Computer Awareness
and Internet
Manipal
INSPIRED BY LIFE
B 1464
BOARD OF STUDIES
Chairman
HOD Arts and Humanities
SMU DDE
Additional Registrar
SMU DDE
Controller of Examination
SMU DDE
Authors:
Rajneesh Agrawal: Units (7.1-7.2, 7.4, 7.9, 8.4-8.7, 9.9, 9.11-9.12, 9.14-9.19, Unit-10, 12.1-12.6, 13.3, 13.5-13.6, 13.8-13.14,
Unit-14) Rajneesh Agrawal, 2011
T. Jeyapoovan: Units (1.1-1.4, 1.7-1.8, 2.4, 4.1-4.2) T. Jeyapoovan, 2011
Sanjay Saxena: Units (1.5-1.6, 1.10, 2.1-2.2, 2.5-2.11, 3.1-3.6, 3.8-3.13, 5.3-5.4, 7.14, 11.1-11.2, 11.4, 11.6, 11.9)
Sanjay Saxena, 2011
Alpana Kakkar: Units (1.9, 2.3, 3.7, 4.3-4.5, 5.1-5.2, 5.5-5.10, Unit-6) Alpana Kakkar, 2011
B. Basavaraj: Units (1.11-18, 4.6-4.11) B. Basavaraj, 2011
R.S Rajesh, K.S. Easwarakumar & R. Balasubramanian: Units (7.5-7.8, 7.11, 9.7, 13.1-13.2, 13.7)
R.S Rajesh, K.S. Easwarakumar & R. Balasubramanian, 2011
Vikas Publishing House: Units (7.3, 7.10, 7.12-7.13, 7.15-7.21, 8.1-8.3, 8.8-8.15, 9.1-9.6, 9.8, 9.10, 9.13, 11.3, 11.5,
11.7-11.8, 11.10-11.16, 12.7-12.13, 13.4) Reserved, 2011
All rights reserved. No part of this publication which is material protected by this copyright notice may
be reproduced or transmitted or utilized or stored in any form or by any means now known or hereinafter
invented, electronic, digital or mechanical, including photocopying, scanning, recording or by any
information storage or retrieval system, without prior written permission from the Publisher.
Information contained in this book has been published by VIKAS Publishing House Pvt. Ltd. and has
been obtained by its Authors from sources believed to be reliable and are correct to the best of their
knowledge. However, the Publisher and its Authors shall in no event be liable for any errors, omissions
or damages arising out of use of this information and specifically disclaim any implied warranties or
merchantability or fitness for any particular use.
Contents
Unit 1
Computer Basics and Data Representation
137
Unit 2
Computer Generation and Classification
3964
Unit 3
Input/Output Units and Computer Memory
6596
Unit 4
Processor and Binary Arithmetic
97125
Unit 5
Computer Languages and Operating System
127148
Unit 6
File Organization
149168
Unit 7
Networking
169213
Unit 8
Communication Protocols and Networking
215234
Unit 9
Connecting PCs
235277
Contents
Unit 10
Communication Channels
279299
Unit 11
The Internet
301339
Unit 12
Layered Protocols and the OSI Model
341385
Unit 13
Polling and Selection Protocols
387408
Unit 14
Security Measures
409423
SUBJECT INTRODUCTION
Computer Awareness and Internet
A computer is a programmable machine designed to carry out a sequence of
arithmetic or logical operations. Personal computers in their various forms are
icons of the Information Age sequentially and automatically. A computer network
is a collection of computers and devices interconnected by communication
channels that facilitate communication and allow sharing of resources and
information among interconnected devices. A communications protocol defines
the formats and rules for exchanging information via a network. A large proportion
of personal computers regularly connects to the Internet to communicate and
receive information. The Internet is a global system of interconnected computer
networks that uses the standard Internet Protocol Suite (TCP/IP) to serve billions
of users worldwide. The Internet can also be defined as a worldwide
interconnection of computers and computer networks that facilitate the sharing
or exchange of information among users. The Internet carries a vast range of
information resources and services, such as the interlinked hypertext documents
of the World Wide Web (WWW) and the infrastructure to support electronic
mail.
This book, Computer Awareness and Internet, comprises fourteen units.
Unit 1 - Computer Basics and Data Representation: Explains the architecture
of computer system including hardware, software and different types of
computers. It also explains the characteristics of computer and representation
of characters in computers.
Unit 2 - Computer Generation and Classification: Discusses the first, second,
third and fourth generation of computers. It also explains Moores law,
classification of computers, distributed computer system and parallel computers.
Unit 3- Input/Output Units and Computer Memory: Defines the various types
of computer input and output units, memory organization, ROM, serial access
memory, and physical devices used to construct memories.
Unit 4 - Processor and Binary Arithmetic: Discusses the structure of
instruction, description of processor and algorithms to simulate the hypothetical
computer. It also explains binary arithmetic and 2 complement representation
of numbers.
Unit 5 - Computer Languages and Operating System: Explains the
significance and types of computer programming languages, need for operating
system, and the various types of operating system.
Subject Introduction
Unit 6 - File Organization: Defines the concept of file, file organization and
accessing techniques, and file handling functions.
Unit 7 - Networking: Explains the basics of computer network, types of networks:
LAN, WAN and MAN, transmission channel for LAN, servers and workstations,
Ethernet, token ring, network hardware, private and public networks, and
applications of computer network.
Unit 8 - Communication Protocols and Networking: Discusses connectionoriented and connectionless network, communications protocols, TDM, TDMA,
carrier sense (collision) system, token passing, peer-to-peer priority systems,
priority slot, carrier sense (collision free) systems, and token passing (priority)
systems.
Unit 9 - Connecting PCs: Explains the use of simple switches, printer sharing
buffers, zero-slot LANs, media sharing LANs, printer servers, client and servers,
OSI and TCP/IP models. It also defines data encoding and multiplexing.
Unit 10 - Communication Channels: Defines the various types of wire cables
used in data communication, telegraph and telephone. It also explains the basics
of microwave, communication satellites and channel sharing.
Unit 11 The Internet: Discusses the significant features and working of the
Internet, Internet browsers, ISP, search engines, URL, DNS, security concept,
digital signatures, e-mail, IPv6 and HTTP.
Unit 12 - Layered Protocols and the OSI Model: Explains the significance
and functioning of OSI, communication between layers of OSI, TCP/IP and
cryptography.
Unit 13 Polling and Selection Protocols: Defines the utility of character and
bit protocols, BSC, HDLC, SDLC, and protocol conversion.
Unit 14 - Security Measures: Discusses the basics of security concepts, need
of security and threats to users.
Objectives of studying the subject
After studying this subject, you should be able to:
Explain the basics of computer hardware, software and its functioning
Describe and identify various generations of computers and computer
languages
Discuss the significance of computer memory
Compute binary arithmetic
Subject Introduction
Unit 1
Structure
1.1 Introduction
Objectives
1.2 Simple Model of Computer
1.3 Hardware
1.4 Software
1.5 Data
1.6 Users
1.7 Different Types of Computers
1.8 Characteristics of Computer
1.9 Problem Solving using Computers
1.10 Representation of Characters in Computers
1.11 Integers and Fractions
1.12 Decimal to Binary Conversion
1.13 Hexadecimal Representation of Numbers
1.14 Summary
1.15 Glossary
1.16 Terminal Questions
1.17 Answers
1.18 Further Reading
1.1 Introduction
A computer can be described as a programmable mechanical device used for
carrying out a sequence of arithmetic or logical operations in a sequential manner.
There are five major units in a computer system namely, input unit, output unit,
control unit, memory unit, and arithmetic and logic unit. Computers consist of
two basic parts, i.e., hardware and software. Hardware is any part of your
computer which has a physical structure, like computer monitor or keyboard.
Software, on the other hand, is any set of instructions that explains the hardware
what to do and guides it to accomplish every task. Data refers to information in
a form suitable for use with a computer and data representation refers to the
methods used internally to represent information stored in a computer.
Computers use numeric codes to represent all the information they store. These
codes are sophisticated and are based on the binary number system (base
Unit 1
two) which represents numeric values using two symbols, 0 and 1. Binary is an
effective number system for computers because it is easy to implement with
digital electronics. The three most common number systems that are frequently
used in computers are binary, decimal and hexadecimal. The decimal numeral
system (base ten) has ten as its base where each position in the number
represents an incremental number with a base of 10. It includes the digits from
0 through 9. The hexadecimal numeral system (base 16), also known as just
hex, is a numeral system made up of 16 symbols. It uses the common symbols
in the decimal numeral system (0 through 9) and includes six extra symbols.
These symbols are characters taken from the English alphabet: A, B, C, D, E
and F.
In this unit, you will learn about computer basics and data representation.
You will be acquainted with computer hardware, software, data and users. The
binary, decimal and hexadecimal number systems and their conversion from
one form to other are explained with the help of examples.
Objectives
After studying this unit, you should be able to:
Describe the model of a computer
Identify the hardware and software components of a computer
Define data and users
Discuss the various types of computers
State the characteristics of a computer
Solve problems using computers
Demonstrate the representation of characters in computers
Explain the concept of integers and fractions
Compute decimal to binary conversion
Interpret the hexadecimal representation of numbers
Page No. 2
Unit 1
Memory unit
Arithmetic and logic unit
The input and output units are devices that are used to receive inputs and
display result. Figure 1.1 shows a computer organization.
Page No. 3
Unit 1
Input Unit
The input device is used to enter data and information into a computer. Keyboard,
mouse and scanner are the commonly used input devices. The keyboard is
used to enter alphanumeric characters and symbols. The mouse is used to pick
or select a command from the monitor screen. The scanner is used to scan an
image, read a barcode and so on.
The functions of an input unit are as follows:
It accepts data from the user.
It converts data into computer acceptable form.
It supplies the converted data to the computer system for further
processing.
Central Processing Unit
The processing unit comprises a processor (usually Pentium IV) that interprets
the program instructions in the memory, controls the data flow into and out of
the memory, and performs arithmetic and logical operations. The program
instructions are processed one at a time from the memory along with the
necessary data. Then the results are sent to the memory and the next instruction
is processed. This method is repeated until the complete program is executed.
The Control Unit (CU), Memory Unit (MU) and Arithmetic and Logic Unit
(ALU) constitute the Central Processing Unit (CPU) of a computer. Their purposes
are as follows:
The control unit controls the activities of the components of the computer.
It sends commands and signals and controls the sequence of instructions
to be executed.
The memory unit is the place where all input data and results are stored.
The CPU memory is also called Memory Register. Computer memory is
also available in the form of Random Access Memory (RAM).
The arithmetic and logic unit consists of circuits and registers that perform
arithmetic (+, -, *, /, etc.) and logic (<, >, <=, >=, etc.) operations.
Output Unit
The output device is used to display or print result from a computer. Monitor,
printer and plotter are the commonly used output devices. The monitor is used
to display the result in the form of text and graphics. The printer is used to print
the result. The plotter is used to plot or print graphical result from a computer.
Note that the result displayed on the monitor is temporary and it disappears
Page No. 4
Unit 1
when the next result is displayed, but the output printed using the printer or
plotter is permanent and these printouts can be used for any business
correspondence or documentation.
The functions of an output unit are as follows:
It accepts the results produced by the computer.
It converts these results into human understandable form.
It displays or prints out the results to the user.
All the units in a computer other than the central processing unit are called
peripherals.
Storage Unit
A computer stores the data entered into it for further processing. It also stores
the results and then passes them to an output device. The intermediate results
are also stored in the computer. Enough space is available in a computer to
store all these.
The functions of a storage unit are as follows:
It stores data for processing.
It stores the intermediate results too.
The results are stored and then passed to an output device.
The storage in a computer is of two types primary and secondary.
Primary Storage: The primary storage, also called the main memory, is
volatile. The primary storage is the RAM. Here all the program instructions,
data and the results are stored. The data stored in RAM disappears once
the electric power supplied to the computer is switched off. The capacity
of the primary storage is limited.
Secondary Storage: The secondary storage is also called auxiliary
storage. It is used as a supplement to the primary storage. The data
stored in the secondary storage stay for several years. They are used for
future data processing applications. The common secondary storage
media are floppy disk, hard disk, compact disk and magnetic tape.
Data Storage in a Computer
Storage of data in a computer is always in the form of binary digits (bits):
4 bits = 1 Nibble
8 bits = 1 Byte
Page No. 5
Unit 1
Self-Assessment Questions
1. Fill in the blanks with the appropriate words:
(a) The computer program directs the computer to solve a particular
problem and display___________.
(b) The ___________ device is used to display or print results from a
computer.
2. State whether true or false:
(a) Computer hardware components are actuated and controlled with
the help of computer programs called computer software.
(b) Storage of data in a computer is always in the form of decimal digits.
1.3 Hardware
Personal computers (refer Figure 1.2) are microcomputers commonly used for
commercial data processing, Desktop Publishing (DTP), engineering applications
and so on. Figure 1.3 depicts computer and its peripherals.
Page No. 6
Unit 1
Processor
The processor is an electronic circuit that allows the processing of numeric data
and the execution of instructions stored in memory. The processor is refered to
as the brain of the computer.
Page No. 7
Unit 1
Activity 1
Collect information and pictures on various categories of computer hardware
and prepare a comparative analysis chart.
1.4 Software
The computer software represents a set of programs that instruct the computer
in its operations and make the hardware work. Instructions to a computer should
take the form of a program. Note that the program is written in a programming
language. The program instructs the computer on how to solve a problem or
perform a task. The computer receives input data, and stores and processes
them to produce the desired output. A computer program is called software.
The computer is merely a general purpose machine that requires specific
software to perform a given task.
For example, if the temperature given in degree Fahrenheit is to be
converted to degree Celsius, we know that the equation
Celsius = (5/9)*(Fahrenheit 32)
is used to get the values converted using a calculator. The equation may
be repeated for various values. Similarly using a computer, a program may be
Page No. 8
Unit 1
run any number of times for various input values. A C-program for the above is
shown below.
Program 1.1
#include <stdio.h>
main()
{ float f,c;
printf(\n Enter temp.in degree Fahrenheit : );
scanf(%f,&f);
c = 5.0/9.0*(f - 32);
printf(\n Temp.in degree Celsius = %6.2f ,c);
}
When this program is executed, you have to enter the temperature in
degree Fahrenheit which will be converted and displayed in degree Celsius as
shown below:
Result of Program 1.1
Enter temp.in degree Fahrenheit: 103
Temp.in degree Celsius = 39.44
The output obtained can be printed or stored in a disk.
A computer software is a system component that consists of many program
modules. These programs instruct the hardware how to conduct processing.
The software determines the order in which these operations may be performed.
Categories of Software
Computer software can be broadly classified into two categories (refer Figure
1.6).
Application software
System software
Computer Software
Application Software
Software Packages
Utilities
Customized software
System Software
Operating System
Language Processor
Unit 1
Application Software
Application software are developed so that computers can be applied to everyday
tasks and problems. Personal productivity programming, engineering and
science applications, and business applications can avail of computers to simplify
their tasks. Personal productivity application programs are categorized on the
basis of the nature of their use in maintaining databases, presenting graphics,
generating spreadsheets and word processing. Application software are available
as a package or as a collection of programs.
Software Packages
The general purpose application software is called a software package. Since
the development of dedicated software for a specific application is very
expensive, software packages are developed to fulfill the needs of general
computer users. The important categories of software packages are given below.
Word processor
Electronic spreadsheets
Graphic, multimedia, presentation software
Database software.
The important features of these software are given below:
Word Processor: We use word processing software to prepare a
document such as a letter, memo or report. The document may be stored,
edited, formatted or printed.
Electronic Spreadsheets: A spreadsheet is a simple worksheet
comprising rows and columns of data. The data kept in a spreadsheet is
similar to the data written in a ledger book of a bank or the marksheet of
a student.
Graphic Software: Graphic software helps us to prepare automated
drawings using the computer and peripheral devices. The drawings may
be stored, edited or printed.
Database Software: Database refers to a collection of data sorted in a
desired order. For example, the names of students stored in alphabetical
order is a database. The data in the database can also be modified or
indexed using key fields like Name, ID Number and others.
Personal Assistance: Many software are available to store personal diary
information or keep records of schedules and contacts. Even an inventory
of items can be maintained using a computer.
Page No. 10
Unit 1
Page No. 11
Unit 1
Self-Assessment Questions
3. Fill in the blanks with the appropriate words:
(a) The processing speed of a computer depends on the clock speed of
the system and is measured in___________.
(b) A computer software represents a set of ________that instruct the
computer in its operations and make the hardware work.
4. State whether true or false:
(a) The ROM, RAM, CPU microprocessor and other supporting circuitry
can be found interconnected to each other on the hard disk.
(b) Application software are developed so that computers can be applied
to everyday tasks and problems.
1.5 Data
Data refers to basic facts and entities such as names and numbers. Examples
of data are dates, weights, prices, costs, numbers of items sold, employee
names, product names, addresses, tax codes, registration marks and so on.
Sequences of statements or facts that might have been processed, stored,
manipulated but not contextualized or organized comprise data. Information
refers to data that has been organized. Once data becomes information, it is
possible to process it and draw generalized deductions from it. An example of
data would be a file that lists all the orders placed through an online service. If
this data were to be sorted by PIN code and the number of orders coming from
each city were to be summarized, then this data would become information.This
Sikkim Manipal University
Page No. 12
Unit 1
would lead to knowledge, which would then make it possible for us to make
statements such as Most orders for Widget X come from Western India.
In a business, data input is a collection of facts about environmental
elements such as consumers, suppliers, competitors and government. Data
refers to the raw materials consumed in the production processes used in
factories or industries.
Information is data that is converted into a more useful form. Information
is used for direct utilization as it helps us in decision-making. Examples of
information are, time tables, merit lists, report cards, headed tables, printed
documents, pay slips, receipts, reports and so on. Information is obtained by
assembling items of data into a meaningful form. Other forms of information
are pay slips, schedules, reports, work sheets, bar charts, invoices and account
returns. The information may further be processed or manipulated to form
knowledge.
1.6 Users
A user, in computer terminology, refers to an individual who uses a computer or
network system. Computer users can be further classified according to the level
of data or security access they require or the applications or functionality that
they have access to.
In order to distinguish between different users, user accounts are created,
with each user account having a unique user ID (User Identification or User
Name) and a password. The systems or application software (or both) assign
access rights and responsibilities based on the way the user has been defined.
So once a user logs in using his unique user ID and password, the system
authenticates it and authorizes the user to access the system services allowed
in the user account.
The ability to define different users allows a single computer to be used
by several users, each having their own rights and privileges to ensure that
each have access only to authorized data and applications that they are supposed
to work on. This also prevents accidental or malicious deletion or corruption of
data created by different users.
Standard User Categories
In any multi-user system, users can be grouped together into different categories
as per their needs and access privileges. These categories or user groups are
defined by the system administrator, who is responsible for setting up the
Sikkim Manipal University
Page No. 13
Unit 1
user network and its administration. Generally, these categories will fit into one
of the standard groups listed below:
Standard User: Also known as a Limited account, generally, they have
access to the majority of functions or applications within the system, can
make adjustments to their own personal work space (like changing the
wallpaper, screen saver) and have a section of data storage space for
their own use. These users are typically not allowed to add or remove
applications from the system or perform any system tasks or access any
other account.
Administrator: The user responsible for the day to day running and
upkeep of a user network system is known as the Administrator. Such a
user has the right to add, delete and change the status of all the user
accounts on the system. The administrator can adjust system settings
and add or remove application software. They can also browse and access
data storage spaces from other user accounts in the system.
Guest: The account, as the name suggests, is meant for guest users or
people who use the system very infrequently or even on a one-time basis.
The guest account is typically very restricted in terms of data access and
altering even basic settings on the system.
Self-Assessment Questions
5. Fill in the blanks with the appropriate words:
(a) Data refers to basic ___________ and entities such as names and
numbers.
(b) In order to distinguish between different users, user accounts are
created, with each user account having a unique user ID and a
____________.
6. State whether true or false:
(a) Information is obtained by disseminating items of data into a
meaningful form.
(b) In any multi-user system, users cannot be grouped together into
different categories, as per their needs and access privileges.
Page No. 14
Unit 1
Page No. 15
Unit 1
Page No. 16
Unit 1
Page No. 17
Unit 1
Page No. 18
Unit 1
Page No. 19
Unit 1
respect to the definition of the problem. If the results consist of a long list of data
values, create a visualization of the data in order to interpret what you see.
Remember, the computer does not solve a problem; it is a tool that carries out
the instructions in the program.
Self-Assessment Questions
7. Fill in the blanks with the appropriate words:
(a) A digital computer stores data in the form of digits (numbers) and
then processes it in the __________ form from one state to the
next.
(b) Many ____________tools and description tools are available that
help in solving problems.
8. State whether true or false:
(a) The processing of data in a digital computer is done with the help of
logical circuits, which are also termed as digital circuits.
(b) The operations of a computer are controlled by a set of instructions
known as computer program.
0100
4
0010 or
01000010 in BCD
Page No. 20
Unit 1
Decimal Number
0
1
2
3
4
5
6
7
8
9
Binary Equivalent
0000
0001
0010
0011
0100
0101
0110
0111
1000
1001
As seen, 4-bit BCD code can be used to represent decimal numbers only.
Since 4 bits are insufficient to represent the various other characters used by
the computer, instead of using only 4 bits (giving 16 possible combinations),
computer designers commonly use 6 bits to represent characters in BCD code.
In this, the 4 BCD numeric place positions are retained but two additional zone
positions are added. With 6 bits, it is possible to represent 26 or 64 different
characters. This is, therefore, sufficient to represent the decimal digits (10),
alphabetic characters (26) and special characters (28).
Page No. 21
Unit 1
0B
0C
0D
0E
VT
FF
CR
SO
SI
10 DLE DC1 DC2 DC3 DC4 NAK SYN ETB CAN EM SUB ESC FSR GS
RS
US
00
20
02
01
03
04
05
06
07
08
09
0F
"
&
<
>
30
40
50
60
'
70
DEL
48
65
6C
6C
6F
2E
Page No. 22
Unit 1
10101.0112 = 1 2 + 0 2 + 1 2 + 0 2 + 1 2
+ 0 21 + 1 22 + 1 23
= 16 + 0 + 4 + 0 + 1 + 0 + 0.25 + 0.125 = 21.37510
In each binary digit, the value increases in powers of two starting with 0 to the
left of the binary point and decreases to the right of the binary point starting with
power 1.
Page No. 23
Unit 1
22
21
21
22
23, etc.
Binary point
Example 1.3: A mixed binary number 1011.101 can be written as
Solution: 1011.1012 = 1 23 + 0 22 + 1 21 + 1 20 + 1 21 + 0 22
+ 1 23
= 1 8 + 0 4 + 1 2 + 1 1 + 1 0.5 + 0 0.25
+ 1 0.125
[1011.101]2 = [11.625]10
When different number systems are used, it is customary to enclose the
number within big brackets and the subscripts indicate the type of the number
system.
sign
0
04
exponent
The mantissa has a 0 in the leftmost position to denote a plus. The mantissa
here is considered to be a fixed point fraction. So, the decimal point is assumed
Sikkim Manipal University
Page No. 24
Unit 1
to be at the left of the Most Significant Bit (MSB). The decimal mantissa, when
stored in a register requires at least 29 flip-flops: four flip-flops for each BCD
digit and one for the sign. The decimal part is not physically indicated in the
register; it is only assumed to be there. The exponent contains the decimal
number + 04 (in BCD), to indicate the actual position of the decimal point which
is four decimal positions to the right of the assumed decimal point. The mantissa
is sometimes called the fraction part.
Consider the following decimal numbers to understand floating point notation.
(i) 42300
(ii) 369.4202
(iii) 0.00385
0
36754
mantissa
sign
1
03
exponent
Page No. 25
sign
0 100111000
mantissa
Unit 1
sign
0
00100
exponent
The mantissa occupies 10 bits and the exponent 6 bits. The mantissa is
assumed to be a fixed point representation. If the mantissa is assumed to be an
integer, the exponent will be 1 00101 (5).
A floating point number is said to be normalized if the most significant
position of the mantissa contains a non-zero digit, for example, the mantissa
035 is not normalized but 350 is. When 350 is represented in BCD, it becomes
0011 0101 0000 and although two 0s seem to be present in the two most
significant positions, the mantissa is normalized. Since the bits represent a
decimal number, not a binary number, and decimal numbers in BCD must be
taken in groups of four bits, the first digit is 3 and is non-zero.
When the mantissa is normalized, it has no leading zeros and, therefore,
contains the maximum possible number of significant digits. Consider, for
example, a register that can accommodate a mantissa of five decimal digits
and a sign. The number + 0.35748 102 = 35.748 is normalized because the
mantissa has a non-zero digit 3 in its most significant position. This number can
be represented in an unnormalized form as + .00357 10 4 = 35.7. This
unnormalized number contains two most significant zeros and, therefore, the
mantissa can accommodate only three significant digits. The two least significant
digits, 4 and 8, which were accommodated in the normalized form, have no form
in the unnormalized form because the register can only accommodate five digits.
Arithmetic operations with floating point numbers are more complicated
than arithmetic operations with fixed point numbers and their execution takes
longer and requires more complex hardware. However, floating point
representation is a must for scientific computations because of the scaling
problems involved with fixed point computations. Many computers and all
electronic calculators have built-in capability of performing floating point arithmetic
operations. Computers that do not have hardware for floating point computations
have a set of subroutines to help the user program his scientific problems with
floating point numbers.
Example 1.4: Determine the number of bits required to represent, in floating
point notation, the exponent for decimal numbers in the range of 10+86.
Solution: Let n be the required number of bits to represent the number 10+86.
2n = 1086
n log 2 = 86
Page No. 26
n = 86/log 2 =
Unit 1
86
= 285.7
0. 3010
1086 = 2285.7.
Self-Assessment Questions
9. Fill in the blanks with the appropriate words:
(a) BCD is based on the concept of __________each digit of a decimal
number into its binary equivalent rather than converting the entire
decimal value into a pure binary form.
(b) The binary number system is also called a _________system.
10. State whether true or false:
(a) The major advantage with the BCD code is that it allows only 64
different characters to be represented.
(b) In the binary system, very large and very small numbers are
expressed in scientific notation.
Page No. 27
Similarly,
Unit 1
199 2
99 2
49 2
24 2
12 2
62
32
12
= 99 + remainder
= 49 + remainder
= 24 + remainder
= 12 + remainder
= 6 + remainder
= 3 + remainder
= 1 + remainder
= 0 + remainder
1
1
1
0
0
0
1
1
(LSB)
(MSB)
Page No. 28
Unit 1
[0.875]10 = [0.111]2
Page No. 29
Unit 1
Binary
(Radix 2)
Octal
(Radix 8)
Hexadecimal
(Radix 16)
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
0000
0001
0010
0011
0100
0101
0110
0111
1000
1001
1010
1011
1100
1101
1110
1111
0001 0000
0001 0001
0001 0010
0001 0011
0
1
2
3
4
5
6
7
10
11
12
13
14
15
16
17
20
21
22
23
0
1
2
3
4
5
6
7
8
9
A
B
C
D
E
F
10
11
12
13
20
0001 0100
24
14
Counting in Hexadecimal
When counting in hex, each digit can be incremented from 0 to F. Once it reaches
F, the next count causes it to recycle to 0 and the next-higher digit is incremented.
This is illustrated in the following counting sequences: 0038, 0039, 003A, 003B,
003C, 003D, 003E, 003F, 0040; 06B8, 06B9, 06BA, 06BB, 06BC, 06BD, 06BE,
06BF, 06C0, 06C1.
Hexadecimal to Binary Conversion
Hexadecimal numbers can be converted into binary numbers by converting
each hexadecimal digit to 4-bit binary equivalent using the code given in Table
Page No. 30
Unit 1
1.3. If the hexadecimal digit is 3, it should not be represented by two bits [11]2,
but it should be represented by four bits as [0011]2.
Example 1.8: Convert [2AB.81]16 to binary.
Solution: Hexadecimal number
2
A
B
.
1000
1000
0001
0001]2
Hexadecimal equivalent
F
7
7
.
E
C
[111101110111.111011]2 = [F77.EC]16
[2AB.8]H = [683.5]10
Page No. 31
Unit 1
[0.0664]10 = [0.10FF]16
[106.0664]10 = [6A.10FF]16
Page No. 32
Unit 1
Self-Assessment Questions
11. Fill in the blanks with the appropriate words:
(a) A popular method known as ___________method and also called
divide-by-two method is used to convert a large decimal number
into its binary equivalent.
(b) The hexadecimal system ____________numbers by sixteen and
powers of sixteen.
12. State whether true or false:
(a) The conversion of decimal fraction to binary fractions may be
accomplished by using several techniques.
(b) The hexadecimal number is formed from a binary number by grouping
bits in groups of 4 bits each starting at the binary point.
1.14 Summary
Let us recapitulate the important concepts discussed in this unit:
A computer is an electronic device capable of manipulating numbers and
symbols under the control of a set of instructions known as a computer
program. The computer program directs the computer to solve a particular
problem and display results.
A computer basically consists of electronic components that are supported
by electrical devices and mechanical systems. All these electronic,
electrical and mechanical components used in a computer are called
computer hardware.
The processing unit comprises a processor that interprets the program
instructions in the memory, controls the data flow into and out of the
memory, and performs arithmetic and logical operations.
A computer stores the data entered into it for further processing. It also
stores the results and then passes them to an output device. The
intermediate results are also stored in the computer.
Storage of data in a computer is always in the form of binary digits.
Personal computers are microcomputers commonly used for commercial
data processing, Desktop Publishing (DTP), engineering applications and
so on.
Sikkim Manipal University
Page No. 33
Unit 1
Page No. 34
Unit 1
1.15 Glossary
Hardware: All electronic/electric components and circuits used in a
computer system
Software: A set of programs which instruct the computer in its operations
Data: Basic facts and entities
Information: Data that is converted into a more useful form
Binary number system: A number system that uses only two digits, 0
and 1
Page No. 35
Unit 1
1.17 Answers
Answers to Self-Assessment Questions
1. (a) Results; (b) Output
2. (a) True; (b) False
3. (a) MegaHertz; (b) Programs
4. (a) False; (b) True
5. (a) Facts; (b) Password
6. (a) False; (b) False
7. (a) Discrete; (b) Analysis
8. (a) True; (b) True
9. (a) Converting; (b) Base two
10. (a) False; (b) False
11. (a) Double-dabble; (b) Groups
12. (a) True; (b) True
Page No. 36
Unit 1
Page No. 37
Unit 2
Structure
2.1 Introduction
Objectives
2.2 Generations of Computers
2.3 Moores Law
2.4 Classification of Computers
2.5 Distributed Computer System
2.6 Parallel Computers
2.7 Summary
2.8 Glossary
2.9 Terminal Questions
2.10 Answers
2.11 Further Reading
2.1 Introduction
In the previous unit, you read about some important terminology of computers
and data representation. In the current unit, you will read about the generations
of computers that have evolved over time and classification of computers based
on certain features.
Being an integral part of our lives today, computers have advanced from
large sized simple calculating machines to smaller yet more powerful, efficient
and faster machines. This evolution in technology is defined in the terms of the
generations of computer. The development of integrated circuits led to decrease
in the size of the chip. The density of transistors on the integrated circuits
increased exponentially thereafterspecifically doubling at regular intervals of
around two years as stated by Moore. Computers vary in utility, size, capacity,
speed, hardware facilities, price, etc. As per utility, computers can be classified
into digital, analog and hybrid. Digital computers can be mainframe,
minicomputers or microcomputers. Early computing was performed on a single
processor. A distributed system is a collection of independent computers,
interconnected via a network, capable of collaborating on a task. The area of a
network can be as small as a building or as large as entire country. A computer
network topology is the physical communication scheme used by connected
devicesthe main ones being star, ring and bus.
Unit 2
Objectives
After studying this unit, you should be able to:
Explain the different generations of computers and their features
State Moores Law
Describe the classification of computers
Summarize the features of distributed computer systems
Discuss parallel computers
Page No. 40
Unit 2
Page No. 41
Unit 2
Instead of punched cards and printouts, users interacted with the thirdgeneration computers through devices like the keyboard and monitors. They
also interfaced with an operating system that allowed the device to run many
different applications at the same time with the help of a central program that
monitored the memory.
For the first time, computers became accessible to the masses because
they were substantially smaller and cheaper than their predecessors.
Page No. 42
Unit 2
In 1981, IBM introduced its first computer for the home user and in 1984
Apple introduced the Macintosh. Microprocessors also moved out of the realm
of desktop computers and into many areas of life as more and more everyday
products began to use microprocessors.
As the computing power of computers improved, it was possible to link
them together to form networks which eventually led to the development of the
Internet. Fourth-generation computers also saw the development of GUIs, the
mouse and various handheld devices.
Self-Assessment Questions
1. Fill in the blanks with the appropriate words:
(a) Early computers, such as the ENIAC, EDVAC and UNIVACI, can be
classified as _________ generation computers.
(b) The first memory chip was constructed in the year __________.
Sikkim Manipal University
Page No. 43
Unit 2
Number of transistors on
an integrated circuit
10,000,000,000
Itanium2
(9 MB cacl)
1,000,000,000
Itanium 2
Number of transistors doubling
every 24 months
100,000,000
Pentium 4
Itanium
10,000,000
Pentium III
Pentium II
Pentium
1,000,000
486
100,000
386
286
10,000
8080
2,300
4004
1971
8008
1980
1990
2000 2004
Year
Page No. 44
Unit 2
Self-Assessment Questions
Fill in the blank with the appropriate word:
3. The Moore law was developed by Intel co-founder ____________ in 1965.
State whether true or false:
4. Moore predicted that the density of transistors in integrated circuits would
triple at regular intervals of around two years.
Page No. 45
Unit 2
Page No. 46
Unit 2
Page No. 47
Unit 2
They are capable of performing data processing tasks and can solve
numerical programs. Microcomputers work faster like minicomputers.
They have moderate memory capacity measured in MBs.
They are inexpensive. A variety of microcomputers are available to suit
smaller business organizations and educational institutions.
The processing speed of microcomputers is measured in MHz. A
microcomputer running at 90 MHz works approximately at 90 MIPS.
Microcomputers are equipped with drives for floppy disks, compact disks
and hard disks.
Only one user can operate a microcomputer at a time.
They are normally dedicated to one job. Millions of people use
microcomputers to increase their personal productivity.
Useful accessory tools like clock, calendar, calculator, daily schedule
reminders, scratch pads and so on, are available in microcomputers.
Laptop computers, also called notebook computers, are microcomputers.
They use a battery power source. Laptop computers use a keyboard,
mouse, floppy disc drive, CD drive, hard disk drive and monitor. They are
costlier than personal computers.
Self-Assessment Questions
Fill in the blank with the appropriate word:
5. ___________computers are generally used in industrial process controls
and to measure physical quantities such as pressure, temperature and
so on.
State whether true or false:
6. The processing power of mainframe computers is less than that of
minicomputers.
Page No. 48
Unit 2
your computer, to plug into the cable, set up and configure special network
software.
Server Computer
Page No. 49
Unit 2
Page No. 50
Unit 2
Page No. 51
Unit 2
resources such as files and printers. Finally, you can say that a LAN runs enduser applications.
Once a network spans more than a few miles, such as a campus
environment, it is referred to as a MAN. A MAN spans a region such as a city. A
WAN brings companies into the sphere of networking by connecting computers
in the entire enterprise, which may span over several cities, states and countries.
In the last 15 years, LANs have become a key business tool used by
companies worldwide rather than just an experimental technology. A LAN is a
high-speed communications system designed to link computers and other data
processing devices within a small geographical area such as a workgroup,
department or a single floor of a multi-storey building. Several LANs can also
be interconnected within a building or campus of buildings to extend connectivity.
LANs have become popular because they allow users to share vital
computing resources, including expensive hardware such as printers and CD
ROM drives, application programs and most importantly, the information the
users need to do their jobs. Prior to the development of LAN technology, individual
computers were isolated from each other and limited in their range of applications.
By linking these individual computers over LANs, their usefulness and productivity
have increased enormously. However, a LAN is a local network by its very nature.
It is confined to a fairly small area such as a building or even a single floor of a
building. To realize the full benefit of computer networking, it is critical to link
individual LANs into an enterprise-wide backbone network that connects all the
employees and computing resources of an enterprise, no matter how
geographically dispersed they may be.
Todays LANs and LAN internetworks are powerful, flexible and easy to
use, but they incorporate many sophisticated technologies that must work
together flawlessly. For a LAN to really benefit an organization, it must be
designed to meet the organizations changing communications requirements.
Building a LAN is a process of choosing different pieces and matching them
together.
Page No. 52
Unit 2
a network. The logical topology of a network describes how data flows through
the physical topology.
Physical Topologies
All physical topologies are variations of two fundamental methods of connecting
devices: point-to-point and multipoint. After examining these two fundamental
topologies, several variations are examined.
Mainframe FEP
Terminal
Laser Printer
Point-to-Point Topology
The Point-to-Point (PTP) topology connects two nodes directly together.
The following examples are pure point-to-point links:
Two computers communicating via modems
A mainframe terminal communicating with a front-end processor
A workstation communicating along a parallel cable with a printer
In a point-to-point link, two devices monopolize a communication medium.
Since the medium is not shared, a mechanism is not needed to identify the
computers. Therefore, a simple two-device point-to-point network has no need
for addressing as seen in Figure 2.6.
Point-to-point links can be simplex, half duplex or full duplex. When devices
must engage in bi-directional communication on a half duplex link, some
turnaround mechanisms must be in place to switch the roles of the sending and
receiving devices.
Multipoint Topology
Multipoint topologies link three or more devices through a single communication
medium. Multipoint topologies work much like a party-line telephone service
where several subscribers are connected to the same telephone line.
Page No. 53
Unit 2
Ring
Mesh
Bus
Star Topology
A star topology is a popular method of connecting computers and resources in
a network through cables. In the star topology, each device connects to a central
point via a point-to-point link. Depending on the logical architecture used, several
names are used for the central point including the following:
PC
PC
Passive
Hub
PC
File Server
Passive hub: A passive hub is a simple signal splitter. Its main function is to
connect the arms of the star while maintaining the proper electrical
characteristics. Figure 2.7 shows a star topology and a passive hub.
A passive hub routes traffic to all nodes. This means that a tremendous
load is created when much communication takes place between computers.
Every computer has the additional burden of reading the address of each piece
of information it receives to determine if the information is intended for that
computer. Information containing other addresses is discarded.
Active hub: An active hub performs the same function as a passive hub, but
contains electronic circuits that regenerate and retransmit the information. Thus,
active hubs can be used to extend the size of a network.
Page No. 54
Unit 2
Intelligent hub: Intelligent hubs perform the same functions as passive and
active hubs. However, they can make informed path selections and perform
some network management. Intelligent hubs route traffic only to the branch of
the star on which the receiving node is located. If redundant paths exist, an
intelligent hub can route information around normally used paths when cable
problems occur.
Routers, bridges and switches are examples of hub devices that can route
data packets intelligently. Intelligent hubs can also incorporate diagnostic features
that make it easier to troubleshoot network problems.
Hub
Node 5
Node 1
Node 4
Node 2
Node 3
Page No. 55
Unit 2
Each device is isolated on its own cable. This makes it easy to isolate
individual devices from the network by disconnecting them from the wiring
hub.
All data goes through the central point which can be equipped with
diagnostic devices that make it easy to troubleshoot and manage the
network.
The hierarchical organization allows isolation of traffic on the channel.
This is beneficial when several, but not all, computers place a heavy load
on the network. Traffic from those heavily used computers can be
separated from the rest or dispersed throughout for a more even flow of
traffic.
The star topology has the following disadvantages:
As point-to-point wiring is utilized for each node, more cabling is required.
Hub failures can disable large segments of the network.
Examples of star topology
The following types of networks are examples of star topologies:
ARCnet
10Base-T, 100Base-TX
StarLAN
Ring Topology
The ring topology is a physical topology in which the devices are connected in
a closed loop using point-to-point links. In Figure 2.9, you can see how each
node on the ring acts as a repeater. It receives transmission from the previous
node and amplifies it before passing it on.
Receipt
To
ke
Transmit
Page No. 56
Unit 2
Page No. 57
Unit 2
Self-Assessment Questions
7. Fill in the blanks with the appropriate words:
(a) A computer connected to a network is called a ___________.
(b) __________ is a system of networked computers and other hardware
resources spread in a small area such as a building.
8. State whether true or false:
(a) In a star topology, each device connects to a central point via a
point-to-point link.
(b) StarLAN is an example of ring topology.
PC
PC
Page No. 58
Unit 2
7 bytes
SFD
1 bytes
Destination
Address
Source
Address
Length Indicator
2 or 6 bytes
2 or 6 bytes
2 bytes
Data
Padding
FCS
Station A
Station B
4 bytes
Station C
Station D
Packet
The NIC then transmits the packet onto the LAN. The packet is transmitted
as a stream of data bits represented by two different voltages of electrical signals.
As it travels along the shared cable, all the stations attached to it can see the
packet. As it goes by the NIC in each station, the NIC checks the destination
address in the packet header to determine if the packet is addressed to it.
When the packet passes the station to which it is addressed, the NIC at that
station copies the packet, takes the data out of the envelope and gives it to the
computer.
Sikkim Manipal University
Page No. 59
Unit 2
Star
Activity 2
Is it possible to connect a ring network and a bus network? If yes, is that an
effective solution or should a single network topology is the best way of
handling it?
Page No. 60
Unit 2
Self-Assessment Questions
Fill in the blank with the appropriate word:
9. In a _________ topology, all the devices are attached to the same
transmission medium.
State whether true or false:
10. In bus topology, if the cable breaks, it can disable the entire segment of
the network because of the removal of the required termination from each
of the two cable fragments.
2.7 Summary
Let us recapitulate the important concepts discussed in this unit:
Each generation of computers is characterized by a major technological
development that fundamentally changed the way computers operate,
resulting in increasingly smaller, cheaper, more powerful, efficient and
reliable devices with decreasing energy consumption and lesser generation
of heat.
First-generation computers used vacuum tubes in their circuitry and
magnetic drums for their memory. Transistors developed in 1947, replaced
vacuum tubes and ushered in the second- generation computers.
The development of integrated circuit was the hallmark of third-generation
computers. Fourth-generation computers saw the development of
microprocessors and GUIs while fifth-generation computing devices based
on artificial intelligence are still being developed.
Moore predicted that the density of the transistors in integrated circuits
would double at regular intervals of around two years.
Computer can be classified as digital, analog and hybrid.
Digital computers can be further classified as mainframe computers,
minicomputers and microcomputers.
A network is a connection of two or more computers together so that they
can exchange information. Networks involve sharing three things: files,
resources and programs.
Disadvantages of networking are crashes, data security problems and
lack of privacy.
Sikkim Manipal University
Page No. 61
Unit 2
2.8 Glossary
Digital computer: A computer that is used for data processing and to
solve problems using programs
Analog computer: A computer used in industrial process controls and to
measure physical quantities
Network: The connection of two or more computers connected by a cable
so that they can exchange information
LAN: A system of networked computers and other hardware resources
spread in a small area, such as a building
Topology: A branch of mathematics that examines the characteristics of
geometric shapes
Page No. 62
Unit 2
2.10 Answers
Answers to Self-Assessment Questions
1. (a) First; (b) 1970
2. (a) False; (b) True
3. Gordon E. Moore
4. False
5. Analog
6. False
7. (a) Node; (b) LAN
8. (a) True; (b) False
9. Bus
10. True
Page No. 63
Unit 2
Page No. 64
Unit 3
Structure
3.1 Introduction
Objectives
3.2 Description of Computer Input Units
3.3 Other Input Methods
3.4 Computer Output Units
3.5 Memory Organization
3.6 Read Only Memory
3.7 Serial Access Memory
3.8 Physical Devices Used to Construct Memories
3.9 Summary
3.10 Glossary
3.11 Terminal Questions
3.12 Answers
3.13 Further Reading
3.1 Introduction
In the previous unit, you read about various generations of the computer as well
as its classifications. In the present unit, you will read about the various input
and output devices as well as the different types of memory used in the computer.
A computer is of no use if it is not able to communicate with the external
world. It must, therefore, have a system to receive information from the outside
world and be able to communicate results to the external world. Thus, every
computer has an input/output subsystem referred to as an I/O subsystem that
provides efficient communication to and from the computer. Programs must be
entered into the computer memory for processing and the results obtained from
computations must be displayed or recorded for the users benefit. An output
device accepts data from the computer and translates them into a form that can
be understood by the user. Memory is required for storage and subsequent
retrieval of instructions and data. Every computer requires storage space where
instructions and data of a program can reside temporarily or permanently when
a program is being executed. You will be acquainted with different types of
memory systems. A read only memory is used to store programs that permanently
reside in the computer and do not change once the manufacture of the computer
is complete. This unit also examines serial access memory. In contrast to the
Unit 3
Page No. 66
Unit 3
output devices are used to provide the processed results from primary storage
to users. Figure 3.1 shows the role of input/output devices in a computer system.
Data
Input
from
External
World
Input
Device
CPU &
Memory
Output
Device
Data
Processed
Data
Coded
Data in
Converted
Internal
in
to HumanInternal
Form
Readable
Form
Form
Figure 3.1 Role of I/O Devices in a Computer System
In this unit, we will discuss the various input devices available for data
input. The most commonly used input devices can be classified into the
categories of:
Keyboard device
Point-and-draw devices (mouse, trackball, joystick, light pen, touch
screen, etc.)
Shift Key
Numeric Keypad
The most popular keyboard used today is the 101-keys with a traditional
QWERTY layout, having an alphanumeric keypad, 12 function keys, a variety
Sikkim Manipal University
Page No. 67
Unit 3
Page No. 68
Unit 3
feedback that a particular position has been selected for further action. The
next click on a selected position or two quick clicks on it causes a particular
action to take place on the selected object, for example, in Windows operating
systems, it causes a program associated with that object to be started. The
second button, on the right, usually provides some less-frequently needed
capability, for example, when viewing a Web page, you can click on an image to
get a pop-up menu that, among other things, lets you save the image on your
hard disk. Some models have a third button for additional capabilities. Some
mouse manufacturers also provide a version for left-handed people.
Trackball
A trackball is a pointing device that is much like an inverted mouse. It consists
of a ball inset in a small external box, or adjacent toand in the same unit as
the keyboard of some portable computers. It is more convenient and requires
much less space than the mouse since here the whole device is not moved (as
in the case of a mouse). Trackballs come in various shapes but support the
same functionality. Typical shapes used are a ball, a square and a button (typically
seen in laptops).
Joystick
A joystick is a vertical stick that moves the graphic cursor in the direction the
stick is moved. It consists of a spherical ball, which moves within a socket and
has a stick mounted on it. The user moves the ball with the help of the stick that
can be moved left or right, forward or backward, to move and position the cursor
in the desired location. Joysticks typically have a button on top that is used to
select the option pointed by the cursor. Video games, training simulators and
control panels of robots are some common uses of the joystick.
Light Pen
A light pen is a pen-shaped device allowing natural movement on the screen. It
is made up of a light sensitive cell and a lens assembly designed in such a way
that it focuses onto itself any light in its field of view. The pen contains a light
receptor and is activated by pressing the pen against the display screen. The
receptor is the scanning beam that helps in locating the position of the pen (X
and Y coordinates on screen). Suitable system software is provided to initiate
the desired action once the area on the display screen is located with the help
of the light pen.
Light pens are typically used in Computer Aided Design (CAD) applications
to directly draw on screen.
Page No. 69
Unit 3
Touch Screen
A touch screen is probably one of the simplest and most intuitive of all input
devices. It uses optical sensors in, or near, the computer screen that can detect
the touch of a finger on the screen. Once the user touches a particular screen
position, sensors communicate the position to the computer. This is then
interpreted by the computer to understand the users choice for input.
The most common usage of touch screens is in information kiosks where
users can receive information at the touch of a screen. These devices are
becoming increasingly popular today.
Self-Assessment Questions
1. Fill in the blanks with the appropriate words:
(a) ___________ is a pointing device which consists of a ball inset in a
small external box or adjacent to the keyboard of some portable
computers.
(b) ___________uses optical sensors in or near the computer screen
that can detect the touch of a finger on the screen.
2. State whether true or false:
(a) A joystick is a horizontal stick that moves the graphic cursor in the
direction the stick is moved.
(b) The light pen contains a light receptor and is activated by pressing
the pen against the display screen.
Page No. 70
Unit 3
There are two types of scanners, CONTACT and LASER. Both bounce a
beam of light off an image and then measure the reflected light to determine
the value of the image. Hand-held contact scanners make contact as they are
brushed over the printed matter to be read. Laser-based scanners are more
versatile and can read data passed near the scanning area. Hand-held scanners
are used where the information to be scanned or the volume of documents to
be scanned is very low. They are much cheaper as compared to the flat-bed
scanners. Capturing information using scanners reduces the possibility of human
error typically seen during large data entry. The reduction in human intervention
improves the accuracy of data and provides for timeliness of the information
processed. Most recent trends for data input is towards source data automation.
The equipment used for source data automation capture data as a by-product
of a business activity thereby completely eliminating manual input of data.
Page No. 71
Unit 3
MICR readers are used to read and sort cheques and deposits. An MICR
reader-sorter reads the data on the cheques and sorts the cheques for distribution
to other banks and customers for further processing.
Barcode Example
Barcode Reader
An Optical Barcode Reader (OBR) uses laser beam technology. The laser
beam is moved across the pattern of bars in a barcode. These bars reflect the
beam in different ways. The reflected beam is then sensed by a light-sensitive
detector which then converts the light patterns into electrical pulses thereby
transmitting them to logic circuits for further conversion to alphanumeric value.
Barcode devices are available as hand-held devices.
Page No. 72
Unit 3
3.3.5 Digitizer
Digitizers are used to convert drawings or pictures and maps into a digital format
for storage into the computer. A digitizer consists of a digitizing or graphics
tablet, which is a pressure sensitive tablet, and a pen with the same X and Y
coordinates as on screen. Some digitizing tablets also use a crosshair device
instead of a pen. The movement of the pen or crosshair is reproduced
simultaneously on the display screen. When the pen is moved on the tablet, the
cursor on the computers screen moves simultaneously to the corresponding
position on screen (X and Y coordinates). This allows the user to draw sketches
directly or input existing sketched drawings easily. Digitizers see most common
usage by architects and engineers as a tool for CAD.
Self-Assessment Questions
3. Fill in the blanks with the appropriate words:
(a) ________________ devices can sense marks on computer readable
paper.
(b) Banks using the _______________technology print cheque books
on special types of paper.
Sikkim Manipal University
Page No. 73
Unit 3
Page No. 74
Unit 3
can be addressed uniquely and directly. Owing to the fact that each dot can be
addressed as a separate unit, it provides greater flexibility for drawing pictures.
Display screen technology may be one of the three categories:
Cathode Ray Tube (CRT): The main components of a cathode ray terminal
are the electron gun, the electron beam controlled by an electromagnetic
field and a display screen which is phosphor-coated. The screens
phosphor-coating is organized into a grid of dots called pixels.
The electron gun emits an electron beam, which is directed towards the
phosphor-coated display by the electromagnetic field and this in turn
creates the image.
There are two types of CRT displays:
o Vector CRT display: In which the electron beam is directed only to
places where the image is to be created.
o Raster scan display: In which image is projected on screen by
directing the electron beam across each row of the picture elements
from top to the bottom of the screen. This type of display provides a
high dynamic capability since the image is continuously refreshed. It
offers full colour display at a relatively low cost and is, therefore,
becoming increasingly popular.
The quality of display is indicated by the resolution of the display device.
The number of horizontal and vertical pixels determines resolution. Typical
resolutions in graphic display range from (800 600) to (640 768) to
(1024 1024) pixels.
Liquid Crystal Display (LCD): Introduced in watches and clocks in the
1970s and is now applied to the display terminals. In this, the cathode ray
tube was replaced by liquid crystal to produce the image. It does not has
color capability and the image quality is relatively poor. The main advantage
of LCD is its low energy consumption. It finds its most common usage in
portable devices where compactness and low energy requirements are
of prime importance.
Projection Display: Projection display technology is characterized by
replacing the personal size screen with large screens upon which the
images are projected. These systems are connected to the computer,
and whatever appears on the computer terminal gets enlarged and
projected on a large screen. These are being used today for large group
presentations.
Page No. 75
Unit 3
Monitors
Monitors use a CRT to display information. It resembles a television screen and
is similar to it in other respects. The monitor is typically associated with a keyboard
for manual input of characters. The screen displays information as it is keyed
in, enabling a visual check of input before it is transferred to the computer. It is
also used to display the output from the computer and hence serves as both an
input and an output device.
The monitor along with the keyboard is called a Visual Display Unit (VDU).
This is the most commonly used input/output device today and is also known as
a soft copy terminal. A printing device is usually required to provide a hard copy
of the output.
3.4.2 Printers
Printers are used for producing output on paper. There are a large variety of
commercially available printers today (estimated to be 1,500 different types).
These printers can be classified into categories based on:
Printing technology
Printing speed
Printing quality
Printing technology: Printers can be classified as impact or non-impact printers,
based on the technology they use for producing output.
Impact printers use variations of standard typewriter printing mechanism
where a hammer strikes the paper through an inked ribbon. These printers
have a mechanism that touches the paper in order to create an image. Dot
matrix printers and character printers fall under this category.
Non-impact printers do not touch the paper when creating an image. They
use chemical, heat or electrical signals to etch symbols on paper. Many of these
require special coated or treated paper. Inkjet, laser and thermal printers fall
under this category of printers.
Printing speed: Refers to the number of characters printed in a unit of time.
Based on speed these may be classified as character printer (prints one character
at a time), line printers (print one line at a time) and page printers (print the
entire page at a time). Printer speeds are, therefore, measured in terms of
characters-per-second or cps for a character printer, lines-per-minute or lpm
for a line printer and pages-per-minute or ppm for a page printer.
Page No. 76
Unit 3
The speed, versatility and ruggedness, combined with low cost, tend to
make such printers particularly attractive in the personal computer market.
Typical printing speeds in case of dot matrix printers range between 40
1000 cps (characters-per-second). The one major disadvantage of this
technology is that the print quality is low.
Inkjet
Inkjet printers use a series of nozzles to spray drops of ink directly on the paper.
These, therefore, fall under the category of non-impact printers. Figure 3.6
shows an inkjet printer.
Sikkim Manipal University
Page No. 77
Unit 3
Figure 3.7
A Laser Printer
Page No. 78
Unit 3
Laser printers are capable of converting computer output into print, page
by page. Since characters are formed by very tiny ink particles, they can produce
very high quality images (text and graphics), generally offer a wide variety of
character fonts, and are silent and fast in use.
Laser printers are faster in printing speed than other printers discussed
above. Their speeds can range from 10 pages a minute to about 200 pages per
minute, depending upon the make/model. Laser is high quality, high speed,
high volume and non-impact technology that works on plain paper or pre-printed
stationary. This technology is relatively expensive but is becoming very popular
because of the quality, speed and noiseless operations.
3.4.3 Plotters
Plotters are used to produce graphical output on paper. It is a device capable of
producing charts, drawings, graphics, maps, etc. It is much like a printer but is
designed to print graphs instead of alphanumeric characters.
Based on the technology used, plotters may be pen plotters or electrostatic
plotters. While pen plotters have an ink pen attached to draw the images,
electrostatic plotters work similar to a laser printer. Image is produced by charging
the paper with a high voltage. This voltage attracts the toner, which is then
melted on the paper with heat. Electrostatic plotters are fast, but the quality is
generally considered to be poor when compared to pen plotters. This is why
pen plotters are more extensively used as compared to electrostatic plotters.
Flatbed plotters and drum plotters constitute the most commonly used
plotters.
Flatbed Plotters
Flatbed plotters have a flat base like a drawing board on which the paper is laid
(refer Figure 3.8 (a)). One or more arms, each of them carrying an ink pen,
moves across the paper to draw. The arm movement is controlled by a
microprocessor (chip). The arm can move in two directions, one parallel to the
plotter and the other perpendicular to it (called the x and y directions). With this
kind of movement, it can move very precisely to any point on the paper placed
below.
The computer sends the commands to the plotter which are translated
into x and y movements. The arm moves in very small steps to produce
continuous and smooth graphics. The size of the plot in a flatbed plotter is
limited only by the size of the plotters bed. The advantage of flatbed plotters is
that the user can easily control the graphics. He can manually pick up the arm
Sikkim Manipal University
Page No. 79
Unit 3
anytime during the production of graphics and place it on any position on the
paper to alter the position of graphics to his choice. The disadvantage here is
that flatbed plotters occupy a large amount of space.
Drum Plotters
Drum plotters use a drum revolver to move the paper during printing (refer
Figure 3.8 (b)). The arm carrying a pen moves only in one direction, perpendicular
to the direction of the motion of the paper. Thus in drum plotters, the pen is
moved in a single axis track and the paper itself moves on a cylindrical drum to
add the other axis or dimension. The combination of the pen and paper movement
creates the graphics.
A Drum Plotter
The size of the graph is, therefore, limited only by the width of the drum
and can be of any length. Drum plotters are very compact and lightweight as
compared to flatbed plotters. This is one of the advantages of such plotters.
The disadvantage, however, is that the user cannot freely control the graphics
when they are being created. Plotters are more expensive when compared to
printers. Typical application areas for plotters include: Computer-Aided
Engineering (CAE ) applications like CAD and Computer-Aided Manufacturing
(CAM), architectural drawing, map drawing, etc.
Activity 2
Collect information on the significant features of output devices of a computer
system and present it in a tabular form.
Page No. 80
Unit 3
Self-Assessment Questions
5. Fill in the blanks with the appropriate words:
(a) The screens phosphor coating is organized into a grid of dots called
___________.
(b) The print head of an inkjet printer consists of a number of tiny nozzles
that can be selectively heated up in a few microseconds by
an_____________.
6. State whether true or false:
(a) Non-impact printers do not touch the paper when creating an image.
(b) Plotter is much like a printer but is designed to print graphs instead
of alphanumeric characters.
Page No. 81
Unit 3
Cache Memory
Main Memory
Secondary Memory
Figure 3.9 The Memory Hierarchy
Page No. 82
Unit 3
costs are desirable. It is worth noting that as the access time for memories
is increasing, the cost is decreasing.
Access time: It is the time required to locate and retrieve data from the
storage unit. Its depend on the physical characteristics and access mode
used for that device.
Primary storage units have faster access time as compared to secondary
storage units.
Access mode: Memory is considered to be consisting of various memory
locations. Access mode refers to the mode in which information is accessed
from the memory.
Permanence of storage: If the storage unit can retain the data even
after the power is turned off or interrupted, it is termed as non-volatile
storage. While, if the data is lost once the power is turned off or interrupted,
it is called volatile storage. It is obvious from these properties that the
primary storage units of the computer systems are volatile, while the
secondary storage units are non-volatile. A non-volatile storage is definitely
more desirable and feasible for storage of large volumes of data.
Self-Assessment Questions
7. Fill in the blanks with the appropriate words:
(a) _____________is the time required to locate and retrieve data from
the storage unit.
(b) A computer system having a memory of 256 MB is capable of storing
____________ bytes or characters.
Page No. 83
Unit 3
Page No. 84
Unit 3
care of such situations. EPROMs are typically used by R&D personnel who
experiment by changing micro-programs on the computer system to test their
efficiency.
Further, EPROM chips are of two types: Electrically EPROM (EEPROM)
in which high voltage electric pulses are used to erase stored information and
Ultra Violet EPROM (UVEPROM) in which stored information is erased by
exposing the chip for some time to ultraviolet light.
Page No. 85
Unit 3
continuosly try to improve the features of the device through research and
developments.
Disadvantages of Serial Access Memory Devices
Tape drives provide serial access or sequential access of data but considerable
amount of time is taken in forwarding and rewinding a tape to store or read any
one particular piece of data. As a result, tape drives are said to have very slow
average seek time. Tape drives can be found inside tape libraries and autoloaders
which help in loading, unloading and storing multiple tapes to further increase
archive capacity. Tape drives are connected to a computer using any of the
following interfaces, such as Small Computer System Interface (SCSI),
Integrated Development Environment (IDE), Serial Advanced Technology
Attachment (SATA), Universal Serial Bus (USB) and so on.
Self-Assessment Questions
9. Fill in the blanks with the appropriate words:
(a) When the manufacturer burns the data into the circuitry of the
computer, it is called ___________.
(b) Serial means no __________which implies that if a required data is
present in the last address cells of the memory then the data that is
present in the target address could only be fetched after all the data
located in the initial addresses is read.
10. State whether true or false:
(a) In both ROM and PROM, the write operation can be performed only
once and whatever is written cannot be changed.
(b) Tape device is a data storage device that reads and writes data on
hard disk.
Page No. 86
Unit 3
The magnetic medium was found to be long lasting and fairly inexpensive,
and therefore became an ideal choice for large storage requirements. Magnetic
tapes and disks are commonly used as storage media. With the advancements
in optical technology, optical disks are making inroads as one of the major
secondary storage devices.
Track
Sector
Inter track
Gap
Figure 3.10 Logical Layout of a Magnetic Disk
Page No. 87
Unit 3
Disk packs consist of two or more hard disks mounted on a single central
shaft; because of this, all disks in a disk pack rotate at the same speed. It
consists of separate read/write heads for each surface (excluding the
upper surface of the top most disk platter and the lower surface of the
bottom most disk platter). Disk packs are removable in the sense that
they can be removed and kept offline when not in use (typically stored
away in plastic cases). They have to be mounted on the disk drive before
they can be used. Thus, different disk packs can be mounted on the
same disk drive at different instances, thereby providing virtually unlimited
(modular) storage capacity. Figure 3.11 shows a disk pack.
Winchester disks also consist of two or more hard disk platters mounted
on a single central shaft but are of the fixed type. The disk platters are
sealed in a contamination-free container. Due to this fact all the disk
platters, including the upper surface of the top most disk platter and the
lower surface of the bottom most platter, are used for storing data. So,
even though Winchester disks have limited storage capacity as opposed
to disk packs, they can store larger amounts of data as compared to the
same number of disk platters. Figure 3.12 shows a Winchester disk.
3.8.4 CD ROM
Optical disks are storage devices with huge storage capacity. It is a relatively
new storage medium and uses laser beam technology for writing and reading
of data.
Page No. 88
Unit 3
Sliding
metal piece
cover
Label for
Identification
Write-protect tab
Optical disks consist of one large track that starts from the outer edge
and spirals inward towards the centre (this is unlike the magnetic disk in which
tracks are concentric circles on the disk platter). An optical disk is also split up
into sectors but these are of the same length regardless of its location on the
track. Data is, therefore, packed at maximum density over the disk.
The technology used in optical disks uses laser beams to write and read
data as opposed to the read /write head used in magnetic disks. Data is recorded
by etching microscopic pits (burnt surface) on the disk surface. A high intensity
laser beam is used to etch the pits while a low intensity laser beam is used for
data retrieval. Figure 3.14 shows an optical disk and a disk drive.
Three optical memory devices that are becoming increasingly popular in
various computer applications are CD ROM, WORM (Write Once Read Many)
and Erasable Optical disks. We shall discuss these below.
CD ROM: The CD ROM is a direct extension of the audio CD. It is usually made
from a resin named polycarbonate that is coated with aluminium to form a highly
reflective surface. The information on a CD ROM is stored as a series of
microscopic pits on the reflective surface (using a high-intensity laser beam).
The process of recording information on these disks is known as mastering.
This is so-called because this master disk is then used to make a die, which is
used to make copies.
The information is retrieved from a CD ROM using a low-powered laser,
which is generated in an optical disk drive unit. The disk is rotated and the laser
beam is aimed at the disk. The intensity of the laser beam changes as it
encounters a pit. A photo-sensor detects the change in intensity, thus recognizing
the digital signals recorded on the surface of the CD ROM and converts them
into electronic signals of 1s and 0s.
As the name suggests, information stored in CD ROM can be read only.
It cannot be modified in any way. It is, therefore, useful for applications in which
Sikkim Manipal University
Page No. 89
Unit 3
Page No. 90
Unit 3
In case of magnetic tapes, a tape (plastic ribbon usually 1/2 inch or 1/4
inch wide and 50 to 2400 feet long) is wound on a spool and its other end is
threaded manually on a take-up spool. The Beginning Of Tape (BOT) is indicated
by a metal foil called a marker. When a write command is given, a block of data
(records are usually grouped in blocks of two or more) is written on the tape.
The next block is then written after a gap (called Inter Block Gap or IBG). A
series of blocks are written in this manner. The End Of Tape (EOT) is indicated
by an end-of-tape marker which is a metal foil stuck in the tape. After the data is
written, the tape is rewound and kept ready for reading. Figures 3.15 (a), (b)
and (c) show magnetic tape reel and tape cartridge.
BOT
Marker IBG IBG
Unused
Tape
IBG
IBG IBG
Unused
Tape
Block of
Records
Tape
File
Header Header
Label Label
IBG
EOT
File
Trailer Marker
Label of
Last File
Data Organization on a Magnetic Tape
File
Trailer
Label
The tape is read sequentially, i.e., data can be read in the order in which
the data has been written. This implies that if the desired record is at the end of
the tape, all the earlier records have to be read before it is reached. A typical
example of a tape can be seen in a music tape cassette where to listen to the
5th song one must listen to, or traverse, the earlier 4 songs. The access time of
information stored on tape is therefore, very high as compared to that stored on
a disk.
Page No. 91
Unit 3
The storage capacity of the tape depends on its data recording density
and the length of the tape. The data recording density refers to the amount of
data that can be stored or the number of bytes that can be stored per linear inch
of tape. The data recording density is measured in BPI (Bytes Per Inch).
Some commonly used magnetic tapes are:
1/2 inch tape reel
1/2 inch tape cartridge
1/4 inch streamer tape
4 mm DAT (Digital Audio Tape) typical capacity of 4 GB to 14 GB
Activity 3
List the storage devices of a computer system in the increasing order of
accessing speed and capacity.
Self-Assessment Questions
11. Fill in the blanks with the appropriate words:
(a) To minimize the interference of magnetic fields, the adjacent tracks
are separated by __________.
(b) __________ consist of two or more hard disks mounted on a single
central shaft; because of this, all disks in a disk pack rotate at the
same speed.
12. State whether true or false:
(a) Tracks are commonly divided into sections called gaps.
(b) Magnetic tapes are used for storing files of data that are sequentially
accessed or not used very often and are stored offline.
3.9 Summary
Let us recapitulate the important concepts discussed in this unit:
Computers have an input/output subsystem, referred to as I/O subsystem
which provides an efficient mode of communication between the central
system and the outside world. Programs and data must be entered into
the computer memory for processing, and results obtained from
computations must be displayed or recorded for the users benefit.
Sikkim Manipal University
Page No. 92
Unit 3
The I/O devices are also known as peripheral devices because they
surround the CPU and the memory of a computer system. While input
devices are used to enter data from the outside world into the primary
storage, output devices are used to provide the processed results from
primary storage to users.
Keyboard devices allow input into the computer system by pressing a set
of keys, mounted on a board connected to the computer system. The
most familiar means of entering information or data into a computer is
through a typewriter-like keyboard that allows a person to enter
alphanumeric information directly.
A mouse is a small device that a computer user pushes across a desk
surface in order to point to a place on a display screen and to select one
or more actions possible from that position. A trackball is a pointing device
that is much like an inverted mouse. It consists of a ball inset in a small
external box or adjacent to/and in the same unit as the keyboard of some
portable computers.
A joystick is a vertical stick that moves the graphic cursor in the direction
the stick is moved and consists of a spherical ball, which moves within a
socket, and has a stick mounted on it.
Scanning devices are input devices that are used for direct data entry
from the source document into the computer system. Scanners facilitate
the capturing of information and storing it in a graphical format for
displaying it back on the graphical screen. There are two types of scanners,
contact and laser.
Digitizers are used to convert drawings or pictures and maps into a digital
format for storage into the computer. A digitizer consists of a digitizing or
graphics tablet, which is a pressure sensitive tablet, and a pen with the
same X and Y coordinates as on screen.
An output device accepts data from the computer and translates them
into a form that can be understood by the outside world. The output can
normally be produced in two ways on a display unit/device or on paper.
Capacity, in a computer system, is defined in terms of the number of
bytes that it can store in its main memory. This is usually stated in terms
of Kilobytes which is 1024 bytes or Megabytes which is equal to 1024 KB
(10,48,576 bytes).
The bootstrap loader is a program whose function is to start the computer
software operation when power is turned on. Since RAM is volatile, its
Sikkim Manipal University
Page No. 93
Unit 3
contents are destroyed when power is turned off. The contents of ROM
remain unchanged even after the power is turned off and on again.
Serial access or sequential access means serial or sequential access of
data, i.e., right from the starting address to the end address data is serially
picked up from the memory and transmitted one by one.
Magnetic disks are a direct-access medium and hence the most popular
online secondary storage devices. Direct-access devices are also called
random-access devices because information is literally available at random
or in any order.
Magnetic tapes are used for storing files of data that are sequentially
accessed or not used very often and are stored offline. They are typically
used as backup storage for archiving of data.
3.10 Glossary
Input/Output devices: A means of communication between the computer
and the user
MICR: A technology used by the banking industry for processing large
volumes of cheques
Read only memory: A memory used to store programs that permanently
resides in the computer and does not change once the production of the
computer is completed
Random access memory: A memory used for storing bulk of the
programs and data that are subject to change
Page No. 94
Unit 3
3.12 Answers
Answers to Self-Assessment Questions
1. (a) Trackball; (b) Touch screen
2. (a) False; (b) True
3. (a) Optical mark recognition; (b) MICR
4. (a) False; (b) False
5. (a) Pixels; (b) IC register
6. (a) True; (b) True
7. (a) Access time; (b) 26, 84, 35, 456
8. (a) True; (b) False
9. (a) Manufacturer-programmed ROM; (b) Random access
10. (a) True; (b) False
11. (a) Inter-track gaps; (b) Disk packs
12. (a) False; (b) True
Page No. 95
Unit 3
Page No. 96
Unit 4
Structure
4.1 Introduction
Objectives
4.2 Structure of Instruction
4.3 Description of a Processor
4.4 A Machine Language Program
4.5 Algorithms to Simulate a Hypothetical Computer
4.6 Binary Arithmetic
4.7 Summary
4.8 Glossary
4.9 Terminal Questions
4.10 Answers
4.11 Further Reading
4.1 Introduction
In the previous unit, you read about the input/output units and memory
organization of computer system. In the present unit, you will be read about
computer instruction, algorithm, processors, machine language program and
binary arithmetic. An instruction is an order given to the processor of a computer
by a computer program. A computer program is a sequence of instructions that
enable a computer to solve a specific problem. In computing, an algorithm is a
rough writing of a program. There are two commonly used tools to help to
document the algorithm. These are flow charts and pseudocode. A flow chart is
a symbolic representation of an algorithm showing the steps as boxes of various
kinds, and their order by connecting these with arrows. A pseudocode is a
description of an algorithm using structured English. With the developments in
the architecture of CPU, the terminologies used for processors have changed.
The language understood by the computer is the machine language. It consists
of the instructions and data that are executed directly by the CPU. A computer
understands only two states, 0 and 1. So the machine language is written using
these two digits. The task of the processor is decided by the currently executing
program. The manner in which the processor executes each machine code
instruction in a program is called fetch/execute cycle. This process is a continuous
cycle which is used until the computer is turned off or there are no more
instructions to process. The arithmetic operations in computers are performed
in binary number system. The arithmetic operationsaddition, subtraction,
Unit 4
Objectives
After studying this unit, you should be able to:
Describe the structure of instructions
Compose program code using algorithm
Explain the architecture of a processor
Create machine language programs
Discuss how algorithms simulate a hypothetical computer
Compute binary arithmetic
Page No. 98
Unit 4
Sequence
Selection
Iteration (Repetition)
Any program could be written with these structures. Programming
languages like C and C++ are commonly used to write structured programs.
In a sequence, instructions are followed one after the other in the preset
order in which they appear within the program.
Example:
printf(\n Enter value to N:);
scanf(%d,&n);
printf(\n Enter value to X:);
scanf(%f,&x);
Selection means that one of two alternative sequences of instructions is
chosen based on a logical condition.
Example:
if (n > 0)
y = 1 + n*x;
else
y = 1 n*x;
printf(\n Value of Y = %f, y);
Iteration or repetition means that the sequence of instructions is executed
and repeated any number of times in a loop until the logical condition is true.
Example:
do
{ printf(\n Enter value to N:);
scanf(%d,&n);
printf(\n Enter value to X:);
scanf(%f,&x);
if (n > 0)
y = 1 + n*x;
else
y = 1 n*x;
Page No. 99
Unit 4
4.2.1 Algorithm
An algorithm is a rough writing of a program. It contains step-by-step instructions
to solve a given problem. The steps must appear in the order in which they are
executed. The information to be given (input), computed (processing) and printed
are identified.
The sequence of instructions in an algorithm is written in the following
manner:
Instructions should are written in the correct sequence in which they are
to be executed.
Instructions should be precise and unambiguous.
Instructions should be executed or repeated only a finite number of times.
Check for possible infinite loop.
Make sure the instructions in the algorithm are written in the correct order.
Example 4.1: Write the algorithm to find the biggest of the given two numbers.
Solution: For this problem, a new name big is used to store the biggest value.
Initially a is assumed as big, then b is compared with the existing big to get
the biggest value.
Sikkim Manipal University
Unit 4
1. Read a, b
2. big
Unit 4
Pseudocode
Pseudocode is a tool used for planning a computer program logic or method.
Pseudo means imitation and code refers to the instructions written in a computer
language. The pseudocode instructions may be written in English, French,
German or any vernacular.
Some programmers prefer to write the actual words or pseudocode to
represent the various steps rather than drawing the flow chart. Pseudocode is
useful to design structured programs. A pseudocode looks similar to the actual
coding. Consider the following pseudocode to find the biggest of given two
numbers.
Start program
Read Number1, Number 2
If Number 1 > Number 2 then
Print Number 1
Unit 4
Else
Print Number 2
Endif
End of program
Self-Assessment Questions
1. Fill in the blanks with the appropriate words:
(a) A/an __________ is a rough writing of a program.
(b) The __________ is a common method to define the logical steps of
flow within the program.
2. State whether true or false:
(a) Testing helps to ensure quality, accuracy and acceptance of the
program for use within a system.
(b) Algorithm is a tool used for planning a computer program logic or
method.
Unit 4
Unit 4
Yet another category of CPU registers are the flags register that hold
the result of a comparison or information about carry as in carry flag, information
about overflow as in overflow flag and similarly there exists a zero flag.
As all these registers discussed above are on the CPU-chip; they are
much faster than the computer memory. Accessing a memory location requires
one or more clock cycles whereas accessing data in a register usually takes
zero clock cycles. Thus, the CPU registers are the best place to store temporary
data.
Some more terminology, which you may find in other texts, associated
with the registers are listed as follows:
AX/EAX/RAX: Accumulator register
BX/EBX/RBX: Base register
CX/ECX/RCX: Counter register (loop counter)
DX/EDX/RDX: Data register
SI/ESI/RSI: Source Index for string operations
DI/EDI/RDI: Destination Index for string operations
SP/ESP/RSP: Stack Pointer for top address of the stack
BP/EBP/RBP: Stack Base Pointer for holding the address of the current
stack
IP/EIP/RIP: Instruction Pointer to hold the current instruction address
Unit 4
Address buses are those parallel lines (each line carrying 1-bit) that consist of
the bit combination specifying the address of the memory location from where
the instruction or data is to be fetched.
Data buses are those parallel lines (again each line carrying 1-bit) that carry
the data to be written to the memory location or read from the memory location
that is addressed by the address bus.
If a cache is present on the CPU chip, then the BIU is also responsible for
accessing data in the cache.
Unit 4
Self-Assessment Questions
3. Fill in the blanks with the appropriate words:
(a) The X86 CPUs have exactly four registers, all ________bit wide.
(b) The instruction pointer register is also called the _______________.
4. State whether true or false:
(a) The arithmetic and logical unit is where most of the operations, such
as arithmetic and logical calculations take place inside the CPU.
(b) The bus interface unit is responsible for controlling the address and
data buses when accessing the main memory.
Unit 4
switch off (0) and switch on (1), therefore, a computer only understands these
two states 0 and 1 (binary digits). Hence, combinations of 0 and 1 are used to
make different strings for different operations, and they are the key to understand
computer language or what we call as the machine language.
Operation Code
(OPCODE)
Address/Data
(OPERAND1)
Address/Data
(OPERAND2)
Address/Data
(OPERAND)
Can you explain why only one operand is required in these cases? This is
because the read command wants to read the data present in some location of
the memory; hence its operand would consist of memory address where the
data is located. It is the same case with the write command that says that the
address mentioned in the Operand field is the address of the memory location
where data is to be stored.
As you are aware that a computer understands only binary digits 0 and 1,
hence, the above instructions may look like thisas strings of 0s and 1s:
00100001 00001111 00001000
01001001 00000001 00011001
Sikkim Manipal University
Unit 4
11100000 11000000
00011100 1101100
Advantages of Machine Language Programs
Programs written in machine language could be executed very fast by
the computer, because the CPU directly understood the machine
instructions and no translation time was required.
Translator system software, such as interpreters or compilers was not
required.
Disadvantages of Machine Language Programs
Difficult to program: A programmer had to memorize the complete
instruction set for the OPCODE utilization. Only then could he use the
right command in the right place. Thus, it was very difficult for a
programmer to learn the long combinations of 0s and 1s.
For efficient and error free programs, the programmers had to constantly
refer to the instruction set card.
Programmers had to be hardware experts, as they had to perfectly know
the memory location addresses where the data was to be stored or from
where the data was to be read.
Error prone: For any programmer to remember such a large instruction
set and to track the memory addresses, it became difficult for him to fully
concentrate on the logic of the problem, thus programming errors occurred,
and since it was difficult to correct an error, the program code had to be
rewritten.
Machine dependent: As explained earlier, the machine language was
machine specific. That meant the address of the memory, size and word
length of the memory, the registers in the CPU, ALU, and so on, decided
the format of the machine instructions. If the machine was changed, it
was necessary for the programmer to understand the new architecture of
the CPU. Henceforth, a new instruction set for the new machine was
required to be memorized. Thus, each machine language program was
machine dependent, i.e., machine specific.
Difficult to modify: The machine language program was manually fed
to each address sequentially. However, if one had to add any instruction
between any two instructions at a specific address, the complete program
from that address onwards had to be deleted and written again with
Sikkim Manipal University
Unit 4
Self-Assessment Questions
Fill in the blank with the appropriate word:
5. __________ devices have two states switch off (0) and switch on (1).
State whether true or false:
6. In machine language, translator system software, such as interpreter or
compiler was required.
Mnemonic
Comments
000
01005
LDA Y
A=Y
001
30004
ADD 240
A= A + 240
002
02006
STA Z
Z=A
003
46007
004
00240
005
Unit 4
JMP 007
Go to address 7
240
00240
Constant 240
03300
03300
Variable Y
006
00557
00557
Variable Z
007
99000
HLT
Halt Execution
3. Decode instruction:
OP = IR operation field
Addr = IR address field
Unit 4
Data
You may have observed that the CPU architecture, i.e., the internal memory,
such as the PC, IR, A, MDR and so on, and the external memory are simulated
using variables to hold the data of each register. The hypothetical CPU internal
memory is accurately represented as follows:
PC
IR
A, Y, Z
MAR
MDR
Self-Assessment Questions
Fill in the blank with the appropriate word:
7. To simulate the CPU, the software simulator must execute the ____ cycle.
State whether true or false:
8. A CPU runs a program by fetching an instruction from the memory once
and executing that instruction in continuous cycle.
Unit 4
only four cases that occur in adding the two binary digits in any position. This is
shown in Table 4.1.
1 + 1 + 1 = 11 (i.e., 1 carry of 1 into next position)
1 + 1 + 1 + 1 = 100
10 + 1 = 11
The rules (1), (2) and (3) in Table 4.1 are just decimal addition. The rule
(4) states that adding 1 and 1 gives one zero in binary (meaning decimal 2 and
not decimal 10).
There is a carry from the previous position. Carry overs are performed in
the same manner as in decimal arithmetic. Since 1 is the larger digit in the
binary system, any sum greater than 1 requires that a digit be carried out.
Table 4.1 Binary Addition
Sl. No.
Addend
(A)
Addend
(B)
Carry
(C)
Sum
(S)
Result
10
Example 4.3: Add the binary numbers (i) 011 and 101 (ii) 1011 and 1110
(iii) 10.001 and 11.110 (iv) 1111 and 10010 (v) 11.01 and 101.0111.
Solution: (i) Binary number
11
Sum =
Carry
011
+ 101
1000
(ii)
Binary
Decimal
11
Carry
1011
11
+ 1110
+ 14
Sum = 11001
25
(iv)
Binary
Decimal
11
Carry
1111
15
(iii) Binary
Decimal
1
Carry
10.001
2.125
+ 11.110
+ 3.750
Sum = 101.111
5.875
(v) Binary
Decimal
11 1 Carry
11.01
3.25
+ 10010
Sum =100001
Unit 4
+ 18
33
101.0111
Sum = 1000.1011
+ 5.4375
8.6875
Since the circuit in all digital systems actually performs addition that can
handle only two numbers at a time, it is not necessary to consider the addition
of more than two binary numbers. When more than two numbers are to be
added, the first two are added together and then their sum is added to the third
number, and so on. Almost all modern digital machines can perform addition
operation in less than 1 ms.
Larger Binary Numbers
Column by column addition applies to binary as well as decimal numbers.
Example 4.4: Add the following binary numbers:
(i) 1101101 and 1001110
(iii) 110011 and 111000
Solution:
1
1 1
1 1 0 1 1 0 1
(i)
1 0 0 1 1 1 0
1 1 1 1 0 0 1
(ii)
1 0 1 1 1 0 1 1
1
1 1 0 1 1 1 1 0
carry
1 1 1 1 1 1 carry
1 1 0 0 1 1
(iii)
1 1 1 0 0 0
1 1 0 1 0 1 1
1 1 0 0 1 0 1
0 1 1 1 1 1 1 0
(iv)
1 1 1 0 0 1 1 1
1 0 1 1 0 0 1 0 1
Example 4.5: Add these 8-bit numbers : 0110 1011 and 1011 0110. Then, show
the same numbers in hexadecimal notation.
Solution: 8-bit binary
Hexadecimal equivalent
1111 11
0110 1011
+ 1011 0110
10010 0001
carry
6 B H
+B 6 H
1 2 1 H
Unit 4
Subtrahend
B
Result
0 with a borrow of 1
Decimal
9
5
(ii) Binary
10000
011
Decimal
16
3
100
1101
13
(iii) Binary
110.01
100.1
Decimal
6.25
4.5
(iv) Binary
1101
1010
Decimal
13
10
1.75
0011
Difference =
Difference =
1.11
Unit 4
Multiplicant = 1110
Multiplier
= 1310
14310
1011
0000
1011
1011
10001111
Example 4.9:
(i)
1 1 0 0
1 0 1 0
0 0 0 0
1 1 0 0
0 0 0 0
1 1 0 0
1 1 1 1
12
10
= 120
0 0 0
(ii)
1 0 1 1
1 1 0 0
0 0 0 0
0 0 0 0
1 0 1 1
1 0 1 1
1
0 0 0
11
12
= 132
0 1 0 0
Unit 4
(iii)
1 . 0 1
1 0 . 1
1 0 1
0 0 0
1 0 1
1 1 .
1.25
2.5
3.125
0 0 1
Example 4.10:
(i) Binary
Decimal
Unit 4
(ii) Binary
101
101 11001
5
5 25
25
101
0101
101
1100
110 1001000
12
6 72
0110
00110
110
12
12
000
00
00
000
Binary
Decimal
1.011
10010 11010.0000
10010
1.444
0100000
10010
11100
10010
010100
(ii)
Decimal
18 26
18
80
72
80
72
80
10010
72
00010
Binary
Decimal
10.01
1100 11101.00
2.4166
1100
12 29
24
0010100
50
1100
48
10000
1100
20
12
10000
80
1100
72
1000
08
Unit 4
Magnitude
= + 5210
= 3110
= +4610
Three main signed number binary codes are used : (i) sign magnitude
(ii) 1s complement code and (iii) 2s complement code. The most commonly
used system for representing signed binary numbers is the 2s complement
system.
Unit 4
9
12
15
21
1001
1100
1111
10101
0110
0011
0000
01010
0111
0100
0001
01011
Unit 4
Unit 4
Self-Assessment Questions
9. Fill in the blanks with the appropriate words:
(a) The process of dividing one binary number (the dividend) by another
(the divisor) is the same as that which is followed for decimal numbers,
which we usually refer to as the method of ______________.
(b) The most commonly used system for representing signed binary
numbers is the _______________complement system.
10. State whether true or false:
(a) To subtract, it is necessary to establish procedure for subtracting a
large digit from a small digit.
(b) In a computer, the multiplication operation is performed by repeated
subtraction, in much the same manner as the addition of all partial
products to obtain the full product.
4.7 Summary
Let us recapitulate the important concepts discussed in this unit:
Designing a program requires program specifications.
An algorithm contains step-by-step instructions to solve a given problem.
The steps must appear in the order in which they are executed.
Before writing the program code, the sequence of statements and the
relationship between various elements are shown with the help of a flow
chart or pseudocode.
Unit 4
The flow chart uses various symbols to represent the functions within the
program. A flow chart shows the sequence, selection and iterations within
a program.
Pseudocode is a tool used for planning a computer program logic or
method. Pseudo means imitation and code refers to the instructions
written in a computer language. The pseudocode instructions may be
written in English, French, German or any vernacular.
The terminologies used for processors today are Pentium IV, Pentium
Pro, Intel CoreTM2 Quad Processor, Intel CoreTM2 Duo Processor, Intel
CoreTM2 Dual-Core Processor, etc. These processors vary in their features
and capabilities.
The X86 CPUs have exactly four registers, all 16-bit wide. All arithmetic
and logical operations take place in the CPU registers.
The four general registers are AX, BX, CX and DX.
The ALU is where most of the operations, such as arithmetic and logical
calculations take place inside the CPU. The BIU is responsible for
controlling the address and data buses when accessing the main memory.
In machine language, combinations of 0 and 1 are used to make different
strings for different operations.
A CPU runs a program by repeatedly fetching an instruction from the
memory and executing that instruction in continuous cycle. This is called
the fetch/execute cycle.
Arithmetic operations are done in a computer by using binary numbers. A
single circuit of a binary adder with suitable shift register can perform all
the arithmetic operations.
Arithmetic operations such as addition, subtraction, multiplication and
division can be performed on binary numbers.
Since digital computers and calculators handle positive as well as negative
numbers, a bit called sign bit is placed to the left of the magnitude bits for
representing the sign of the number. A 0 in the sign bit represents a positive
number and a 1 in the sign bit represents a negative number.
The most commonly used system for representing signed binary numbers
is the 2s complement system. The 2s complement form of a binary
number is simply formed by taking the 1s complement of the number
and adding 1 to the least significant bit position.
Unit 4
4.8 Glossary
Sequence: A structure in which instructions are followed one after the
other in the preset order in which they appear within the program
Algorithm: A rough writing of a computer program
Flow chart: A method used to define the logical flow of steps within the
program
4.10 Answers
Answers to Self-Assessment Questions
1. (a) Algorithm; (b) Flow chart
2. (a) True; (b) False
3. (a) 16; (b) program counter register
4. (a) True; (b) True
5. Electronic
6. False
7. Fetch/Execute
8. False
9. (a) Long division; (b) 2s
10. (a) True; (b) False
Unit 4
Unit 5
Structure
5.1 Introduction
Objectives
5.2 Programming Language
5.3 Computer Languages
5.4 Categories of Languages
5.5 Need for an Operating System
5.6 Summary
5.7 Glossary
5.8 Terminal Questions
5.9 Answers
5.10 Further Reading
5.1 Introduction
In the previous unit, you read about the description of processors, the machine
language program as well as binary arithmetic. In the present unit, you will read
about the various types of computer languages and the need for an operating
system.
A programming language refers to the language designed to communicate
instructions to a machine, particularly a computer. Programming languages help
in creating programs that control the behaviour of a machine and/or to express
algorithms precisely. The term computer language includes a wide variety of
languages used to communicate with computers. It is broader than the more
commonly-used term programming language. Programming languages are a
subset of computer languages. Computer language or programming language
is a coded syntax used by computer programmers to communicate with a
computer. It is the only language that computers, software programs and
computer hardware can understand. Computer language establishes a flow of
communication between software programs. The language enables a computer
user to dictate what commands the computer must perform to process data.
Computer language comes in various types that employ different sets of syntax.
The operating system is the interface between the hardware and the user. If
there were no operating system, the computer would be an expensive door
stop. It manages the hardware and software resources of the system. In a
desktop computer, these resources include things such as the processor,
Unit 5
memory, disk space, etc. It provides a stable, consistent way for applications to
deal with the hardware without having to know all the details of the hardware.
Objectives
After studying this unit, you should be able to:
Describe programming language
Classify computer languages
Discuss the various categories of computer languages
Explain the need for an operating system
Unit 5
Translator
(Interpreter/Compiler)
Machine Language
Program
Self-Assessment Questions
1. Fill in the blanks with the appropriate words:
(a) The compilers and _______________freed the programmers from
the rigours of understanding the intricacies of computer architecture
on which they were working.
(b) The complete _____________ set written in one of natural language
programs is called a computer program or source program.
Sikkim Manipal University
Unit 5
Unit 5
Activity 1
Visit the site http://en.wikipedia.org/wiki/Programming_language. Collect
data that how a programming language specification provides a definition
that the language users and the implementors can use to determine whether
the behaviour of a program is correct given its source code.
Self-Assessment Questions
3. Fill in the blanks with the appropriate words:
(a) A _______________is a language that can be understood by the
computer.
(b) Each and every problem to be solved by the computer needs to be
_____________into discrete logical steps before the computer can
execute it.
4. State whether true or false:
(a) A computer language is the language that people speak daily.
(b) A computer language also consists of lexicon and syntax, i.e.,
characters, symbols, and rules of usage that allow the user to
communicate with the computer.
Unit 5
multiply, move, etc.) and the operand which is the address of the data that has
to be acted upon. For example, a typical machine language instruction may be
represented as shown in Figure 5.2.
OPCODE
Operand
001
010001110
Operation address
READ
ADD
Unit 5
Unit 5
A compiler, on the other hand, takes an entire high level language program
and produces a machine code version out of it. This version is then run as a
single program.
Generally, language statements are written by programmers in languages
such as C or COBOL using editors. The source statements are contained within
the file that thus gets created. Following this, the suitable language compiler is
run by the programmer, who specifies the file name within which the source
statements are contained. These statements are converted into their
corresponding machine code, which can then be executed by the computer.
(refer Figure 5.5)
The object code can be stored in the computers memory for executing in
future. A compiler does not need to translate the source program every time it
needs to be executed, thereby saving execution time.
Program in
High Level
Language
Input
Compiler
Output
Program
in Machine
Language
(Source Program)
(Object Program)
Figure 5.5 Translation Process using a Compiler
Unit 5
Unit 5
Unit 5
Unit 5
Activity 2
Explain the features of the packages available for fourth-generations
computer programming languages.
Self-Assessment Questions
5. Fill in the blanks with the appropriate words:
(a) Machine language program is called the __________________ code.
(b) First-generation computers used ________________written in
machine language.
6. State whether true or false:
(a) Machine language is very cumbersome to use, and is tedious and
time consuming for the programmer.
(b) High level languages developed as a result of the lack of portability
of programs from one computer to another.
Unit 5
Some of the startup programs initially loaded in the RAM are stored in the
ROM-mainly the BIOS programs which are recorded by the manufacturers of
the computer system. Service programs available in the operating system for
operations like copying a file, deleting a file, formating a disk, printing a file and
so on, are usually stored in the disk. Any malfunctioning of hardware components
is instructed to the user by displaying error messages on the screen. Operating
system programs are also called System Software.
There are many operating systems used in computers. The commonly
used operating systems are MS DOS (Microsoft Disk Operating System),
Windows 95/98/2000, Windows NT, UNIX and so on. Nowadays, Windows 2000
operating system is widely used in personal computers, and UNIX is used in
Mainframes, Servers, Graphic Workstations and also personal computers. The
operating system UNIX itself is written using C language.
Unit 5
5.5.3 Multiprogramming
It is the name given to the interleaved execution of two or more programs in a
computer. Multiprogramming refers to the loading of two or more programs in
the main memory of the computer and executing them concurrently. We know
that the speed of the CPU is much more than the I/O devices. Hence, the idle
time of the computer while waiting for input or output operations can be utilized
to execute some other program. Figure 5.7 shows how multiprogramming is
done.
Main Memory
Operating System
Programs
Secondary
Storage
Device
Storing Results
Executing
this Job
Job 3
3
CPU
While Job 1 is receiving data from the input device, the computer executes
Job 2 and Job 3 is sending the results to the storage device.
5.5.4 Multitasking
It is the ability of the computer to handle several application programs
concurrently. For example printing a document, solving a set of equations and
any other operation can be done simultaneously to reduce the idle time of the
processor. The multitasking capability of the operating system will utilize the
processor efficiently, thus reducing the user waiting time.
The concept of multitasking is no different from that of multiprogramming.
Programmers use both the terms synonymously. However, the difference is
that multitasking is applicable to single-user systems (DOS based) and
multiprogramming is applicable to multi-user systems (UNIX based).
Sikkim Manipal University
Unit 5
5.5.5 Time-Sharing
It is the ability of the CPU to serve many users connected to it through a network.
The operating system will assign each user a slice of processor time in a roundrobin pattern. Since the CPU has a high processing speed, it can process the
information of many users.
The term time-sharing is used in the context of multiprogramming, where
users in the network environment can work simultaneously on the system. In a
time-sharing system, the CPU scheduling algorithm allocates CPU time to various
users. The time allotted to each user is usually in the order of 10 to 100
milliseconds.
The three states in a time-sharing system are Ready, Running and Blocked.
Jobs 1, 2 and 3 are in the three states of Ready, Running and Blocked in
the cycle, respectively. Job 3 is in Ready state for execution as soon as Job 2 is
executed and Job 1 completes its output. In a time-sharing system, the CPU
will never be idle as long as there is some job to be executed. Figure 5.8 shows
time-sharing.
New
job
Ready
Running
Job
processing
completed
I/O completed
Blocked
Unit 5
Unit 5
Unit 5
Unit 5
Self-Assessment Questions
7. Fill in the blanks with the appropriate words:
(a) The term _______________________ is used in the context of
multiprogramming, where users in the network environment can work
simultaneously on the system.
(b) Real-time processing requires a dialog between the user and the
______________.
8. State whether true or false:
(a) There is only one operating system used in computers.
(b) Batch processing is a process for executing programs one after the
other using a batch file program.
5.6 Summary
Let us recapitulate the important concepts discussed in this unit:
In order that the machine executed programs written in different languages,
it was necessary that the machine on which the program was running
understood what to do.
Sikkim Manipal University
Unit 5
Unit 5
5.7 Glossary
Computer language: A language that can be understood by the computer
Batch processing: A process for executing programs one after the other
Multitasking: The ability of the computer to handle several applications
concurrently
5.9 Answers
Answers to Self-Assessment Questions
1. (a) Interpreters; (b) Instruction
2. (a) True; (b) False
3. (a) Computer language; (b) Broken down
4. (a) False; (b) True
5. (a) Object; (b) Programs
6. (a) True; (b) True
7. (a) Time-sharing; (b) Computer
8. (a) False; (b) True
Unit 5
Unit 6
File Organization
Structure
6.1 Introduction
Objectives
6.2 Concept of File
6.3 File Organization and Accessing Techniques
6.4 File Handling Functions
6.5 Summary
6.6 Glossary
6.7 Terminal Questions
6.8 Answers
6.9 Further Reading
6.1 Introduction
In the previous unit, you read about the various categories of computer languages
and the concept of operating system. In the present unit, you will be reading
about the file and its accessing techniques.
File is a computer record which can be in the form of a document or
information stored in a certain way for later retrieval and organization refers to
logical arrangement. Therefore, file organization refers primarily to the logical
arrangement of data (which can itself be organized in a system of records with
correlation between the fields/columns) in a file system. A file should be organized
in such a way that the records are always available for processing with no
delay. There are four methods of organizing files. They are serial, sequential,
indexed sequential, and direct or hashed access organization. In this unit, you
will also learn about the various file handling functions, such as sorting, merging,
indexing and updating.
Objectives
After studying this unit, you should be able to:
Explain the concept of file
Define file organization
Classify various accessing techniques
Discuss different file handling functions
Unit 6
Unit 6
Thus, a physical file is a file viewed in terms of how it is stored and its
physical details, and a logical file is a file viewed in terms of what a file contains
and how these data items should be processed.
Key Field
One or more of the data elements will act as the key field of the record that is
used for identifying the record for location and processing purposes. The key
field for a particular file is shown on the file specification. In a student file, the
key field could be the student enrolment number. The term field, which is
sometimes used as a synonym for a data element, more specifically defines
the space which an item occupies in terms of its data type.
Record Length
It is possible to store records in fixed or variable format and length.
Fixed-Length Records
A file is said to consist of fixed-length records when each record has the same
length. This can be achieved in two ways: either all the records are identical in
layout or where the layout is different each record is padded. The first is common
on most master files while the second approach is often found in transaction
files where the data is required for different transactions.
Fixed-length records are usually easier to design and write programs for,
but can be more wasteful in backing storage than variable-length records.
Variable-Length Records
A file is said to have variable-length records when the records have different or
varying lengths, i.e., records in a file consists of fixed number of fields but one
or more field varies in its length, e.g., the name and address fields in a student
record.
File Processing
Informational retrieval refers to any file processing for the purpose of retrieving
data to produce useful information. Some of this information retrieval may include:
Retrieval: The act of transferring a record from a secondary storage to
the main memory so that the data in its fields can be accessed
Writing: The act of transferring a record from the main memory to the
secondary storage
Insertion: Adding a new record to an existing file
Deleting: Removing a record from the file
Unit 6
Unit 6
Self-Assessment Questions
1. Fill in the blanks with the appropriate words:
(a) The data items within the record are called _________.
(b) __________ relationships refer to the actual arrangement of the data
in a storage device.
2. State whether true or false:
(a) A file is said to have fixed length records when the records have
different or varying lengths.
(b) A file containing permanent or semi-permanent data consolidated
for reference and updating is called a work file.
Unit 6
Unit 6
Unit 6
Unit 6
The magnetic disks are the most suitable storage media for indexed
sequential files. A cylinder on the disk is accordingly divided into three parts:
index area, prime area and overflow area as shown in Figure 6.2.
Index
Track
Track no
Data Tracks
Overflow Track
Index Area: The first track in each cylinder is used for an index file. This index
describes the storage of records on the various tracks of the cylinder.
Prime Area (Data tracks): The various records of the file are written on this
area on a cylinder always starting from the second track. The records are written
sequentially along the various tracks. The highest key on the track and the
track address are the fields of index.
Overflow Area: The area is created to accommodate the overflowed records in
the file. The overflow area is the last track on the same cylinder. This area is
unoccupied at the time of creation of file.
Unit 6
Access Mode
Indexed sequential files support three main types of accessing or processing:
Sequential Accessing: Where records are read and updated one after
another according to their key sequence beginning from the first record
in the file to the last
Selective Sequential Processing: Where selective groups of records
are read and processed sequentially skipping groups of unwanted records
Direct Access: Where block consisting the record is searched directly
and then one by one the record is read in the block until the desired
record is found.
Advantages
It proves best for the applications that require working both ways, direct
access as well as sequential access.
Accessing a record is fast because of indexing records.
Transactions may be sorted or unsorted.
Only the affected master records are processed during updating.
It facilitates file enquiry.
Disadvantages
Extra storage space is required for indexes when multilevel indexes are
maintained.
ISAM files generate excessive overflows and storage space is wasted.
The overflow areas sometimes overflow to other cylinders and thus cause
much read/write head movement making the access very slow. Therefore,
the file has to be reorganized and indexes rearranged accordingly, which
is a time consuming process.
Unit 6
from the file. The same is the case if writing a record to a file is required hence
the namedirect files or direct access files.
If a desired record is to be accessed, a relationship must first be established
between the record key and the corresponding address of the record, i.e., to
access (read or write) a record an address is first calculated by applying a
mathematical function to the key field of the record. The mathematical function
is known as Hash function.
The simplest relationship that can be established is called direct addressing
where the key value is used as the physical address of the record. Although this
is the fastest and the simplest method of accessing a particular record, there
are many serious drawbacks. One of them is that the absolute addresses are
device dependent. Should there be the need to upgrade or change the device
on which the file resides, it is most likely that the key values will have to be
changed. The next is that the size of the record key seldom matches the number
of digits required for a disc address.
Hashing Techniques: Hashing means Key Transformation
In order to overcome the disadvantages of the former method, a very common
approach is hashing where a calculation is done on the key value to obtain the
address of the record. Note that hashing can be applied to non-numeric keys as
well as numeric keys.
Mid Square Hashing
In this technique, the key (K) is squared and then specified digits are
extracted from the middle of the result (K2) to yield the address of the
records. The following examples show how mid square hashing is
performed on key values given as under:
K
:
3248
2
K
: 10549504
Hash Address :
49
5212
27164944
64
Unit 6
Unit 6
Access Mode
Direct access by the way of establishing a relationship between the desired
record key field and the corresponding address of the record, i.e., find the address
and access directly from the location.
Advantages
Records can be accessed directly.
File processing activities, such as insertion, deletion, modification and so
on can be performed without new master file concept.
File is up-to-date now.
Accessing the records even in large files is very fast as compared to
sequential files.
Disadvantages
Variable length records are difficult to handle.
Often, the generated addresses are not in key sequence that creates
difficulties for serial processing (it may be necessary for the input to be
sorted to the address sequence).
Gaps in keys can cause wastage of space.
Synonyms can occur and that can cause loss of time in searching the
records.
Allocation of efficient overflow areas to a randomly organized file is difficult.
It could lead to large areas of the disc being empty, with overflow areas
being set up as areas of the file.
Activity 1
Search the Web and collect data on methods and design paradigm of file
structure. Prepare visual presentation from the data collected.
Self-Assessment Questions
3. Fill in the blanks with the appropriate words:
(a) _____________ refers to the physical arrangement of data on the
backup storage devices.
(b) The mapping of keys to the same address is known as a _________.
Unit 6
6.4.1 Sorting
As we know that file is a group of records, now the need arises to arrange these
records in a file in any order, either ascending or descending order. To arrange
these records in any specific order in a file is called sorting. Sequencing is
based on some key of the record that could be numeric like enrolment number
of a student or alphabetic like names of the students following ASCII sequence.
The simplest case is sorting the records using one field of the record as the
primary key, so that the key must be unique, i.e., no two students can have
same enrolment number, hence a file of student records in a university may be
sequenced by ascending order of student enrollment number.
By introducing a further key in the sorting process, a more complex order
may be produced, for example, suppose each record of the student file also
contains a field for the course code in which course the student is enroled. Now
the order of sorting may be student enrolment number within course. This means
that all the records for one course code are presented first, each one in ascending
sequence of enrolment number; then all the records for the next course code
are presented in sequence and so on. In this example, two keys have been
used in the sorting processcourse code is called primary key and student
enrolment number is known as the secondary key.
Since sorting is a very common data-processing requirement,
manufacturers provide sort utility software which enables users to specify their
particular sequencing requirements by means of simple parameters. Software
is usually available for sorting files held on all types of storage devices. The
user specifies the sort keys and also the details about the type of file, such as
storage device, file labels, record structure. The sort utility program reads the
un-sequenced input file, and by means of various copying techniques ultimately
produces as output a copy of the input file in the required sequence (refer
Tables 6.1 (a) and (b)).
Sikkim Manipal University
Unit 6
Enrolment_No
1001
1005
1003
1004
1002
Name
Ankit
Sahil
Cimone
Dolly
Ankita
Enrolment_No
1001
1002
1003
1004
1005
Name
Ankit
Ankita
Cimone
Dolly
Sahil
6.4.2 Merging
Let us take an example to understand the concept of merging two files. Let
there be one file by the name File1 and the other file be named as File2. Both
the files have student records of Class VII, say, arranged in increasing order of
enrolment number.
File1 is a file maintaining the records of the students participating in sports
competition and File2 maintains the records of students of the same class but
participating in music competition. Both the files have records arranged in
ascending order of enrolment number.
Now, Class_7_file must consist of all the records of all the students studying
in that class, in spite of what hobby class they choose. Merging the above said
two files File1 and File2 could create this file and as mentioned above; the two
files to be merged must be sorted in the same specific order before we could
merge them. Now, File1 (students of 7th participating in sports) and File2
(students of 7th participating in music), are merged and we will get the file
named Class_7_file consisting of all the names of the students who are studying
in that class. Tables 6.2 (a) and (b) are shown as examples:
Table 6.2 (a) File1 Students Participating in Sports
Enrolment_No
1001
1003
1004
Name
Ankit
Cimone
Dolly
Activity
Music
Sports
Sports
Unit 6
Enrolment_No
1002
1005
1006
Name
Ankita
Sahil
Deepa
Activity
Music
Sports
Music
Now if you could observe that after the enrolment number 1001, the next
key 1002 is present in File2, hence merging the two files will order the records.
That means both the files are opened to read, and record is read one by one
and the keys are compared, whichever is less in order value is being written
into a new file, i.e., in this case Class_7_file. In this way when End Of File
(EOF) is reached for both the files the result file Class_7_file will consist of all
records for all the students of that class. In case EOF for any one file reaches
first then the left over records in second file are written to the result file.
To summarize, it may be said that merging of files involves the combining
of records from two or more ordered files into a single ordered file. Each of the
constituent files must be in the same order. The output file will be in the same
order as the input files, placing records from each in their correct relative order.
6.4.3 Indexing
The records in a file are stored for immediate access and speedy reference;
hence to organize the records in a file it is important to index. Now indexing
means that a table of index is maintained which is storing the information of the
record (key) and the block address on which it is stored. Thus, when a record is
to be searched, the record key of the required record is compared with the keys
in the index table one by one, as soon as the key matches; the address from the
corresponding column is tracked to pick up the desired record from the file into
the buffer. This way the required record is read; if any modification is required it
is done and the record is written back on the same location. If it is to be deleted,
the record entry is deleted from the index table. Lastly the index is updated
according to the actions done on file and file is closed.
6.4.4 Updating
Updating a record is also known as modifying a record existing in a file. When
the value for any field in the record is to be changed or any such specific record
modification requirements comes and the following steps take place:
Search the record based on the record key
Read the record when the key matches
Unit 6
Self-Assessment Questions
5. Fill in the blanks with the appropriate words:
(a) To arrange the records in any specific file is known as __________.
(b) __________ of files involves the combining of records from two or
more ordered files into a single ordered file.
6. State whether true or false:
(a) The sort utility program reads the un-sequenced input file and by
means of various copying techniques ultimately produces as output
a copy of the input file in the required sequence.
(b) Updating a record is also known as modifying a record existing in a
file.
Unit 6
6.5 Summary
Let us recapitulate the important concepts discussed in this unit:
File is a collection of logical records. A file consists of records, fields,
entity set, entities and attributes. There are two types of file: logical file
and physical file.
A file is said to consist of fixed-length records when each record has the
same length, whereas, a file is said to have variable length records when
the records have different or varying lengths.
There are four types of file organization: serial organization, sequential
organization, indexed sequential organization and hashed/random/direct
organization.
In serial organization, file is created by placing the record in the next
available storage space, leaving no gap, apart from non-data areas
between records. In sequential organization, however, the records are
written in some meaningful, defined order. In an indexed sequential
organization, the records are stored in physical sequence according to
the primary key. Random files are the files that have a predictable
relationship between the record key and the records location (address)
on the disc.
There are two types of file handling functions: Sorting, merging, indexing
and updating.
To arrange the records in any specific order in a file is called sorting.
Merging is the combining of records from two or more ordered files into a
single ordered file. Indexing means maintaining the information of record
and the block address on which it is stored, and updating refers to
modifying a record in an existing file.
6.6 Glossary
Record: A logical unit comprising of related data items
Fields: Data items within the record
Entity: Something about which or when we store facts
Retrieval: The act of transferring a record from a secondary storage to
main memory
Unit 6
6.8 Answers
Answers to Self-Assessment Questions
1. (a) Fields; (b) Physical data
2. (a) False; (b) False
3. (a) File organization; (b) Collision
4. (a) True; (b) False
5. (a) Sorting; (b) Merging
6. (a) True; (b) True
Unit 6
Unit 7
Networking
Structure
7.1 Introduction
Objectives
7.2 Introduction to Computer Network
7.3 Criteria for Classification of Computer Network
7.4 Types of Network: LAN, WAN and MAN
7.5 Local Area Network (LAN): Hardware and Software
7.6 Servers and Workstations
7.7 Introduction to Ethernet
7.8 Token Ring
7.9 Bridges
7.10 Private Networks
7.11 Public Networks
7.12 Network Topology
7.13 Network Protocol
7.14 Applications of Computer Networks
7.15 Distributed Data Processing
7.16 Teletext and Videotext Networks
7.17 Summary
7.18 Glossary
7.19 Terminal Questions
7.20 Answers
7.21 Further Reading
7.1 Introduction
In the previous unit, you read about file organization and its accessing techniques.
In the present unit, you will read about networking.
Networking is the practice of linking two or more computing devices
together for sharing data. Networks are built with a mix of computer hardware
and computer software. Network can be categorized in three different ways:
LAN, WAN and MAN. In networking, the communication language used by
computer devices is called the protocol. Yet another way to classify computer
networks is by the set of protocols they support. Networks often implement
multiple protocols to support specific applications. TCP/IP is the most common
protocol found on the Internet and in home networks.
Unit 7
Unit 7
As there are five PCs, therefore, a total of ten connections are required
for point-to-point connection. Out of these ten connections, six pass through
the same location thereby making the point-to-point connection an expensive
one. By increasing the PC by one in this configuration, at location 2, the total
number of connections will increase to fifteen. Out of these connections, eight
connections will eventually pass through the same area.
Unit 7
information. This relieves individual users from the burden of storing data and
related applications on their own computers. Information needed, can be
accessed from the server by connecting to the network.
When there is sharing of information through networking, the question of
security arises automatically. Thus, sharing data and program can also share
malicious programs either destroying or stealing critical data that may be
detrimental to the data owner. This is achieved by restricted access and restricted
operation between the users by giving the log in user ID and password for
validation and verification.
Unit 7
Self-Assessment Questions
1. Fill in the blanks with the appropriate words:
(a) In a distributed processing system, most of the processing is done
in the ___________of the individual PCs or workstations besides
sharing the expensive computer resources.
(b) A ____________is a common place where different users can come
together to share and access the information.
2. State whether true or false:
(a) When there is sharing of information through networking, the question
of security arises automatically.
(b) The scale of operation is one issue that needs no analysis.
Unit 7
Unit 7
Unit 7
Self-Assessment Questions
3. Fill in the blanks with the appropriate words:
(a) Wireless LAN technology connects devices without wiring, using radio
waves as the ______________medium.
(b) Scale of operation is another way of classification depending on the
____________of the network and distance between nodes.
4. State whether true or false:
(a) The personal area network is used for establishing connection among
computer devices in the remote vicinity.
(b) For communication-oriented services, a client sends packets to the
server via three-way handshake.
Unit 7
Router
Local
Telephone
Exchange
Router
Ethernet
Ring Network
Unit 7
Self-Assessment Questions
5. Fill in the blanks with the appropriate words:
(a) A network is an ________ between two or more computers in a peerto-peer or client-to-server manner over a shared and virtual connection.
Unit 7
Unit 7
Unit 7
Unit 7
gateway has to identify the protocols used in the networks, and recognize the
data format and convert the message format into suitable format to be accepted
by the other network. Wide area networks often use gateways because there is
a large number of dissimilar networks present in a WAN. Gateways provide
good connectivity to different kinds of networks on the Internet.
Modem: Another significant network component is modem. The term Modem
is the shortened version of the name MOdulator/DEModulator. Modem provides
two-way communication facility between a computer network and telephone
network. As WAN uses the existing telephone network to connect to a distant
network, it always uses a modem to dial up the telephone network. Modem
converts the digital data from the computer into useful analog signals that can
be transmitted through a telephone network. Similarly, signals from the telephone
channels are converted back into digital data suitable for a computer.
Unit 7
Unit 7
Self-Assessment Questions
7. Fill in the blanks with the appropriate words:
(a) ______________is the most powerful computer of the network.
(b) IEEE is the leading organization defining most of the
_____________protocols that configure LAN devices.
8. State whether true or false:
(a) A multi-user operating system is an operating system that is used to
manage the resources of computers via WAN software.
(b) A LAN messenger is a software package, an instant messaging
program that works within a single LAN.
Unit 7
Data server is used only for storage and management of data. That is,
the processing carried out at the data server are rule-based procedures, such
as data validation and data management. These servers must be capable of
searching a large amount of data and updating tables with numerous data.
Certainly, to perform these tasks, the data servers requires high speed
processing, sufficient internal memory and substantial amount of hard disk space.
Computer server is in conjunction with the data server. When the client
requests data from the server, the server processes the query and before
supplying the result to the client, the compute server performs necessary
processing on the requested data with the application logic. It then sends it to
the client. Similar to the data servers, the compute server also requires
processors with high performance capabilities and large amount of memory.
Here, the processing of data is separated from the data. This optimizes the
processing capabilities and also permits availability of the more than one compute
server for a data server.
The communication server acts as a gateway for transmitting network
protocols. The network computers communicate through a server that has
multiple slots and fast processors. In the database server, the client system
sends requests to the database server for data retrieval or modification. The
server then accepts the request and processes of the data accordingly and
sends the results back to the client. In a database server concept, the client
machine has application specific logic and presentation logic. The server does
all the database management activities, such as data locking, multi-user cache
management and scheduling.
Workstations
Workstations are a type of personal computer that intended for professional
use. Workstations have higher performance than other types of personal
computers as they have higher graphics, CPU, memory capacity and multitasking
capability. They help connect local area networks and they support multi-user
operation systems. In fact, workstations are designed for more powerful scientific
and technical applications.
A workstation offers technical users a cost effective way to better utilize
desktop visualization. Workstations use a keyboard and mouse just like a
personal computer. They are used intensively in the corporate world, and they
help organizations to increase productivity and reduce cost. For example, instead
of spending money on different desktops, you can simply do all the tasks on
one piece of hardware - the workstation. Workstations come handy in
Unit 7
applications, such as video editing, graphic design, AutoCAD, and other RAM
and CPU intensive programs.
Technically, workstations are used by professionals for high-powered
design work, multi-media production, engineering stimulation and for business
use. Workstations usually run on UNIX, Windows, Mac OS X and Solaris 9
operation systems.
Activity 3
Prepare a list on the types of servers and workstations available in the
market.
Self-Assessment Questions
9. Fill in the blanks with the appropriate words:
(a) Data server is used only for storage and _______________of data.
(b) A workstation offers technical users a cost effective way to better
utilize desktop____________________.
10. State whether true or false:
(a) Computer server is in conjunction with the data protocol.
(b) In database server, the client system does not send requests to the
database server for data retrieval or modification.
Unit 7
Ethernet was first designed and installed by Xerox Corporation at its Palo
Atto Research Center (PARC) in the mid-1970s. In the year 1980, DEC Intel
and Xerox came out with a joint specification which has become the de facto
standard. Ethernet was named DIX from this period onwards. It gained this
name after its business sponsors Digital, Intel and Xerox.
Fast Ethernet
100Base-T is a high-speed LAN standard and is considered to be a variation of
10BaseT. This is standardized as IEEE 802.3u. This operates with an access
mechanism as CSMA/CD and provides a transmission speed of 100 Mbps
through an Ethernet switching hub. Multiple 10 Mbps connections are supported
through multiple ports on the switch.
Gigabit Ethernet
When the IEEE approved the fast Ethernet standard, it offered ten times greater
bandwidth with other innovative attributes, such as autonegotiation and full duplex
operation. This made Ethernet a scalable technology and with the emergence
of Gigabit Ethernet standard, scalability is expected to go further. Fast Ethernet
Alliance, an industry consortium enhanced the Fast Ethernet standard. The
IEEE 802.3 committee approved the 802.3z Gigabit Ethernet Standardization
project in the year 1996. In May 1996, eleven companies got together and
formed the Gigabit Ethernet Alliance. These eleven companies were Bay
Networks Inc., 3Com Corp., Compaq Computer Corp., Cisco Systems Inc.,
Intel Corporation, Granite Systems Inc., Packet Engines Inc., LSI Logic, UB
Networks, Sun Microsystems Computer Company and VLSI (Very Large Scale
Integration) Technology.
Sikkim Manipal University
Unit 7
Unit 7
Ring Interface
Input
Output
Input
Output
1 Bit
To
Station
From
Station
To
Station
From
Station
H
A
(a) Unidirectional ring network
7.8.4 Cables
Networks are connected to each other in order to allow communication with a
wide range of media. These include optical fibre, twisted copper wire cable,
coaxial cable and other types of cables. Cable is the medium through which
information usually moves from one network device to another. There are several
types of cable which are commonly used with LANs. In some cases, a network
will utilize only one type of cable, other networks will use a variety of cable
Sikkim Manipal University
Unit 7
types. The type of cable chosen for a network is related to the networks topology,
protocol and size.
The following types of cables are used in networks:
Twisted Pair Cables
Twisted pair cabling comes in two varieties: Shielded and Unshielded.
Unshielded Twisted Pair (UTP): Unshielded Twisted Pair or UTP is the
most popular and is generally chosen as the best option for school
networks. Figure 7.9 shows UTP.
Unit 7
Fiber Optic Cable: Fiber optic cabling consists of a center glass core
surrounded by several layers of protective materials. It transmits light
rather than electronic signals eliminating the problem of electrical
interference. This makes it ideal for certain environments that contain
large amounts of electrical interference. Fiber optic cable has the ability
to transmit signals over much longer distances than coaxial and twisted
pair. It also has the capability to carry information at greater speeds. This
capacity broadens communication possibilities to include services such
as video conferencing and interactive services. The center core of fibre
cables is made from glass or plastic fibres. A plastic coating then cushions
the fibre center and Kevlar fibres help to strengthen the cables and prevent
breakage. The outer insulating jacket is made of Teflon or PVC (Polyvinyl
Chloride).
Workstation (Client)
Main Ring
In
O
ut
Multi-Station
Access Units
(MAUs)
O
ut
In
Server
Unit 7
This process looks very time consuming but the data transfer speed is
very fast and the tokens movement can be calculated in microseconds. A new
standard of token ring named as the High Speed Token Ring (HSTR) has
increased the token ring speeds to 100 Mbps and 1 Gbps.
Self-Assessment Questions
11. Fill in the blanks with the appropriate words:
(a) The best alternative to high-speed and cost-effective LAN
is______________.
(b) To control the access of the network, a control frame called
_____________ is used.
12. State whether true or false:
(a) A light duty coaxial cable known as thin net is normally used to connect
workstations within the same building.
(b) The cable recommended for a token ring by IEEE 802.5 contains
two pairs of twisted cables covered by a shield.
7.9 Bridges
Like repeaters, bridges are used to connect similar LANs together, for example,
Ethernet-to-Ethernet and operate at the bottom two layers of the OSI model,
the physical layer and the data link layer. As it operates on the second layer of
the OSI model, it relays only on the necessary data to other signals. MAC
addresses (physical addresses) are used to determine whether the data is
necessary or not. It passes information from one LAN segment to another based
on the destination address of the packet. In other words, when a bridge receives
data through one of its ports, it checks the data for a MAC address. If this
address matches that of the node connected to the other port, then the bridge
sends this data through this port. This action is called forwarding. If the address
does not match with any node connected to the other port, then the bridge
discards it. This action is called filtering. This is shown in Figure 7.11. Unlike
repeaters, bridges have buffers to store and forward packets, in case the
destination link is congested due to traffic.
The main advantage of a bridge over a repeater is that it has filtering
action. If any noise on Ethernet occurs because of collision or disturbance in
Unit 7
electrical signals, the bridge will consider it as an incorrectly formed frame and
will not forward it to the segment connected to the other port of the bridge. Note
that a bridge can relay broadcast packets and packets with unknown destinations.
Application layer
Presentation layer
Session layer
Transport layer
Network layer
Data link layer
Physical layer
Bridge
Application layer
Presentation layer
Session layer
Transport layer
Network layer
Data link layer
Physical layer
Unit 7
Unit 7
Self-Assessment Questions
13. Fill in the blanks with the appropriate words:
(a) The main advantage of a bridge over a __________ is that it has
filtering action.
(b) ____________networks are designed, maintained and used by a
single organization.
14. State whether true or false:
(a) A bridge can relay broadcast packets and packets with unknown
destinations.
(b) The tower of an Internet connection considers the minimum speed
as the actual speed.
7.11.1 ISDN
Integrated Services Digital Network (ISDN) is a new communication standard
for providing an end-to-end connectivity over a digital link. It is basically a circuit
switched digital network. Conventional telephone lines that are used to carry
the ISDN data are called as ISDN lines. In an ISDN line, a wide range of digital
services such as voice, data, image, video, facsimile, etc., can be integrated. It
provides efficient and cost effective solution to connect office LANs.
The CCITT (Consultative Committee for International Telegraphy and
Telephone), renamed in 1993 as International Telecommunication Union (ITU),
is a worldwide body that governs telecommunications. The United Nations has
drafted the ISDN standards by defining physical interfaces, message formats,
switching mechanisms, communication protocols and service capabilities. With
these standards, telephone companies, computer and communications
Sikkim Manipal University
Unit 7
Features of ISDN
The main features of ISDN are as follows:
Helps the implementation of digital network services on the existing
telephone network.
Provides a data rate of 2 Mbps on a local link and 64 Kbps/128 Kbps over
a wide area link.
Facilitates in connecting remote users to a LAN.
Helps in LAN-to-LAN linking.
Provides high bandwidth interoffice FAX.
Gives high-speed Internet access.
Another important feature of ISDN is its flexibility. It automatically switches
among different devices attached to it. A typical ISDN interface consists of a
phone, FAX machine and a PC. ISDN also can be used as a local access link in
frame relay and X.25 networks.
The ISDN integrates customer services with the integrated digital network.
In addition, digital services are much more efficient and flexible than analog
services. To receive the maximum benefit from the integrated digital networks,
the next step is to replace the analog local loops with digital subscriber loops.
Figure 7.14 shows the conceptual ISDN network. With ISDN, all the customer
services become digital rather than analog, and the flexibility allows the customer
services to be made available on demand.
Pkt. switched
Network
Digital pipe
Ckt. switched
Network
Telephone
Terminal
ISDN
interface
PBX Alarm
LAN
Other ISDN
interfaces
ISDN
central office
Data from
other sources
Other networks
Unit 7
office through a digital pipe. These pipes are of different capacities that allow
different rates of transmission and support different subscriber needs.
7.11.2 PSTN
PSTN or Public Switched Telephone Network relates to the public telephone
network. It is based on circuit switched connection and can be compared to the
Internet terms, referring to a public IP network based on a packet switched
connection. The term PSTN was initially used for fixed-line analog telephone
system but nowadays due to the advancement in technology, it is also referred
for digital circuit switched telephone network including both mobile and fixed.
ITU-T technical standard and an addressing rule (telephone number) E.163/
E.164 are followed by the PSTN.
PSTN is the global compilation of interconnects made for assisting circuit
switched voice communication. The conventional Plain Old Telephone Service
(POTS) is provided by PSTN to dwellers and to various enterprises. Some of
the DSL, VoIP (Voice over Internet Protocol) and other Internet based network
technologies also make use of some parts of PSTN .
Almost 64 Kbps bandwidth is supported by the basic PSTN network link.
The PSTN lines, in case of residences, are in the form of copper cables
transferring the data in such a bandwidth. The dial up modems make use of 56
Kbps of the total bandwidth while joined to the phone line. In the Signalling
System#7 (SS7), signalling protocol is used by the PSTN.
ISDN and other non-PSTN services have comparatively more speed and
unique features due to which they are prefered for using the Internet. For
example, while using a non-PSTN service like ISDN or DSL, voice and data can
be used simultaneously with the use of only one line instead of getting another
phone line for accessing the Internet which is the case with other services.
7.11.3 PSDN
Public Switched Data Network (PSDN) is a network that is accessible to the
public. It assists packet switched data as well as PSTN.
Earlier PSDN was termed as PSS (Packet Switch Stream) that was a
X.25-based packet switched network. The basic purpose of PSS was to present
leased line connections between LANs and also the Internet with the help of
PVCs (Permanent Virtual Circuits). Now, as technology is advancing day by
day, PSDN is not only limited to frame relay and ATM (Asynchronous Transfer
Mode) that are as providers of PVCs, but also extended to various other packet
switching methods like IP, GPRS, etc.
Sikkim Manipal University
Unit 7
Physical Topologies
The shape of the cabling layout used to link devices is called the physical topology
of the network. This refers to the layout of cabling, the locations of nodes and
the interconnections between the nodes and the cabling. The physical topology
of a network is determined by the capabilities of the network access devices
and media, the level of control or fault tolerance desired, and the cost associated
with cabling or telecommunications circuits.
Unit 7
Logical Topologies
The logical topology is the way that the signals act on the network media or the
way that the data passes through the network from one device to the next
without regard to the physical interconnection of the devices. A networks logical
topology may not necessarily be the same as its physical topology. Token ring
is an example of a logical ring topology. Technically, the logical classification of
network topologies describes the path that the data takes between nodes being
used as opposed to the actual physical connections between nodes. Hence,
the logical topologies are determined by network protocols as opposed to being
determined by the physical layout of cables, wires and network devices or by
the flow of the electrical signals. Logical topologies can be reconfigured using
routers and switches.
The network topologies include bus, star, ring, mesh, etc. This is discussed
in Unit 2 in detail.
Self-Assessment Questions
15. Fill in the blanks with the appropriate words:
(a) In public networks, the subscribers ____________is determined by
the amount of time the user is connected to the network and the
number of data packets sent and received.
(b) Network topology is the layout pattern of interconnections of the
various _________________of a computer network.
16. State whether true or false:
(a) Almost 82 Kbps bandwidth is supported by the basic PSTN network
link.
(b) The logical topology is the way that the signals act on the network
media or the way that the data passes through the network from one
device to the next without regard to the physical interconnection of
the devices.
Unit 7
Unit 7
Unit 7
Cable
Speed
Topology
Ethernet
10 Mbps
Fast Ethernet
100 Mbps
Star
LocalTalk
Twisted Pair
.23 Mbps
Token Ring
Twisted Pair
4 Mbps 16 Mbps
FDDI
Fiber
100 Mbps
Dual Ring
ATM
Applications in Railways
The railroad industry is the backbone of the countrys economy. Some of the
major IT initiatives taken by Indian Railways are as follows:
Unit 7
All India centralized reservation system provides the facility for the
passenger to book tickets from any destination and is one of the most
successful examples of computerization in the country.
Indian Railway Catering and Tourism Corporation (IRCTC) is an online
railway ticket booking portal which enables the passenger to book railway
tickets for any destination in India from anywhere in the world. It also
provides very useful information like computerized reservation-related
enquiries about passenger status, train schedule and trains between pairs
of stations.
Indian Railways has also started a pilot project for issuing periodical season
tickets through the ATM and another pilot project for buying tickets through
smart cards.
The Interactive Voice Response System (IVRS) has also been introduced
to update the passengers with railway inquiry and other related information.
Application in Airlines
The airline business is one of the largest users of computers. Computers have
been deployed in almost all aspects of the airline business for increasing
revenues, reducing cost and enhancing customer satisfaction.
Some of the major IT initiatives taken by the airline industry are as follows:
Online Ticket Booking Through the Internet: Almost all the airline
companies, may it be domestic or international are selling air tickets
online. Air tickets can be booked online by paying through credit card
and e-tickets can be printed on your printer.
Flight and Seat Availability Information: Flight and seat availability
information along with the cost of the ticket is now easily available
online with an option to compare it with other available airlines, making
it easier to choose the airlines according to the time and price that
best suits an individual.
All these facilities would not have been possible for airline companies
without the use of computer networks.
Application in Banking
With the increasing number of branches, banks had to simply recruit more
manpower to cope up with the additional workload which requires more
operational cost. To reduce this operational cost, banks computerized all the
customer accounts. However, computerization reduces the back office
Unit 7
operational cost only but banks still needed manpower as customer relation
officers for the front office. To deal with this problem, banks played a smart
move by introducing the Automated Teller Machines (ATMs). With the introduction
of the ATMs, customer interaction with the bank staff was drastically reduced
and customers had the privilege of 247 banking.
Application in Telecommunication
Use of computer network has made voice communication very easy and at
affordable cost. Revolution has come in conventional telephone industries as
well as in mobile telephony.
Telephone Exchanges: The conventional telephones had to be directly
connected by telephone wire in order to make a call. This system was adequate
when the number of phone users was very few and the scale of the telephone
network was very small but the consequences of implementing this system on
a larger scale became apparent very quickly.
Now telephone exchanges are automated and computerized not only for
switching calls but also for passing information to a user regarding the status of
their call. They can switch and connect numerous calls at a time with no delays
or mistakes. These systems removed the need for human operators to connect
calls or perform other related services. In fact modern telephone networks would
cease to function if they relied on a human component for switching or
connection. Computerization and digitization of telephone exchanges have
allowed the integration of other systems into the telephone network making a
variety of services and functionality available to users.
Mobile Phones: The perfect solution for providing connectivity is a mobile phone.
It works on the fundamental concept of a radio. Increased coverage can be
provided while keeping cost and power expenditure at a minimum by dividing
coverage area into cells. Each cell contains a base station within its area of
coverage. The base station hosts an antenna and other radio equipment which
wirelessly connects with the mobile phones located in its proximity. Mobility
beyond the coverage of a cell is achieved by allowing inter-cell communication
and transfer of connection from one cell to another.
Activity 4
Prepare a report on the areas where computer is used. Also mention the
name of application software for each type.
Unit 7
Self-Assessment Questions
17. Fill in the blanks with the appropriate words:
(a) The rules of the language in which one computer communicates
with another are called ______________protocols.
(b) Computer is a powerful digital device and a programmable
_____________that eases the difficult tasks taken by human beings.
18. State whether true or false:
(a) Only one electronic token travels throughout the ring from system to
system.
(b) With the increasing number of branches, banks had to simply recruit
more manpower to cope up with the additional workload which
requires more operational cost.
Unit 7
Unit 7
Videotext Networks
An interactive electronic system that permits the users for transmitting and
receiving data from a PC (Personal Computer) or a dedicated terminal can be
termed as a videotext. The information and transactional services like banking,
shopping, etc., are provided by the videotext system.
Earlier, only text format was available in the videotext systems. Due to
the rising rate of technological advancement, the systems started offering
Graphical User Interfaces (GUIs) that added audio and were visually outstanding
displays of computer graphics.
The videotext services can be divided into three categories namely,
services related to information recovery like weather forecasts, services
regarding transactional messages that allows the merchandize acquisition
through the network and the interpersonal exchange of messages that also
involve conferencing, electronic mail or chat channels.
Self-Assessment Questions
19. Fill in the blanks with the appropriate words:
(a) The ___________systems include computers established at various
sites where every system performs data processing free from the
other systems.
(b) Any type of text that is sent by the means of ______________can
be termed as teletext.
Unit 7
7.17 Summary
Let us recapitulate the important concepts discussed in this unit:
In the mainframe and minicomputer environment, each user is connected
to the main system through a dumb terminal that is unable to perform any
processing task. In the present computing environment, processing and
memory are centralized.
A network is a common place where different users can come together to
share and access the information. A user can access the resources
available at other users computer if there is an agreement between the
two for such sharing. To facilitate sharing of information, one or more
servers are kept in a network containing important data and information.
The sole purpose of networking is sharing of information. However, before
establishing a network of computers, there are certain issues that need
to be addressed. The scale of operation is one issue that needs a careful
analysis. Every organization or individual user needs a networking of
computers but his needs may be different.
There are various criteria for classifying a computer network such as
method of connection, scale of operation, network architecture, network
topology, network connections and protocols, and network services.
Computers are connected by many different technologies. A network is
an interconnection between two or more computers in a peer-to-peer or
client-to-server manner over a shared and virtual connection.
The file server is a powerful computer, which runs special software. It
provides the files and other shared resources to different users in the
network.
A LAN messenger is a software package, an instant messaging program
that works within a single LAN. These offer advantages in comparison to
a normal instant messenger as it runs inside the local network without
needing an Internet connection or a central server.
Sikkim Manipal University
Unit 7
File servers are I/O oriented. A client requests the data; the server transmits
the data/records in the file along with the necessary index table. Now, at
the client side, either the client selects the data/record, based on the
index entries or keeps this information and processes as required.
In computer networking, a server computer is a computer that links other
computers or electronic devices together.
A workstation is a type of personal computer that is intended for
professional use and has higher performance than other types of personal
computers. A workstation has higher performance and speed compared
to other PCs as they have higher graphics, CPU, memory capacity and
multitasking capability. They help connect local area networks and they
support multi-user operation systems.
The best alternative to high-speed and cost-effective LAN is Ethernet.
Data is transmitted and received at the rate of 10 Million bits per second
(Mbps).
A ring topology is a collection of point-to-point links that may form a circle.
The LAN of IBM follows the ring topology. The IEEE 802.5 standard
committee, along with a substantial number of representatives from IBM,
has developed a standard called token ring. In a token ring, stations are
connected to the logical ring.
Networks are connected to each other in order to allow communication
with a wide range of media. These include optical fibre, twisted copper
wire cable, coaxial cable and other types of cables. Cable is the medium
through which information usually moves from one network device to
another.
Bridges are used to connect similar LANs together, for example, Ethernetto-Ethernet and operate at the bottom two layers of the OSI model the
physical layer and the data link layer.
A network will be categorized as private only if a user or application
designates it as private. Only networks located behind a private gateway
device should be designated as private networks. Users likely designate
home or small business networks as private networks.
Public networks, also known as packet switched data networks, are wide
area telecommunication facilities owned by common carriers and sold to
users by subscription. In public networks, the subscribers tariff is
determined by the amount of time the user is connected to the network
and the number of data packets sent and received.
Sikkim Manipal University
Unit 7
The shape of the cabling layout used to link devices is called the physical
topology of the network. This refers to the layout of cabling, the locations
of nodes and the interconnections between the nodes and the cabling.
The rules of the language in which one computer communicates with
another are called network protocols. The language that both systems
are using must be the same.
Information Technology has dramatically changed the way of our life. After
the discovery of electricity, the computer ranks as one of the most important
breakthroughs of the modern era.
DDP can be described as the organizing of networked computers wherein
the data processing capabilities are extended throughout the network. In
DDP, particular jobs are handled by skilled computers that can be away
from the user or other skilled computers.
Any type of text, sent by the means of telecommunication, can be termed
as teletext. In cases of mobile communication, teletexts mobile alerts are
in the form of Short Messaging Service (SMS) text messages sent to the
mobile phones. An interactive electronic system that permits the users
for transmitting and receiving data from a PC (Personal Computer) or a
dedicated terminal, can be termed as a videotext.
7.18 Glossary
Network: The arrangement of data communication systems that serves
as a hardware and software communication system
Ring topology: A collection of point-to-point links that may form a circle
Physical topology: The shape of the cabling layout used to link devices
Distributed data processing: The organizing of networked computers
wherein data processing capabilities are extended throughout the network
Fiber optic cabling: A cabling center glass core surrounded by several
layers of protective materials
Unit 7
7.20 Answers
Answers to Self-Assessment Questions
1. (a) Memory; (b) Network
2. (a) True; (b) False
3. (a) Transmission;(b) Size
4. (a) False; (b) True
5. (a) Interconnection; (b) Site
6. (a) True; (b) True
7. (a) Server; (b) LAN
8. (a) False; (b) True
9. (a) Management; (b) Visualization
10. (a) False; (b) False
11. (a) Ethernet; (b) Token
Sikkim Manipal University
Unit 7
Unit 7
Unit 8
Communication Protocols
and Networking
Structure
8.1 Introduction
Objectives
8.2 Connection Oriented and Connectionless Networks
8.3 Classification of Communications Protocols
8.4 Time Division Multiplexing (TDM)
8.5 Time Division Multiple Access (TDMA)
8.6 Carrier Sense (Collision) System
8.7 Token Passing
8.8 Peer-To-Peer Priority Systems
8.9 Carrier Sense (Collision Free) Systems
8.10 Token Passing Priority Systems
8.11 Summary
8.12 Glossary
8.13 Terminal Questions
8.14 Answers
8.15 Further Reading
8.1 Introduction
In the previous unit, you read about networking. In the present unit, you will
read about the various types of communication protocols related to networking.
A communications protocol is a system of digital message formats and
rules for exchanging those messages in or between computing systems and in
telecommunications. A protocol may have a formal description. Protocols may
include signaling, authentication, error detection and correction capabilities. A
protocol defines the syntax, semantics and synchronization of communication.
It includes the considerations for networking real time embedded systems. The
protocols discussed in this unit are connection oriented protocols, Time Division
Multiplexing (TDM), Time Division Multiple Access (TDMA), token passing,
Carrier Sense Multiple Access with Collision Detection (CSMA/CD) and Carrier
Sense Multiple Access with Collision Avoidance (CSMA/CA).
Unit 8
Objectives
After studying this unit, you should be able to:
Describe connection oriented and connectionless networks
Classify communication protocols
Discuss TDM and TDMA
Explain carrier sense system
Summarize token passing and peer-to-peer system
Define token passing priority systems
Unit 8
the actual packet switching and data transfer can be taken care of by fast
hardware, as opposed to slow software based routing.
The alternative to connection oriented transmission is connectionless
communication, also known as datagram communication, in which data is sent
in the form of packets from one end point to another without prior arrangement
or signaling. This mode operates, without guarantees of delivery, according to
a best-effort policy. Each data packet must contain complete address information,
since packets are routed individually and independently of each other and
possibly transmitted along different network paths. Connectionless protocols
are usually described as stateless because the end points have no protocoldefined way to remember where they are in a conversation of message
exchanges. Because they can keep track of a conversation, connection oriented
protocols are sometimes described as stateful.
Examples of connection oriented packet mode communication, i.e., virtual
circuit mode communication:
The Transmission Control Protocol (TCP) is a connection oriented
reliable protocol that is based on a datagram protocol (the IP protocol).
X.25 is a connection oriented reliable network protocol.
Frame relay is a connection oriented unreliable data link layer protocol.
General Packet Radio Service (GPRS)
Asynchronous Transfer Mode (ATM)
Multiprotocol Label Switching
Activity 1
List the significant features of connection oriented and connectionless
networks in telecommunications. Also prepare a list of connection oriented
and connectionless protocols.
Unit 8
Unit 8
Self-Assessment Questions
1. Fill in the blanks with the appropriate words:
(a) Connection oriented communication is a ________ communication
mode in telecommunications.
Sikkim Manipal University
Unit 8
Time slots are assigned in such a way that each transmitting device gets
its required share of the available bandwidth. TDMs are not sensitive to protocol
and have the capability to combine various protocols onto a single high-speed
transmission link. Because of this, time-bandwidth multiplexing technique,
Unit 8
Unit 8
than the sum of connected capacity of each channel because it utilizes the idle
time very effectively. Since it is digital, more complicated framing of data is
required.
It is commonly used for remote communications with multiple terminals.
The additional services such as data compression, line priority, mixed speed
lines, host ports sharing, network port control, automatic speed detection, etc.,
are available with STDM techniques.
Unit 8
Unit 8
Self-Assessment Questions
3. Fill in the blanks with the appropriate words:
(a) ______________refers to digital transmission technology.
(b) Asynchronous TDM is popularly known as _________TDM.
4. State whether true or false:
(a) Time slots are assigned in such a way that each transmitting device
gets its required share of the available bandwidth.
(b) CSMA/CA needs a delay in network activity at the end of each
transmission.
Unit 8
Unit 8
CPU3
CPU2
Bus
Collision
CPU2 & 3
Collide
Jam
PSlot
Priority Slot
Rotating Slots
Slot1
Slot2
Message: CPU2
PSlot
Slot2
Message: CPU3
PSlot
Time
In the Figure 8.4, the number of slots are allocated on LAN/WAN randomly to
minimize collisions. Slots are prioritized and based on expected traffic prediction.
There is some collision detection hardware, such as sending dummy messages,
that keep slots going in the absence of network traffic.
Time Slots
The transmission time of a fixed-length physical frame is defined and prioritized
as a time slot and is used for multiplexing of user data switching over WAN. The
maximum length of an Ethernet MAC frame is exactly fixed into a physical frame
time slot. It is sent to a time-critical user data stream followed by the required
QoS parameters such as throughput and time delay.
For example, the DS0 (Digital Signal 0) time slot is used for WAN interface.
All are checked by default and arranged as slot priority. In the T1/E1 carrier, T1
provides 24 time slots of 64 Kbps for each which in total is 1536 Kbps. For E1,
there are 31 time slots of 64 Kbps each for a total of 1984 Kbps.
Unit 8
Figure 8.5 shows that frame formats such as DS1 and E1 each have a reserved
time slot for framing information. The structured frame format is repeated every
125s. By using framing information, the receiving node separates bits into
individual time slots according to the priority slot for data.
The Figure 8.6 shows the time slot arrangement over DS1 link which prioritizes
allotment of slots and transmission.
Unit 8
Self-Assessment Questions
5. Fill in the blanks with the appropriate words:
(a _________ is the term given to a media access control convention
that enables both the centralized master station and individual slaved
stations to determine the length of time which will pass before access
is provided.
(b) Peer-to-peer priority system is a system used as an
______________priority control structure.
6. State whether true or false:
(a) Token-based LAN technologies are somewhat overhead intensive,
due to the token passing and management processes.
(b) The transmission time of a fixed-length physical frame is not defined
and prioritized as a time slot.
Unit 8
Unit 8
Step II: If the medium is idle, the station starts transmission and goes to
Step IV; otherwise it goes to Step III.
Step III: If the medium is busy, it continuously listens until the channel
becomes idle, then it starts immediately.
Step IV: If collision is detected during the transmission, a brief jamming signal
is transmitted to inform all the stations to stop transmission
immediately.
Step V: After transmitting the jamming signal, the station waits for a random
time and attempts to start from Step I again.
This CSMA/CD is a significant protocol. It has been included in the IEEE
standard.
CSMA/CD Bus-Based LAN: It is also known as Ethernet. Base band
coaxial cables are used to construct Ethernet LAN. Typical operating speeds of
these LANs are in the order of 10 Mbps.
Unit 8
Self-Assessment Questions
7. Fill in the blanks with the appropriate words:
(a) The disadvantage of the ____________access method is that when
more and more users start accessing the network, there is more
chance of two people transmitting simultaneously.
(b) _____________is a process in which each workstation passes a
permission known as token to the closest neighbour.
8. State whether true or false:
(a) ALOHA scheme provides efficient collision control.
(b) A token is passed around every network.
Sikkim Manipal University
Unit 8
8.11 Summary
Let us recapitulate the important concepts discussed in this unit:
Connection oriented communication is a data communication mode
whereby the devices at the end points use a protocol to establish an endto-end logical or physical connection before any data may be sent.
Protocols can be grouped into different suites according to their technical
functions. A protocol can define one or multiple protocol suites.
Some of the common network protocols are Ethernet, Local Talk, token
ring, FDDI and ATM.
In synchronous TDM, a single channel is broken into time slots and each
transmitting device is given or allotted at least one of the time slots for its
transmission.
The advantages of TDMA may be counted from increasing the efficiency
of transmission to easy adaptation for both the transmission of data as
well as voice communication.
Non-deterministic media access control, places access control
responsibilities on the individual stations. This is popularly known as Carrier
Sense Multiple Access (CSMA) and is most effective in low-traffic
environments. There are two variations, CSMA/CD and CSMA/CA.
Deterministic access is the term given to a media access control convention
that enables both the centralized master station and individual slaved
stations to determine the length of time which will pass before access is
provided.
Peer-to-peer priority system is a system used as an interrupted priority
control structure. It suspends transmission of packets from the lower priority
nodes to the higher priority nodes. This system is obtained as rapid access
to the transmission medium. Then it sends a message to the destination.
In packet radio networks of the earlier days, transmission media was
shared by a number of stations; ALOHA technique provided a fair conflictfree channel access to stations. This scheme is suitable for any system,
using shared media.
Token passing is a process in which each workstation passes a permission
known as token to the closest neighbour. In a token passing priority system,
the token is passed with transmitted data over a network.
Unit 8
8.12 Glossary
Code division multiplexing: A form of multiplexing where the transmitter
encodes the signal using a pseudo-random sequence
Deterministic access: A media access control convention that enables
both the centralized master station and individual slaved stations to
determine the length of time which will pass before access is provided to
the network
Time slot: The transmission time of a fixed-length physical frame
Token passing: A process in which each workstation passes a permission
known as token to the closest neighbour
8.14 Answers
Answers to Self-Assessment Questions
1. (a) Data; (b) Two
2. (a) False; (b) True
3. (a) TDMA; (b) Statistical
4. (a) True; (b) True
Unit 8
Unit 9
Connecting PCs
Structure
9.1 Introduction
Objectives
9.2 Simple Switches
9.3 Printer Sharing Buffers
9.4 Zero-Slot LAN
9.5 Media Sharing LAN
9.6 Printer Servers
9.7 Client and Servers
9.8 Interface Cards
9.9 Media Access Control
9.10 Operating System Features
9.11 OSI Model
9.12 TCP/IP Model
9.13 Data Encoding
9.14 Multiplexing, Communication Techniques and Hardware
9.15 Summary
9.16 Glossary
9.17 Terminal Questions
9.18 Answers
9.19 Further Reading
9.1 Introduction
In the previous unit, you read about communication protocols and networking.
In the present unit, you will be reading about how to connect PCs. A network
switch is a small hardware device that joins multiple computers together within
one local area network. Unlike hubs, network switches are capable of inspecting
data packets as they are received, determining the source and destination device
of each packet and forwarding them appropriately. To connect many personal
computer and printers, a printer buffer system is also used.
Media sharing LAN means involving various sharing of music files, video
files and images. Printer server is also used to connect two PCs and can be
attached directly to the network, which enables user on the network to access
Unit 9
printer, even if one of the PC connected to the printer is switched off. In this unit,
you will also read about various other devices used for connecting one or more
PCs followed by different OSI model, TCP/IP, data encoding and various
multiplexing communication techniques.
Objectives
After studying this unit, you should be able to:
Define simple switches, printer sharing buffer and zero-slot LAN
Differentiate media sharing LAN, printer servers, and client and servers
Explain interface cards
Discuss the concept of media access control
State the features of various operating system
Recognize OSI and TCP/IP models
Describe different encoding techniques
Explain various multiplexing communication techniques and its hardware
Unit 9
that is the intended recipient. This way of operation reduces network traffic for
message delivery and hence, performance of a switch is superior to a hub on
busy networks.
A LAN switch prevents collision of data packets, maximizes bandwidth
allocation as well as transmission speed. It is a good replacement to a network
hub and solves problems associated with expanding networks.
By using a LAN switch in the network, every node is directly connected to
a switch, and there is a dedicated connection to each node, which makes it
possible for a node to maximize the bandwidths use, since other nodes are not
competing for bandwidth. This results in data transmission at higher speed.
Use of a switch eliminates data collision as connection between a node and the
switch is made by cable having separate route for transmitting data sent by that
node.
The LAN switches have the capability of reading addresses of source
and destination node of a data packet, forwarding the packet to the destination
node only. While transmitting data by one node to another node in local area
network, a switch intercepts the data, reads the address of the destination and
then forwards transmission to the intended recipient. This way data packet is
not broadcasted to unnecessary segments, resulting in minimization of network
congestion leading to conservation of bandwidth.
In Figure 9.1, a simple switch is shown. This connects two PCs through a
switch. This switch, in turn, is connected to the Internet through a modem or
router.
Internet
Phone line
Modem/Router
Cat5
Cable
Cat5
Cable
Cat5
Cable
Network Switch
PC1
PC2
Unit 9
Cisco IOS
command-line
interface
Web-based or
SNMP-based
management
station
Giga Stock
cabling
Straight-through
cabling
10BaseT/
100BaseT
router
10BaseT/
100BaseTX
workstations
Unit 9
process is needed and nodes can transmit any time being only potential devices
accessing the medium. This is like flow of traffic in each direction in its own
lane. Duplex mode of transmission double the effective speed of the network in
a one-to-one exchange between two nodes. For example, if the network speed
is 10 Mbps, then it is possible for a node to transfer data simultaneously at the
same speed.
Mixed Networks
All networks are not fully switched. Figure 9.3 depicts an example of a mixed
network using two switches and three hubs. Most users find a combination of
switches and hubs, efficient as well as cost-effective alternative to a fully switched
network.
Nodes
Backbone
Switches
Segments
Hubs
Unit 9
Application layer 7
Presentation layer 6
Session layer 5
Transport layer 4
Network layer 3
Routers
Datalink layer 2
Switches
Physical layer 1
Hubs
A hub or a switch will pass along any broadcast packets it receives to all
the other segments in the broadcast domain, but a router will not. Without the
specific address of another device, it will not let the data packet pass through.
Activity 1
Collect information on various types of switches and routers used in LAN.
Explain the advantages and disadvantages of each type.
Self-Assessment Questions
1. Fill in the blanks with the appropriate words:
(a) _____________ networks are connected using either fiber-optic
cabling or twisted-pair having separate conductors to exchange data.
(b) _____________ normally work at the second layer of OSI, which is
data link layer, using MAC addresses.
2. State whether true or false:
(a) Switch, in context of a network, software for connecting many
computers within one local area network or segments of computer
networking.
(b) Duplex mode of transmission doubles the effective speed of the
network in a one-to-one exchange between two nodes.
Unit 9
Computer buffers
print job
Unit 9
Print job
For small office, it is very convenient but when it is a big office, trouble
may be there in operation. If a user reboots his computer while print job is in
progress for another user, the print job is either lost or delayed. This may also
happen when that particular user has performed some intensive operations
that require additional resources for that printer and has to buffer the incoming
print data.
A printer buffer system, used to connect many personal computers and
printers has a master printer buffer with few slave buffers creating an expandable
printer buffer system. Each buffer has an input storage device to store data,
command and status signals that comes from a PC. This is also to control data
transfer between computer and the buffer as well as output storage devices to
store status, command and data signals for transferring data between printer
and the buffer with control on such transfer. Then, it becomes possible to add or
remove PCs and printers from the system as may be required with flexibility to
user to select a designated printer.
Unit 9
Unit 9
Self-Assessment Questions
3. Fill in the blanks with the appropriate words:
(a) ____________ is an area of memory used for temporary storage of
data while moving it from one place to another.
(b) The ZSLAN does not require a ____________.
4. State whether true or false:
(a) A printer buffer system, used to connect many personal computers
and printers has a master printer buffer with few slave buffers creating
an expandable printer buffer system.
(b) Media player is the hardware device used to play media files.
Unit 9
For installing a printer server, all that is required besides a printer and a
Print Server is LAN cable.
Wired and Wireless Print Servers
There are two different types of print servers. In some of them, the servers are
wired and plugged to an RJ-45 Ethernet cable to attach it to the network, whereas,
in others, the print servers are wireless and can interact with the wireless network
without the use of cables. The type of print server (wired or wireless), to be
used, depends on the type of network being used.
The print server or printer server can be defined as a system linked to a
single or multiple printers or to systems operated by clients through the network.
They are enabled to execute printing tasks from different systems and transfer
them to the respective printer.
Print server can also refer to:
A home computer consisting of single or multiple shared printers.
A printing protocol applied by a system like the Line Printer Daemon
(LPD) protocol or Microsoft Network Printing protocol.
A dedicated device linking single or multiple printers to LAN. It normally
consists of a single LAN connector like an RJ-45 socket and a single
or multiple outer ports, like a serial, parallel or USB, to transfer links to
printers. In addition, such devices enable printing protocol conversion
to what was sent from the client system till permitted by the printer.
Dedicated print server devices may assist various printing protocols like
LPD/LPR (Line Printer Daemon protocol/Line Printer Remote protocol) over
TCP/IP, NetWare, NetBIOS/NetBEUI over NBF, TCP Port 9100 or RAW printer
protocol over TCP/IP, DLC or IPX/SPX. LPD/LPR is also called Berkeley printing
system. It is a set of programs providing functionality of network print server
and printer spooling for UNIX like systems. A printer supporting LPD/LPR
functioning is also known as TCP/IP printer.
Usually, all dedicated server systems are simple and easy in settings and
features and are accessible incorporated along with different devices like wireless
router, firewall or may be both of them.
Unit 9
Unit 9
computer with one or more hard disks facilitates this. All client stations share
these hard disks. Clients can make their requests to access any of the shared
facility to the server. The file server is a powerful computer, which runs special
software. It provides the files and other shared resources to different users in
the network. It provides facilities like user authentication and security to various
user programs and data. It can be accessed through Network Operating System
(NOS). Typical configurations of a server are Pentium 4 machine with 128 MB
or higher capacity RAM and 40 GB or higher capacity hard disk, to serve upto
10 nodes or workstations.
The file server has a large memory, which is used for caching directories,
files and hashing directories. Novell Netware and Windows NT are the two
network operating systems that run on a server machine.
Activity 2
Search on the Internet, collect information and illustrations on different types
of client-server computing. Prepare a presentation from the data collected.
Unit 9
card can be used for a typical workstation. In general, the memory and hard
disk capacity of a workstation is much less than that of the server. Most home
and portable computers connect to the Internet through the dial up connection.
The modem provides the connection interface to the Internet service provider.
An interface card implements an electronic circuitry for communication
by using specific physical layer and data link layer standard protocol. For Ethernet
it is called Ethernet card and for token ring it is known as token ring card. These
cards provide base for full network protocol stack that enables communication
between computers on the same LAN as well as large-scale network
communications using routable protocols. Internet Protocol (IP) is such routable
protocol.
Normally, card and controller are used interchangeably and a network
interface controller and network interface card means same thing; some also
use the term controller card. These cards are hardware devices for handling an
interfacing of a computer network, allowing a network-capable device to access
that network. The NIC contains a ROM chip having a unique number, which is
known as Media Access Control (MAC) address and is a permanent address
allocated to that card. This address is used to identify the device uniquely on
the LAN. Existence of the NIC is there on physical layer as well as data link
layer of the OSI model.
NIC uses one or more of the following four techniques used for transferring
data:
Polling: In this technique, the microprocessor checks for the status of
peripheral under program control.
Programmed I/O: In this technique, the microprocessor signals the
designated peripheral using its address to the address bus of the
system.
Interrupt-Driven I/O: In this technique, the peripheral alerts the
microprocessor to be ready to transfer data.
Direct Memory Access: In this technique an intelligent peripheral
takes control of the system bus for directly accessing the memory.
This relieves CPU of the burden, but needs a separate processor on
the card.
Unit 9
Self-Assessment Questions
5. Fill in the blanks with the appropriate words:
(a) A printer supporting LPD/LPR functioning is also known as
___________.
(b) _______________is a circuit board installed in a computer for
connecting it to other computer(s) or devices using some protocol.
6. State whether true or false:
(a) The primary goal of a computer network is to share the data among
several users.
(b) Direct memory access is a technique in which the microprocessor
checks for the status of peripheral under program control.
Unit 9
If a computer does not send a packet, the bridge will never be able to
determine its position and unnecessarily forwards the packet on the network.
Fortunately, this cannot happen because a computer attached to a network
transmits at least one frame when the system first boots. Furthermore, computer
communication is bi-directional; there is always an acknowledgement for each
received packet.
Unit 9
for various purposes. The design of the OS must include provisions for easy
introduction of new services and removing or improving/replacing the existing
services. Also, the design must provide easy interfacing facility to connect and
communicate with new types of hardware devices and upgraded versions of
the existing hardware devices.
Self-Assessment Questions
7. Fill in the blanks with the appropriate words:
(a) ______________ is used to connect dissimilar LANs, such as
Ethernet and token ring using encapsulation or translation.
(b) __________ was set up as an international standard for network
architecture.
Unit 9
Unit 9
Unit 9
Application Layer
The TCP/IP model was the first of its kind and, therefore, did not contain session
or presentation layers because of its little use to most of the applications. This
layer has all the higher level protocols. Numerous protocols are found at the
application layer. They are application protocols like HTTP (HyperText Transfer
Protocol), FTP (File Tansfer Protocol), SMTP (Simple Mail Transfer Protocol),
etc., for providing end-user services, as well as administrative protocols like
SNMP (Simple Network Management Protocol), DHCP (Dynamic Host
Configuration Protocol), DNS (Domain Name System), etc.
OSI Model
TCP/IP Model
Application layer
Presentation layer
Application layer
(FTP, TFTP
SMTP, NFS
TELNET, SNMP)
Session layer
Transport layer
Network layer
3
Physical layer
Transport layer
(TCP, UDP)
Internet layer
(IP, ICMP, RIP,
BGP)
Network Interface
layer
(Ethernet, FDDI,
Token Ring)
Hardware
Unit 9
from TCP and encapsulates it for transmission. According to the OSI reference
model, TCP segments are created as Layer 4 PDUs (Protocol Data Units) which
becomes Layer 3 SDUs at IP layer. The IP software encapsulates these SDUs
into messages known as IP packets or IP datagrams which is now treated as
the Layer 3 PDUs. When Layer 3 PDUs passes down to a Layer 2 protocol, for
example, Ethernet, which treats IP datagrams as Layer 2 SDUs and encapsulates
them into Layer 2, PDUs which is called Ethernet frames and are passed down
to Layer 1. At the receiving end, the process of encapsulation is reversed.
Layer 4 PDU (TCP Segment)
Layer 4
TCP
Header
Layer 3
(IP)
Header
Layer 3 SDU
Layer 4
(TCP)
Header
2
Layer 2
(Ethernet)
Header
Layer 2 SDU
Layer 3 SDU
Layer 4
(TCP)
Layer 3
Header
(IP)
Header
2
Layer 2
(Ethernet)
Footer
Unit 9
for upper layers using IP protocol. This is possible because TCP uses positive
acknowledgement to confirm the sender about the proper reception of data.
The sender keeps on sending data at constant intervals until it receives a positive
acknowledgement.
A negative acknowledgement implies that the failed data segment needs
to be retransmitted.
Unit 9
and UCS (Unicode Character Set). An encoding does the mapping of the range
of Unicode code points to the sequences of values in a fixed-size range of code
values. Numbers in the names of the encodings (for UTF encodings) show the
number of bits in one code value or the number of bytes per code value (for
UCS encodings).
Manchester Code
This is also known as MPE (Manchester Phase Encoding). It is used in
telecommunication by Ethernet standard 802.3.
Transition, taking place in the middle of each bit, synchronizes sender
and receiver. Sender or receiver, at any instant can have one out of these three
states:
Transmitting a 0 bit, to the lower of the set values (which is mostly kept at
0.85v).
Transmitting a 1 bit to the higher of the set values (mostly at +0.85v).
Idle (0 volts).
Differential Manchester Encoding (DME)
Differential Manchester encoding (refer Figure 9.8) is also called CDP
(Conditioned Diphase Encoding). It is a method of data encoding where data
and clock signals are combined to create a single data stream that is selfsynchronizing. Here, logical values (0s and 1s) are indicated by the presence or
absence of transitions.
Bit 1 is indicated when first half of the signal equals the second half of
the signal of the previous bit. This means there is no transition in the start of the
bit-time. Thus, when there is no change of signal in start of the bit time, it signifies
1. Bit 0 is indicated when first half of the signal is opposite to the second half of
signal of the previous bit. Thus, bit 0 is indicated when there is a transition in
the beginning of the bit-time. There is always a transition in the middle of the bit
time.
Unit 9
Unit 9
Self-Assessment Questions
9. Fill in the blanks with the appropriate words:
(a) The ______________ is composed of four layers which are logically
considered equivalent to the top six layers of the OSI reference model.
(b) ______________ is done for data inside computer as well as for
communicating data from one computer to another within a network.
10. State whether true or false:
(a) According to the TCP/IP reference model, OSI segments are created
as Layer 4 PDUs which becomes Layer 3 SDUs at IP layer.
Unit 9
(b) MPE is a method of data encoding where data and clock signals are
combined to create a single data stream that is self synchronizing.
Unit 9
Unit 9
data simultaneously in the same direction over one fibre, and later on is separated
by wavelength at the distant end.
Information exchanged between two computers is physically carried by
means of electrical signals assuming certain coding methods. These codings
can be characterized by changing voltage levels, current levels, frequency of
transmission, phase changes or any combination of the physical aspects of
electrical activity. For reliable exchange of data, the computers must have a
compatible implementation of encoding and interpreting data carrying electrical
signals. Over time, network vendors defined different standards for encoding
data on the wire.
Modulation Techniques
Modulation is the technique used to translate low-frequency (base band) signals
like audio, music, video and data to a higher frequency. In other words, it may
be said that modulation/demodulation is a non-linear process where two different
sinusoids are multiplied.
The modulation process involves a high-frequency sinusoidal carrier fc.
Some characteristics of this signal like amplitude, frequency and phase change
in direct proportion to the instantaneous amplitude of the base band signal fm as
shown in Figure 9.13.
Let us assume the two sinusoids, as shown in Figure 9.13, fm and fc as
base band signal and carrier respectively represented as:
fm = A sin mt + 1
(9.1)
fc = B sin ct + 2
(9.2)
and
In Equation (9.2), you may change either amplitude B or angular frequency
wc in accordance with Equation (9.1) and thus produce either amplitude
modulation or frequency modulation or phase modulation, respectively. Angular
frequency is defined as twice the frequency of carrier signal.
Unit 9
Unit 9
(9.3)
From Figure 9.14 and Equation (9.3), you may derive the following equation
for modulating index m.
m=
Emax Emin
Emax + Emin
(9.4)
Angle Modulation
It is described in Equation (9.2) as a carrier which is being reproduced as follows:
fc = B sin ct + 2
In the equation, there is an argument of sine as c t + 2 which can be
varied in accordance with Equation (9.1) and thus produce either frequency or
phase modulation. In either case, the amplitude of the carrier remains unchanged
with incremental change in c t + 2 .
Frequency Modulation
Frequency Modulation involves the modulation of the frequency of the analog
sine wave as shown in Figure 9.15, where the instantaneous frequency of the
carrier is deviated in proportion to the deviation of the modulated carrier with
respect to the frequency of the instantaneous amplitude of the modulating signal.
It may be said in simple words that it occurs when the frequency of a carrier is
changed based upon the amplitude of input signal.
The modulating index for FM is given as follows:
= fp / fm
where,
= Modulation index
fm = Frequency of the modulating signal
fp = Peak frequency deviation
Sikkim Manipal University
Figure 9.15
Unit 9
Frequency Modulation
It can be seen from Figure 9.15, that the amplitude of the modulated
signal stays constant, in spite of the frequency and amplitude of the modulating
signal. This means that the modulating signal adds no power to the carrier in
FM unlike AM. FM produces an infinite number of side bands spaced by the
modulation frequency. Therefore, AM is considered as a linear process whereas
FM is considered a non-linear process. It is necessary to transmit all side bands
to reproduce a distortion-free signal. Ideally, the bandwidth of the modulated
signal is infinite in this case. In general, the determination of the frequency
content of an FM waveform is complicated (but when it is small, the bandwidth
of an the FM signal is 2fm). On the other hand, when it is large, the bandwidth is
determined (empirically) as 2fm (1 + b).
Phase Modulation
Phase Modulation (PM) is similar to frequency modulation. In FM, the frequency
of the carrier wave changes, whereas in PM the phase of the carrier wave
changes. In PM, the phase of the carrier is made proportional to the instantaneous
amplitude of the modulating signal.
Modulating index for PM is given as:
=
where, is the peak phase deviation in radians.
As in the case of angular modulation, the argument of sinusoidal is varied
and therefore, you will have the same resultant signal properties for frequency
and phase modulation. A distinction in this case can be made only by direct
comparison of the signal with the modulating signal wave, as shown in Figure
9.16.
Unit 9
Unit 9
The receiving terminal is alerted by the start bits about the transmission
of some important information and the receiving terminal is informed by the
stop bit that the transmission of information is complete. In addition,
asynchronous transmission adds a parity-checking bit for comparatively weak
error control. When the data is framed with these three or four bits of control,
information results in operating cost or an inefficiency aspect of 20 per cent to
30 per cent.
In almost all cases, a PC and a modem exchange data asynchronously.
The length of the start and stop bit can be specified using PC communication
software. Generally, a start bit is 1 bit long. The length of a stop bit can be
selected as 1, 1.5 or 2 bits. Normally, the stop bit is also 1 bit long.
Character Synchronous Systems
Figure 9.18 shows a character synchronous (SYN synchronous) system. With
this system, special characters are added to the beginning of a data block to
allow detection of separation of data items. These special characters are called
SYN characters. The character string of the SYN character is 00010110. Upon
receipt of this character, the receiving equipment determines that all succeeding
data consists of data bits. It then receives each succeeding 8 bits as one
character. Normally, the sending equipment sends two or more SYN characters
before sending data to ensure synchronization with the receiving equipment.
The receiving equipment remains attentive to SYN characters at all times so
that it can receive bit strings other than SYN characters as data. A string
containing 00010110 (the same as the SYN character) cannot be used to transmit
data.
Unit 9
With this system, data of a desired bit length can be sent. It may seem
impossible to send the same data bit string as the flag, i.e., 01111110. A method
called transparency can be used to send this flag as data.
Transparency means that the receiving equipment will use the same format
as the sending equipment to receive any data in its original format. To send the
same bit string, as the 01111110 flag string, as data with a flag synchronous
system, a technique called zero bit insertion or bit stuffing is used. This
technique is explained as follows:
If the sending equipment detects a bit string 11111 (5 consecutive 1s) in
the data, it inserts a 0 bit at the end to send 111110. If the receiving equipment
detects a bit string 111110, it deletes the 0 at the end. Although the flag 01111110
contains a bit string 11111, the sending equipment sends the flag as is without
inserting a 0.
When this technique is used, the data string 01111110 is converted into
011111010. Therefore, the same bit string cannot appear in the data as the flag.
Half Duplex Transmission
In this mode, the data is transmitted in one direction at a time, for example, a
walkie-talkie. The usage is primarily for low-speed transmission and involves
two-wired, analog circuits as shown in Figure 9.20. Due to switching of
communication direction, data transmission in this mode requires more time
and processes than under the full duplex mode. Examples of half duplex
application include line printers, buffers polling systems and modems (many
modems can support full duplex also).
Unit 9
Communication Hardware
In a communication system there are three basic elements, a sender (source)
who creates message for the purpose transmitting it, a medium to carry the
message and a receiver (sink) that receives the message. Each of these contains
hardware device or devices connected and configured in a manner needed for
communications. In a communication network using computers, a sender is a
computer, single or in a group of computers connected together and a receiver
is also a computer. Medium is either physical, using wires of different
characteristic, copper cables or fibre optical cables or wireless system that too
require some equipment as hardware devices in a particular configuration.
There are various kinds of hardware like routers, servers, switches, firewall,
workstations, modems and many varieties of essential and advance
communication hardware used for the process of computer networking for the
creation of a computer network.
Unit 9
Host Computer
For the purpose of processing of application programs, a centralized type of
computing environment is provided by the host computer. Different terminals
and peripheral components are attached to the host computer through frontend processors. Being a large scale main-frame computer, many tape and disktype storage devices are linked to it.
Terminal
The terminal serves the purpose of an input device for the user and basically
includes a keyboard and a console screen. Usually, many terminals are userdependent, i.e., they cannot carry out functions by themselves due to which all
program execution jobs are done with the help of the host computer. The host
system receives all the data typed on the keyboard and processes it, following
which, updates on the screen is transmitted from there to the terminals console
screen. Nowadays, the use of network connections such as Ethernet or token
ring for linking all the terminals, which was earlier done through a serial link, is
becoming famous. A terminal is unable to function by itself and is totally
dependent on the host computer.
Network Interface Cards
Network interface card is printed electronic circuit that is put inside the slot
available in the computer for this purpose. This is the most important
communication hardware part required for establishing networked
communication. The attached card corresponds to the system and topology of
the network. To implement Ethernet, an Ethernet card with its driver software is
required. Token ring card is used for using token ring technology.
Hubs and Switches
Hubs and switches are used to connect computers in star or tree like topology.
They are connected through cables.
Front End Processor
A Front End Processor (FEP) also called as the communications processor
relates to a device or component interfacing a variety of side-line devices such
as terminals, disk units, printers, tape units, etc., for the host system. The host
system transfers data to the front-end processor and vice versa with the help of
a high speed parallel interface. The communication between the front end
processor and peripheral devices is done through a slow speed serial interface.
Unit 9
The basic reason for using a front end processor is off-loading the job of
administration of the peripheral devices through the host system permitting it
for concentrating over processing the applications software. The FEP helps in
providing an interface between the host system and the data communications
network that includes every terminal and other host computers.
Concentrator
A concentrator is a component or device that joins numerous low-speed devices
onto various high-speed channels Figure 9.22. This is done through the
combination of data derived from all sub-channels and transmitting the same
through the links. The free time during the transfer of data is beneficial for the
concentrator as it utilizes that free time and allocates it for another sub-channel.
This implies that there should be adequate buffer storage within a concentrator
to save the data from every sub-channel. The concentrator is generally used for
joining circuits.
physical lines
Multiplexor
It is a device through which multiple users share a communications link with the
help of time or frequency division as it would become very expensive for providing
a circuit each to every device (terminal). For example, if there are 400 remote
terminals in total, then it would be very expensive to provide 400 physical lines
for every terminal. The basic function of a multiplexor is joining every low speed
circuit to a single high speed link. Therefore, by analyzing this, it can be observed
that the cost of the single high speed link is very much low than the expense in
providing the required amount of low speed links (refer Figure 9.23).
Unit 9
physical lines
Modem
Modems are devices through which digital data signals can be sent over an
analog link. Modem is basically the abbreviated form of modulator/demodulator.
At the senders end, the digital signals are modified into analog frequency and
transmitted over an analog link. Whereas, at the receivers end, another modem
accepts the analog signals and changes them back to their original digital forms.
Network Repeater
The basic purpose of a repeater is to join the two segments of the network
cable. It also includes maintaining the correct amplitude of the signals through
retiming and regenerating and then transmitting them to the rest of the segments
(refer Figure 9.24). Some network architectures restrict a lot of repeaters used
in a row. The physical layer of the OSI network model is the only level where the
repeater is required.
Bridge
The functioning of the bridge is to read the outermost section of data packets
for describing the direction of the message flow (refer Figure 9.25). The bridge
helps in decreasing the traffic on the other network segments as not all packets
Sikkim Manipal University
Unit 9
are sent by it. An advantage in using bridges is that, they can be made to ignore
the packets from some specified networks by programming them in that way.
Ethernet data can also be read by the bridge that provides the hardware address
of the destination address, not the IP address. All transmitted messages can be
transferred with the help of the bridges.
There are other communication devices too, at higher level such as routers,
brouters and gateways but these are components of networks installed by service
providers and are outside the terminal computers.
Activity 3
Collect data on the architecture and features of modem types used in
computer networking. Prepare a chart on it.
Self-Assessment Questions
11. Fill in the blanks with the appropriate words:
(a) ______________ is the technique used to translate low-frequency
(base band) signals like audio, music, video and data to a higher
frequency.
(b) ______________ involves the modulation of the frequency of the
analog sine wave.
12. State whether true or false:
(a) Amplitude modulation is similar to frequency modulation.
(b) In full duplex mode, the data can be transmitted in both directions at
the same time.
Unit 9
9.15 Summary
Let us recapitulate the important concepts discussed in this unit:
In electronics, switch is an electrical component used for connecting or
breaking an electrical circuit to interrupt current or divert it from one
conductor to another.
Fully switched networks are connected using either fiber-optic cabling or
twisted-pair having separate conductors to exchange data.
Buffer is an area of memory used for temporary storage of data while
moving it from one place to another. Data while moving from one location
to another is stored in a buffer.
The ZSLAN does not require a network card. To attach the LANs cable to
the computer, plug the cable into the computers parallel printer port or
RS-232 serial port.
Media means information types that handle text, sound, images, animation
and video in an interactive way. Each of this is termed media and
combination is known as Multimedia. Media sharing involves the sharing
of music files with format WMA, MP3, WAV and others; sharing of video
files having formats WMV, AVI, MPEG-1 and MPEG-2, MPEG-4 and
others; images in formats JPEG, JPG, PNG and others.
The print server or printer server can be defined as a system linked to a
single or multiple printers or to systems operated by clients through the
network.
Server is the most powerful computer of the network. In a local area
network, usually a powerful microcomputer or a super-microcomputer
with the power of a minicomputer is used as a server.
An interface card is a circuit board installed in a computer for connecting
it to other computer(s) or devices using some protocol. An interface card
implements an electronic circuitry for communication by using specific
physical layer and data link layer standard protocol.
Media access control is used to connect dissimilar LANs such as Ethernet
and token ring using encapsulation or translation. It is a bridge that
translates the original packet format from the requesting LAN segment
by encapsulating or enveloping with control data, specific to the protocol
of the destination LAN segment.
Unit 9
A computer system has various resources like CPU, memory and I/O
devices. Every use of the resources is controlled by the OS.
The OSI has two meanings. It refers to protocols that are authorized by
the ISO and the OSI basic reference model.
The TCP/IP model was aimed to connect multiple networks together in a
seamless way even in case of breakdown of the subnet hardware. It
provides not only seamless communication, but also a flexible architecture
that should support applications with divergent requirements, ranging from
transferring files to real-time speech transmission.
Encoding is done for data inside computer as well as for communicating
data from one computer to another within a network.
Information exchanged between two computers is physically carried by
means of electrical signals assuming certain coding methods. These
coding can be characterized by changing voltage levels, current levels,
and frequency of transmission, phase changes or any combination of the
physical aspects of electrical activity.
9.16 Glossary
Switch: An electrical component used for connecting or breaking an
electrical circuit
Buffer: An area of memory used for temporary storage of data
Client: An application or system that accesses a service made available
by a server
Interface card: A circuit board installed in a computer for connecting it to
other computer(s) or devices
Operating system: Software consisting of programs and data that runs
on computers
Unit 9
9.18 Answers
Answers to Self-Assessment Questions
1. (a) Fully switched; (b) Switches
2. (a) False; (b) True
3. (a) Buffer; (b) Network card
4. (a) True; (b) False
5. (a) TCP/IP printer; (b) Interface card
6. (a) True; (b) False
7. (a) Media access control; (b) OSI
8. (a) True; (b) True
9. (a) TCP/IP model; (b) Encoding
10. (a) False; (b) False
11. (a) Modulation; (b) Frequency modulation
12. (a) False; (b) False
Unit 9
Unit 10
Communication Channels
Structure
10.1 Introduction
Objectives
10.2 Wire Cables
10.3 Microwave Transmission
10.4 Communication Satellites
10.5 Channel Sharing
10.6 Data Transmission
10.7 Summary
10.8 Glossary
10.9 Terminal Questions
10.10 Answers
10.11 Further Reading
10.1 Introduction
In the previous unit, you read about connecting PCs. In the present unit, you will
read about the various types of communication channels used to send and
receive data.
In telecommunications and computer networking, a communication
channel refers either to a physical transmission medium, such as a wire or to a
logical connection over a multiplexed medium, such as a radio channel. A channel
is used to convey an information signal from one or several senders or
transmitters to one or several receivers. Technically, in information theory, a
channel refers to a storage device which can be sent to (written) and received
from (read). Data transmission, digital transmission or digital communications
is the physical transfer of data over a point-to-point or point-to-multipoint
communication channel. Examples of such channels are copper wires, optical
fibers, wireless communication channels and storage media. The data is
represented as an electromagnetic signal, such as an electrical voltage,
radiowave, microwave or infrared signal. Data transmitted may be a digital
message originating from a data source or it may also be an analog signal.
Unit 10
Objectives
After studying this unit, you should be able to:
Describe the various types of wire cables
Define microwave transmission
Explain the significance of communication satellites
Interpret channel sharing
Describe data transmission system
Unit 10
and different worksites for LAN. The coaxial cable is basically made up of a
copper or aluminum wire covered with insulated coating of a stretchy material
carrying elevated dielectric constant and a conductive coat that covers the
entire part. The coating of insulation reduces intrusion and alteration. The
transmission range speed of a normal coaxial cable starts from 200 million to
more than 500 million bits/s.
The core factor that limits a twisted pair cable is the skin effect. The flow
of the current in the wires is likely to flow only on the wire's outer surface as the
frequency of the transmitted signal raises, thus, less of the available crosssection is used. The electrical resistance of the wires is increased for signals of
higher frequency which leads to higher attenuation. Further, significant signal
power is lost due to the effects of radiation at higher frequencies. Thus, another
kind of transmission medium can be used for applications that require higher
frequencies. Both these effects are minimized by the coaxial cable.
Coaxial cable as shown in Figure 10.1 is a robust shielded copper wire
two-conductor cable in which a solid center conductor runs concentrically
(coaxial) inside a solid outer circular conductor. This forms an electromagnetic
shield around the former that serves to greatly improve the signal strength and
integrity. The two conductors are separated by insulation. A layer of dielectric
(nonconductive) material, such as PVC (Permanent Virtual Circuit) material or
Teflon, protects the entire cable.
The coaxial cable comes under the category of a bounded media and is
still an effective medium to use in data communication. For better performance,
coaxial cable contains shields which make it costly. Cable television uses coaxial
cables. LANs functions over coaxial cable to the 10BASE5, 10BASE2 and
10BASET specifications.Generally, coaxial cable allows longer distance
transmission instead of twisted pair cable at a higher data rate. This is however,
costly.
Unit 10
Unit 10
can be modified through the on-off keying, that is contradictory to the use of
spark gap in the earlier radio methods.
Telephone
A telephone can be described as a telecommunications device which helps in
transmitting and receiving data that is usually in the form of sound waves. Being
the most widely used equipment in the modern society, it has become an
obligatory tool for every business enterprise and institution.
The basic principle behind the working of a telephone is to transform
sound waves to electrical signals and vice versa. After the signals pass through
a telephone network and get transformed into electronic and/or optical signals,
every other telephone operator can communicate with anyone with a network,
globally.
A common landline telephone system which is also known as POTS (Plain
Old Telephone Service), performs the basic function of sending and receiving
signals and audio information through the common telephone line that uses a
twisted pair of insulated wires. Besides performing its basic function, i.e., voice
communication, the telephone system, with the currently changing scenario,
has been modified for performing more complex and important purposes for
data communication like telex, fax and Internetworking.
Digital Telephony: The evolution of digital telephony from Public Switched
Telephone Network (PSTN) has not only improved the networks quality but
also its capacity. In the early 1960s, after the transmission networks were
upgraded with T1 (Terrestrial 1) carrier systems, the end-to-end analog telephone
networks were also modified. After this, methods like Synchronous Optical
NETwork (SONET) and fiber optic transmission, proved beneficial in the
advancement of digital transmission. Digital transmission provided cheaper price
and greater multiplexed channels with a single medium of transmission even
though analog carrier systems still existed. Nowadays, the analog signals are
transformed to digital signals even when the end instrument is still analog.
IP Telephony: A digital telephone service named Internet Protocol (IP) telephony
that is also termed as the Voice over Internet Protocol (VoIP) is a technology
having a different approach from the earlier one and is slowly overpowering the
traditional telephone network technology.
In IP telephony, for the purpose of transmitting encoded conversations in
the form of data packets, Internet connection and hardware IP Phones or
softphones established on personal systems are used. Besides overpowering
POTS, IP telephony service is also challenging the mobile phone services by
Sikkim Manipal University
Unit 10
Self-Assessment Questions
1. Fill in the blanks with the appropriate words:
(a) The method of sending ______________ from one point to another
through a particular medium is termed as communication.
(b) The device used for sending and receiving messages across great
distances is known as ___________________.
2. State whether true or false:
(a) Fiber optic provides high bandwidth and is basically made up of a
single or more thin filaments of glass fiber covered in a shielding
coat.
(b) A telephone is a telecommunications device which helps in
transmitting and receiving data that is not in the form of sound waves.
Unit 10
range and the wavelength in the millimeter range. This very short wavelength
gives rise to the term microwave. Such high frequency signals are especially
susceptible to attenuation and therefore must be amplified or repeated after a
particular distance.
In order to maximize the strength of such a high frequency signal and to
increase the distance of transmission at acceptable levels, the radio beams are
highly focused. The transmit antenna is centered in a concave, reflective metal
dish which serves to focus the radio beam with maximum effect on the receiving
antenna. The receiving antenna, similarly, is centered in a concave metal dish,
which serves to collect the maximum amount of incoming signal. It is a point-topoint, rather than a broadcast, transmission system. Additionally, each antenna
must be within line of sight of the next antenna.
Unit 10
Unit 10
Activity 2
Collect information from the Internet on the features and architectural
structure of various types of communication satellites. Prepare a chart from
collected data and also list the types in chronological order.
Unit 10
Self-Assessment Questions
3. Fill in the blanks with the appropriate words:
(a) Microwave transmission transmits the information with the help of
radio waves whose wavelengths are measured in small numbers of
centimeters called _________________.
(b) Contemporary satellite communications systems involve a
_____________ relay station that is launched into a geostationary,
geosynchronous or geostatic orbit.
4. State whether true or false:
(a) Downlink frequency is the frequency used to transmit signal from
earth station to satellite.
(b) Code Division Multiplexing (CDM) methods can help in transferring
the digital bit streams through an analog channel.
Unit 10
Transmitted
signal
Transmitter
Transmission
medium
Received
signal
Output
data
Receiver
Unit 10
Sender
Message
Channel
Signal
Receiver
Signal
Destination
Message
Noise
The brain
Message
Sender
Channel
Receiver
Destination
The brain
Unit 10
machines connected with each other by physical wires or radio links. The
machines may be transmitter, telephone, computer, etc.
In data communication system, data is transmitted from terminals to the
information processing unit through data communication circuits. There are two
types of data transmission methods that are used to transmit data from its origin
to the information processing. These are:
Offline: Computers are not connected by communication circuits. Data
is transmitted between a terminal and an information processing unit
through a magnetic tape and magnetic disk packs.
Online: Computers are connected by communication circuits. Data can
be instantly transmitted between a terminal and an information processing
unit.
Components of Data Communication System
The data communication system consists of the following:
Transmitter or Sender of Data: These may be terminals, computers
and mainframes, etc.
Medium: The medium through which the data is transmitted, can be
cables, Radio Frequency (RF) wave, microwave, fiber optics, infrared,
etc.
Receiver: As the name implies, it is the device which receives the data
transmitted. These are printers, terminals, mainframes, computers, cell
phone, etc.
The transmitter may be a device which transmits signal in such a format
that is not compatible with the medium. Similarly, medium provides signal in
unacceptable format to receiver. Hence, the signal from transmitter to medium
and medium to transmitter require conversion of signal from one form to another
as per the requirement.
Unit 10
An analog voice and video can be converted into digital and digital data
can be converted to analog. Each format has its own advantages.
Unit 10
communication over analog. Figure 10.7 shows the integrated role of digital
and analog communication to complete data communication system.
As these two signals are different in nature, how can these be connected
together or communicated over the communication channel? This question can
be understood by communication channels, which provide the link for data
communications. Figure 10.7 shows that the link between modems is modulated
analog signal created by the modem. Likewise, we may consider Figure 10.8
where a data communication system is presented in a wider sense. The
communication from PC to modem consists of a binary signal whereas the
communication between Central Telephone Office (CTO) and modem takes
place in modulated analog signal. The communication between one CTO to
another CTO is by digital signal using time division multiplexers, which are
codecs. Thereafter, CTO feeds modulated analog signal to modem and the
modem converts it into binary signal for the PC. Different types of signals emerge
on the communication link and reach to CTO on their way across a big city.
These can be multiplexed to share the same communication link for transmitting
to destination.
binary
signal
PC
analog
signal
MODEM
digital
signal
analog
signal
TDM
TDM
CTO
CTO
binary
signal
MODEM
PC
Unit 10
Two key issues occur in parallel transfer. The wire itself is the first issue.
Minimum of nine wires (eight for data bits, one for circuit ground) are required.
Many a times extra wires are needed to control the flow of data across the
interface. The other issue is with the nature of the bits or voltages itself. When
there is change in the state of the bit/voltage from a one to zero or vice versa, it
happens at the rate of nanoseconds (one billionth of a second). A crucial part of
the data transfer is the abruptness. The changes that occur slowly, i.e., between
zero and one are not accepted as data.
Serial Transmission
Data is sent over a single wire as shown in Figure 10.10. Therefore, sending
one byte does not require 8 wires. These are sent one after the other. In this
transmission, it is necessary to detect where each bit is separated from the next
and also where each block is separated from the next. Serial transmission is
suitable for long distance data transmission because it is less costly and more
resistant to noise. Therefore, almost all transmission lines for data communication
systems are serial transmission lines.
Transmitting eight individual bits one after the other involves eight times
more than the time required for transmitting them all at the same time parallely.
This speed limit does not prove to be significant for several applications.
Sikkim Manipal University
Unit 10
Activity 3
Visit http://en.wikipedia.org/wiki/Claude_Shannon and prepare a report on
the notable works done by Claude Elwood Shannon.
Self-Assessment Questions
5. Fill in the blanks with the appropriate words:
(a) Data ___________________ is the exchange of data between a
source and a receiver.
(b) In data communication system, data is transmitted f rom
__________________ to the information processing unit through
data communication circuits.
6. State whether true or false:
(a) In any form of communication, the message is not affected by the
signal as it moves across from the sender to the receiver in the
channel.
Sikkim Manipal University
Unit 10
(b) Serial transmission is suitable for long distance data transmission because
it is less costly and more resistant to noise.
10.7 Summary
Let us recapitulate the important concepts discussed in this unit:
The method of sending signals from one point to another through a
particular medium is termed as communication. The medium of
communication usually depends upon the computer networking or local
area networking that is been worked upon.
Baseband transmits a single signal at a time at very high speed. It is used
for local area networks.
Broadband transmits many simultaneous signals using different
frequencies.
The device used for sending and receiving messages across great
distances is known as telegraph. The process of sending these messages
is known as telegraphy.
A telephone is a telecommunications device which helps in transmitting
and receiving data that is usually in the form of sound waves.
Microwave transmission refers to the technology of transmitting information
with the help of radio waves whose wavelengths are conveniently
measured in small numbers of centimeters called microwaves.
The geostationary satellites are positioned approximately 2 apart in order
to minimize interference from adjacent satellites using overlapping
frequencies.
Uplink frequency is the frequency used to transmit signal from earth station
to satellite.
Downlink frequency is the frequency used to transmit the signal from
satellite to earth station.
A communication channel is shared by the way of multiplexing, i.e., putting
several information on the same channel.
In telecommunications and computer networks, the technique for
combining either digital data streams or multiple analog message signals
into a single signal through a shared medium is termed as multiplexing or
muxing.
Unit 10
10.8 Glossary
Communication: It is the method of sending signals from one point to
another through a particular medium
Baseband: It transmits a single signal at a time at very high speed
Broadband: It can transmit many simultaneous signals using different
frequencies
Telegraph: It is the device used for sending and receiving messages
across great distances
Uplink frequency: It is the frequency used to transmit signal from earth
station to satellite
Downlink frequency: It is the frequency used to transmit the signal from
satellite to earth station
Unit 10
10.10 Answers
Answers to Self-Assessment Questions
1. (a) Signals; (b) Telegraph
2. (a) True; (b) False
3. (a) Microwaves; (b) Satellite
4. (a) False; (b) True
5. (a) Transmission; (b) Terminals
6. (a) False; (b) True
Unit 10
Unit 11
The Internet
Structure
11.1 Introduction
Objectives
11.2 The Internet Basics
11.3 The Internet Browsers
11.4 Modem
11.5 The ISP
11.6 Search Engines
11.7 Security
11.8 Digital Signatures
11.9 E-Mail
11.10 IPv6
11.11 HTTP
11.12 Summary
11.13 Glossary
11.14 Terminal Questions
11.15 Answers
11.16 Further Reading
11.1 Introduction
In the previous unit, you read about various communication channels. In this
unit, you will read about the Internet and its facilities.
The Internet is a global system of interconnected computer networks that
use the standard Internet Protocol suite to serve billions of users worldwide. It is
a network of networks that consists of millions of private, public, academic,
business and government networks, of local to global scope that are linked by
a broad array of electronic, wireless and optical networking technologies. The
Internet powerfully leverages users ability to find, manage and share information.
This can be done through various techniques such as modem, search engines,
e-mail, etc. The Internet Protocol version 6 (IPv6) is the current version of the
Internet Protocol.
Unit 11
Objectives
After studying this unit, you should be able to:
State basics of the Internet
Interpret the Internet browsers
Compare the different ways to connect to the Internet
Explain the Internet service provider
Discuss different search engines
Describe the use of security in networks
State the characteristics of digital signature
Compose e-mail
Classify the significant features of IPv6
Explain HTTP with context to network
Unit 11
Unit 11
Unit 11
Users
Computer
Modem
Modem
Internet Backbone
For dial up connections, regular telephone lines are used. Therefore, the
quality of connection is not always good.
Permanent Dedicated Connection: You can also have a dedicated
Internet connection that typically connects you to ISP through a dedicated
phone line. A dedicated Internet connection is a permanent telephone
connection between two points. Computer networks that are physically
separated are often connected using leased or dedicated lines. These
lines are preferred because these are always open for communication
traffic unlike the regular telephone lines that require a dialling sequence
to be activated. Often this line is an ISDN (Integrated Services Digital
Network) line that allows transmission of data, voice, video and graphics
at very high speeds. ISDN applications have revolutionized the way
business communicates. ISDN lines support upward scalability, which
means that you can transparently add more lines to get faster speeds
going up to 1.28 Mbps (Million bits per second).
Unit 11
T1 and T3 are the other two types of commonly used dedicated line types
for the Internet connections. Dedicated lines are becoming popular
because of their faster data transfer rates. Dedicated lines are costeffective for the business that uses Internet services extensively.
Internet Protocols
Internet protocols are required to transfer data over networks and/or the Internet
in an efficient manner. When various computers are connected through a
computer network, it becomes necessary to use a protocol to efficiently use
network bandwidth and avoid collisions.
A network protocol defines a language that contains rules and conventions
for reliable communication between different devices over the network. For
example, it includes rules that specify how to package data into messages, how
to acknowledge a message and how to compress data.
There are a number of Internet protocols used. The most commonly used
protocols are:
Transmission Control Protocol/Internet Protocol (TCP/IP)
HyperText Transfer Protocol (HTTP)
File Transfer Protocol (FTP)
Telnet
Transmission Control Protocol/Internet Protocol (TCP/IP)
It is a protocol suite used to transfer data over the Internet. Two main protocols
in this protocol suite are:
TCP: It forms the higher layer of TCP/IP and divides a message or a file
into smaller packets which are transmitted over the Internet. A TCP layer
on the other side receives these packets and reassembles the data packets
into the original message.
IP: It is the lower layer whose function is to handle the address part of
each packet to enable it to be delivered to the right destination. Usually,
this address is checked by each gateway computer on the network so
that it is identified where to forward the message. This implies that all the
packets of a message are delivered to the destination regardless of the
route used for delivering the packets.
The working of TCP/IP can be compared with shifting your residence to a
new location. This activity would involve packing your belongings in smaller
boxes for easy transportation, with the new address and a number written on
Sikkim Manipal University
Unit 11
each of the boxes. You would then load them on multiple vehicles. These vehicles
may take different routes to reach the same destination. The delivery time of
vehicles depends on the amount of traffic and the length of the route. Once the
boxes are delivered to the destination, you would check these to make sure
that all have been delivered in good shape. After that, you need to unpack the
boxes and reassemble your house.
HyperText Transfer Protocol (HTTP)
HTTP is a protocol for transferring files (text, image, sound, video and other
multimedia files) using the Internet. It is an application protocol that runs on top
of the TCP/IP protocol suite, which is the foundation protocol of the Internet. It
defines how messages are formatted and transmitted and what actions Web
servers and Web browsers should take in response to the commands issued.
HTTP is based on the client/server architecture where your Web browser acts
as an HTTP client making requests to the Web server machines. In addition to
the Web pages, a server machine contains an HTTP daemon that handles the
Web page requests. Typically, when a user types a URL (Uniform Resource
Locator) or clicks on a hypertext link, the browser builds an HTTP request and
sends it to the IP address indicated in the URL. The HTTP daemon on the
destination server then receives this request and responds by sending back the
requested Web page (refer Figure 11.2).
www.yahoo.com
Request
Response
HTTP Client
Server
Unit 11
FTP Client
FTP Server
Unit 11
What it represents
Commercial organization
Non-profit organization
Educational institution
Networking organizations
Government agencies
Unit 11
www.tscpl.com 185.0.0.12
www.eg.com 195.102.230.2
195.102.230.2
DNS
185.0.0.12
www.tscpl.com
Unit 11
Typically, the first part of a URL indicates the protocol to be used, while
the second part specifies the domain name or IP address where the resource is
located. Some examples of URLs are shown below:
URL
http://mysite.com/index.html
Description
Fetch a Web page (index.html) using the HTTP
Protocol
Web Browser
A Web browser, commonly known as browser, is a computer application that
creates requests for HTML pages or Web pages and displays the processed
HTML page. Web browsers use the HTTP to request for information from Web
servers. The two most commonly used Web browsers are:
Mozilla Firefox
Microsoft Internet Explorer
Other examples of Web browsers include Opera, Mosaic, Cello and Lynx.
Having knowledge of the basic features of the browsers will be helpful to
you in using them easily.
Toolbar of the Internet Explorer
The toolbar consists of various icons that can be used to execute functions. In
fact, most of the options available through the menu bar are also available
through the icons in the toolbar. Some commonly used icons are:
Back: The back button allows you to navigate to the Web page you viewed
last.
Forward: The forward button on the toolbar navigates to the next Web
page that was accessed previously. To view a list of the last few Web
pages visited, you can click the down arrow button beside the Back and
Forward buttons.
Stop: The stop button can be used to terminate the current Web page
request. This is usually used when you type the wrong URL by mistake
Unit 11
and you want to stop the request for the Web page or if the Web page
takes too long to download.
Refresh: The Refresh or the Reload button is used to load the current
Web page again.
In other words, it refreshes the contents of the current page by fetching a
new copy of it.
Search: The Search button allows you to find information on the Web.
You can find information by clicking on the Search button on the toolbar.
This will activate the search text box as shown. You can then type in a
word or phrase and click the search button to start the search.
History: The History button is used to view the list of all the Web pages
visited in the last few days, hours or minutes. To revisit any one of them,
simply click on the address.
Print: The Print button is used to print the contents of the current Web
page.
Net Surfing
Net surfing, Internet browsing or exploring a network on the World Wide Web is
associated with visiting different Websites on the Internet. It is typically finding
places of interest on the click of a mouse. It is analogous to surfing TV channels
with a remote control.
Searching
Searching is one of the most common uses of the Internet. You can search for
any topic or information on the Internet. This is possible by using Websites that
provide a search engine.
Unit 11
Websites. Web browsers such as the Internet Explorer and Mozilla Firefox are
used to access information from Websites. Some Web browsers are:
Mozilla Firefox
Microsoft Internet Explorer
Netscape
Opera
Apple Safari
In the usual Web surfing, the client communicates with the Web server
directly. The direct communication with the Web server exposes the information
about the Websites the user has visited. The proxy server hides the details of
the Websites the user has visited. This type of Web surfing is called anonymous
Web surfing.
Anonymous Web surfing is useful because, it protects the users privacy
on the Web. It allows a user to visit Websites without allowing anyone to gather
information about the sites the user visited. A user can hide the information
about the visited sites using proxy server. A proxy server is a server that is
located between a client application and a Web server. The proxy server provides
anonymity of the visited sites by hiding the visitors IP address. The proxy server
intercepts all the requests that are intended for the Web server to verify if it can
respond the requests on its own. If the proxy server can respond the request on
its own, it responds the request by sending the requested Web page. If the
proxy server cannot respond to the requests, it forwards the requests to the
Web server. The Web server, where the requested Web pages reside, receives
requests from the proxy server for the Web pages. (refer Figure 11.5).
Unit 11
Self-Assessment Questions
1. Fill in the blanks with the appropriate words:
(a) A network protocol defines a _______________________ that
contains rules and conventions for reliable communication between
different devices over the network.
(b) FTP is an _________________ protocol for exchanging files between
computers over the Internet.
2. State whether true or false:
(a) The Internet application that is currently drawing maximum attention
is the World Wide Web.
(b) Web browsers communicate with Web servers using File Transfer
Protocol.
Sikkim Manipal University
Unit 11
11.4 Modem
There are various ways to connect to the Internet. Some of the common options
are described here:
Dial Up Connections
Telephone lines were designed to transmit human voice and not electronic data
from computers. Modems were therefore invented to convert digital computer
signals into a form that allowed them to travel over phone lines by converting
digital signals to analog ones on one end, and converting them back to digital
signals at the receiving end.
If your computer does not has an internal modem, you can consider buying
an external one, as it is much easier to install and operate. For example, when
your modem freezes (not an unusual occurrence), you may need to turn it off
and on again to get it working properly. With an internal modem, that means
restarting your computera waste of time. With an external modem, it is as
easy as flipping a switch.
Until the end of 1995, the conventional wisdom was that 28.8 Kbps was
about the fastest speed you could squeeze out of a regular copper telephone
line. Today, data transmission for a dial up connection is typically 56 Kbps. The
key information here is to know which speed modem is supported by your ISP.
If your ISP supports only a 28.8 Kbps modem on its end of the line, you would
be able to connect to the Internet only at 28.8 Kbps, even if you had the fastest
modem in the world.
Digital Subscriber Line (DSL)
DSL is a high-speed technology that has recently gained popularity. It can carry
both data and voice over telephone lines. It is possible for a DSL line to stay
connected to the Internet; this means that you do not have to dial up every time
you wish to go online. Usually with DSL, data can be downloaded at rates that
can go up to 1.544 Mbps and data can be sent at 128 Kbps. Because DSL lines
carry both data and voice, a separate phone line does not have to be installed.
DSL services can be established using your existing lines, as long as the service
is offered in your locality and your system lies within the appropriate distance
from the central switching office of the telephone company.
DSL services require special modems and network cards to be installed
on your computer. The cost of equipment and the monthly service and DSL
installation charges may vary considerably; therefore, checking with the local
Unit 11
phone company and the ISP is recommended. It may be noted here that prices
are now declining due to the increasing competition.
Cable Modems
You can also connect to the Internet at high-speeds through cable TV. Since
their speeds go up to 36 Mbps, cable modems make it possible for data to be
downloaded in a matter of seconds, where they might take fifty times longer
with dial up connections. Since they work over TV cables, they do not tie up
telephone lines and also do not require you to specifically connect as in the
case of dial up connections.
RPGInfotech
Gateway
systems
CMC
Sifi
ERNET
India
Essel
VSNL
Jumpp
India
Astro
Primus
Siti Cable
India
Telecommunication Network
Network India
Reliance L&T Finanace
In2Cable
(India)
Reliance
RailTel
Corporation
GTL
Bharti Infotel
i2i Enterprise
Tata Power
Broadband
RailTel Corporation
World Phone
Escorts
Internet Services Communication
Spectra Net
Reach
Estel
Communication
As shown in the Figure 11.6, ISP provides Web, e-mail and VoIP, etc., as
main services. The ISP includes domain name registration and hosting, Internet
Unit 11
transmit, dial up or DSL access, lease-line and collocation. You can take your
domain name, secured Website and high-availability Web servers with this facility.
Suppose a firewall is implemented with two separate Ethernet interfaces. Figure
11.7 shows how two ISPs are connected with the Internet.
Internet
ISP 1 Gateway
Router
IP
206.124.146.254
ISP 2 Gateway
Router
IP
130.252.99.254
eth0
206.124.146.176
eth1
eth2 130.252.99.27
Local LAN
Google (http://www.google.com)
Unit 11
Yahoo (http://www.yahoo.com)
This will result in pages containing both the terms and will therefore be
more specific for your search. You should, therefore, choose your search terms
carefully.
To restrict a search further, include more terms in your search criteria.
You could also search using phrases, when you need the results to
contain the exact phrases. If this is desired, include the search phrase
in quotation marks as shown:
Five star hotels in Singapore
Unit 11
have any database to search but only provide services to route a single query
to multiple search engines.
Examples of meta search engines include MetaCrawler, Mamma, DogPile
and One Search.
Activity 2
Visit http://en.wikipedia.org/wiki/Web_search_engine and prepare a report
on the history and functioning of Web search engines.
Self-Assessment Questions
3. Fill in the blanks with the appropriate words:
(a) Data transmission for a __________________ connection is typically
56 Kbps.
(b) The Internet Service Provider (ISP) is a _________________ that
access the Internet services.
4. State whether true or false:
(a) Modems convert digital signals to analog ones on one end and then
convert them back to digital signals at the receiving end.
(b) The Ethernet eth2 connects to local LAN.
11.7 Security
The security of a system involves two parts: one, the task of authenticating a
subject (process or people) who attempts to access a secure entity, and two,
the task of determining if the subject is authorized to have access to each
specific secure entity. When a user logs on to a computer, the operating system
wants to determine who the user is. This process is called user authentication.
Sikkim Manipal University
Unit 11
Unit 11
Unit 11
Unit 11
User Name:
Password:
Click!
If the two requirements are not matched, users are not allowed to access
the system.
Unit 11
Checksum
The checksums provide a form of authentication where an invalid checksum is
not recognized. If the packet of checksum is one byte long, it will have the
maximum value of 255. If the sum of other bytes of the packet is 255 or less
than that the checksum contains exact value. But, if the sum of other bytes is
more than 255, the checksum is the remainder of total value (refer Table 11.3).
Table 11.3 Checksum Calculation
Byte
1
212
Byte
2
232
Byte
3
54
Byte
4
135
Byte
5
244
Byte
6
15
Byte
7
179
Byte
8
80
Total
1151
Checksum
127
In Table 11.3, 1151 is divided by 256 that returns remainder 4.496 (round
value is taken as 4). Then it is multiplied with 4 256 that equals to 1024. The
value 1024 is subtracted 1151 that returns 127. In this way, the total checksum
value is calculated.
Cyclic Redundancy Check (CRC)
The process of CRC is same as checksums. In this method, the polynomial
division determines the value of CRC, which can be equal in length to 16 or 32
bits. The one difference between CRC and checksum is that CRC is more
accurate. If a single bit is taken as incorrect the CRC value does not match.
11.9 E-mail
E-mail, short for electronic mail enables you to send your correspondence
instantaneously anywhere in the world via the Internet. E-mail has made the
world a small place.
The popularity of e-mail is because of its capability of sending and receiving
messages anytime, anywhere without any cost. E-mail allows you to send and
receive a variety of file types such as text, image, video, sound and graphics to
a single recipient or multiple recipients using broadcasting. To use the e-mail
feature, you just need to create an e-mail account for yourself using a Website
that offers such services. Various sites provide e-mail facility. Some of them
such as yahoo.com, rediff.com, hotmail.com and lycos.com provide it free
of cost while others charge for it.
Since by now you would be quite keen to use the e-mail facility, let us run
through creating and using an e-mail account on yahoo.com.
Unit 11
The page that is now displayed is the Sign in page. If you are an existing
user, you need to type in your user id and password to log on to your account.
If you are a first time user, you need to first create an account for yourself.
Existing
User
New User
Unit 11
User Id and
Password
User Id and
Password
Sign In
Unit 11
Once you have signed in successfully, you can access your e-mail account.
You can access your Inbox to view any incoming mail or to write a new mail.
Clicking the Inbox button displays all the received messages or mails.
You can read an e-mail by clicking the e-mail subject.
Clicking the e-mail subject displays the contents of your e-mail that can
be read to take necessary action.
Compose
Inbox
Sending an E-Mail
The Compose option on the left corner of your screen allows you to write an
e-mail message. You can also attach documents to your mail. When you select
the Compose option, the following screen appears:
Send
Attachments
Message Box
Unit 11
You can use the following options while composing or writing an e-mail
message.
To: Specif ies the e-mail address of a recipient such as
recipient@domain.com and user@abcdomain.com. This should be a
valid e-mail id for the delivery of your message. You can specify multiple
recipients addresses separated by commas.
Cc: Specifies the address of the recipient to whom you want to send
the carbon copy (Cc) of your message. You can specify multiple
recipients addresses separated by commas.
Subject: Refers to the subject of the e-mail message. It provides a
fair idea to the recipient about what the mail contains.
Message Box: Provides a text area for composing e-mail content.
E-Mail Attachments
Attachments can be sent and received with e-mails. These are files of different
type like text, sound, video, etc., attached with the e-mail.
Sending Attachments
To send an attachment, click on the Attachments button while composing a
mail. The following screenshot provides options to attach one or more file(s).
Attach Files
Browse
Clicking the Browse button against the box provided to enter the file
name opens a standard file selection dialog box. This lets you browse through
the files on your disk(s) and select the file you wish to attach. Once you select
the file to attach, click the Open button. You can repeat this process if you wish
to attach more file(s). Once you are done with selecting all the files, click the
Unit 11
Attach Files button and then return to your message to proceed with sending
the message with the attached file(s).
Opening Attachments
If you receive an e-mail message with an attachment(s), you could either
download or save the attached files to the disk to be viewed later or view them
online. To see an attachment, click the attached file(s).
Open
Attached file
Unit 11
Self-Assessment Questions
5. Fill in the blanks with the appropriate words:
(a) Authorization is that task after __________________ that ensures
whether the subject has the right to access a secure entity in the
system.
(b) E-mail, short for electronic mail enables you to send your
correspondence instantaneously anywhere in the world via the
____________________.
6. State whether true or false:
(a) Any computer system connected to the insecure Internet is not
vulnerable to attack.
(b) Message authentication protects digital signature because in that
messages are exchanged by the third-party.
11.10 IPv6
IPv6 offers the following significant features:
A considerably larger address space, which is said to be sufficient for at
least the next 30 years.
Globally unique and hierarchical addressing based on prefixes rather than
address classes to keep routing tables small and backbone routing
efficient.
A mechanism for the auto-configuration of network interfaces.
Support for encapsulation of itself and other protocols.
Class of service that distinguishes types of data.
Improved multicast routing support (in preference to broadcasting).
Built-in authentication and encryption.
Transition methods to migrate from IPv4.
Compatibility methods to coexist and communicate with IPv4.
IPv6 uses the term packet rather than datagram. The meaning is the
same but the formats are different.
Unit 11
IPv6 uses the term node for any system running it, that is, a host or a
router. An IPv6 host is a node that does not forward IPv6 packets that are not
explicitly addressed to it. A router is a node that forwards IP packets not addressed
to it.
Format of an IPv6 Datagram
Figure 11.8 illustrates the format of an IPv6 datagram.
Priority
4-bit priority field defines the priority of the packet with respect
to traffic congestion or other packets from the same source.
Flow Label
Payload length
Next header
Unit 11
Hop limit: This is similar to the IPv4 TTL field but it is now measured in hops
and not in seconds. It was changed for two reasons:
IP normally forwards datagrams faster than one hop per second and the
TTL field is always decremented on each hop; so, in practice, it is measured
in hops and not in seconds.
Many IP implementations do not expire outstanding datagrams on the
basis of elapsed time.
The packet is discarded after the hop limit is decremented to zero.
Flow Labels
IPv6 introduces the concept of a flow, which is a series of related packets from
a source to a destination that requires a particular type of handling by the
intervening routers, for example, real-time service.
A flow label is assigned to a flow by the flows source node. New flow
labels must be chosen (pseudo-) randomly and uniformly from the range 1 to
FFFFF hex. The purpose of the random allocation is to make any set of bits
within the Flow Label field suitable for using as a hash key by routers for looking
up the state associated with the flow.
All packets belonging to the same flow must be sent with the same source
address, destination address and flow label. The handling requirement for a
particular flow label is known as the state information; this is cached at the
router. When packets with a known flow label arrive at the router, the router can
efficiently decide how to route and forward the packets without having to examine
the rest of the header for each packet.
There can be multiple active flows between a source and a destination,
as well as traffic that is not associated with any flow. Each flow is distinctly
labelled by the 24-bit flow label field in the IPv6 packet. A flow is uniquely identified
by the combination of a source address and a non-zero flow label. Packets that
do not belong to a flow carry a flow label of zero.
11.11 HTTP
The engine of the World Wide Web is the application protocol that defines how
Web servers and clients exchange information through the HTTP. The first
version of HTTP, HTTP/0.9, was part of the early World Wide Web and was a
very simple request/response protocol with limited capabilities that could transfer
only text files. The first widely used version was HTTP/1.0, which is a more
complete protocol that allows the transport of many types of files and resources.
Sikkim Manipal University
Unit 11
Unit 11
Unit 11
The closer the cache is to the user, the greater the efficiency benefits and
the farther from the user, the greater the number of users that can benefit
from the cache.
One of the most important types of intermediary devices in HTTP is a
proxy server, which acts as a middleman between the client and server,
handling both requests and responses. A proxy server may either transport
messages unchanged or may modify them to implement certain features
and capabilities. Proxies are often used to increase the security and/or
performance of Web access.
HTTP is an inherently stateless protocol, because a server treats each
request from a client independently, forgetting about all prior requests.
This characteristic of HTTP is not an issue for most routine uses of the
World Wide Web, but is a problem for interactive applications such as
online shopping where the server needs to keep track of a users
information over time. To support these applications, most HTTP
implementations include an optional feature called state management.
When enabled, a server sends to a client a small amount of information
called a cookie, which is stored on the client machine. The data in the
cookie is returned to the server with each subsequent request, allowing
the server to update it and send it back to the client again. Cookies thus
enable a server to remember user data between requests. However, they
are controversial, because of certain potential privacy and security
concerns related to their use.
Self-Assessment Questions
7. Fill in the blanks with the appropriate words:
(a) IPv6 is a mechanism for the ___________________ of network
interfaces.
(b) HTTP is a ___________________ protocol because it does not keep
track of the connections.
8. State whether true or false:
(a) An IPv6 host is a node that does not forward IPv6 packets that are
not explicitly addressed to it.
(b) HTML is a tag language used to create hypertext documents.
Unit 11
11.12 Summary
Let us recapitulate the important concepts discussed in this unit:
The Internet is a network of networks that links computer systems around
the world. It allows communication across networks, i.e., communication
can take place between one network and another.
TCP/IP is a protocol suite used to transfer data over the Internet. Two
main protocols in this protocol suite are TCP and IP.
HTTP is a protocol for transferring files (text, image, sound, video and
other multimedia files) using the Internet. It is an application protocol that
runs on top of the TCP/IP protocol suite, which is the foundation protocol
of the Internet.
FTP is an application protocol for exchanging files between computers
over the Internet. It is the simplest and most commonly used protocol for
downloading /uploading a file from /to a server.
Telnet is a protocol that allows you to access a remote computer provided
you have been given the permission to do so. It is typically referred to as
remote login. Telnet is based on a different concept from HTTP and
FTP.
A Web browser, commonly known as browser, is a computer application
that creates requests for HTML pages or Web pages and displays the
processed HTML page. Web browsers use the HTTP to request for
information from Web servers.
The Internet Service Provider is a company that accesses the Internet
services. This service provider provides a software package in which you
get registration with the providing services.
A search engine is a software system that enables the users to search
information on the WWW using keywords. It is designed to help the Internet
users locate Internet resources such as Web pages, documents, programs
and images using a keyword search mechanism.
A virus is a program fragment that is attached to legitimate popular
programs like games or other utilities with the intention of infecting other
programs. A worm is also like virus, but it can automatically spread to
other computers through the Internet. A worm has two parts, the bootstrap
code and the worm code.
Unit 11
11.13 Glossary
Internet: A network of networks that links computer systems around the
world
Web: A collection of thousands of information locations connected with
each other
Web browser: A computer application that creates requests for HTML
pages or Web pages and displays the processed HTML page
ISP: A company that accesses the Internet services
Search engine: A software system that enables the users to search
information on the WWW using keywords
Unit 11
11.15 Answers
Answers to Self-Assessment Questions
1. (a) Language; (b) Application
2. (a) True; (b) False
3. (a) Dial up; (b) Company
4. (a) True; (b) True
5. (a) Authentication; (b) Internet
6. (a) False; (b) True
7. (a) Auto-configuration; (b) Stateless
8. (a) True; (b) True
Unit 11
Unit 12
Structure
12.1 Introduction
Objectives
12.2 Open System Interconnection
12.3 Layers of OSI
12.4 TCP/IP Reference Models and Internetworking
12.5 Major IP Services
12.6 TCP
12.7 Flow Control
12.8 Cryptography
12.9 Summary
12.10 Glossary
12.11 Terminal Questions
12.12 Answers
12.13 Further Reading
12.1 Introduction
In the previous unit, you read about the basics of the Internet, network security,
e-mailing as well as various search engines. In the present unit, you will read
about the OSI reference model and the layered protocols.
The OSI model defines the communications process into 7 Layers, which
divides the tasks involved with moving information between networked computers
into seven smaller, more manageable task groups. A task or group of tasks is
then assigned to each of the seven OSI layers. Each layer is reasonably selfcontained so that the tasks assigned to each layer can be implemented
independently. This enables the solutions offered by one layer to be updated
without adversely affecting the other layers. TCP/IP is the basic communication
language or protocol of the Internet. It can also be used as a communications
protocol in a private network. TCP/IP uses the client-server model of
communication in which a computer user (a client) requests and is provided a
service (such as sending a Web page) by another computer (a server) in the
network. The TCP/IP model does not exactly match the OSI model. While there
is no universal agreement about how to describe TCP/IP with a layered model,
it is generally viewed as being composed of fewer layers than the seven used in
the OSI model.
Unit 12
Unit 12
Discarded data
Unit 12
control, the receiving process must send a step sending signal to the sending
computer, if it is unable to cope up with the rate at which data is being transmitted
by the sending computer. Later, when data communication buffer is available,
the receiving computer sends resume sending signal.
Data Frame Format
For information exchange between computers, communication processes need
to have following for accomplishing these aspects of the exchange process:
The receiving computer must be capable of distinguishing between an
information carrying signal and mere noise.
There should be a detection mechanism to detect whether the information
carrying signal is intended for itself or some other computer on the network,
or a broadcast (a message that is intended for all computers on the
network).
The receiving end should be able to recognize the end of data train
intended for receiver before it engages itself to recover data from the
medium.
The receiving end after completion of receiving of information, must also
be capable of dealing with and recognizing the corruption, if any, introduced
in the information due to noise or electromagnetic interference.
To accommodate the above requirements, data is delivered in well-defined
packages called data frames as shown in Figure 12.3. This frame belongs to
the Ethernet packet format. The receiving end compares the contents of this
data frame. If the comparison is favourable, the contents of the Information
field are submitted for processing. Otherwise, the entire frame is discarded. It is
important to realize that the primary concern of the receiving process is the
reliable recovery of the information embedded in the frame.
Preamble
(P)
1010.10
SED
SA
DA
FCS
10101011
Routing
With the growth of network size, traffic also grows affecting the overall network
in performance and responses. To manage a situation like that, network
Sikkim Manipal University
Unit 12
C
Network
Network
Router
Unit 12
48 bits
Preamble Destination
Address
48 bits
Source
Address
16 bits
Frame Type
368-12000 bits
Data Frame
32 bits
Cyclic
Redundancy
Checks(CRC)
In this layer, the network is designed according to the content of data frame to
detect and correct data corruption in the network communication channel.
The network layer delivers units of data as individual packets. The network
designers design the protocols used for routing data.
The transport layer delivers data within a host computer. The source
transport layer carries a virtual conversation with the destination transport layer.
The network is designed on a hop-to-hop basis.
Table 12.2 Network Design of Peers Process among Discrete Layers
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
Unit 12
Table 12.2 shows the corresponding layers (in each host) indicating a virtual
conversation of different layers. Network designers often recommend a mesh
topology to meet the availability requirement because routers are connected to
single-link delay between two sites. This layer is responsible for getting data
from or sending data to each network that manages flow control on an end-toend basis.
A session layer network is designed to occasionally merge the session
and transport layers. Therefore, network designers design the hierarchical
topology for this layer.
The presentation layer handles printers, video displays and file formats.
So, hierarchical topology is a suitable network design for this layer.
The application layer deals with network-wide applications which include
electronic mail and distributed databases. Generally, API forms a session layer
upon an application layer. It provides file services, network printer services and
mail services. The network designs included in this layer are, Novells Netware,
Banyans VINES and Artisofts LANtastic.
Unit 12
layers of the model until data interchange is affected through the physical
connection.
The top layer is used by the transmitting device where data is placed into
a packet under a header.
The protocol data unit that consists of data and header, is handled by
each of the successive lower layers as data flows across the network to the
receiving node. Data flows through the layer model and each of the successive
higher layer strip off the header information.
Another alternative standards approach was being led by the CCITT
(Consultative Committee on International Telephony and Telegraphy) and the
ISO parallely to the development of TCP/IP by DARPA. The CCITT has now
become the ITU-T (International Telecommunications Union-Telecommunication
Standardization Sector).
The outcome of this joint attempt was the creation of the OSI (Open
Systems Interconnect) reference model (ISO 7498). This outlines a seven-layer
model of data communication with the bottom layer comprising physical and
transport layers and the application protocols forming the upper layers. Each
layer of the model is responsible for specific functions. The operation of a
network protocol stack is understood on the basis of this model (refer Figure
12.5). It is also used as a reference tool to compare network stack.
APPLICATION
APPLICATION
PRESENTATION
PRESENTATION
SESSION
SESSION
TRANSPORT
TRANSPORT
NETWORK
NETWORK
DATA
DATA
NETWORK
NETWORK
Each layer provides some of the functions to the layer above it in return
for the functions provided by the layer below it. In this fashion, messages are
transmitted vertically through the stack from one layer to the other. Logically,
each layer communicates directly with its peer layer on the other nodes.
Sikkim Manipal University
Unit 12
Activity 1
Prepare a report on the origin of Open Systems Interconnection (OSI) model.
Self-Assessment Questions
1. Fill in the blanks with the appropriate words:
(a) ___________ model divides the required functions of the network
architecture into seven layers and defines the function of each layer.
(b) ___________ involves breaking the communication process into
different categories and dealing with them according to the steps to
which they belong.
2. State whether true or false:
(a) Information exchanged between two computers is physically carried
by means of electrical signals assuming certain coding methods.
(b) The network layer delivers units of data as multiple packets.
Unit 12
is responsible for the reliable transfer of data across the physical link. Its
responsibilities include functions, such as data flow control, data frame formatting,
error detection and link management.
The Network Layer (Layer 3)
The network layer sets up appropriate paths between various nodes and to do
this it uses a software that handles PDUs to transport them to the final destination.
The Internet Protocol (IP) operates at this layer. It is mainly responsible for
providing routing services across the Internet. It also shields the above layers
from details about the underlying network (the network topology and road map)
and the routing technology that might have been deployed to connect different
networks together. In addition to routing, this layer is responsible for establishing
and maintaining the connection.
The next three layers are task oriented and have to do with the operations
performed by the user rather than with the network.
The Transport Layer (Layer 4)
This layer guarantees the orderly and reliable delivery of data between end
systems. Data is received from session control layer and transported to network
control layer. The two protocols used here include transmission control protocol
or TCP and OSI transport protocol or TP's five levels. The transport layer also
performs additional functions such as data multiplexing and de-multiplexing.
This layer divides up a transmitting message into packets and reassembles
them at the receiving end.
The Session Layer (Layer 5)
The session layer is responsible for establishing, maintaining and arbitrating
the dialogues between communicating applications. It is also responsible for
the orderly recovery from failures by implementing appropriate check pointing
mechanisms.
The Presentation Layer (Layer 6)
Formatting and displaying of data, received by terminals and printers are
functions performed by the presentation layer. It is concerned with differences
in the data syntax used by communicating applications. This layer is responsible
for remedying those differences by resorting to mechanisms that transform the
local syntax (specific to the platform in question) to a common one for the purpose
of data exchange. For example, it performs conversion between ASCII and
EBCDIC character codes, does data compression and encrypts data if necessary.
Unit 12
Self-Assessment Questions
3. Fill in the blanks with the appropriate words:
(a) The ____________layer describes the physical media over which
the bit stream is to be transmitted.
(b) Formatting and displaying of data, received by terminals and printers
are functions performed by the _______________layer.
4. State whether true or false:
(a) The network layer sets up appropriate paths between various nodes
and to do this it uses a hardware that handles PDUs to transport
them to the final destination.
(b) The application layer allows the user to use the network.
Unit 12
Unit 12
Serial Port: These types of ports transfer data serially one bit at a time.
They need that type of wire which transmits 8 bits of data and comes in
25-pin male connector. They are also known as communication ports or
RS232C ports. They are used to connect mouse and modems.
Parallel Port: These ports send and receive one byte/8-bit data at a time.
They need a specialized wire which transmits parallel 8 bits of data at a
time and that which has a 25-pin female connector. They are used to
connect the printer, scanner, joystick, digital camera, speakers, telephones,
CD (Compact Disk), zip drive and tape backup drive.
AGP Port: This type of port is used to connect graphics card to system
unit. This card facilitates high-speed video performance for game and
multimedia applications.
Sockets
Sockets are built-in interfaces on motherboards. They connect two network
applications. They are used on different computers for inter-process
communication and are bidirectional, that is, they send and receive data. When
protocols change, computer sockets are renamed to keep pace with newer
protocols.
Types of Sockets
The types of sockets are as follows:
Datagram Sockets
Stream Sockets
Raw Sockets
Datagram Sockets are used for connectionless issues. They do not make any
distinction between servers and clients. They use IP for routing. They run with
datagram objects.
Stream Sockets are implemented for system area networks. They are twoway connected communication streams. If we send input as 2, 3, it arrives in
stream sockets at the opposite end in the same order as 3, 2 free of error.
These sockets are used in Telnet applications and the Web browser uses HTTP
along with stream sockets to get Web pages and uses TCP.
Raw Sockets take packets and bypass TCP/IP, and send them to the requested
applications. It passes through transport layer. These sockets lie in routers and
other network equipments. Examples of raw sockets are ICMP (Internet Control
Unit 12
Each XXX is a number between 0 and 255 stored in 8 bits and can have
2 (2 raise to the power 8) values. Some of the examples are 127.0.0.1 and
192.168.0.1. The 127.0.0.1 IP address is the default IP address which is assigned
to any system and not connected to any network. This is called local host address.
Each version of IP address is 32 bit long. The computer converts this decimal
dotted notation into binary form. The 32 bits are considered as entity. The entity
contains two components as Network Identifier and Host Identifier.
8
Network Identifier
It starts from the left-most bit which is used to identify the network. This process
is called network prefix. The four numbers in an IP address are called octets
Unit 12
The Figure 12.7 shows class A, class B and class C network bits and host
bits arrangement.
IP addresses are associated with the network layer network interfaces
because it examines the IP address information from an interface of IP address.
The network layer is used for IP address because it obtains a distinct address
for a given hardware address too.
Unit 12
The right hand side shows the Host ID and the left-hand side shows
Network ID.
Features of IP Address
It provides a unique address over a network. We cannot get the same IP
address for two system units. In case an IP address is set as same for
two systems, an IP conflict process takes place wherein the data packets
do not know the destination place.
An IP address contains a default network whose address is 0.0.0.0 which
is used to the default network.
An IP address provides a loopback address except for class A, class B
class C, class D and class E. The IP address 127.0.0.1 is called loopback
address which helps the host computer to send a message back to itself.
It is frequently used for troubleshooting and network testing.
IP performs the task of routing data packets over a network and provides
IP address which specifies the locations of source and destination nodes
in the network topology of a routing system.
Unit 12
Figure 12.9 shows how IP is related to OSI Layer 3 (Network Layer) to the
functional and procedural means of transferring variable length data sequences
from a source to the destination via one or more different networks. It maintains
the quality of service and error control messages. IP is connected with OSI
Layer 2 (data link layer) with frames which are switched with MAC address and
OSI Layer 4 (transport layer) with end-to-end and host-to-host transport switches
router packets. IP at Layer 3 acts as a mediator between these two adjacent
layers.
IP allows a bitwise logical AND operation between destination of the IP
address and the netmask. First it compares the result to the network destination.
If the two match, IP marks the route of one which has the maximum bits in the
netmask and matches the destination IP address. If multiple matching routes
are found, IP uses the route with the lowest metric.
The major features of IP are as follows:
IP delivers the data packets to the desired destination with no
guarantees.
IP is defined in RFC 791.
It contains 32 bit destination address.
It is tied up with TCP for reliability of data packet.
It runs on data link interfaces including Ethernet and Wi-Fi.
It handles each datagram independently so that each datagram follows
a different route to the destination.
It does not change the packet during transmission unless source
routing, Network Address Translation (NAT) and Firewall software is
used.
Sikkim Manipal University
Unit 12
16
Version
IHL
Type of service
Identification
Time to live
31
Total length
Flags
Protocol
Fragment offset
Header checksum
Source address
Destination address
Options/padding
Unit 12
Functions
Version
IHL (Internet Header Length)
Type of Service
Total Length
Flags
Time to Live
Protocol
Header Checksum
Source Address
Destination Address
Options/Padding
12.4.4 IP Datagram
The term IP datagram is used to describe a client of IP data. Each IP datagram
contains a specific set of fields in a specific order so that the user knows how to
decode and read the stream of data received.
Data Encapsulation
Data encapsulation means adding the IP header to the data. As shown in Figure
12.11, the IP header consists of five or six 32-bit words; the sixth word is attributed
to the IP options field.
Internet Header Length (IHL): IP determines the length of the header
by the contents of the IHL.
The Version field: It refers to the version of the IP protocol in use. The
current version of IP is 4.
The Service type field: It refers to any of the type of services that IP
supports. The desired service type is normally specified by user-level
applications. Examples of service type include minimum and maximum
throughput, requested by applications such as the File Transfer Protocol (FTP)
and Simple Mail Transfer Protocol (SMTP).
The Total length field: If it is subtracted from the IHL field, it indicates to
IP the actual length of the data field.
The Identification and the Fragment fields: These provide the
necessary elements on which IPs capability to fragment and reassemble data
depends.
Sikkim Manipal University
Unit 12
Version
16
31
Service type
IHL
Identification
Time-to-line
Total length
Flags
Protocol
Fragment offset
Header checksum
Source IP address
Destination IP address
IP optios
Padding
Data
Unit 12
16
31
Source port
Length
Destination port
UDP checksum
Data
4
Version
16
Identification
Time-to-live
31
Total length
Flags
Protocol
Header checksum
Source IP address
Destination IP address
IP options
Data
Padding
UDP Datagram
Source Destination
port
port
Length
Application data
Unit 12
Self-Assessment Questions
5. Fill in the blanks with the appropriate words:
(a) The reason for TCP/IPs popularity is the public availability of its
protocols_____________.
(b) A ____________ is an access channel for computers to exchange
information.
6. State whether true or false:
(a) TCP/IP is employed is employed for UNIX and the Internet.
(b) Data encapsulation means removing the IP header from the data.
Unit 12
Unit 12
Figure 12.14 shows how the offset pointer points to the IP address in the
remaining data section. The packet traverses the network which is rewritten by
offset pointer.
Self-Assessment Questions
7. Fill in the blanks with the appropriate words:
(a) The ____________is an error reporting protocol that is an integral
part of the IP protocol.
(b) IP source routing is a ___________-bit IP address and pointer which
points to the list for the next use.
8. State whether true or false:
(a) When a host creates a datagram destined for a network, the host
sends the datagram to a router, which forwards the datagram to its
destination.
(b) A network manager decides to find the link connection such as
satellite connection and avoids congested routes.
Sikkim Manipal University
Unit 12
12.6 TCP
TCP standard is defined in Request For Comment (RFC). Its document number
is 793 which is given by Internet Engineering Task Force (IETF). The original
specification was written in 1981 and experimented by Advanced Research
Projects Agency NETwork (ARPANET) for guaranteed delivery. Its sliding window
protocol facilitates handling for timeouts and retransmission.
Structure of TCP
TCP connects two endpoints by full duplex virtual connection. Each endpoint
contains an IP address and a TCP port number. The byte stream is moved in
segments. The number of bytes of data sent prior to acknowledgement of the
receiver is determined by the window size. TCP includes Post-it-Note process
in its header which has two steps:
Step I
When application requests to send data for remote location, TCP arranges the
initial segment to set up the socket interface between two systems. No data is
sent until and unless TCP gets a message from the receiving system that a
socket is placed for receiving data.
Step II
Once the sockets are ready, TCP starts sending data within segments. It then
asks TCP to acknowledge the arrived data segments. TCP retransmits the
segments if acknowledgement is not received.
TCP Header
TCP header is required for every TCP segment. The header segment is same
for the TCP segment. There are six flag bits in the header namely URG, ACK,
PSH, RST, SYN and FIN. TCP header consists of eleven fields.
0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
Source Port
Destination Port
Sequence Number
Acknowledgment Number
Data
Offset
reserve
ECN
d
Control Bits
Checksum
Window
Urgent Pointer
Unit 12
Figure 12.15 shows the eleven fields which are in the TCP header. The
source port and destination port contain 16 bits. The sequence number tells
the position of the sequence of the segments first data byte. The
acknowledgement number tells the value of the next sequence number. Data
offset contains 4 bits and indicates the beginning of data section. Reserved
contains 6 bits which is reserved for future use.
TCP Switching
TCP switching is a network architecture which creates a circuit for TCP
connection. It directly controls the creation/destruction of the circuits. It is
optimized to 90 per cent of network traffic. TCP switching is done to increase
bandwidth efficiency and robustness because sometimes network connections
should change the routing table to recover from its failure.
IP Routers
TCP Switches
Circuit Switched Links
Packet Switched Links
Unit 12
Figure 12.17 shows how a TCP protocol works in different layers. It works in
four layers with reference to the TCP model. They are as follows:
Application Layer: In this layer, TCP provides network services such as
http, ftp and telnet.
Transport Layer: In this layer, TCP manages transferring data using
connection oriented (TCP itself) and connectionless (UDP) transport
protocols and also makes connection between networked applications.
The Internet Layers: TCP addresses data packets and delivers packets
over network. It manages fragment packets.
Network Interface Layer: TCP delivers data via physical links and
provides error detection and packet framing.
The main characteristics of TCP protocol are as follows:
TCP enables data flow for monitoring.
It avoids network saturation.
It makes data to contain variable length segment which returns to the IP
protocol.
It makes data multiplex where information coming from distinct sources
can be circulated.
It enables successful communication between the client and server.
Sikkim Manipal University
Unit 12
Figure 12.18 shows how segments are passed down to the network layer.
When TCP sends data from one end, it is known as send buffer and when it
receives a segment which is placed in TCP connections it is known as receive
buffer.
TCP Three-Way Handshake
TCP uses a three-way handshake connection to send and receive data between
hosts based on three phases (refer Figure 12.19). They are connection
establishment, data transf er and connection termination. Telnet
(Telecommunication network), FTP, HTTP (Web request), POP3 (Post Office
Protocol), SMTP for e-mails, SSH (Secure SHell) uses three-way handshake
protocol when connection takes place. These days, TCP rides on top of IP
which is called TCP/IP (TCP over IP) in which IP facilitates addressing and
routing but TCP handles the actual communication between hosts.
The steps that make the three-way handshake connections over TCPare
as follows:
Step I
Unit 12
Step II :
Step III :
Step IV :
Step V :
Step VI :
Step VII :
SSL is intended to utilize TCP to provide end-to-end security services which are
secure and reliable since World Wide Web is a client-sever application running
over the network and TCP/IP intranets. Therefore, SSL contains a record protocol
which provides confidentiality and message integrity.
Confidentiality is the handshake protocol where three-way handshake
protocol is used in reference to TCP. A shared secret key is used for conventional
encryption of SSL payloads. Message integrity defines a shared secret key
which is also the handshake protocol. This forms a MAC. They transmit the
fragment of data into manageable blocks. MAC encrypts and a TCP header
format is added, and the resulting unit is transmitted in a TCP segment.
Sikkim Manipal University
Unit 12
Figure 12.20 shows how proxy server handles requests to standard TCP
communication with protected SSL security services. It further protects the lack
of authentication of IP packets with TCP.
Unit 12
Unit 12
its protocols also engage in peer talk by encapsulating data with protocol headers
before submitting it to the underlying layer for subsequent delivery to the network.
A header is added to the data at each layer before being sent to the
receiving node. The same header is removed at the receiving end in the reverse
order as shown in Figure 12.21. As shown in Figure 12.22, when a node wishes
to transmit a data, the application layer of TCP/IP architecture adds a header as
TCP header which is again complemented by IP header and Ethernet header in
the lower layers.
Ethernet frame
EH
IH
TH
Data
TCP header
Source
Port No.
Destination
Port No.
IP header
Source IP
Address
Destination
IP address
Ethernet header
Destination
MAC address
Source MAC
Address
Unit 12
At the transport layer, the header includes destination and source port
numbers. For example, port number 25 identifies a SMTP session, whereas
port number 80 refers to HTTP session. Therefore, upon receiving data from
the Internet layer, the transport layer fetches its own header for the destination
port number to identify the application that it is supposed to deliver the data to.
This mechanism helps the transport layer establish connections on behalf of
multiple applications without confusing the data exchange process. The protocol
data unit thus formed at this layer is normally referred to as a data segment.
At the Internet layer, the header contains information to identify the IP
addresses of the ultimate communicating hosts and intervening routers.
At the network access layer, the header includes the MAC addresses of
the source and destination devices communicating on the same physical network.
A frame check sequence is also included to assist the network access layer in
checking the integrity of the received data. The protocol data unit thus formed
at this layer is normally referred to as a data frame.
lan0
RDP
Client
Host A
RDP
Client
Host B
Unit 12
interface is configured as limited broadcast address 255. 255. 255. 255. If the
whole process takes place then the net or subnet address is included in the
advertisement.
The RDP Client
The RDP client runs on hosts. It only hears those router advertisements which
have all host mutilicast addresses 224.0.0.1 and interfaces on broadcast address.
When RDP client receives a router advertisement, the host installs a default
route to each of the addresses listed in the advertisement.
Unit 12
Telnet
Telnet is a program that allows a user with remote login capabilities to use the
computing resources and services available on the host. Telnet can also be
used to connect other ports serving user defined as well as well-known services.
The telnet program requires two arguments, that is, the name of a computer on
which the server runs and the protocol port number of the server. Telnet service
is unique since it is not platform-specific like other TCP/IP services. A DOS user
running Telnet, for example, can connect to a UNIX host or a mainframe
computer. The down side of using Telnet, however, is that unless the user is
familiar with the operating system running on the remote platform, he or she
cannot use the desired resources easily.
File Transfer Protocol
File Transfer Protocol or FTP is among the oldest protocols still used in the
internet. FTP is widely available on almost all-computing platforms, including
DOS, OS/2, UNIX and up to the mainframe level. FTP is a file server access
protocol that enables a user to transfer files between two hosts across the network
or Internet. This is also established through TCP. Accessing FTP sites over the
Internet requires that the user must have the knowledge of the location and the
name of the desired files.
Unlike Telnet, FTP does not require any familiarity with the remote
operating system. The user is still required, however, to be familiar with the FTP
command set built into the protocol itself so that he or she can productively
manage the session.
Sikkim Manipal University
Unit 12
Modern FTP servers known as ftpd support two modes, the classic normal
mode and more security conscious passive mode or PASV mode.
Trivial File Transfer Protocol (TFTP)
TFTP, like FTP, is also an Internet service intended for the transfer of files
between hosts. Unlike FTP, however, TFTP does not rely on TCP for transport
services. Instead, TFTP uses UDP to shuttle the requested file to the TFTP
client.
Simple Mail Transfer Protocol
The Simple Mail Transfer Protocol is an electronic mail (e-mail) service provider.
It is intended for the transfer of e-mail messages across the network. SMTP
uses TCP transport for the reliable delivery of mail messages. When there is
an outgoing mail, the SMTP client will connect to the SMTP server and send the
mail to the remote server.
Network File System (NFS)
Network File System service enables hosts across the network to share file
system resources transparently among themselves. Although it all started on
UNIX platforms, NFS can be implemented on any platform, including DOS,
NetWare and Windows NT.
Simple Network Management Protocol (SNMP)
Using the Simple Network Management Protocol, LAN administrators can
monitor and tune the performance of TCP/IP (as well as non-TCP/IP) networks.
Using SNMP, all kinds of information about network performance can be
gathered, including statistics, routing tables and configuration-related
parameters. The information and configuration gathering capabilities of SNMP
make it an ideal tool for network troubleshooting and performance tuning.
Domain Name System
Due to Internet explosion, it is not practical to keep an exhaustive host file for
every host because of the sheer volume of listing as well as addition, deletion
and updating of new, old and current hosts. Therefore, DNS is used to provide
host-to-IP address mapping of remote hosts to the local hosts and vice versa.
You know that each device connected directly to the network must have
an IP address that is uniquely assigned to it. The address takes the form of a
dotted decimal notation such as 128.45.6.89 to make a machine connected on
the network and consequently accept connections as well as request them.
The addresses in the form of dotted notations are very difficult to remember for
Unit 12
Self-Assessment Questions
9. Fill in the blanks with the appropriate words:
(a) Transfer control protocol connects two endpoints by full
_______________virtual connection.
(b) TCP uses a ___________-way handshake connection to send and
receive data between hosts based on three phases.
10. State whether true or false:
(a) TCP switching is a network architecture which creates a circuit for
TCP connection.
(b) A passive operation does not respond to external activity such as
request for data on the network.
Unit 12
Frames 2, 3, 4 in transit
Sender A
Receiver B
Acknowledgement for Frame 1 in transit
Frames awaiting
transmission
Unit 12
Buffer
Frame 8
Frame 7
Frame 6
Buffer
Frame 5
Frame 0
Frame 4
Frames awaiting
acknowledgement
Frame 3
Frame 1
Previously
acknowledged
Frame 2
Frame 3
Checked for errors
and acknowledged
Frames 4, 5 in transit
Sender A
Receiver B
Acknowledgement for Frame 3 in transit
The receiving data link layers window consists of the sequence number
of the frame it is prepared to accept. Any frame received with a sequence number
outside this range is discarded. The window is moved by one step and an
acknowledgment frame is produced when a frame, whose sequence number is
equal to the lower edge of the window, is received. The receivers window always
maintains its original size, unlike the senders window. When the size of the
receivers window is 1, it means the receiver is prepared to accept all frames in
a sequential order.
12.8 Cryptography
The huge growth of the Internet has changed the way businesses are conducted.
Buying and selling of goods have changed from the traditional ways to the
Internet-based techniques. Sellers need not display items in a physical showroom
to lure buyers. Sellers display the items on Web pages which can be viewed by
buyers all over the world sitting in front of their Internet connected computers.
Orders and payments can be made through computers (using credit card
numbers or bank accounts) and the seller can dispatch the item to the homes of
buyers quickly. However, the security of sensitive information like credit card
numbers and pins sent over the Internet is a serious concern for both the sellers
and buyers. Other sensitive information we may send over internet may include
social security number, private correspondence, personal details and company
information. These informations are to be secured during transit over Internet
for the security of the buyers and sellers.
There are a number of techniques by which information is secured during
transactions and during communications between parties over the Internet.
Sikkim Manipal University
Unit 12
Encoding the sensitive information before transmission over the Internet using
some key called the Encryption is the widely used technique in todays secure
transactions and communications. The received information may be decrypted
using decoding key to view and use the information in the original form. The
process of encryption and decryption falls under the traditional topic of
cryptography.
Cryptography is the process of representing information using secret
codes for providing security and confidentiality of information in a system.
Cryptography is used to encrypt a plain text like ASCII strings into the ciphertext
(coded form of plaintext) in such a way that only the authorized people know
how to convert it back to the plaintext.
Cryptographic Protocols
The cryptographic protocols basically exchange the messages over insecure
communication medium that ensures authentication and secrecy of data.
Kerberos, IPSec, SET protocol and Pretty Good Privacy (PGP) are the popular
examples of cryptographic protocol. Kerberos is network authentication system
used for insecure networks. PGP protocol is used for file storage applications
and e-mail services that provide authenticable and confidential services.
Encryption encodes file storage locally and transmits e-mail message. The email service enables PGP to be used for private exchange over network. IPSec
follows security architecture to the Internet. This protocol formats IP security
protocol to lead the cryptographic algorithm. This protocol basically provides
subnet-to-subnet and host-to-subnet topologies.
Unit 12
Self-Assessment Questions
11. Fill in the blanks with the appropriate words:
(a) If there is _____________between the source and destination hosts
data sending and receiving speed, it will cause dropping of packets
at the receiver end.
(b) ____________ is the process of representing information using
secret codes for providing security and confidentiality of information
in a system.
12. State whether true or false:
(a) The receiving data link layers window consists of the sequence
number of the frame it is prepared to reject.
(b) The cryptographic protocols basically exchange the messages over
insecure communication medium that ensures authentication and
secrecy of data.
12.9 Summary
Let us recapitulate the important concepts discussed in this unit:
OSI reference model divides the required functions of the network
architecture into seven layers and defines the function of each layer.
Layering the communications process means breaking down the
communication process into smaller and easier to handle interdependent
categories, with each solving an important and somehow distinct aspect
of the data exchange process.
Unit 12
With the growth of network size, traffic also grows affecting the overall
network in performance and responses. To manage a situation like that,
network specialists break the network into multiple networks,
interconnected by specialized devices that include routers, bridges,
brouters and switches.
The physical layer determines the type of network design exclusively
designed for the physical layer and connected to higher levels such as
data link, network, session, transport, presentation and application layers.
The basic concept of the seven-layer model is that each layer may be
defined independently of every other layer. Thus, from the user point of
view, interchange takes effect across each operation and passes down
through the layers of the model until data interchange is affected through
the physical connection.
TCP/IP or Transmission Control Protocol/Internet Protocol was developed
with the objective to specify a suite of protocols capable of providing
transparent communications interoperability services between computers
of all sizes, regardless of the hardware or operating system platforms
supporting them.
A port is an access channel for computers to exchange information. Data
is sent and received over the network. It is first automatically organized
and then transferred into packets. These packets contain a set of
instructions called protocol so that other computers recognize the data
and decode the same.
Internet Protocol (IP) is the host-to-host network layer protocol for the
Internet. With reference to networking, it is a connectionless datagram
protocol that delivers the best services such as no error control and flow
control.
Datagram is an independent, self-contained message which is sent over
a different network. Its arrival, arrival time and content are not guaranteed
whether it is sent successfully or not.
The Internet Control Message Protocol (ICMP) is an error reporting
protocol that is an integral part of the IP protocol. ICMP communicates
control data, information data and error recovery data across the network.
IP source routing is a 32-bit IP address and pointer which points to the list
for the next use. IP source routing is generally used by malicious users
who exploit this feature to cause DoS (Denial of Service) attacks and
bypass security rules on LAN.
Sikkim Manipal University
Unit 12
12.10 Glossary
Transmission media: A media dealing with the type of media used (fiber,
copper, wireless, and so on), which is dictated by the desirable bandwidth,
immunity to noise and attenuation properties
TCP/IP: A basic communication language or protocol of the Internet
Gateways: Hardware/software combinations that connect devices running
different native protocols
Port: An access channel for computers to exchange information
Internet protocol: A unique address which provides a universal address
across the network
Unit 12
12.12 Answers
Answers to Self-Assessment Questions
1. (a) OSI reference; (b) Layering
2. (a) True; (b) False
3. (a) Physical; (b) Presentation
4. (a) False; (b) True
5. (a) Specifications; (b) Port
6. (a) True; (b) False
7. (a) ICMP; (b) 32
8. (a) True; (b) True
9. (a) Duplex; (b) Three
10. (a) True; (b) False
11. (a) Mismatch; (b) Cryptography
12. (a) False; (b) True
Unit 12
Unit 13
Structure
13.1 Introduction
Objectives
13.2 An Introduction to Polling and Selection Protocols
13.3 Character and Bit Protocols
13.4 Binary Synchronous Control (BSC)
13.5 High-Level Data Link Control (HDLC)
13.6 Code Transparency and Synchronization
13.7 HDLC Transmission Process
13.8 Synchronous Data Link Control (SDLC)
13.9 Protocol Conversion
13.10 Summary
13.11 Glossary
13.12 Terminal Questions
13.13 Answers
13.14 Further Reading
13.1 Introduction
In the previous unit, you read about layered protocols and OSI model. In the
present unit, you will read about polling and selection protocols.
A protocol is a set of mutually accepted and implemented rules at both
ends of the communication channel for the proper exchange of information.
Protocols comprise standards which, at a basic level, include the dimensions of
line set-up, transmission mode, code set, and non-data exchanges of information
such as error control (detection and correction). This is done through a device,
which controls a set of terminals, and is called a terminal controller. However,
there are times when a group of channels start simultaneous transmission.
Since the controller cannot identify the terminal that is transmitting, a technique
called polling is employed. Polling means identifying the willingness to transmit.
Binary synchronous communications is a character-oriented form of
communication developed by IBM in the 1960s. High-level data link control is a
bit-oriented synchronous data link layer protocol developed by the ISO.
SDLC (Synchronous Data Link Control) is a transmission protocol
developed by IBM in the 1970s as a replacement for its binary synchronous
protocol. SDLC was a basis for the ISO standard data link protocol, high-level
Unit 13
data link control. SDLC essentially became one of several variations of HDLC,
the normal response mode.
Objectives
After studying this unit, you should be able to:
Explain polling and selection protocol
Classify character and bit protocols
Differentiate between binary synchronous control and high-level data link
control
Summarize code transparency and synchronization
Describe HDLC transmission process
Assess synchronous data link control and its functions
Discuss protocol conversion
Unit 13
send data, it enquires with T2. If T2 is also not willing to send data,
T3 is enquired for transmission. In this manner, polling is performed
continuously in a cyclic order or until all the terminals complete their
transmission. Roll-call polling is most suitable for point-to-point
channels.
o Hub Polling: The problem with the roll-call polling is that the terminal
controller has to enquire with each and every terminal in turn. Even
when most of the terminals do not have enough data to transmit, it is
necessary to send control signals back and forth between the
controller and the terminals. In the hub polling scheme, the above
said problem is avoided by allowing the terminals to indicate their
willingness to transfer data. The terminal controller passes the enquiry
to the nearest terminal first. If the terminal has some data, it transmits
immediately, otherwise it simply passes the request to the adjacent
terminals. The request propagates cyclically to all the terminals and
finally reaches the controller. This type of polling is most suitable for
multidrop channels.
Activity 1
Collect data on the functioning and features of polling schemes. Summarize
your research in a report form.
Unit 13
From the Figure 13.3, it can be seen that each message has three parts:
Header: This is recognized by the control characters SOH (Start of
Header).
Text: This is recognized by the control characters STX (Start of Text
block).
Trailer: This is recognized by the control characters ETX (End of
Text block).
Unit 13
Unit 13
receives a positive acknowledgement. This process repeats until the data arrives
at the destination.
However, there is a limited buffer space to store incoming frames at the
receiving station. So when there is a shortage of buffer space, it gives indications
to other stations that it cannot accept any more frames. The links between the
receiver and the sender are half duplex, full duplex or both.
Since the frame permits intelligent control and the transmission link, there
are some benefits in this scheme, such as supporting multiple stations, error
recovery, intelligent routing and other important functions.
Unit 13
Unit 13
station may start transmission without a poll. NRM is most suitable for multidrop
environments.
The ABM mode is suitable only to point-to-point configuration. Each station
assumes the role of a primary and secondary, depending on the need. There is
no polling in this mode. In the HDLC protocol, data is transmitted in the form of
frames.
Address
Control
Information
FCS
Flag
F
0111110
A
8 Bits
C
8 Bits
I
N Bits
FCS
16 Bits
F
01111110
Address
Control
FCS
Flag
FCS
0111110
8 Bits
8 Bits
16 Bits
01111110
Unit 13
Self-Assessment Questions
1. Fill in the blanks with the appropriate words:
(a) In the _________ polling scheme, the terminal controller polls each
and every terminal to check whether it is willing to transmit data.
(b) In the _________ mode, the primary station, before allowing the
secondary stations to start transmission, performs polling.
2. State whether true or false:
(a) Binary synchronous control follows full duplex communication.
(b) The unit of data transmission is called frame.
Unit 13
Transmission
Control
Procedure
The term data link refers to a logical path that allows data transmission.
When a data link is established, the sending and receiving equipment can
communicate with each other. Telephone conversation between two persons
can be cited as an example.
The following are three typical transmission control procedures:
Non-procedure
Basic control procedure
High-level data control procedure
Non-Procedure
As indicated by its name, a non-procedure is a communication procedure with
no transmission control procedure. In this case, DTEs (Data Terminal
Equipments) do not establish or release a data link or perform error control.
Such tasks are left in the hands of operators. This procedure is widely used for
communication between computers, database retrieval services and others.
For data flow in this case, the receiving equipment, in general, identifies a
character as the beginning of the datathis can be any characterand finds
the end of the data by detecting a code called a delimiter. For communication
between PCs, the CR (Carriage Return) code is generally used as the delimiter
as shown in Figure 13.6.
The most typical example of non-procedure is communication between
the PC and modem for use in PC to PC communication. Although a variety of
protocols are used for communication between modems on the terminal and
host sides, non-procedure is generally used between the PC and modem.
Unit 13
Full name
Definition
SOH
Start of Heading
STX
Start of Text
ETX
End of Text
EOT
End of Transmission
ENQ
Enquiry
ACK
Acknowledge
Unit 13
DLE
NAK
Negative Acknowledgement
SYN
Synchronous Idle
ETB
End of Block
Unit 13
Supervisory Frames
The following are some of the supervisory frame functions:
Flow Control: Once a station has completed the transmission of seven
frames, no more frames are transmitted, until the acknowledgment for
the first frame is received.
Error Control: If the received frame contains error, a negative
acknowledgment NAK is sent back to the transmitter via a supervisory
frame. There are two types of protocols used for this. They are the goback-N protocol and selective repeat protocol. In the go-back-N mode,
all the frames including the garbled ones are retransmitted. In the selective
repeat mode, the sending station retransmits only the frames that contain
error.
Pipelining: More than one frame may be in transit at a time. This allows
efficient use of links and reduces the average propagation delay.
The third type of frame, whose format is given in Figure 13.8, is known as
unnumbered frame. It is used for control purposes.
Unit 13
Address
DATA
Control
CRC
Flag
SFT
7 byte
Flag
01111110
Address
1 byte
Control
1 Byte
Type
16 bits
DATA
1522 bytes
Data
46 - 1500 bytes
CRC
32 bits
CRC
32 bits
Flag
01111110
Unit 13
combined station controls the link on primary and secondary stations. It is not
based and authorized on other stations.
HDLC configuration has several types such as unbalanced configuration,
balanced configuration and symmetrical configuration. There is one primary
and many secondary stations in unbalanced configuration which supports half
duplex, full duplex, point-to-point configuration and multi-point configuration.
On the other hand, in balanced configuration, there are two or more combined
configurations. The symmetrical configuration consists of one balanced and
one unbalanced configuration.
Modes for Operation of HDLC
HDLC provides Normal Response Mode (NRM) where each and every frame is
transferred; Asynchronous Response Mode (ARM) which reduces time
overheads while transferring the frames; and Asynchronous Balanced Mode
(ABM) which transfers data or frames from the secondary station.
HDLC subsets are known as layer two protocols. It is recommended for
CCITT (Consultative Committee for International Telephone and Telegraph)
Recommendation X.25. LAP-B is a subset of X.25 protocol stack. It shares the
same frame format, frame types and field functions. It is restricted to the ABM
transfer mode and is suitable for combined stations. Its circuits are established
either by Data Terminal Equipment (DTE) or Data Circuit-terminating Equipment
(DCE). Table 13.2 shows the HDLC variations along with their uses:
Table 13.2 HDLC Variations
HDLC Subset Variations
Uses
LAPM (Link Access Procedure for Modems) Is used with Modems for error-correcting
Unit 13
Unit 13
Unit 13
the US Defense program was the first to introduce the concept of a standardized
protocol. ARPA is a resource-sharing network connecting different computers
at universities and laboratories in the US. The concept of the protocol and its
layer structure emerged from the ARPA network. ARPA developed an integrated
network using packet protocol and is also renowned for its development of
packet switching.
HOST SYSTEM
DTE
(3)
(4)
DCE
(2)
(1)
DCE
(3)
CCP
CPU
(2)
(5)
Transmission control
Data processing
Unit 13
Self-Assessment Questions
3. Fill in the blanks with the appropriate words:
(a) _____________ is a communication procedure with no transmission
control procedure.
(b) ______________ are used primarily for low-speed data
communications between PCs and very small computers.
4. State whether true or false:
(a) The basic control procedure defines the establishment and release
of data links, data receipt confirmation methods and error control.
(b) HDLC stations consist of three stations: Primary station, secondary
station and combined station.
13.10 Summary
Let us recapitulate the important concepts discussed in this unit:
A definite way to reduce the cost of a communication channel is to make
a number of terminals to share a single communication channel. The
device, which controls a set of terminals, is known as a terminal controller.
Polling means identifying the willingness to transmit. Two types of polling
schemes used are roll-call polling and hub polling.
Each character has its own meaning in character orientated protocols. A
character may be a data byte or a control byte during transmission.
BISYNC or binary synchronous is the main COP in use these days.
In a bit oriented protocol, a single character may hold 256 different
meanings; hence, there is a reduction in the information needed to convey
additional information and consequently increase in efficiency of the
protocol.
BISYNC is a data communication line protocol that uses a standard set of
transmission control characters and control character sequence which is
sent to binary-coded data over the communication control line.
HDLC was developed by the ISO as a superset of IBMs SDLC and United
States National Bureau of Standards ADCCP protocols.
Unit 13
There are three modes of operation defined for HDLC protocol. They are
normal response mode, asynchronous response mode and asynchronous
balanced mode.
HDLC procedure is also standardized by ISO.
There are three types of transmission control procedures, namely, nonprocedure, basic control procedure and high-level data control procedure.
In frame check sequence, three types of frame that are used with different
control fields are information frames, supervisory frames and unnumbered
frames.
High-level data link control is a set of protocols which determines
transmitting data between network points. It is the Layer 2 protocol in OSI
model.
HDLC stations consist of three stations: primary station, secondary station
and combined station. Primary station supervises error-control aspects,
organizes data-flow links and controls the secondary stations over the
network which uses HDLC protocol. The secondary station is activated
when the primary station sends a request. The combined station controls
the link on primary and secondary stations.
SDLC is a bit-oriented protocol that uses bit strings to represent characters.
It uses CRC error correction techniques. SDLC supports high-speed
transmission and generally employs full duplex dedicated circuits.
A protocol is a set of mutually accepted and implemented rules at both
ends of the communications channel for the proper exchange of
information. To connect different types of computers from a variety of
computer vendors, protocols must be first standardized.
13.11 Glossary
Frame: The unit of data transmission
Data link: A logical path that allows data transmission
Non-procedure: A communication procedure with no transmission control
procedure
Protocol: A set of mutually accepted and implemented rules at both ends
of the communications channel for the proper exchange of information
Unit 13
13.13 Answers
Answers to Self-Assessment Questions
1. (a) Roll-call; (b) Normal response
2. (a) False; (b) True
3. (a) Non-procedure; (b) Asynchronous protocols
4. (a) True; (b) True
Unit 13
Unit 14
Security Measures
Structure
14.1 Introduction
Objectives
14.2 Security Measures: Basics
14.3 Need for Security
14.4 Basic Security Concepts
14.5 Threats to Users
14.6 Hardware and Data
14.7 Summary
14.8 Glossary
14.9 Terminal Questions
14.10 Answers
14.11 Further Reading
14.1 Introduction
In the previous unit, you read about polling and selection protocols. In the present
unit, you will be reading about security measures in computer system.
Security is nothing but the protection of information from theft, corruption
or natural disaster, while allowing the information to remain accessible and
productive to its intended users. The term computer security measure means
the collective processes and mechanisms by which sensitive, and valuable
information and data are protected from publication, tampering or collapse by
unauthorized activities or untrustworthy individuals (like hackers) and unplanned
events, respectively. To protect data from unauthorized person, firewall is used.
Firewall is an important part of computer security. It is a combination of software
and hardware components that is used to protect against threats from the public
Internet.
Objectives
After studying this unit, you should be able to:
Describe security measures
State the need for secure network
Explain the basic security concepts
Identify different threats to users
Discuss the relation between hardware and data
Unit 14
Unit 14
With the increase of system security, the price for its management will
also increase accordingly; therefore a compromising level between security
and prices should be established as per the requirement of the network
security system policy. This will largely depend upon the level of security
needed to apply in the network, overall security requirements and the
effective implementation of the chosen level of security.
Division of the responsibilities concerning the network security must be
clearly defined between users and the system administrator.
The requirements for security must be detailed within a network security
policy of the organization that indicates the valuable data and their
associated cost to the business.
After defining the detailed network security policy and identifying the clear
cut responsibilities in the organization, the system administrator should
then be made responsible for ensuring that the security policy is effectively
applied to the company environment, including the existing networking
infrastructure.
Self-Assessment Questions
1. Fill in the blanks with the appropriate words:
(a) ____________ is addressed at the data link layer, network layer
and application layer.
(b) Division of the responsibilities concerning the network security must
be clearly defined between users and the __________.
2. State whether true or false:
(a) TCP/IP protocols are susceptible to intercept.
(b) The main objective of the network is to block information among its
users situated locally or remotely.
Unit 14
Unit 14
With the proliferation of the Internet, data security has become a real
issue and a challenge for all Internet users worldwide. Awareness regarding the
ways to avoid and protect against such security threats needs to be spread
among all the Internet users. Generally, the various threats over the Internet
can be classified into four categories:
Interruption: Making online services or connections of an organization
unusable.
Interception: Accessing protected data during transmission at its source.
Modification: Altering the data for the purposes of disruption.
Fabrication: Inserting spurious data or information into an organizations
system to disrupt or overload services.
All the Internet users face some kind of security threat, though the relative
importance of each of these threats may vary from user to user. Some of the
most serious threats are:
Information theft
Identity theft Spear-phishing
Financial fraud
Loss of data from malicious software Trojan, viruses and worms
Censoring data for children
Threats from the Internet gatekeepers and government agencies
To a company, its internal data such as sales sheets, market strategies,
customer information, etc., are very important for running it efficiently. This data
in the wrong hands could seriously affect or undermine its competitive advantage
in the marketplace, create legal issues and tarnish its goodwill. The same way
a company needs to protect itself by keeping its data safe, an individual also
needs to have control over the extent of personal information s/he wishes to
disclose over the Internet. Small amounts of combined information such as
name, date of birth and address are enough to fabricate false identities and
misuse them over the Internet for financial gains or personal injury.
The most common type of the Internet threat and also the most serious in
nature is money fraud. A large number of Websites over the Internet sell their
products and services and claim to be among the most honest and customer
oriented sellers in the market. This is not the case most of the time. Chances
are that if an individual is not careful about the Website from where s/he buys
products or services then his/her credit card details and bank account details
can be compromised and money stolen by unauthorized transaction or money
Sikkim Manipal University
Unit 14
transfers. Often, shopping sites fail to deliver the quality product they claim to
sell and charge the customer the full amount for it.
The intention of a hacker is not always to steal data or information for the
user. Sometimes, the only reason which entices them to exploit security loops
is to cause chaos irrespective of who is targeted. This leads to the maximum
amount of data loss, as it was never the intention to steal data but only to
corrupt it.
Another major threat for the Internet users is the large presence of
pornographic material present on the Internet. If not checked and properly
blocked with the help of certain dedicated programs like Net Nanny, Cyber Sitter
and Safe Eyes, this material can have serious psychological effects on the
outlook and upbringing of our children.
While the Internet has become a part of our daily lives, it has to be used
carefully. The Internet gatekeepers or Internet Service Providers (ISPs), since
they are best placed to fulfill this role, need to play a pivotal role in ensuring data
security. ISPs routinely keep history logs of every user and their browsing history
over the Internet. This not only puts all the information at one place but also
makes it easier to misuse the same. For example, a majority of the Internet
gatekeepers block access to certain sites and programs without the customers
knowledge. They have the capability to peep into the private lives of the Internet
users and control and manipulate the way in which every Internet subscriber
uses the Internet.
However the role of ISPs does not absolve all users and creators of
Website to exercise caution and good sense in being prepared for security
breaches. Any user who goes online should be aware of the threats from the
Internet and be completely prepared to tackle them.
Some dos and donts of computer usage to safeguard your data and
information, especially over the Internet are as follows:
All computers, whether at your house or in your office, should be protected
with antivirus, anti-spyware and anti-spam software which should be
updated regularly.
Use a personal firewall to block unsolicited and unauthorized access to
your computer and its contents.
Secure the network router by installing passwords and encryption
algorithms.
Adjust Web browser settings for cookies, history management and offline
content download for increased security.
Sikkim Manipal University
Unit 14
Self-Assessment Questions
3. Fill in the blanks with the appropriate words:
(a) The ____________ levels contain the security-related problems in
the component or modular form.
(b) ___________ routinely keep history logs of every user and their
browsing history over the Internet.
4. State whether true or false:
(a) The evolution of security levels can be looked at in different forms,
contributed by the Indian Department of Defense.
(b) The role of ISPs does not absolve all users and creators of Website
to exercise caution and good sense in being prepared for security
breaches.
Unit 14
Unit 14
Hackers may access the others computer and servers without valid
authentication for stealing the information not meant for general purpose.
Confidential information may reach the wrong hands. Hacking establishes
the fact that there is a security lapse in the particular system or network
and that the system or network is unstable and prone to tamper.
Hacking may also lead to interception of the information from the network,
which lacks security measures. The information may be tampered with or
altered from the actual contents.
Encryption
Authentication
function included
User
R
R
Server
R
R
User
Server
Hacker
Unit 14
Unit 14
Internet
R
o
u
t
e
r
Switch
Mail
server
Firewall
system
DMZ
Switch
Router
Database server
Internet
LAN
hub
DMZ
hub
A proxy server can be used to monitor the traffic on the network and allow
the users access to a limited number of services, while some unwanted
services may be blocked. This can be integrated with the firewall as shown
in Figure 14.4.
Unit 14
Internal workstations
Proxy
firewall
Internet
LAN
Hub
Internet
LAN
hub
Proxy server
Activity 2
Prepare a PowerPoint presentation on firewall technology. Take help of the
Internet.
Self-Assessment Questions
5. Fill in the blanks with the appropriate words:
(a) _____________ concerns itself with the protection of data contained
in a file or many files in a computer.
(b) The three types of data security measures are invalid access, firewall
security and ___________.
Unit 14
14.7 Summary
Let us recapitulate the important concepts discussed in this unit:
Network security can be addressed at the data link layer, network layer
and application layer. The issues concerned are: packet intrusion and
encryption, IP packets and routing tables with their update version, and
host-level bugs occurred at data link layer, network layer and application
layer, respectively.
The main objective of the network is to share information among its users
situated locally or remotely.
The security levels contain the security-related problems in the component
or modular form. Each level contains the specific security problem, which
is broken down into different divisions.
Data security concerns itself with the protection of data contained in a file
or many files in a computer either as a standalone or on a network from
unauthorized interception by providing some sort of security.
A LAN connected to an Internet allows access to the outside world. The
terminals getting connected to the Internet have access to a variety of
servers to obtain a variety of information bases. It also provides the
opportunity to the undesirable person to execute commands on the servers
and other computers.
The Internet provides a two-way flow of traffic that may be undesirable in
many organizations where some information may be meant for access
exclusively within the organization or for Intranet.
Intranet is a TCP/IP network that is modelled after the Internet that only
works within the organization. In order to isolate information meant only
for the benefit of the organization or its Intranet from the other open to all
or meant for the Internet, some sorts of security measures need to be
employed to control two-way flow of traffic.
Sikkim Manipal University
Unit 14
14.8
Glossary
Unit 14
14.10 Answers
Answers to Self-Assessment Questions
1. (a) Network security; (b) System administrator
2. (a) True; (b) False
3. (a) Security; (b) ISPs
4. (a) False; (b) True
5. (a) Data security; (b) Encryption
6. (a) True; (b) False