These flags are
01111110 bit patterns and serve as the outside boundaries of each frame of data. The beginning
flag is followed by two fields called the address field and the control field. Both of these fields are
eight bits long for SDLC and HDLC. The HDLC frame has one additional address field called a
packet header that routes the frame through a packet-switched network to its proper destination.
SNA
The IBM System Network Architecture (SNA) used to control communications between many
IBM computer products is based on the SDLC protocol. A PC with the proper SDLC hardware
bpbonline all rights reserved
Computer Communication and Networking 235
Figure 6.15
SDLC DATA STRUCTURE
SDLC and HDLC
protocols
Data Address Control Information field Cyclic Cyclic Data
start field field redundancy redundancy end
flag check check flag
Data field
Frame
Data field
Frame
and software can be used to emulate an IBM 3270 terminal in such a network, besides being used
as a local stand-alone microcomputer to support spreadsheet and word-processing applications.
Combining these two capabilities in one set of hardware would make the PC a powerful executive
workstation for business applications. Typical SDLC networks are shown in Figure 6.16.
As shown in Figure 6.16, the SDLC/HDLC protocols allow only one primary station, but one
or more secondary stations are supported. The address field in an SDLC/HDLC frame identifies
the secondary stations that are the intended recipients of data. The address field of the primary
station’s frame contains a secondary station’s address, whereas the address field of a secondary
station contains its own source address because a secondary station can communicate with only
one destination device, i.e. the primary station.
6.4.8 Speed-Matching In Asynchronous Communication
When the transmitted data can be routed to another device and immediately printed, displayed or
saved on the receiving end, there would be no delays or interruptions in the serial transfer of data.
Differences in the speed of some of these operations, however, result in the need for data transfer
flow controls. The need for data flow control depends a great deal upon the IBM PC system unit
chosen for communications and upon the speed of communications.
All IBM PS/2 and PC system units contain the necessary hardware and operate fast enough to
reduce the need for data flow control. With Direct Memory Address (DMA) devices in these units,
Figure 6.16
Mainframe
Magnetic disk
networks storage
(SNA Networks)
Remote
terminal Printer
controller
Large-scale
CRT terminal devices main frame
computer
Commu-
nications
Stand-alone controll-
terminal er
devices
Local
Small terminal
controller
computer
Magnetic
tape
storage
the CPU can continue accepting new data from a remote computer while simultaneously writing
accumulated data to disk. All IBM PS/2 and some PC system units operate above 6 MHz which
allows them to handle data at a much faster rate than the early vintage 4.77 MHz system units.
Data flow speed-matching techniques come in a variety of forms, but most of them can be
categorized as either on/off data flow toggles or temporary data storage mechanisms. IBM PC
asynchronous communication applications of both of these techniques are discussed in the fol-
lowing section.
Communication Buffers
A communication buffer is random access memory set aside to temporarily store data to compen-
sate for differences in the rates at which data are transferred and received. In data communications,
buffers are often provided on both the transmitting and receiving ends of a communication link,
but the term communication buffer is normally used when referring to the buffer on the receiving
end.
Data are transferred from the transmit buffer on a first-in/first-out basis so that they are trans-
mitted in the same sequence in which they were received. When the transmit buffer has been
emptied, more data is loaded into it from the disk file.
The size of the receive buffer is more crucial and the one with which most PC users will be
concerned when performing data communications. If a communications software package’s trans-
mit buffer is too small, data may be transmitted to a remote computer in bursts rather than in a
continuous flow.
Receive buffers act in the same manner as transmit buffers, but the direction of data flow is
reversed. A receive buffer accepts data coming in from the communication line and stores them
until the communication program can display, print or store the data in a disk file or memory
space.
Interrupt Handler
Communication buffers provide a necessary function in speed-matching with remote computers,
but do create limitations for multitasking software. Because of the memory storage space required
for these buffers and the need to place data into the storage space as soon as they are ready for
transmit or receive, a communications software module cannot be swapped from memory to disk
while the buffers are active. These buffers are normally linked directly to the communications
hardware through software interrupt handlers. These interrupt handlers actually become exten-
sions to PC-DOS after they are loaded and have specific transmit and receive buffer memory
locations. When a character is ready to be transmitted to the communications hardware or a
character is received from a remote computer at the communications hardware, the interrupt han-
dler moves the character to the specified memory location regardless of the software currently
occupying that location. If the communications software has been temporarily removed from
memory by a multitasking environment and another software program is loaded in its place, when
the interrupt handler moves the character into memory, the character may get placed in an unde-
sirable location causing the system unit to stop operating. To prevent this occurrence, most multi-
tasking software allows you to designate a program as a communications module, thereby
preventing it from being temporarily removed from memory while it is active. Operating System/2
provides special capabilities that support multitasking communications software to eliminate some
of these problems.
within the medium, such as in a microwave or satellite channel or in a broadband local area net-
work. The allocation of a frequency in the communication channel is important to avoid any
interference or mixing up of the systems.
6.5.1 Multiplexing
Multiplexing is a transmission of multiple signals over a single communications or computer
channel. The multiplexor brings together several low speed communications lines, transforms
them into one high speed channel and reverses the operation at the other end. The multiplexers
also perform the concentration functions. Multiplexers are less expensive than concentrators, but
many of the earlier versions were not programmable and thus did not have the flexibility of con-
centrators. However todays microprocessor equipped multiplexers perform much like concentra-
tors.
There are many applications in which several terminals are connected to a computer. If each
terminal is operating at 300 bits per second over a communications line (channel) that can operate
at 9600 bits per second, then we see a very inefficient operation. It has been found that the capacity
of a channel exceeds that required for a single signal. A channel is an expensive resource. Hence,
for its optimal utilization, the channel can be shared in such a way so as to simultaneously transmit
multiple signals over it. The method of dividing a physical channel into many logical channels so
that a number of independent signals may be simultaneously transmitted on it is known as multi-
plexing. The electronic device that performs this task is known as a multiplexer.
A multiplexer takes several data communications lines or signals and converts them into one
data communications line or signal at the sending location. For example, as shown in Figure 6.17,
there may be 4 terminals connected to a multiplexer. The multiplexer takes the signals from the 4
terminals and converts them into 1 large signal which can be transmitted over 1 communications
line. Then, at the receiving location, a multiplexer takes the 1 large signal and breaks it into the
original 4 signals. Without multiplexers, you would have to have 4 separate communications lines.
Figure 6.17
A multiplexed
T1
system
M U L T I P L E X E R
M U L T I P L E X E R
C O M P U T E R
T2
MODEM
MODEM
T3
T4
Figure 6.18
Frequency division Modulator Demodulator
multiplexing Signal - 1 40 KHz 40 KHz Signal - 1
The best example of FDM is the way we receive various stations in a radio. Each radio station
is assigned a frequency range within a bandwidth of radio frequencies. Several radio stations may
be transmitting speech signals simultaneously over the physical channel which is "ether" in this
case. A radio receiver’s antenna receives signals transmitted by all the stations. Finally, the tuning
dial in the radio is used to isolate the speech signal of the station tuned. In FDM, the signals to be
transmitted must be analog signals. Thus, digital signals must be converted to analog form if they
are to use FDM.
Time Division Multiplexing (TDM)
The bit rate of a transmission medium always exceeds the required rate of the digital signal. This
fact is utilized for time division multiplexing. In TDM, the total time available in the channel is
divided between several users and each user of the channel is allotted a time slice (a small time
interval) during which he may transmit a message. The channel capacity is fully utilized in TDM
by interleaving a number of data streams belonging to different users into one data stream.
Streams of data sent through the physical channel must be demultiplexed at the receiving end.
Individual chunks of messages sent by each user are reassembled into a full message at the
receiving end. The process of TDM is illustrated in Figure 6.19 for multiplexing three different
signals. The same idea may be extended for multiplexing several signals.
TDM may be used to multiplex digital or analog signals. For communications of digital data,
it is more convenient to transmit data directly in digital form and thus TDM is more appropriate.
Figure 6.19
Time division Reassembled
Time sliced signals signals
multiplexing
Signal A A3 A2 A1 A3 A2 A1
Sending Receiving
end end
Demulti
Signal B B3 B2 B1 CHANNEL B3 B2 B1
Plexer
C2 B2 A2 C1 B1 A1
Signal C C3 C2 C1 C3 C2 C1
Moreover, communication between computers occurs in short, fast bursts. Each burst would thus
need the full channel bandwidth which is available to a signal in TDM. Besides this, TDM is gen-
erally more efficient as more subchannels can be derived because it is upto the network designers
to allocate time slots to different channels. It is common to have 32 low speed terminals connected
to one high speed line.
Whether or not to use multiplexing usually depends upon economics. The cost of high-speed
modems and multiplexers is very high compared to the cost of low-speed modems. However, if
line costs are high due to long distances, then multiplexing is cost effective. One serious disad-
vantage with multiplexing relates to transmission line failure. If the line goes out, everything is
dead. With individual lines only one terminal is likely to be lost.
6.5.2 Concentrators
A concentrator performs the same function as a multiplexer, but concentrators have the ability to
actually reduce the number of signals. For example, 100 signals from different devices coming
into the concentrator could leave as only 70 or 80. The signals are concentrated to form a fewer
number of signals. This requires intelligence. This intelligence normally takes the form of micro-
processors or even minicomputers. Thus, a concentrator is basically an intelligent multiplexer.
The advantage of using a concentrator is that devices of varying speeds and types are
connected to the concentrator which in turn is connected to the host computer by high speed lines.
Concentrators are especially useful where data communications costs are high, such as long-
distance international communications. In general, concentrators are more expensive than multi-
plexers. For some long-distance and international data communications applications, however, the
use of concentrators is cost justified.
6.5.3 Space-Division
Prior to the advent of electronic switching, the early manual and electro-mechanical PBX utilized
space-division switching networks. These systems established connections between the switching
network’s ports by providing a unique dedicated physical path for each conversation. A single-
source port and a single destination port occupied a full-duplex physical path for the duration of
the call. The physical paths in manual and electromechanical space-switching networks carried
continuous analog signals.
Figure 6.20
FINANCIAL ENGINEERING
Typical LAN
system with
shared peripherals
LINE PRINTER
SALES
MAINFRAME SERVER
OPERATIONS
SERVER
MINICOMPUTER
PUBLICATIONS
MAGNETIC TAPE
STORAGE
cheaper to purchase another laser printer than to purchase today’s networking hardware and
software.
(b) Local area networking software requires memory space in each of the computers used on the
network. For an IBM PC/AT, with 2 mega byte of main memory, computer in an IBM
Token-Ring Network that has a printer or a disk space shared with other users, almost 20 per
cent of the computer’s memory will be needed to manage the network interface. This
reduces the memory space available for the user’s programs.
(c) Local area networking adds another level of complexity to the computer operation. Users
may have difficulty in learning the network commands. The installation and management of
a LAN requires far more technical and administrative skills than installing and managing
several computers that are not networked.
(d) Some control on the part of the user is lost. You may have to share a printer with other users.
You may face a situation like entire network suddenly locking up because one user has made
a mistake.
(e) Some type of security system must be implemented if it is important to protect private data.
(f) Many current application programs will not run in a network environment. The program
may require too much memory or have other technical constraints. In other cases the pro-
gram may run, but the execution leaves too little memory for data. Memory-intensive pro-
grams, such as spreadsheets and expert systems, are particularly vulnerable to networking.
Table 6.4 LAN vs single user system
Advantages Disadvantages
Economic Less computer memory available
Shared peripherals High cost
(as printers) Greater complexity
Technological flexibility Less user control
Incremental growth Prone to security loss
Organizational
Improved communications
Improved standardization
Better control
Controlled security
Data sharing
the maximum data transfer speed of 56 Kbps (7000 cps) for high-grade telephone company
digital trunk lines, or the 1200/2400 bps (120/240 cps) transmission speed used by most
personal computer communications systems.
(c) LANs are private networks, not subject to tariffs or other regulatory oversight.
6.6.3 Differences between Multiuser Systems and LANs
There are obvious physical and design differences between multiuser systems and LANs. These
are illustrated in Figure 6.21. Multiuser terminals are physically connected to serial input/output
Figure 6.21
Shared resource Keyboard and display only
architectures
RS-232-C
terminal I/O
Multiuser computer
LAN
PC PC PC PC
ports on the central computer and the terminal users are assigned segments of main memory for
program execution and data storage. LAN users use local memory in their workstations. Each user
in a multiuser system is typically assigned certain access rights for mass storage on a shared hard
disk.
The most significant operational difference between the two systems, however, is the manner
in which central processor loads are divided. In the multiuser system, each terminal shares a por-
tion of the main CPU’s processing time, whereas in the LAN, each workstation has its own CPU.
The combination of a multiuser terminal, its assigned area of main memory and a share of the CPU
execution time is functionally equivalent to a single workstation on a local area network.
bpbonline all rights reserved
Computer Communication and Networking 245
From a general performance perspective, multiuser systems are sensitive to how the central
CPU’s time is allocated to its attached terminals, and to the number of active terminals. LAN per-
formance, on the other hand, is most sensitive to how the shared resources are managed and to the
rules by which workstations share access to the network. The common performance denominator
is the design of the software needed to manage the shared resource, be it CPU or hard disk.
6.6.4 LANs Fundamentals
Network adaptor card
For purposes of illustrating basic concepts, the simplified LAN shown in Figure 6.21 will be
briefly described. The hardware components consist of four IBM PCs all attached to the PC called
‘‘Server.’’ In each PC, an adapter card is required in one of the expansion slots. This card is
referred to by an assortment of names, depending on the particular network vendor. Some of the
more common names are transporter card, network adapter card, network interface card, or
Ether Link. The adapter card has the same purpose in this network as the RS-232-C asynchronous
communications card has in a modem/telephone network. The purpose is to provide an intelligent
conduit for the data to move from the workstation or server computer to the network and from the
network to the computer. This card is designed for the communications function of a LAN and has
a relatively limited role in the LAN’s data processing function.
Once data leaves the computer and passes through the adapter card, it enters the network data
highway. The network’s physical data path is commonly formed by a coaxial cable, similar to that
used on a cable TV installation. Some systems use a cheaper means of data transport, the twisted-
pair wire, similar to that used in telephone installations. Cables can be terminated at both ends,
connected to a central file processor or attached to a hub, like spokes on a wheel. The hub might
contain a ring circuit, or it could contain circuitry to amplify signals on the network. In ring-type
network systems, the data path forms a closed loop. Several common methods of making connec-
tions from PCs to the data path are shown in Figure 6.22.
Two basic types of equipment are attached to a local area network. More numerous are work-
stations, designed to provide a user’s window to the network and to support local data processing
functions. Less numerous, but absolutely essential for any practical network operation, are servers.
Servers, as their name implies, perform some type of service to all the users on a network. Servers
are by definition shared devices, and their performance is most often measured in relation to how
well they accommodate multiple, near-simultaneous requests for service.
Terminology
Nodes: The PCs and the server are known as network devices or network nodes. In general, a
device or node is connected directly to the network cable or data path.
Media: The media, and data bus are collectively used to refer to the data path. Media can be
bounded, such as a cable or wire, or unbounded, such as free space. Most LANs use bounded
media, although there is current interest in developing unbounded radio broadcast LANs.
Server: The term server refers to any device that offers a service to network users. A server can
be hardware, software or both. Servers can be PCs doing double duty, or they can be special-
Figure 6.22
Typical physical
Stub
LAN connections Lan media
Adapter card
Wire
Modular
telco wire
RJ-11
RJ-11
purpose devices. The most common are file servers, print servers and gateways (also known as
communications servers).
Protocol: The set of rules that allows an orderly, reliable transfer of data among all network
devices is collectively known as a protocol. In the context of the seven-layer model developed by
the International Standards Organization, a protocol refers to the rules associated with a specific
layer or set of layers. For example, the Ethernet, Arcnet and IBM Token Ring protocols apply only
to the Physical and Data Link Layers. Ethernet began as a de facto standard but has been adapted
to the ANSI/IEEE 802.3 Local Area Network standard.
Virtual: A process is virtual if it does not exist but appears to; a process is transparent if it exists
but does not appear to. For example, a virtual disk process allocates RAM to simulate the presence
of an extra floppy disk drive. In this case, a virtual disk appears to be a real disk drive to an appli-
cations program, but does not physically exist. The separation of physical aspects of a LAN and
the applications that run on it is a good example of transparency. The underlying communications
methodology of a LAN is transparent to the user’s application. In other words, a database software
package would not operate any differently on an Ethernet, an Arcnet or an IBM Token Ring LAN.
Physical and logical: A physical entity can be seen and touched; a logical entity exists as a
process or an activity, but in general cannot be seen or touched. Hardware is physical; software (in
operation) is logical.
Throughput: The term throughput is a measure that describes the interval from the time a request
is entered at a workstation until the response is received at that workstation.
Data rate: It is a measure of how fast data move between two adapter cards on a network. Data
rate is a useful measure because it provides an upper limit boundary on network communications
capacity.
Bottlenecks: Throughput can be thought of as the data rate minus the sum of the bottlenecks
inherent in a local area network. Typical bottlenecks include network adapter cards, data move-
ment within workstations and servers and access to shared hard disks for data reads and writes.
Throughput depends not only on data rate and design bottlenecks, but also on the manner in which
the network is being used.
Host: The term host refers to the microcomputer attached to a network device. It may also refer to
the native operating system on a workstation. Thus MS-DOS is a host operating system, and an
IBM PC or PS/2 may be host to a server function or to a workstation.
Workstation: A workstation is a computer used as a node on a network primarily used to run
application programs. In the IBM Token-Ring Network, any IBM PC compatible computer can be
used as a workstation.
6.6.5 Working of LAN Systems
The network adapter card plays a major role in determining the performance local area network.
The network adapter card is the most visible evidence that a workstation is attached to a local area
network. It is also the physical and logical link between the host microcomputer and the network
to which it is attached. On one side, the adapter card must exchange data with the host computer’s
microprocessor and internal RAM; on the other side it must transmit and receive data at the speed
and in the format required by the network media. The adapter card may contain significant amount
of firmware in a Read Only Memory (ROM) chip. This software is primarily designed to imple-
ment communications protocol. Adapter cards are designed to communicate with the host com-
puter through Direct Memory Access (DMA) channels, Interrupt Request (IRQ) channels, and/or
Input/Output ports. Figure 6.23 illustrates the basic functions of a network adapter card, including
basic data conversions, encapsulation into packets, access control and network signaling.
6.6.6 Speed of Data on the Network (Data Rate)
One of the major factors that characterizes a LAN is the speed at which data move on the network.
Local area network data transfers are done in a serial mode bit by bit. A mismatch in data rates
between the network and its host processor requires buffering, or temporary data storage, to pre-
vent the loss of data as it goes into the host computer. It is the job of the network adapter card to
manage data rate mismatches. Such mismatches usually occur because the network adapter card
Figure 6.23
Function of a
network adapter Access control
Buffer rules (software)
card Parallel
data Busy
Encode
IBM PC
Transceiver
Computer bus/
adapter card
interface
Card cable
interface
Network
cable
processes data packets slower than the speed of movement of data on the network and slower than
the speed of movement if data that the host computer is capable of moving to and from the card. In
other words, the network adapter card becomes a bottleneck between the network media and its
host computer.
How does Data Move on the Network?
The network in Figure 6.23 distribute processing and data-storage tasks among a number of users
who may require near simultaneous access to the server PC. Controlling multiple users requires
structuring of the data flow in a standard manner. Control implies an orderly means of allowing
each device to access the network. It also implies a degree of service that allows data to arrive at
its correct destination with some assurance that transmission errors have been detected. A pre-
requiste to such network control is the placement of serial data streams into formatted packets
which are transmitted in accordance with network protocol. An example of the format of data as it
travels from one network adapter card to another in the Ethenet data packet, is shown in Fig-
ure 6.24.
Differences between Asynchronous Data Flow and LAN Data Travel
(a) Asynchronous data are transmitted one character at a time, while LAN data travel as large
blocks, combining control bits with control and pure data characters.
(b) Except for file transfers to and from shared hard disks, LAN data packets follow a random
pattern that reflects the random nature of user workstation activity.
Figure 6.24
Ethernet packet Keyboard and display only
related to existing
LAN
"John" "Server"
T
CRC Data y Source Destination Preamble
p
e
common form of wiring installed in offices today. Twisted-pair wiring can take on entirely differ-
ent personalities depending on the type of signaling employed. The gamut runs from RS-232-C,
which is nominally limited to 19,200 bps at for distances upto 50 feet, to AT&T’s Starlan system,
which can support data rates of 1 Mbps over distances of 800 feet.
Coaxial cables of types RG-58, RG-59 and RG-62 are used in many of today’s LAN systems.
The newer Token Ring networks, such as IBM’s Token Ring and Proteon’s ProNET, allow the
selection of special wiring that combines multiple twisted pairs and coaxial-type shielding. Coax-
ial cables support data rates of up to several tens of Mbps at distances upto several thousand feet.
Certain types of signaling will allow high data rates over distances of several miles.
Fiber optics has superior data handling and security characteristics. Fiber optic cables cannot
be tapped and can support data rates of several hundred Mbps. Connection costs for fiber optic
networks are currently high, but are expected to decrease significantly in the next few years.
Data rates supported are dependent on the frequency band used for the network the higher the
frequency band, the higher the maximum possible data rate. A potentially viable technology is the
use of ultra-high frequency (UHF) radio modems operating at very low power levels for office
workgroup LANs.
6.6.8 Categories of Signaling
Signaling is the method by which a network represents data (1s and 0s) on the media during its
movement between the output of the source network adapter card and the input of the destination
network card. It also refers to the manner in which digital 1’s and 0’s familiar to a computer are
transmitted on the network data path.
The two basic categories of LAN signaling are:
(a) Baseband
(b) Broadband
The concepts of baseband and broadband signaling are illustrated in Figure 6.25. Signaling is
generally the responsibility of the network adapter card.
In the baseband system shown in Figure 6.25(a), a single digital signal is sent to the network
media. A serial stream of bits is packed into formatted data packets by the network adapter card
and converted to a form suitable for transmission on the data path. The serial data packets are sent
and received at a specific design data rate typically 1 to 80 Mbps.
In a baseband network system, no signal conversion device is required between the network
node and the data path.
Baseband LANs are generally cheaper and simpler to acquire and install than broadband sys-
tems.
A broadband system like the one shown in Figure 6.25(b) makes efficient use of high-capacity
cable TV (CATV) distribution media. This type of cable can support a bandwidth of 300 mega-
hertz (MHz). The high bandwidths on CATV cables were designed to accommodate fifty 6-MHz
wide TV channels for community video distribution. This high capacity can be fully exploited in
broadband local area networks.
Figure 6.25
Signaling on a
Local Area
Network
Network adapter Network media
Host PC card
1 1 1 1 1 1 1 1
0 0 0 0 0 0 0 0
Full capacity of
network media
(a) Baseband
IBM PC Network
1 1 1 1 adapter card
0 0 0 0
1 0 11 0 0
Fixed
frequency
modem
CH-1
CH-2 Partial
bandwidth
CH-3 of
broadband
cable
CH-4
CH-5
Fixed Frequency
frequency agile
modem modem
stations then extend from this unit in a star configuration. Token ring provides the twin advantages
of the ring and star topologies in one design. The following rules and limitations apply:
(a) The maximum, number of station is 96
(b) Eight workstations can be attached to a multi-station access unit (MAU).
(c) Up to 12 MAUs can be included in the ring.
(d) The maximum distance between a node and an MAU is 150 feet.
6.7.1 Topology
Topology is the way networks are physically connected together. The three most common LAN
topologies available for PCs are illustrated in Figure 6.27 star, ring and distributed bus. All are
normally associated with baseband networks. Another very common topology is the distributed
star, as illustrated in Figure 6.28. While all distributed star networks are identical in physically
appearance, the nature of the stars’ connected hubs can be radically different. For example, in
Novell’s S-Net, the connected hubs are active repeaters, responsible for retransmitting data pack-
ets between two stations in a round-robin sequence. The IBM Token Ring hubs are electrical ring
circuits (See Figure 6.28). These are referred to as Media Access Units or MAUs.
Importance of Topology
Topology determines the complexity and therefore the cost of network cable installation. Cable
installation can often be a major cost factor for network system. Topology also determines the
strategy for physically expanding the network.
Star-wired networks such as IBM’s Token Ring, Proteon’s ProNET and Arcnet are particularly
well-suited for multifloor installations. Hubs on star-wired networks are frequently placed in wir-
ing closets, with cable running from the wiring closet to wall outlets at selected office locations.
Although distributed bus networks are not as well-suited for multifloor installations, they are
well-suited to linear expansion.
6.7.2 LANs Protocols
A Local Area Network is a method for passing communications between computers. Whenever a
communication occurs, rules and conventions control the process. Imagine a committee meeting in
which each member wishes to speak. To prevent mass confusion, rules are adopted. If someone
wishes to speak he may raise his hand. The chairperson recognizes the person who wishes to
speak, and then that person has the floor. No one can speak who has not been recognized by the
chairperson. The rules and conventions for the committee meeting are called protocols.
The communications protocol layering concept plays a major role in LAN selection and
design. The significance of a layered communications model is ultimately economic. Figure 6.29
shows the role of currently defined LAN Physical and Data Link protocol in the context of the
entire model. Ehternet has developed from a de facto protocol, supported by DEC, Intel and
Xerox, to the full-fledged ANSI/IEEE Standard 802.3, entitled ‘‘Carrier Senser Multiple Access
with Collision Detection’’ (CSMA/CD). This standard is popularly known as StarLAN and was
developed by AT&T.
Figure 6.27
Common LAN
topologies Star
Ring
Media access
unit (MAU)
Distributed bus
IBM’s Token Ring has prompted the development of ANSI/IEEE Standard 802.5, entitled
‘‘Token Passing Ring’’. Arcnet has not developed into a recognized ANSI/IEEE standard, but has
achieved wide-spread acceptance as a de facto standard.
Figure 6.28
Distributed star
topology
Distributed star
Figure 6.29
Lower-level
LAN protocol
Applications 7 7
layer
Presentation 6 6
layer
Session 5 5
layer
Transport 4 4
layer
Request Network 3 3
for layer
Response
service
Data link 2 2
layer
Physical 1 1
layer
Ethernet
arcnet
token ring
As another example, you can purchase a network version of dBASE III Plus (an application
software product) and be sure it will run on a wide variety of networks. dBASE III Plus runs on a
wide variety of compatible networks.
The Presentation Layer
The major DOS functions which a programmer uses in this layer were provided in DOS release
3.1, and this release 3.1 of DOS was written for IBM by Microsoft. For the IBM Token-Ring Net-
work, DOS 3.1 was modified slightly and released as DOS 3.2. The network functions are defined
in IBM’s PC Network Technical Manual.
For network operation there is an additional level of functions that must be added to the DOS.
These functions support the redirecting of disk and print requests from workstations to the server
when necessary. For example, suppose the user wishes to load a file stored on the hard disk of the
server. This might be disk C of the server. Assume the user has a hard disk C and has assigned the
server hard disk as disk D on the local workstation. Each time the user requests a file from D on
the local workstation, the request must be redirected to C on the server hard disk.
The software to support these redirecting functions was written by Microsoft and sold as MS-
NET. This redirector shell is loaded into memory as a resident program and actually sits on top of
DOS when the network is active. You do not purchase MS-NET. Vendors selling LAN software
purchase the rights to MS-NET from Microsoft and include this as an integral part of the product.
MS-NET is already included in the IBM PC LAN software. MS-NET is also included as a part of
other network software, such as 3COM’s 3Plus.
At other times, vendors may choose to write their own redirector (and perhaps even DOS),
trying to emulate the Microsoft products. An example of this is Novell’s Netware.
As a user, your main concern at this level is that you have a standard network redirection
interface that will work with your application software. For example, if you are using dBASE III
Plus, you would want to be sure your version of dBASE III Plus works with the DOS and the
redirector that your network will be using. If you plan to purchase a network version of a word
processor in a year or two, can you be sure this will work with the network software you purchase
now? If a future DOS is released that supports more memory, will your network be obsolete?
Using a product that merely emulates the MS-NET function may buy you speed now, but could
cause incompatibility problems with some of your current software or future releases of current
software.
Using the Microsoft products (latest version of DOS namely 6.2 and a LAN that includes the
MS-NET redirector) means that you can be certain of future compatibility, but it may result in
slower throughput and fewer features when compared with other networks. When planning your
network, these are some of the trade-offs you will need to consider whilst making the decision and
purchasing your hardware and software.
In other types of data communication environments, the Presentation layer controls the highest
level of overhead and data formatting external to the raw data itself. For example, in transmitting
data to a printer the presentation layer defines machine control functions, such as tabbing and form
feed codes. In transferring a file between two word processors, the Presentation layer defines the
format of the word processing file.
node to the destination node. Standards at this level define the cable, the connectors, and topology
constraints.
6.7.4 Data Link Protocol
The data link layer (layer 2 of the OSI model) is the most commonly referenced layer in commu-
nications because it is responsible for packaging the data for transmission and then transmitting it.
Packaging refers to breaking up the data into blocks of a specified length and appending codes to it
for identification and error checking. The data link protocol often includes the electrical and
physical specifications (layer 1 of the OSI model) as well.
The following are the major categories of data link protocols:
Asynchronous Transmission
Originating from mechanical teletypewriters, asynchronous transmission sends one character at a
time out on the communications line with start and stop bits appended to each character. It is the
common form of personal computer communications outside of local area networks, and it is
widely used for connecting terminals to minicomputers and timesharing services. The most ele-
mentary asynchronous protocols, called ASCII or Teletype protocols, provide little or no error
checking and are only acceptable for text messages. The serial port on a personal computer is an
asynchronous transmission channel, and Xmodem, Ymodem and Kermit are typical error check-
ing protocols.
Synchronous Transmission
Developed for higher speeds and higher volumes of transmission than asynchronous protocols,
synchronous transmission sends a block of data out on the line at one time, with both the sending
and receiving stations synchronized to each other. Synchronous protocols provide extensive error
checking. Examples are IBM’s SDLC, Digital’s DDCMP, and the international standard, HDLC.
Local Area Network Protocols
Developed for medium transmission speeds between personal computers, local area networks
interconnect upto thousands of users. The networks typically use collision detection (CSMA/CD)
or token passing methods for gaining access to the network. Examples are IBM’s Token Ring,
Data point’s ARCNET, Xerox’s Ethernet and AT&T’s Starlan. In course of time, fiber optic local
area networks will provide the capacity to handle large volumes of high-resolution graphics as
well as voice and video.
6.7.5 What is a Network Operating System?
The software required to ensure smooth and orderly execution of applications in a LAN multiuser
environment is distinct from software designed to transport data packets within LANs or between
different types of local or wide area networks. It is also different from the software needed to
establish services such as sessions between cooperating applications or the logical naming of users
and resources throughout interconnected networks. LAN operating systems sit at Level 6, the Pre-
sentation Layer (see Figure 6-29). Network utility software and other multiuser applications are
generally considered to be either in Layer 7 or outside the scope of the OSI model, depending on
the type of application. Layer 7 standards for generic applications such as electronic mail and file
transfer are becoming more common. More specific applications would use the services provided
by Level 7.
Operating systems have the responsibility of providing an orderly method for users to interact
with the resources under their control. Like a microcomputer operating system, a network operat-
ing system (NOS) has features that must be evaluated to determine the best match for a particular
combination of applications, hardware and budget.
Some general features in a network operating system are:
Hardware independence
The ability of a NOS to operate in more than vendor’s network hardware environment
Bridging
The ability of a NOS to support the linking of one or more dissimilar hardware LANs under the
same NOS umbrella
Multiple server support
The ability of a NOS to support more than one server and to transparently keep track of which
users are logged in to which server.
Multiuser support
The ability of a NOS to provide adequate protection for applications programs and their data files
in a multiuser environment
Network management
The degree to which the NOS supports network utility and management functions such as archiv-
ing, server directory management, traffic analysis, etc.
Security and access control
The ability of a NOS to provide a high degree of network security and flexible management of
user privileges and file access.
User interface
The degree of human engineering reflected in menus, screens, commands and user control over
network resources. Figure 6.30 shows the relationship between applications software, host operat-
ing system, network operating system and lower-level network communications functions. This
figure is shown from the perspective of a workstation on the network. The user’s view of the
network is through either an applications program, such as dBASE III Plus, or menus and com-
mand lines that provide control of network utilities.
Network utilities are themselves special purpose applications programs. When an
application such as dBase III Plus is running in a workstation, a redirector or shell program runs in
the background, continuously screening requests for files or devices. The redirector knows what
devices and drives are network resources because it has been given this information by a network
configuration utility program.
Figure 6.30
LAN software
relationships Network Network commands Network
program (user) utilities
Configuration
commands
Device/file access
Applications request Redirector/
program shell
Local Remote
file file
calls calls
MS DOS.SYS Netbios
Bios IO.sys
Network
adapter
Hardware adapters
Figure 6.31
The International
Standards
COMPUTER COMPUTER
Organization’s
A B
seven layers of
control for open
systems
Layer 7 Layer 7 Protocol Layer 7
(Application) (Application)
Figure 6.32
Distributed data
network using Star
network
Distributed star
addition, a computer at one location can also transfer data and processing jobs to and from com-
puters at other locations.
Flexibility
It allows greater flexibility in placing true computer power at the location where it is needed.
Better Utilization of Resources
Computer resources are easily available to the end users. For example, users can use small mini or
microcomputer systems for processing small jobs. However, for complex jobs they can easily
access large sophisticated computer systems. The same is true for other resources like mass stor-
age devices, plotters, database and even a growing library of application programs.
Better Accessibility
It facilitates quick and better access to data and information especially where distance is a major
factor.
Lower Cost for Communication
Telecommunication costs can be lower when much of the local processing in handled by on-site
mini and microcomputers rather than by distant central mainframe computers.
Disadvantages of a Distributed Data Processing System
There is lack of proper security controls for protecting the confidentiality and integrity of the user
programs and data that are stored on-line and transmitted over network channels. It is relatively
easy to tap a data communication line. One technique used to protect security and privacy over
data communications lines is encryption. Basically, encryption is a coding device placed on either
end of a data communications line, putting a very complex code on the data. This code is
extremely difficult to break. At the receiving end of the data communications line, encryption
device is used to decode the signal into a meaningful message.
Linking of Different Systems
Due to lack of adequate computing/communications standards, it is not possible to link different
equipments produced by different vendors into a smoothly functioning network. Thus, several
good resources may not be available to the users of a network.
Maintenance Difficulty
Due to decentralization of resources at remote sites, management from a central control point
becomes very difficult. This normally results in increased complexity, poor documentation, and
non-availability of skilled computer/communications specialists at the various sites for proper
maintenance of the system.
Difference between a centralized distributed data processing and a
decentralized processing system
In a decentralized processing system different computers process a separate workload without
communication between them. But in a centralized distributed data processing system, one or
more computers are located in one facility and handle the entire workload.
Figure 6.33
Client/server CLIENT
processing
App
environment l.
CLIENT CLIENT
App LAN l.
l. App
or
WAN
SERVER
Appl.
terminology, such shared devices are called servers. In a typical LAN-based shared-device pro-
cessing, these PC requests are usually limited to services related to shared files or print processing.
For example, a common file can be read by several PCs, and some report pages can be sent by
multiple PCs to the same printer. The obvious drawback of such an approach is that all application
processing is performed on individual PCs. and only certain functions (print, file I/O) are distrib-
uted. Therefore, an entire file has to be sent to a PC that issues a READ request against this file. If
file has to be updated, the entire file is locked by the PC that issued the update request. Examples
of shared device processing that allow a local are network to have a system dedicated exclusively
to the file and/or print services are Novell’s NetWare and Microsoft’s LAN Manager.
bpbonline all rights reserved
Computer Communication and Networking 269
The client/server processing concept is an extension of shared device processing. A local area
networks grew in size and number of supported workstations including file server and print server.
Gradually, these servers became capable of serving large numbers of workstations. At the same
time, the role of the workstations was also changing the workstations were becoming clients of
the servers. The main reason for the change was that in a large LAN environment sharing of file
and print services among the workstations in a LAN group represented only a fraction of a typical
application. The significant part of the application functionality was also a good candidate for
sharing among LAN users. Therefore, some of the application processing was distributed to a new
server the server that receives requests from application running on workstation (clients) and
processes them for each of its clients. In this concept, application processing is divided between
client and server. The processing is actually initiated and partially controlled by the service
requester client. Both client and server cooperate to successfully execute an application. Data-
base server such as Sybase or the Microsoft SQL Server are examples of the client/server pro-
cessing environment.
An advantage of the client/server approach can be seen by comparing a file server and a
database server. For example, if a PC application needs particular records from a shared file, it
sends a request to read the entire file to a file server, which makes this entire file available to the
PC. The application running on this PC has to search the file to select requested records. The
computing resources of the file server are used to process the entire file, while the PC’s resources
are used to run an application that reads every record of the file. If every file record is sent to the
PC for processing, a significant portion of the available resources is used inefficiently, and com-
munications lines are overburdened. In the case of a database server, an application running on a
PC sends a record read request to its database server. The database server processes the database
file locally and sends only the requested records to the PC application. Both the client and the
server computing resources cooperate to perform the requested query. Figure 6.33 depicts the
concept of client/server processing described above.
Advantages
Following are real benefits in adopting client/server architecture.
(a) It allows corporations to leverage emerging desktop computing technology better. Todays’s
workstations deliver considerable computing power, previously available only from main-
frames, at a fraction of mainframes cost.
(b) It allows the processing to reside close to the source of data being processed. (Client/server
architecture is a special form of distributed processing cooperative processing.) There-
fore, network traffic can be greatly reduced, and effective throughput and carrying capacity
on a heavily loaded network is increased.
(c) It facilitates the use of graphical user interface (GUI) available on powerful workstations.
These new interfaces can be delivered to customers in a variety of visual presentation tech-
niques.
Disadvantage
If a significant portion of application logic is moved to a server, the server may become a bottle-
neck in the processing of distribution of data to the clients. Server’s limited resources will be in
ever-higher demand by the increasing number of resource consumers.
Figure 6.34
Illustrating dial-up Host
access to GIAS Dial-up
User
Host Host
Many Internet access providers also allow dial-up users to interactively roam the Internet
in realtime, logging on to remote hosts with TELNET, searching indexed databases with WAIS,
and locating esoteric information with Gopher.
The equipment and software for PC dial-up is essentially the same-whether the user is
dialing from a stand alone computer at home, from a networked computer equipped with a local
modem, or from a networked computer using a communications server and a shared pool of net-
work modems.
The computer uses terminal emulation software, not TCP/IP to talk to the Internet host
computer. The Internet host computer uses TCP/IP to talk to the rest of the Internet. Ordinary
modems and telephone lines provide adequate throughput for PC dial-up access, though fast
modems make the experience more pleasant. If you are trying to connect a NetWare LAN to the
Internet, you have a number of options. Some people use a UNIX computer to connect the LAN to
the Internet. The advantage is that UNIX will interface easily with Internet. Other people prefer to
stick to a NetWare solution. Because NetWare 4.0 is transport independent (it will send data from
workstation to file server using either TCP/IP or Novell’s IPX Protocol). A NetWare 4.0 server
provides a cleaner base for this process, though NetWare 3.11 or 3.12 will also work.
Dedicated Internet Access
The most popular Internet access for companies and institutions is a dedicated phone line con-
necting your LAN to the Internet 24 hours a day. However, a dedicated Internet access also
requires substantial initial investment in equipment. The main continuing cost is a flat monthly fee
for the use of the line. It varies with line capacity, and line capacity determines how many users
can connect simultaneously.
Using the Internet to create an Inexpensive WAN
A company with multiple offices and Internet access can use the Internet to provide a cheap cor-
porate WAN. Using TELNET, an authorized user can log onto another computer physically dis-
tant but also on the Internet. As an alternative to a commercial X.25 connection between two
distant cities, the Internet is unbeatable. It is not secure, but it is cheaper per bit than any of the
alternatives and quite reliable.
Internet Service Providers
After you decide what kind of Internet connection you need, look for a service provider. A wide
variety of providers support a wide variety of Internet connection services. Here are some hints.
If you want to connect an individual PC to the Internet, you can choose a national provider. If
you want to connect several geographically scattered sites, contact one of the major national and
regional Internet providers.
To get a dedicated line into the Internet, contact one of the leased line, the more traffic it can
carry and the more expensive it will be.
A final word of caution before connecting your network to the Internet. A large number of
people have made it their pastime to break into computer networks. There are many stories of
companies that have plugged their networks in to the Internet, not realizing that at that point, any-
one from Russia to the Fiji Islands could look at their files.
bpbonline all rights reserved
Computer Communication and Networking 273
Which ever system you choose, make sure it is implemented. It is easy to believe that you are
invisible, but that is not true. Tools are now available to automatically scan for new IP addresses as
well as weak points in your defenses. Set your security properly before you connect for the first
time.
6.13.3 How India is Connected to the Internet?
Videsh Sanchar Nigam Ltd, India’s international telecom carrier, has also provided backbone net-
work in India known as VSNL’s Gateway Internet Access Services (GIAS) network. This netwrok
is built to provide full range of Internet services on all India basis connecting its main Internet
access node at Bombay to internet node in USA via satellite media and to Internet node in Europe
via submarine cable media.
VSNL has already commissioned remote Internet access modes at Calcutta, New Delhi and
Madras. In addition several cities are likely to be commissioned in the near future. These nodes are
connected to the main Internet access node at Bombay through DoT provided intercity links.
Internet access node at Bombay is also connected to VSNL’s gateway packet switched ser-
vice (GPSS). As DoT remote area business message network (RABMN), domestic packet
switched network, I-Net and high-speed V-SAT network. HVNET are connected to GPSS.
Subscribers of these networks would also have easy access to full range of Internet services. Sub-
scribers from over 4300 STD cities of India would also be able to avail advantage of Internet ser-
vices by subscribing to ‘099’ access of I-Net in addition to subscribing to GIAS.
VSNL plans to provide full rnage of Internet services progressively by March 1996.
VSNL’s Options for accessing Gateway
VSNL has planned the following options for accessing gateway Internet access service (GIAS).
Shell account: Using dial-up access to GIAS HOST the primary level of access for Internet
users one can dial-up access to GIAS HOST computer set up by VSNL, at each of the node. By
connecting to the host computer, the users would be able to use all Internet services. In this mode,
the users would be using a simple terminal emulation from their PCs and will not require any spe-
cial software on their machine.
The limitation of this access mode is that the access is primarily limited to text-based ser-
vices. Figure 6.34 pictorially describes this facility. Figure 6.35 illustrates router connection to
GIAS.
TCP/IP account: VSNL, as the second level of access, provides a direct TCP/IP account. The
subscribers can use transmission control protocol/Internet protocol (TCP/IP) software to connect
on a dial-up or leased basis to the GIAS system and access online all services on the Internet.
In this mode of access, the users will be required to use software for E-mail, file transfer,
remote log-in, Mosaic, World Wide Web etc.
Packet switched network access: VSNL, as the third level of access, provide access via packet
switched network, i.e. GPSS, I-Net, RABMN and HVNET. Subscribers of these networks would
be able to avail the full range of Internet services using shell account or TCP/IP account.
Shell account subscribers using terminal dial-up can access GIAS HOST computer and avail
all Internet services, i.e. E-mail, file transfer, remote log-in, etc. primarily limited to text-based
services.
Figure 6.35
Illustrating router
connection in
GIAS
VSNL Gateway
Internet Access
Service
Router
Router
TCP/IP account subscribers would required to have router capable of routing TCP/IP over
X.25 and connect to the VSNL GIAS router. In this type of access, users would require to have
software needed for E-mail, file transfer, remote log-in, Mosaic, World Wide Web, etc. Fig-
ure 6.36 illustrates this mode of operation.
Figure 6.36
Illustrating X.25 Internet Host Connect Service
User
TCP/IP routing Host
over X.25 ( IP
Over
X.25 )
VSNL Gateway
User Internet Access
Requirements Service
TCP/IP
IP Routing I-NET/
Over X.25 X.25 Internet
GPSS Link
Port
RABMN
X.25/IP VSNL
Router Internet
Host
IP Router
Term Server
TEST PAPER
Time allotted : 3 Hrs.
Max. Marks :100
Q. 5 A company has a computer at its main office in Delhi linked to a terminal in each of
its branch offices situated in the state capitals. It would like to use multiplexing for
these terminals to reduce transmission costs. Is that possible!? Explain your answer.
Q. 6 Describe the asynchronous and synchronous modes of data transmission.
Q. 7 List out the relative advantages and disadvantages of asynchronous and synchronous
modes of data transmission.
Q. 8 What is meant by network topology? Describe three commonly used network topol-
ogies with their relative advantages and disadvantages.
Q. 9 What is a LAN? What are its main objectives?
Q. 10 Differentiate between a LAN and a WAN. Give one example of each.
Q. 11 Describe a method so that a company can use the Internet as a WAN for its different
offices located all over the globe.
Q. 12 Describe the concept of Client/server processing technique used in the Local Area
Networking. How does it differ from distributed processing system?