UNIT-II- Internet: Concept & evaluation, Features of Internet: email, WWW, ftp, telnet, newsgroup & video conferencing; Intranet & Extranet, ISDN, TCP/IP, Limitation of internet, Hardware & software requirement of Internet.
Internet: Concept &
Evaluation
The first workable prototype of the
Internet came in the late 1960s. ARPANET (Advanced Research Projects Agency
Network). Originally funded by the U.S. Department of Defense, ARPANET used
packet switching to allow multiple computers to communicate on a single
network. The
technology continued to grow in the 1970s after scientists Robert Kahn and Vinton Cerf developed
Transmission Control Protocol and Internet Protocol, or TCP/IP, a
communications model that set standards for how data could be
transmitted between multiple networks. ARPANET adopted TCP/IP on January 1,
1983, and from there researchers began to assemble the “network of networks”
that became the modern Internet. The online world then took on a more
recognizable form in 1990, when computer scientist Tim Berners-Lee invented the
World Wide Web. While it’s often confused with the Internet itself, the web is
actually just the most common means of accessing data online in the form of
websites and hyperlinks.
The Internet,
World Wide Web (WWW) and information super highway have
penetrated into lives of millions of people all over the world. The Internet is a network made up of
thousands of networks worldwide. Obviously, these networks are composed
of computers and other intelligent and active devices. In fact, Internet is an
example of self-regulating mechanism and there is no one in-charge of the
Internet.
There are organizations which are entrusted
to develop technical aspects of this network, but no governing body is in
control. Private companies own the Internet backbone, through which Internet traffic or data flows
in the form of text, video, graphics, sound image etc. All computers on
the Internet communicate with one another using the Transmission Control
Protocol/Internet Protocol architecture, abbreviated to TCP/IP, based on
client/server architecture. This means that the remote server machine provides
files and services to the user' local client machine. Software can be installed
or a client computer to take advantage of the latest access
technology.
A wide variety of services, namely, electronic
mail, file transfer, vast information resources, interest group membership, interactive
collaboration, multimedia displays, real-time broadcasting, shopping
opportunities, and many more are available on the Internet. To provide
all these services, the Internet consists primarily of a variety of
access protocols. Many of these protocols
feature programs that allow users to search for and retrieve material made
available by the protocol.
Transmission Control Protocol/Internet Protocol (TCPIP) is
the protocol suite developed for the Internet.
History of the Internet
The Internet,
www and Information Super Highway are terms which have deep impact in the lives
of millions of people all over the world. The widespread impact of Internet
across the globe could not be possible without the development of Transmission Control Protocol/Internet Protocol (TCP/IP). This
is the protocol suite developed specifically for the Internet. The Information Technology revolution of today cannot be achieved
without this vast network of networks. This has become a fundamental part of life
of millions of people all over the world. All the aforesaid services,
basically, provide us the necessary backbone for information sharing in
organizations and within common interest groups. That information may be in
several forms. It can be notes and documents, data to be processed by another
computer, files sent to colleagues, and even more exotic forms of data
During late 1960s and 1970s, organizations were
inundated with many different LAN and WAN technologies such as packet switching
technology, collision-detection local area networks, hierarchical enterprise
networks, and many other excellent technologies. The major drawbacks with all
these technologies were that they could not communicate to each other without expensive
deployment of communication devices. These were not only expensive but also put
users at the mercy of the monopoly of the vendor they would be dealing with.
Consequently, multiple networking models were available as a result of the
research and development efforts made by many interest groups. This paved (make it easier) the way for
development of another aspect
of networking known as protocol layering. This allows applications to
communicate with each other. A complete range of architectural models was
proposed and implemented by various research teams and computer manufacturers.
The result of all this great know-how is that today, any group of users can
find a physical network and an architectural model suitable for their specific
needs. This includes cheap asynchronous lines with no other error recovery than
a bit-per-bit parity function, through full-function wide area networks (public
or private) with reliable protocols such as public packet switching networks or
private SNA (Systems
Network Architecture) networks,
to high-speed but limited-distance local area networks.
This is now
evident that organizations or users are using different network technology to
connect computer over the network. The desire of sharing more and more
information among homogeneous or heterogeneous interest group motivated the
researcher to devise the technology so that one group of users may extend its
information system to another group of users who happen to have a different
network technology and different network protocols. This necessity was
recognized in the beginning of the 1970s by a group of researchers in the United States of
America who hit upon a new principle popularly known as internetworking. Other
organizations also became involved in this area of interconnecting networks,
such as ITU-T(International
Telecommunications Union –
Telecommunications Sector)(formerly
CCITI (Consultative Committee on Information Technology Industry)) and ISO(International Organization for Standardization). All were
trying to define a set of protocols, layered in a well-defined suite, so that
applications would be able to communicate to other applications, regardless of
the underlying network technology and the operating systems where
those applications run.
Features of
Internet:
1.
The
World Wide Web.
2.
E-mail.
3.
News
4.
Telnet
5.
File
Transfer Protocol (FTP)
6.
Internet
Relay Chat (IRC)
7.
Newsgroup
& video conferencing
8.
Intranet
& Extranet
9.
ISDN (Integrated Services Digital Network)
10.
TCP/IP (Transmission Control Protocol/Internet
Protocol,)
11.
Limitation
of internet
12.
Hardware
& software requirement of Internet.
The World Wide Web
- The World Wide Web is a part of the
internet, which supports hypertext documents, allowing users to view and
navigate different types of data.
- A
web page is a document encoded with hypertext markup language (HTML) tags.
- HTML
allows designers to link content together via hyperlinks.
- Every
web page has an address, a uniform resource locator (URL).
E-mail
- Electronic mail (e-mail) is the most
popular reason people use the Internet.
- To create, send, and receive e-mail
messages you need an e-mail program and an account on an Internet mail
server with a domain name.
- To use e-mail, a user must have an e-mail
address, which you create by adding your user name to the e-mail create by
adding your user name to the e-mail server’s domain name, as in
jsmith@aol.com.
News
- One Internet based service called news,
includes tens of thousands of newsgroups.
- Each newsgroup hosts discussions on a specific topic. A
newsgroups a some indicated its users special topic of interest, such as
alt. food. cake.
- To participate in a newsgroup, you need a news-reader program
hat.left you read articles that have been posted on a news server. You can
post articles for others to read and respond to.
Telnet
- Telnet is a specialized service that lets
you use one computer to access the contents of another computer a telnet
host.
- A telnet program creates a “Window” into
the host so you can access files, issue commands, and exchange data.
- Telnet is widely used by libraries to
allow visitors to look up information, find articles and so on.
File transfer protocol
- File Transfer protocol (FTP) is the internet tool used to
copy files from one computer to another.
- Using a special FTP program or a web browser, you can log
into an ETP host Computer over the internet and copy files on to your
computer.
- FTP is handy for finding and copying software files, articles
and other types of data. Universities and software companies use FTP
servers to provide visitors with access to data.
Internet Relay chat (IRC)
- Internet Relay chat (IRC) is a service
that allows users to communicate in real time by typing text in a special
window.
- Like news, there are hundreds of IRC
“channel” each devoted to a subject or user group.
- You can use a special IRC program to participate
in chat room discussions but many chat rooms are set up in web sites,
enabling visitors to chat directly in their browser window.
Internet Communication Tools
There are
many different forms of communications that rely on the Internet, including
e-mail, instant messaging, blogs, newsgroups and discussion forums. Newsgroups
and discussion forums differ from other forms of communication by allowing you
to post to a large number of potential users and by archiving the postings over
time.
Newsgroups
A newsgroup is
a repository of electronic messages posted by users and managed by the Usenet
system. This is a worldwide Internet discussion system that is separate from
the World Wide Web. Usenet was established in 1980, a little more than 10 years
before the creation of the World Wide Web. Newsgroups on Usenet were one of the
first opportunities for general computer users to share and post information on
the emerging Internet.
Participants
in a newsgroup read and post messages to one or more categories. Usenet was
created in a time when the bandwidth of the Internet was very limited, and
newsgroups were designed to be text only. More recently, users were able to
attach images and other files to postings, but in general, newsgroups remain
very heavily text-based.
Originally,
newsgroups required special software known as newsreader software. This
software somewhat resembles an e-mail system, but messages are not sent to a
single individual. Messages are posted to newsgroups, which look like folders
in newsreader software. When a user connects to a particular newsgroup, all the
messages posted to this newsgroup are downloaded to the newsreader software.
The
communication protocol used by newsgroups is called Network News Transfer
Protocol, or NNTP. This is one of the many communication protocols used on the
Internet, which also includes the more well-known HTTP protocol used by the
World Wide Web. The name of a newsgroup is determined by those who create it. A
name typically consists of two to three words that describe the topic,
separated by a dot. Here are some examples of typical names:
Newsgroup Examples
Below are
some examples of active newsgroups. The first part of the name (before the
first dot) is the primary category (or hierarchy) or the newsgroup. For
example, sci. is used for science-related
discussions.
Comp
Computer-related topics.
comp.software.testing
Humanities
Topics related to the humanities (fine
arts, literature, philosophy, Classical Latin, etc.).
Misc
Miscellaneous topics. Examples include:
·
misc.legal.moderated
— A moderated legal forum.
·
misc.taxes.moderated — A
moderated professional tax forum open to the general public.
News
Matters
related to the functioning of Usenet itself.
· news.admin.net-abuse.blocklisting —
discussion related to the use of blocklists to deal with spam and other
unwanted network traffic.
· news.admin.net-abuse.email —
discussion of abuse of email by spammers and other parties.
rec
Recreation and entertainment topics.
·
rec.arts.movies.current-films—The
latest movie releases.
·
rec.arts.movies.past-films—Past films.
·
rec.arts.poems
sci
Science-related topics.
· sci.physics
· Sci.bio.*
o
sci.bio.paleontology
o
sci.bio.evolution
· sci.skeptic
soc
Discussion
related to society and social subcultures. Examples
include:
· soc.culture.usa— for the
discussion of culture in the USA.
· soc.culture.iraq— for the
discussion of Iraq.
· soc.art.california
talk
Discussion of various topics, especially
controversial ones. Includes political topics as well. Examples include:
·
talk.bizarre — a
newsgroup for experiencing the bizarre.
·
talk.origins — evolution-creationism controversy
which maintains an extensive FAQ.
·
talk.religion
The alt hierarchy
This is the most extensive newsgroup
hierarchy outside of the Big 8. Examples include:
· alt.2600 —
Official group for 2600
· Alt.Adoption —
for adoption
· alt.arts.poetry.comments — for
poetry and poetry critique (a piece
of writing that describes the good and bad points of somebody/something)
· alt.asian-movies — for
discussions focusing mainly on Hong Kong action cinema.
· alt.politics
· alt.comics.superman
There are
thousands of different newsgroups. In newsreader software, each of the groups
represents a folder with messages shown in the order that they were posted. At
present, you can use an Internet browser to participate in newsgroups. For
example, a service like Google Groups integrates a number of different types of
online communications, including newsgroups. In addition, many e-mail software
applications make it possible to participate in newsgroups in addition to using
regular e-mail. However, dedicated newsreader software is often preferred since
it provides more options to search and filter postings.
Newsgroups are different from similar communication methods that use
the World Wide Web in a number of ways:
- No registration with a particular newsgroup is required
- Stored information is distributed on a
collection of computers instead of a central server
- Archives are always available
- Newsreader software is commonly used to
read and post messages
In recent
years, the popularity of newsgroups has declined substantially as web-based
discussion forums, blogs and mailing lists have become more popular. However,
newsgroups remain very popular for a number of reasons. First, it is very easy
to participate and contribute to newsgroups or even to create your own. Second,
the information contained in newsgroups is not located on a central server or
controlled by one particular organization or company - for some people, this
makes it more of a bottoms-up approach to using the Internet.
Video Conferencing
What Is Video Conferencing?
Video
conferencing is a technology that allows users in different locations to hold
face-to-face meetings without having to move to a single location together.
This technology is particularly convenient for business users in different
cities or even different countries because it saves time, expense, and hassle
associated with business travel. Uses for video conferencing include holding
routine meetings, negotiating business
deals, and interviewing job candidates.
How Video Conferencing Works
Video
conferencing main advantage over teleconferencing is that users can see each
other, which allows them to develop stronger relationships. When a video
conference is held for informal purposes, it is called a video call or video
chat.
There are a
variety of ways video conferencing can be conducted. Individuals may use web
cameras connected to our built into laptop, tablet, or desktop computers.
Smartphones equipped with cameras may also be used to connect for video
conferences. In such instances, a software-based platform typically is used to
transmit the communication over Internet protocols.
[Important:
The stability and quality of the video conference may fluctuate with the speed
and reliability of the data connection.]
Some
businesses use dedicated video conferencing rooms that have been equipped with
high-grade cameras and screens to ensure the conversation is clear and with
limited technical faults. Third-party providers often install and assemble the
hardware needed to conduct the video conference.
Uses of Video Conferencing
Companies
with multiple offices might establish direct video communications between their
locations in order to allow their teams to work more collaboratively.
Video conferencing can also be used as a
medium for conducting training, with the instructor teaching a remote class
from most anywhere. This can be done in a corporate context, especially for
getting workers the knowledge they need to better perform their jobs. The
academic world can also make use of video conferencing to connect a traditional
classroom setting with students who are based a considerable distance from the
school.
A video conference may also be used to
conduct regular meetings with a company staff or to confer with shareholders about the latest activities
at the business. It may be used to announce significant changes at a company,
such as introducing a new CEO or to
present information in an interactive way that allows all participants to engage
in discussion about what they see on screen.
Hotels and conference centers sometimes make
video conferencing services available to guests who require such services. This
may be offered in suites or conference rooms that have been equipped for this
purpose.
Key Takeaways (a key fact,
point, or idea to be remembered)
- Video conferencing is a highly convenient use of technology
that allows users in different locations to hold face-to-face meeti
- ngs.
- There are
many ways to utilize video conferencing technology, such as company
meetings, job training sessions, or addressing board members.
- Video
conferencing can be used to connect a traditional classroom with students
who are taking the class remotely.
- The
stability and quality of the video conference may fluctuate with the speed
and reliability of the data connection.
- There are a
variety of ways video conferencing can be conducted—like using smartphones and tablets or via desktop
computers.
Intranets VS Extranets - What's the difference?
What is the difference
between intranet and extranet?
An intranet is a network where employees can create
content, communicate, collaborate, get stuff done, and develop the company
culture. An extranet is like an
intranet, but also provides controlled access to authorized customers, vendors,
partners, or others outside the company.
For many, understanding
the difference between an intranet and extranet can be confusing – especially
for those who have never used them before.
Intranets and extranets support two different areas within a business, but have similar
goals: to improve how employees work with clients and each other. Sometimes
they exist within the same software, other times, separately.
Once integrated into a
business model, these portals can make day to day activities more efficient,
more streamlined, better connected, and more productive.
But let's not get ahead
of ourselves... before you plan on implementing extranet or intranet software, you need to understand how these platforms work, what their features
do, and how they will benefit your business. The better you can grasp these
concepts, the more likely you'll reap their advantages.
What is an intranet?
The prefix intra means
within or inside. Therefore, an intranet is the company's digital workspace
that centralizes and streamlines every person, document, tool, conversation,
and project within your company.
The major difference from an extranet, however, is that an intranet is used
internally. While an extranet allows businesses to communicate with clients and
vendors, an intranet allows employees and colleagues to work together in a
virtual space — no outside parties are involved.
Businesses use intranets for a variety of reasons ... because like extranets,
a company intranet streamlines daily activity, organizes people and
data, improves internal communications, and increases employee engagement. They
also solve many challenges for remote teams and large organizations by connecting
staff with colleagues, information, and projects – no matter where they are.
Strong intranet software is packed with features that improve three main areas
within your business: communication, collaboration, and connectivity. When you
prioritize all three, your staff will work better, smarter, and happier. Let's
take a look at how these features work.
Benefits of the
Intranet
It helps in getting the
message across the staff members in the organization. As a result, there are
fun activities which can be performed on the intranet as well. Here are some of
the benefits of the intranet in the organization.
Productivity
Due to the intranet,
the information can be accessed anywhere and at anytime. This helps the
workplace get the information whenever they want. Thus, they can view the
information faster and use it as per their needs.
Time-saving
It helps people in the
organization get information based on their needs. Thus, only the required
amount of information is being given to the employees and it takes very less
time to process it. The employees may link this information to a relevant one
and based on their convenience.
Reduces cost
Anytime the information
is needed, employees can access using their desktop or the smartphone. This
helps the company in saving the extra space which is required in the form of
the physical documents being stored in the organization.
There is various
information like the internal phone numbers, procedure materials which are
required on a day to day basis. When this information is available on hand, it
can essentially save the time as well as the money. The organization is freed
from costs like printing, maintenance, and many more.
Communication
Intranet can save time
by making the communications quick. It works as a powerful tool for an
organization horizontally as well as vertically. It can initiate the strategic
communications within the company and as it is secure, companies can rely on
it. Every member of the team can be up to date with just a single click.
What is an extranet?
If an intranet is the
digital workplace for internal communications, an extranet is the digital
platform for external communications.
Think of it this way:
"Extra"
refers to any contact or activity outside of your business, such as clients,
vendors, and suppliers.
Therefore, an extranet
is a private network where these individuals (clients, vendors, suppliers,
partners, etc.) can communicate with you and your employees in a closed digital workspace. Extranets serve an extremely important role, as they allow for
private communication, collaboration, knowledge sharing, document sharing, and
data transfer between organizations.
An extranet supports a
variety of needs. Large volumes of data can be exchanged between parties via
extranets, for example, thus facilitating easy collaboration. These collaboration tools are particularly useful for companies that need to brainstorm or
communicate frequently with clients and customers. It saves hours of time in
comparison to email and telephone. Extranets also monitor and fix potential
bugs or issues that can occur with a company's products or services — almost
like built-in quality control.
The benefits of
implementing an extranet.
There are many reasons
why it might be beneficial for your business to implement an extranet.
An
extranet can add value to your company by helping you communicate and
collaborate more effectively with clients, customers, and partners.
Particularly in the business-to-business market, an extranet can give your
company an edge over the competition and save you money by streamlining
traditional business functions and cutting overhead costs.
Extranets
offer small businesses many other advantages:
Increased productivity. As you
automate processes that were traditionally done manually, bottlenecks will
disappear and your company’s productivity will increase. Critical information
won’t get lost in the mail or buried in an e-mail inbox, and busy employees
won’t miss or forget key events. An extranet can, for example, monitor business
activities and trigger specific actions, such as automatically placing an order
with a supplier when your inventory drops below a certain level.
Reduced margin of error. An
extranet can reduce your margin of error, especially when you use it to give
specific groups access to internal applications. This could involve something
as simple as giving customers access to their order histories, or something as
complex as processing orders from distributors and suppliers.
Flexibility. When you use an extranet to make information
and applications available to partners, clients, and customers, everyone can
operate when and where it’s most convenient. This self-serve approach frees you
from unnecessary meetings and phone tag, and it cuts down on the costs
associated with in-person information exchanges. For example, an extranet may
allow you to provide customer-service information outside of regular business
hours.
Timely and accurate information. On an
extranet you can instantly change, edit, and update sensitive information such
as price lists or inventory information. Compared to typical paper-based
publishing processes, an extranet offers a unique opportunity to get hot
information into the right hands before it cools — and before it’s out-of-date.
Shorter time to market. If your
business is not moving at “Internet speed,” you risk being left behind. An
extranet can help you get your products to market more quickly by making
proposals and specifications available to suppliers, and giving clients and
partners up-to-date information on current projects.
Reduced inventory. One of the hallmarks of a
business-to-business extranet is its impact on supply-chain management. By
linking your inventory system directly to a supplier, you can process orders as
soon as the system knows you need them, thus reducing the stock you keep on
hand and making the procurement process more efficient.
Build customer loyalty. Extranets
make business easier for your customers. The more you make timely, accurate
information available to your customers, the more likely it is you’ll keep
their business.
As
these examples demonstrate, an extranet can help you spend less on supplies,
staffing, and other overhead costs. Given the investment an extranet requires,
it may take time for savings to become apparent. Over a period of weeks or
months, however, eliminating even one paper-based process can yield dramatic
savings.
ISDN
- What is the ISDN?
The
ISDN technology (Integrated Services Digital Network, or ISDN) means complete
digitization so that all communication established in digital form, providing a
wide range of services.
Integrated
Services Digital Network is a telephone system network. It is a wide area
network becoming widely available. Prior to the ISDN, the phone system was
viewed as a way to transport voice, with some special services available for
data. The key feature of the ISDN is that it integrates speech and data on the
same lines, adding features that were not available in the classic telephone
system.
ISDN
is a circuit -switched telephone network system, that also provides access to
packet switched networks, designed to allow digital transmission of voice and
data over ordinary telephone copper wires, resulting in better voice quality
than· an analog phone. It offers circuit-switched connections (for either voice
or data), and packet-switched connections (for data), in increments of 64
Kbit/s.
Another
major market application is Internet access, where ISDN typically provides a
maximum of 128 Kbit/s in both upstream and downstream directions (which can be
considered to be broadband speed, since it exceeds the narrowband speeds of
standard analog 56k telephone lines). ISDN B-channels can be bonded to achieve
a greater data rate; typically 3 or 4 BRIs (6 to 8 64 Kbit/s channels) are bonded.
ISDN
should not be mistaken for its use with a specific protocol, such as Q.931 whereby ISDN is employed as
the network, data-link and physical layers in the context of the OSI model. In
a broad sense ISDN can be considered a suite of digital services existing on
layers 1, 2 and 3 of the OSI model. ISDN is designed to provide access to voice
and data services simultaneously.
However,
common use has reduced ISDN to be limited to Q.931 and related protocols, which
are a set of protocols for establishing and breaking circuit switched
connections, and for advanced call features for the user. They were introduced
in 1986. In a videoconference, ISDN provides simultaneous voice, video, and
text transmission between individual desktop videoconferencing systems and
group (room) videoconferencing systems.
The
first generation of ISDN is called as a narrowband ISDN and it is based on the
use of 64 kbps channel as the basic unit of switching and has a circuit
switching orientation. The main device in the narrowband ISDN is the frame
relay. The second generation of ISDN is referred to as the broadband ISDN
(B-ISDN).
It
supports very high data rates (typically hundreds of Mbps).
It has a packet switching orientation. The
main important technical contribution of B-ISDN is the asynchronous transfer
mode (ATM), which is also called as cell relay.
ISDN
The ISDN
technology (Integrated Services Digital Network). Earlier, the
transmission of data and voice both were possible through normal POTS (Plain
Old Telephone Systems). With the introduction of Internet came the advancement
in telecommunication too. Yet, the sending and receiving of data along with
voice was not an easy task. One could use either the Internet or the Telephone.
The invention of ISDN helped mitigate this problem.
The
process of connecting a home computer to the Internet Service Provider used to
take a lot of effort. The usage of the modulator-demodulator unit, simply
called the MODEM was the essential thing to establish a connection. The
following figure shows how the model worked in the past.
The
above figure shows that the digital signals have to be converted into analog
and analog signals to digital using modem during the whole path. What if the
digital information at one end reaches to the other end in the same mode,
without all these connections? It is this basic idea that lead to the
development of ISDN.
As
the system has to use the telephone cable through the telephone exchange for
using the Internet, the usage of telephone for voice calls was not permitted.
The introduction of ISDN has resolved this problem allowing the transmission of
both voice and data simultaneously. This has many advanced features over the
traditional PSTN, Public Switched Telephone Network.
ISDN
ISDN
was first defined in the CCITT (Consultative
Committee for International Telephony and Telegraphy) red book in 1988.The Integrated Services
of Digital Networking, in short ISDN is a telephone network based
infrastructure that allows the transmission of voice and data simultaneously at
a high speed with greater efficiency. This is a circuit switched telephone
network system, which also provides access to Packet switched networks.
The
model of a practical ISDN is as shown below.
The
ability to transfer information between
the user and ISDN structured in the form of information transfer channels:
• Channel
A: It is an analog channel of 4 Khz.
• Channel B: It is a 64 Kbps digital channel that intended for the
transport of user information.
• Channel C: It is an 8 or 16 Kbps digital channel.
• Channel D: It is a digital channel of 16 or 64 Kbps intended primarily
for the transmission of user-network signaling information for communication
control, although it can also use under certain conditions for the transfer of
user information in services selection (telealarm, telecontrol, and Telemedia)
and low capacity data transmission.
• Channel E: It is a 64 Kbps digital channel (used for internal ISDN
signals).
• Channel H: It is a digital channel of 384, 1,536 or 1,920 kbps that
provides the user with an information transfer capability.
These
channels can be combined differently, giving rise to two types of access:
• Basic
access.
• Primary access.
Basic access
Basic
access, known as 2B + D access, BRA (Basic Rate Access) or BRI (Basic Rate
Interface), provides the user with two B channels and a 16 Kbps D channel.
It
allows establishing up to two simultaneous communications at 64 Kbps, being
able to use the capacity of the D channel for low-speed data transmission.
The
main application of this type of access occurs in small local network
facilities with a small number of terminals (up to eight) that require digital
transmission or small capacity digital exchanges.
Primary
Access
Primary
access, also called 30B + D access, PARA (Primary Rate Access) or PRI (Primary
Rate Interface), offers the user 30 B channels and a 64 kbps D channel, thus
providing a bandwidth of up to 2,048 Kbps (in the US it consists of 23 B
channels and a 64 Kbps D channel, so it provides a bandwidth of up to 1,544
Kbps).
It
allows establishing up to thirty simultaneous communications at 64Kbps without
currently planning to use the capacity of the D-channel for data transmission.
You can also use other combinations of channels B, H0, H11 and H12, but always
respecting the speed limit of 2,048 Kbps. The main application of this type of
access is the connection to ISDN of small digital exchanges, multi-line
systems, and local area networks of medium and large capacity.
Types of ISDN
Interfaces
Among
the types of several interfaces present, some of them contains channels such as
the B-Channels or Bearer Channels that are used to transmit voice and
data simultaneously; the D- Channels or Delta Channels that are used
for signaling purpose to set up communication.
The ISDN has
several kinds of access interfaces such as −
1.
Basic
Rate Interface (BRI)
2.
Primary
Rate Interface (PRI)
3.
Narrowband
ISDN
4.
Broadband
ISDN
Basic Rate
Interface (BRI)
The
Basic Rate Interface or Basic Rate Access, simply called the ISDN BRI
Connection uses the existing telephone infrastructure. The BRI
configuration provides two data or bearer channels at 64
Kbits/sec speed and one control or delta channel at 16 Kbits/sec.
This is a standard rate.
The
ISDN BRI interface is commonly used by smaller organizations or home users or
within a local group, limiting a smaller area.
Primary Rate
Interface (PRI)
The
Primary Rate Interface or Primary Rate Access, simply called the ISDN PRI
connection is used by enterprises and offices. The PRI configuration is based
on T-carrier or T1 in the US, Canada and Japan countries consisting of 23
dataor bearer channels and one control or delta channel, with 64kbps speed for
a bandwidth of 1.544 M bits/sec. The PRI configuration is based on E-carrier or
E1 in Europe, Australia and few Asian countries consisting of 30
data or bearer channels and two-control or delta channel with
64kbps speed for a bandwidth of 2.048 M bits/sec.
The
ISDN BRI interface is used by larger organizations or enterprises and for
Internet Service Providers.
Narrowband
ISDN
The
Narrowband Integrated Services Digital Network is called the N-ISDN. This
can be understood as a telecommunication that carries voice information in a
narrow band of frequencies. This is actually an attempt to digitize the analog
voice information. This uses 64kbps circuit switching.
The
narrowband ISDN is implemented to carry voice data, which uses lesser bandwidth,
on a limited number of frequencies.
Broadband
ISDN
The
Broadband Integrated Services Digital Network is called the B-ISDN. This
integrates the digital networking services and provides digital transmission
over ordinary telephone wires, as well as over other media. The CCITT defined
it as, “Qualifying a service or system requiring transmission channels capable
of supporting rates greater than primary rates.”
The
broadband ISDN speed is around 2 MBPS to 1 GBPS and the transmission is related
to ATM, i.e., Asynchronous Transfer Mode. The broadband ISDN communication is
usually made using the fiber optic cables.
As
the speed is greater than 1.544 Mbps, the communications based on this are
called Broadband Communications. The broadband services provide a continuous
flow of information, which is distributed from a central source to an unlimited
number of authorized receivers connected to the network. Though a user can
access this flow of information, he cannot control it.
Principle of
ISDN
The
ISDN works based on the standards defined by ITU-T (formerly CCITT). (The
Telecommunication Standardization Sector (ITU-T) coordinates standards for
telecommunications on behalf of the International Telecommunication Union (ITU)
and is based in Geneva, Switzerland. The standardization work of ITU dates back
to 1865, with the birth of the International
Telegraph Union. It became a United Nations specialized agency in 1947, and
the International Telegraph and
Telephone Consultative Committee (CCITT), (from the French name
"Comite Consultatif International de Telephonique et Telegraphique")
was created in 1956. It was renamed ITU-T in 1993.
Principles of
ISDN
The
various principles of ISDN as per ITU-T recommendation are:
I. To support
voice and non-voice applications
The
main feature of the ISDN concept is the support of a wide range of voice
(for e.g. Telephone calls) & non-voice
(for e.g. digital data exchange) applications in the same network.
2. to support
switched and non-switched applications
ISDN
supports both circuit switching and packet switching. In addition ISDN supports
non-switched services in the form of dedicated lines.
3. Reliance
on 64-kbps connections
ISDN
provides circuit switched and packet switched connections at 64 kbps. This is
the fundamental building block of ISDN. This rate was chosen because at the
time, it was standard rate for digitized voice.
4.
Intelligence in the network
An
ISDN is expected to provide sophisticated services beyond the simple setup of
circuit switched calls. These services include maintenance and network
management functions.
5. Layered
protocol architecture
A
layered protocol structure should be used for the specification of the access
to an ISDN. Such a structure can be mapped into OSI model.
6. Variety of
configurations
Several
configurations are possible for implementing ISDN. This allows for differences
in national policy, in state of technology and in the needs and existing
equipment of the customer base.
ISDN
Services
The
purpose of the ISDN is to provide fully integrated digital services to users.
These services fall into categories- better services, teleservices and
supplementary services.
1. Bearer
Services: Bearer
services provide the means to transfer information (voice, data and video)
between users without the network manipulating the content of that information.
The network does not need to process the information and therefore does not
change the content.
Bearer
services belong to the first three layers of the OSI model and are
well defined in the ISDN standard. They can be provided using circuit-switched,
packet-switched, frame-switched, or cell-switched networks.
2.
Teleservices: In
teleservices, the network may change or process the contents of the data. These
services correspond to layers 4-7 of the OSI model. Teleservices relay on the
facilities of the bearer services and are designed to accommodate complex user
needs, without the user having to be aware of the details of the process.
Teleservices include telephony, teletex, telefax, videotex, telex and
teleconferencing. Although the ISDN defines these services by name, they have
not yet become standards.
3.
Supplementary Service: Supplementary services are those
services that provide additional functionality to the bearer services and
teleservices. Examples of these services are reverse charging, call waiting,
and message handling, all familiar from today's telephone company services.
ISDN supports
a variety of services. A few of them are listed below −
1.
Voice
calls
2.
Facsimile
3.
Videotext
4.
Teletext
5.
Electronic
Mail
6.
Database
access
7.
Data
transmission and voice
8.
Connection
to internet
9.
Electronic
Fund transfer
10.
Image
and graphics exchange
11.
Document
storage and transfer
12.
Audio
and Video Conferencing
13.
Automatic
alarm services to fire stations, police, medical etc.
Advantages of
ISDN
ISDN
is a telephone network based infrastructure, which enables the transmission of
both voice and data simultaneously.
There are
many advantages of ISDN such as −
As
the services are digital, there is less chance for errors.
The
connection is faster.
The
bandwidth is higher.
Voice,
data and video − all of these can be sent over a single ISDN line.
Disadvantages
of ISDN
The
disadvantage of ISDN is that it requires specialized digital services and is
costlier.
However,
the advent of ISDN has brought great advancement in communications. Multiple
transmissions with greater speed are being achieved with higher levels of
accuracy.
TCP/IP
(Transmission Control Protocol/Internet Protocol)
TCP/IP, or the Transmission Control
Protocol/Internet Protocol, is a suite of communication protocols used
to interconnect network devices on the internet. TCP/IP can
also be used as a communications protocol in a private network (an intranet or
an extranet).
The entire
internet protocol suite -- a set of rules and procedures -- is commonly
referred to as TCP/IP, though others are included in the suite.
TCP/IP
specifies how data is exchanged over the internet by providing end-to-end
communications that identify how it should be broken into packets, addressed,
transmitted, routed and received at the destination. TCP/IP requires little
central management, and it is designed to make networks reliable, with the
ability to recover automatically from the failure of any device on the network.
The two main
protocols in the internet protocol suite serve specific functions. TCP defines how applications can create
channels of communication across a network. It also manages how a message is
assembled into smaller packets before they are then
transmitted over the internet and reassembled in the right order at the
destination address.
IP defines
how to address and route each packet to make
sure it reaches the right destination. Each gateway computer
on the network checks this IP address to determine where to forward the
message.
The history
of TCP/IP
The Defense Advanced Research Projects Agency
(DARPA), the research branch of the U.S. Department of Defense, created
the TCP/IP model in the 1970s for use in ARPANET, a wide area network that
preceded the internet. TCP/IP was originally designed for the Unix
operating system, and it has been built into all of the operating systems that
came after it.
The TCP/IP model and its related protocols
are now maintained by the Internet Engineering Task Force.
How TCP/IP
works
TCP/IP uses the client/server model
of communication in which a user or machine (a client) is provided a service
(like sending a webpage) by another computer (a server) in the network.
Collectively, the TCP/IP suite of protocols
is classified as stateless, which means each client request is
considered new because it is unrelated to previous requests. Being stateless
frees up network paths so they can be used continuously.
The transport layer itself, however, is
stateful. It transmits a single message, and its connection remains in place
until all the packets in a message have been received and reassembled at the
destination.
The TCP/IP model differs slightly from the
seven-layer Open Systems Interconnection (OSI) networking model designed
after it, which defines how applications can communicate over a network.
TCP/IP model
layers
TCP/IP functionality is divided into
four layers, each of which include specific protocols.
·
The application layer provides
applications with standardized data exchange. Its protocols include the
Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP),
Post Office Protocol 3 (POP3), Simple Mail Transfer Protocol (SMTP)
and Simple Network Management Protocol (SNMP).
·
The transport layer is
responsible for maintaining end-to-end communications across the network. TCP
handles communications between hosts and provides flow control, multiplexing
and reliability. The transport protocols include TCP and User Datagram Protocol
(UDP), which is sometimes used instead of TCP for special purposes.
·
The network layer, also called
the internet layer, deals with packets and connects independent networks to
transport the packets across network boundaries. The network layer protocols
are the IP and the Internet Control
Message Protocol (ICMP), which is used for error reporting.
·
The physical layer consists
of protocols that operate only on a link -- the network component that
interconnects nodes or hosts in the network. The protocols in this layer
include Ethernet for local area networks (LANs)
and the Address Resolution Protocol
(ARP).
Advantages of
TCP/IP
TCP/IP is nonproprietary and, as a result, is
not controlled by any single company. Therefore, the internet protocol suite
can be modified easily. It is compatible with all operating systems, so it can
communicate with any other system. The internet protocol suite is also
compatible with all types of computer hardware and networks.
Limitations
Of Internet
1) The
quality of information resources might not always be reliable and accurate.
Of course,
with so many many websites and webmasters claiming
to be an expert in almost anything, we are ending up with stuffs like “learn how to earn online with a 13 year old“. While I
don’t blame such approaches, their integrity and experience about the subject
is definetly questionable.
2) Searching
of information can be very tedious. (It IS
definetly time consuming)
Let’s a take
an example, just google for the word “money“, you will
see 10 pages full of resources (That’s only with google, now there
are yahoo, msn..etc). So finding what you are exactly looking
for, might take you some hours of browsing..
3) Internet is
definetly not 100% secure.
We cannot
neglect things like identity theft, a pc being compromised by a cracker or your
email account being compromised..Etc
( Thought: may be you could
think about the possible solutions for this situation )
Some other critical
limitations of using internet marketing as your source of medium.
1. Online Marketing
Online
Marketing as people allegedly say does not happen to be of free of cost, there
are a lot of things that adds to the cost of internet marketing and they are
not at all cheap. Some of the major expenses are the cost of hardware,
software, wed site designing, online content and product distribution costs,
maintenance of the site as well as server, web hosting of the website
and the costliest thing is time, all of these must be considered while planning
for Internet Marketing budget and strategies.
2. Conventional
Marketing
Where
conventional marketing helps in spreading awareness as well as selling, the
internet is considered as a medium to gain information to most of the
customers. There are still many industry and areas where internet marketing is
incapable of generating a trust and sale of the product or the service. There
are still lots of fields where people prefer the live interaction when they
buy.
3. Access to Internet
Still,
50% of the world does not have access to the internet and there are many such
areas where people are not even literate enough to access the internet. This is
a major limitation for internet marketing in the current scenario.
4. Cyber Crimes
Cyber
Crimes are increasing day by day as well as the scams. The rules if cyber
security are still not that secure and that leaves a fear in the mind of the
people and leaves internet marketing vulnerable.
5. Internet Marketing
Internet
marketing faces a major current as well as the future issue of “infollution” –
the issue of distracting and old data on the internet. There are lots of
websites that are decades old and no information is updated on it from a long
time. If a customer relies on it and makes a decision, there is a high chance
that it can lead to some trouble. This thing is not an issue in conventional
marketing as people timely update things in the real world. Whereas there is no
such filter available in the virtual world.
6. Secure your Website
One
major issue and an important question is that “is your website safe?” In
internet marketing it is very easy for competitors to attack your website and
put in some hack in it, there are a lot of such examples where competitors
tried and also succeeded in damaging the brand image via some online hack or
negative attacks.
7. Internet Marketing
One
of the major reason why conventional marketing is not affected that much from
Internet Marketing is good old fashioned customer service. The majority of
online marketers fail to deliver ideal response programs as well as customer
service. There are thousands of website live which has no customer care service
and still are running. But, the word travels really fast in this virtual world
and if a website fails to deliver desired customer service to even a single
customer, there is a high possibility that the customers will spread out a
negative word in the industry and news no matter genuine or fake, travels
faster in the virtual world.
8. Marketing Strategy
One
major benefit of Conventional marketing is that it is not that easy to imitate
a conventional marketing move. It takes the time to do that and in the
meanwhile, the initiative taker gets the benefit of risk. But, if we talk about
internet marketing, there are a lot of instances where one successful strategy
will be copied in less than 24 hours by your competitors. Thus, you fail to get
the desired benefit. Thus, the only motive of this article is that no matter
how fond marketers are of the internet marketing, if they have not taken
proper precautions and some help of an expert, there is a high possibility
of getting a backlash or a complete failure and resulting into a waste of
time as well as money.
Hardware and
Software Requirements
What
Do I Need to Connect to the Internet?
To connect to the Internet you need
the following four things:
·
A
computer.
·
A
modem and telephone line (if you are using dial up access) ...
·
An Internet browser
(software) and software to connect you to the ISP.
·
An
account with an Internet Service Provider (ISP) Souvenirs.
Hardware and
Software Requirements
Recommended
Operating Systems
Windows: 7
or newer
MAC: OS
X v10.7 or higher
Linux: Ubuntu
Hardware
Requirements
We
strongly recommend a computer fewer than 5 years old.
Processor:
Minimum 1 GHz; Recommended 2GHz or more
Ethernet
connection (LAN) OR a wireless adapter (Wi-Fi)
Hard Drive:
Minimum 32 GB; Recommended 64 GB or more
Memory
(RAM): Minimum 1 GB; Recommended 4 GB or above
Sound
card w/speakers
Some
classes require a camera and microphone
Recommended
Software
Supported
Browsers
People
often ask what browser they should use. There is no single answer for this. Use
whichever browser works best on your computer. However, we recommend
downloading Firefox and/or Chrome in addition to having Internet Explorer or
Safari.
Firefox
Chrome
Other
important software
Java
Adobe Flash Player
Adobe Reader
These
things work together in the following way:
The Computer is
essential.
The Modem is
necessary if you are using a telephone line to access the Internet. It
translates the language that computers talk into a language that can travel across
the phone lines, and vice versa.
The ISP is
your gateway to the Internet. You access the ISP over the phone line, and the
ISP will connect you to the Internet. The ISP provides you with e-mail and
access to the Internet. It does this through thousand of dollars worth of
hardware and software, which the average user can not afford. You will have an
account with the ISP - you will pay $X per month in return for accessing the
Internet through the ISP. This account will come with a user name and a password
that you use to log on to the Internet.
You need two
lots of software to connect to the Internet. The first is the software that
connects you to your ISP. This is different for each ISP. Some ISP's will give
you a disk with the connection software on it. Other ISP's will use the
connecting software that comes with the operating systems Windows 95, OS7 and
OS8. They will give you the settings to put into this software.
The second
lot of software you need is a Browser. Browsers go and get web
pages and display them on your computer. The two most popular and commonly used
browsers are Netscape Navigator and Microsoft Internet
Explorer. These browsers also provide the software for e-mail and to read
Usenet newsgroups. If you have a browser that is just a browser, you will also
need software for e-mail and for reading newsgroups.
No comments:
Post a Comment