Block 3
Block 3
1.0 INTRODUCTION
As you know, the network layer is one of the important layers of OSI model. It is
responsible for different tasks of networking, but mainly its role is to determine
addresses and finding a route between a source and destination node or between two
intermediate devices. It establishes and maintains a logical connection between these
two nodes, either a connectionless or a connection oriented communication. The basic
purpose of the network layer is to provide a network to network communication
capability in contrast to machine to machine common provided by data line layer. The
network layer controls the operation of the subnet. A key design issue is determining
how packets are routed from source to destination. Routes can be determined based on
static tables that are “wired into” the network and rarely changed. If too many packets
are present in the subnet at the same time, they will get in one another’s way forming
bottlenecks. The controlling such congestion also belongs to the network layer. The
quality of service also depends on network layer issue.
In this unit, we will study the fundamental Issues of network layer. These issues are
designing interface between the host and the network, the routing methods, congestion
control methods and Internetworking issues. In this unit we will study how routing is
done at network layer using adaptive and non adaptive algorithm. We will also discuss
the Network addressing. Further, some Error reporting protocols ICMP and IGMP on
network layer will be discussed.
1.1 OBJECTIVES
After going through this unit, you should be able to:
• Know the basic issues of network layer
• Understand the different switching methods used at network layer
• Know the routing mechanisms
5
Network, Transport • Understand the congestion control methods
and Application
Layer • Differentiate between adaptive and non adaptive algorithm
• Know process of Error reporting protocols at network layer
1.2 SWITCHING
As you have studied earlier in block 1, unit 3, that Switching is used to determine the
path to be used for forwarding the information to the receiver. You also know that the
Switching methods are mainly divided into Circuit, Message and Packet switching. In
this section, we will explore the other switching mechanism like virtual circuit and
datagram.
6
Network Layer
It is that part of the network layer responsible for deciding which output line an
incoming packet should be transmitted on.
2. Simplicity: The routing should be done in a simple manner so that the over
head is as low as possible.
2. Non-adaptive algorithms
Adaptive algorithms use such dynamic information as current topology, load delay
etc to select routes.
Non adaptive algorithms, routes never changes once initial routes have been
selected. Also, called static routing.
7
Network, Transport
and Application Adaptive Routing Algorithm (Dynamic Routing)
Layer
It changes their routing decision to reflect changes in the topology and in traffic as
well. These get their routing information from adjacent routers or from all routers.
Routing decision may be changed when network topology and/or traffic load changes.
The optimization parameters are the distance, number of hops and estimated transit
time.
1. Isolated: Each router makes its routing decisions using only the local
information it has on hand. Specifically, routers do not even exchange
information with their neighbors.
Isolated: In this method, the node decides the routing without seeking information
from other node. The disadvantage is that the packet may be sent through a congested
route resulting in a delay.
Some of the examples of this type of algorithm for routing are :
• Hot Potato Routing: Form of routing in which the nodes of a network have no
buffer to store packets in before they are moved on to their final predetermined
destination.
• In normal routing situation, when multiple packets contend for a single outgoing
channel, packets that are not buffered are dropped to avoid congestion.
• Backward Learning: In this method the routing tables at each node gets
modified by information from the incoming packets. Backward learning routing
algorithm used for routing traffic that makes decisions by assume that a can
optimally reach B through C.
Centralized Routing
Advantage: Only one node is required to keep the information.
Disadvantage: If the central node goes down the entire network is down, i.e. single
point of failure.
Distributed: It receives information from its neighboring nodes and then takes the
decision about which way to send the packet.
Optimality Principle
Optimality principle is a general statement about optimal routes regardless of network
topology or traffic.
8
With reference to Figure 2 above, Optimality principle states that if router I is on the Network Layer
optimal path from router ‘I’ to router ‘K’ then the optimal path from ‘J’ to ‘K’ also
falls along the same route.
To prove the above statement we can say, if there was a better way from J to K, then
you could use that with the path from I to J for a better path from I to K, so your
starting point (the path from I to K was optimal) is contradicted.
Disadvantages:
1. Duplicacy
9
Network, Transport 2. Infinite looping.
and Application
Layer 3. Flow-Based Routing: This algorithm considers two strategies in account to
decide the route.
a) Topology.
b) Load for routing
Previous static algorithm only considers topology in account not the load
for routing. The basic idea behind the analysis is that for a given line, if
capacity and average flow is known, it is possible to compute the mean
packet delay on that line from queuing theory. The routing problem then
reduces to finding the routing algorithm that produces the minimum
average delay for the subnet.
For this technique, certain information must be known in advance.
c) Topology
d) Traffic Matrix Fij
e) Line capacity matrix Cij
1
Now T = µc − λ
Intradomain Interdomain
10
1. Distance vector routing Network Layer
In distance vector routing, each router maintains a routing table indexed by, and
containing one entry for each router in the subnet. This entry contains two parts
a) The preferred outgoing line to use for that destination.
b) An estimate of the time as distance to that destination.
The router is assumed to know the distance to each of its neighbors.
For example, consider a subnet as given below in figure 4.
A C
B
C D
1 2 3
For example : as shown in the figure 5, ‘A’ claims to have 3 msec delay to B 8 msec
delay to ‘C’ and so on. Similarly ‘B’ claims to have 2 msec delay to A, 4 msec delay
to ‘C’ and so on.
Now (4) column shows how router ‘C’ decides his new route to router ‘E’. There are
three ways
a) If ‘C’ follows line ‘A’ then delay is CE = CA ® AE = 5 + 1 = 6 msec.
11
Network, Transport c) If ‘C’ follows line ‘B’ then delay is CE = CB ® BE = 6 + 11 = 17 msec.
and Application
Layer d) If ‘C’ follows line ‘D’ then delay is CD ® DE ® 8 + 12 = 20 msec.
Min delay time is via neighbor route ‘A’ so from C to E line is chosen ‘A’ in
column (4)
The same calculations is performed for all destination, with the new routing
table as (4)
The problem is, that router B doesn't know that C has router B as successor in
his routing table on the route to A.
12
2. Hierarchical Routing: As networks grow in size, the router routing tables Network Layer
grow proportionally. Not only the router memory consumed but also the more
CPU time is needed to scan them and more bandwidth is needed.
The problem can be solved to some extent by using Hierarchical routing. In this
routers are divided into regions as depicted in figure 8, with each router
knowing all the details how to route packets to destination within it own region,
but nothing about the internal structure of other regions.
1A 1A
1B 1B 1 1B 1B 1
1C 1C 1 1C 1C 1
2A 1B 2 2 1B 2
2B 1B 3 3 1C 2
2C 1B 3 4 1C 3
2D 1B 4 5 16 4
3A 1C 3
3B 1C 2
4A 1C 2
4B 1C 4
4C 1C 4
5A 1C 4
5B 1C 5
5C 1B 5
5D 1C 6
5E 1C 5
13
Network, Transport The full routing table as shown above for 1A has 17 entries but when routing is
and Application done hierarchically there are only 7 entries (e entries for local routers 4 entries
Layer for regions which are considered as single router. All the traffic for region 2
goes by 1B-2A line but rest of traffic goes by 1C-3B line.
In this process send “Hello”, packet on each point-to-point line. After receiving
the hello packet Destination, node replies with its address.
2. Measure the cost (delay) to each neighbor.
The information tables are creating having all details of neighboring nodes.
4. Send this packet to all other routers.
Use selective flooding. Sequence numbers prevent duplicate packets from being
propagated. Lower sequence numbers are rejected as obsolete
5. Compute the shortest path to every other router.
Dijkstra’s Shortest Path algorithm is used to determine the shortest path to each
destination.
When a router using a Link State protocol, such an OSPF (Open Shortest Path
First) knows about a change on the network, it will broadcast this change
instantly, there for flooding the network with this information. The information
routers require to build their databases is provided in the form of Link State
advertisement packets (LSAP). Routers do not advertise their entire routing
tables; instead each router advertises only its information regarding
immediately adjacent routers.
14
• Link state has big memory requirements Network Layer
• In link state announcements cannot be “filtered”. All items in the database must
be sent to neighbors
Even though Link State protocols work more efficiently, problem can arise.
Usually problems occur cause of changes in the network topology (links go up-
down), and all routers don't get updated immediately cause they might be on
different line speeds, there for, routers connected via a fast link will receive
these changes faster than the others on a slower link.
Different techniques have been developed to deal with these problem and these are:
5. Traffic is bursty.
15
Network, Transport
and Application
Layer
a) Open loop: In open loop solution the good designs are being developed to solve
the problem so that congestion does not occur at first place once the system is
setup and running, no mid pores connection is made. In open loop control, tools
are included to decide when to accept new traffic, when to discard packets and
which ones. And making scheduling decisions at various points in the network.
The decisions are offline decision is not based on current state of network close
loop solution.
The concept of feedback loop is used in closed loop solution. This approach has
three parts, when apply to the congestion control.
i) Monitor the system to detect when and where congestion occurs.
ii) Pass the information to places where the action can be taken.
iii) Adjust system operation to correct the problem.
2. To increase capacity
Traffic shaping is about regulating the average rate (and burstiness) of data
transmission.
16
water is bucket and zero when the bucket is empty. Also once the bucket is full, any Network Layer
additional water entering it spills over the sides and is lost.
Leaky bucket algorithm can be understood as “The leaky bucket consists of finite
queue when a packet arrives, if there is room on the queue it is appended to the queue,
otherwise it is discarded. At every clock tick, one packet is transmitted”.
17
Network, Transport Advantage
and Application
Layer This algorithm smoothens the bursts and greatly reduces the chances of congestion.
Disadvantages
1. When the queue is full, packets are discarded.
Token Bucket Algorithm: The leaky bucket algorithm has a rigid output pattern at
the average rate, no matter how bursty the traffic is.
In many applications, it is better to allow the output to speed up somewhat when large
bursts arrive so a more flexible algorithm is needed, preferably one that never losses
data one such algorithm is token bus algorithm.
In token bucket algorithm, the leaky bucket holds ‘tokens’ generated by a clock at the
rate of one token every DT sec.
Host Host
Computer Computer
One token is
added to the
bucket every ∆ t
The Bucket
Holds Tokens
Networks Networks
(a) (b)
The token bucket algorithm provides a different kind of traffic shaping than the leaky
bucket algorithm. Bust of up to n. packets can be sent at once, allowing some
burstiness in the output stream and giving faster response to sodden bursts of input.
A token bucket algorithm throws away tokens when the bucket fills up but never
discards packets.
18
Table 1: Token Bucket V/S Leaky Bucket Network Layer
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
4. In which type of switching, do all the datagrams of a message follow the same
channel of a path
a) Circuit switching
b) Datagram packet switching
c) Virtual circuit packet switching
d) Message switching
……………………………………………………………………………………
……………………………………………………………………………………
19
Network, Transport 5. Which type of switching uses the entire capacity of a dedicated link
and Application
Layer a) Circuit switching
b) Datagram packet switching
c) Virtual circuit packet switching
d) Message switching
……………………………………………………………………………………
……………………………………………………………………………………
1. Version 4(IPv4)
2. Version 5(Ipv5)
3. Version 6(Ipv6)
IP addressing
The identifier used in the IP layer of the TCP/IP protocol suite to identify each device
connected to the Internet is called the Internet address or IP address.
OR
An IP address (Ipv4) is a 32-bit address that uniquely and universally defines the
connection of a host or a router to the Internet.
1. There is the binary notation which uses the base two number system to
represent numbers.
2. There is the decimal notation which uses the base ten number system to
represent numbers.
3. There is the hexadecimal notation which uses the base sixteen number system to
represent numbers.
Do you know?
An IP address is a 32-bit(4-bytes) address.
Example 1
Assume, IGNOU’s IP address is 142.190.23.180. This IP address consists of four
bytes. The first byte has the value of 142. The second byte has the value of 190. The
third byte has the value of 23, and the fourth byte has the value of 18.
Do you know?
IP addresses are unique.
20
IP addresses are unique in the sense that each address defines one, and only one, Network Layer
connection to the Internet. Two devices on the Internet can never have the same
address.
Do you know?
The address space of IPv4 is 232 or 4,294,967,296.
Notations of IP addresses
Example 1
Change the following IP addresses from binary notation to dotted-decimal notation.
Solution
We replace each group of 8 bits with its equivalent decimal number and add dots for
separation:
a) 129.11.11.239
b) 193.131.27.255
c) 231.219.139.111
d) 249.155.251.15
Example 2
Change the following IP addresses from dotted-decimal notation to binary notation.
a) 111.56.45.78
b) 221.34.7.82
c) 241.8.56.12
d) 75.45.34.78
Solution
We replace each decimal number with its binary equivalent:
a) 01101111 00111000 00101101 01001110
b) 11011101 00100010 00000111 01010010
c) 11110001 00001000 00111000 00001100
d) 01001011 00101101 00100010 01001110
Example 3
Find the error, if any, in the following IP addresses:
a) 111.56.045.78
b) 221.34.7.8.20
c) 75.45.301.14
d) 11100010.23.14.67
21
Network, Transport
and Application
Layer
Solution
a) There are no leading zeroes in dotted-decimal notation (045).
b) We may not have more than four numbers in an IP address.
c) In dotted-decimal notation, each number is less than or equal to 255; 301 is
outside this range.
d) A mixture of binary notation and dotted-decimal notation is not allowed.
Example 4
Change the following IP addresses from binary notation to hexadecimal notation.
Classless Inter-Domain a) 10000001 00001011 00001011 11101111
Routing allocates address b) 11000001 10000011 00011011 11111111
space to Internet service
providers and end users on
Solution
any address bit boundary,
instead of on 8-bit We replace each group of 4 bits with its hexadecimal equivalent (see Appendix B).
segments. CIDR notation Note that hexadecimal notation normally has no added spaces or dots; however, 0X
is a syntax of specifying IP (or 0x) is added at the beginning or the subscript 16 at the end to show that the
addresses and their number is in hexadecimal.
associated routing prefix.
It appends to the address a a) 0X810B0BEF or 810B0BEF16
slash character and the
b) 0XC1831BFF or C1831BFF16
decimal number of leading
bits of the routing prefix,
e.g., 192.0.2.0/24 for IPv4 1.5.1 Classful Addressing
IP addresses, when started a few decades ago, used the concept of classes. This
architecture is called classful addressing. In the mid-1990s, a new architecture, called
classless addressing, was introduced and will eventually supersede the original
architecture. However, part of the Internet is still using classful addressing, but the
migration is very fast.
22
Figure 14: Address Spaces of IPv4 classes Network Layer
The way you recognize which class an IP address belongs to is by analyzing the first
byte. If the number in the first byte is between 0-127, then the IP address is in the
Class A range as shown in figure 15. If it is between 128-191 it is in Class B. If it is
between 192-223 it is in the Class C range. If it is between 224-239 it is in the Class D
range, and if it is between 240-255, then it belongs to Class E.
According to the figure 16, we can device a mechanism as given figure 17 for finding
the address class in binary notation like:
If first left most bit is 0 then it is class A
If first bit is 1 and second bit is 0 then it is class B
If first two bits are 1 and third bit is 0 then it is class C
If first three bits are 1 and fourth bit is 0 then it is class D
If all the four bits are 1 then it is class E
23
Network, Transport Figure 17: Finding the address class in binary notation
and Application
Layer
Example 5
How can we prove that we have 2,147,483,648 addresses in class A?
Solution
In class A, only 1 bit defines the class. The remaining 31 bits are available for the
address. With 31 bits, we can have 231 or 2,147,483,648 addresses.
Example 6
Find the class of each address:
a) 00000001 00001011 00001011 11101111
b) 11000001 10000011 00011011 11111111
c) 10100111 11011011 10001011 01101111
d) 11110011 10011011 11111011 00001111
Solution
a) The first bit is 0. This is a class A address.
b) The first 2 bits are 1; the third bit is 0. This is a class C address.
c) The first bit is 1; the second bit is 0. This is a class B address.
d) The first 4 bits are 1s. This is a class E address
Example 7
Find the class of each address:
a) 227.12.14.87
b) 193.14.56.22
c) 14.23.120.8
d) 252.5.15.111
e) 134.11.78.56
Solution
a) The first byte is 227 (between 224 and 239); the class is D.
b) The first byte is 193 (between 192 and 223); the class is C.
c) The first byte is 14 (between 0 and 127); the class is A.
d) The first byte is 252 (between 240 and 255); the class is E.
e) The first byte is 134 (between 128 and 191); the class is B.
Example 8
In Example 5 we showed that class A has 231 (2,147,483,648) addresses. How can
we prove this same fact using dotted-decimal notation?
Solution
The addresses in class A range from 0.0.0.0 to 127.255.255.255. We need to show
that the difference between these two numbers is 2,147,483,648. This is a good
exercise because it shows us how to define the range of addresses between two
addresses. We notice that we are dealing with base 256 numbers here. Each byte in
the notation has a weight. The weights are as follows
2563, 2562, 2561, 2560
Now to find the integer value of each number, we multiply each byte by its weight:
24
Last address: 127 × 2563 + 255 × 2562 + Network Layer
Do you know?
Class D addresses are used for multicasting; there is only one block in this class and
Class E addresses are reserved for future purposes; most of the block is wasted.
In classful addressing the netid and hostid are easily distinguishable by looking at the
IP address. First you have to determine which class the IP address belongs to and from
there you can tell which part is the netid and which part is the hostid. If it is in Class
A, then the first byte represents the netid and the last three represent the hostid, and so
on.
That is why a new addressing scheme was devised. It is called classless addressing
because it doesn't use the classes which were used in classful addressing.
Do you know?
Millions of class A and class B addresses and are wasted in class full addressing
Do you know?
The number of addresses in class C is smaller than the needs of most organizations.
Example 9
25
Network, Transport Given the network address 17.0.0.0, find the class, the block, and the range of the
and Application addresses.
Layer
Solution
The class is A because the first byte is between 0 and 127. The block has a netid of
17. The addresses range from 17.0.0.0 to 17.255.255.255.
Example 10
Given the network address 132.21.0.0, find the class, the block, and the range of the
addresses.
Solution
The class is B because the first byte is between 128 and 191. The block has a netid of
132.21. The addresses range from 132.21.0.0 to 132.21.255.255.
Example 11
Given the network address 220.34.76.0, find the class, the block, and the range of the
addresses.
Solution
class is C because the first byte is between 192 and 223. The block has a netid of
220.34.76. The addresses range from 220.34.76.0 to 220.34.76.255.
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
26
Network Layer
1.6 FRAGMENTATION
Each network imposes some maximum size on its packets. A problem appears when a
large packet wants to travel through a network whose maximum packet size is too
small. One solution is to make sure the problem does not occur in the first place. In
other words, the internet should use a routing algorithm that avoids sending packets
through networks that cannot handle them. However, this solution is no solution at all.
What happens if the original source packet is too large to be handled by the
destination network? The routing algorithm can hardly bypass the destination.
Basically, the only solution to the problem is to allow gateways to break up packets
into fragments, sending each fragment as a separate internet packet. However,
converting a large object into small fragments is considerably easier than the reverse
process.
Two opposing strategies exist for recombining the fragments back into the original
packet.
1. Transparent Fragmentation
2. Non Transparent Fragmentation
Transparent Fragmentation
The first strategy is to make fragmentation caused by a “small-packet” network
transparent to any subsequent networks through which the packet must pass on its
way to the ultimate destination. This option is shown in Figure 19 (a). In this
approach, the small-packet network has gateways that interface to other networks.
When an oversized packet arrives at a gateway, the gateway breaks it up into
fragments. Each fragment is addressed to the same exit gateway, where the pieces are
recombined. In this way, passage through the small-packet network has been made
transparent. Subsequent networks are not even aware that fragmentation has occurred.
Do you know?
ATM networks have special hardware to provide transparent fragmentation of packets
into cells and then reassembly of cells into packets. In the ATM world, fragmentation
is called segmentation
2. All packets must exit via the same gateway. By not allowing some fragments to
follow one route to the ultimate destination and other fragments a disjoint route.
some performance may be lost.
27
Network, Transport 3. A last problem is the overhead required to repeatedly reassemble and then re-
and Application fragment a large packet passing through a series of small packet networks.
Layer
Tips
ATM requires transparent fragmentation.
Non Transparent fragmentation also has some problems. For example, it requires
every host to be able to do reassembly. Yet another problem is that when the large
packet is fragmented the total overhead increases, because each fragment must have a
header.
An advantage of this method is that multiple exit gateways can now be used and
higher performance can be achieved
When a packet is fragmented, the fragments must be numbered in such a way that the
original data stream can be reconstructed. One way of numbering the fragments is to
use a tree. If packet 0 must be split up, the pieces are called 0.0, 0.1, 0.2 etc. If these
fragments themselves must be fragmented later on, the pieces are numbered 0.0.0,
0.0.1, 0.0.2, ….0.1.2 etc. If enough fields have been reserved in the header for the
worst case and no duplicates generated anywhere, this scheme is sufficient to ensure
that all the pieces can be correctly reassembled at the destination, no matter what
order they arrive in.
However, if even one network loses or discards packets, end-to-end retransmissions
are needed, with unfortunate effects for the numbering system. Suppose that a 1024-
bit packet is initially fragmented into four equal-sized fragments, 0.0, 0.1, 0.2 and
0.3. Fragment 0.1 is lost, but the other parts arrive at the destination. Eventually, the
source times out and retransmits the original packet again. Only this time the route
taken passes through a network with a 512-bit limit, so two fragments are generated.
When the new fragment 0.1 arrives at the destination, the receiver will think that all
four pieces are now accounted for a reconstruct the packet incorrectly.
28
• when a datagram cannot reach its destination, Network Layer
• when the gateway does not have the buffering capacity to forward a datagram,
• When the gateway can direct the host to send traffic on a shorter route.
Do you know?
ICMP is considered an integral part of IP as shown in figure 20.
The Internet Protocol (IP) is not designed to be absolutely reliable. The purpose of
these control messages is to provide feedback about problems in the communication
environment, not to make IP reliable. There are still no guarantees that a datagram
will be delivered or a control message will be returned. Some datagrams may still be
undelivered without any report of their loss. The higher level protocols that use IP
must implement their own reliability procedures if reliable communication is required.
The ICMP messages typically report errors in the processing of datagrams. To avoid
the infinite regress of messages about messages etc., no ICMP messages are sent
about ICMP messages.
TIPS
ICMP provides error reporting, flow control and first-hop gateway redirection.
00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
Type Code ICMP header checksum
Data
4. Data. It is of variable length. It contains the data specific to the message type
indicated by the Type and Code fields
29
Network, Transport Types of ICMP messages
and Application
Layer Each ICMP message contains three fields that define its purpose and provide a
checksum. They are
• TYPE,
• CODE, and
• CHECKSUM fields (described above).
The TYPE field identifies the ICMP message, the CODE field provides further
information about the associated TYPE field, and the CHECKSUM provides a
method for determining the integrity of the message.
Tips
ICMP message are sent as packet so these are also called ICMP packet
Tips
ICMP messages are identified by "type" numbers
Tips
30
Internet Group Management Protocol (IGMP) is the protocol used to support Network Layer
multicasting.
00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
Type Code IGMP Checksum
Identifier
Group Address
Access Key
The fields can be described as follows
31
Network, Transport 2. Code. It is of 8 bits. In a Create Group Request message, this field indicates if
and Application the new host group is to be public or private. In all other Request messages, this
Layer field is set to zero.
In a Reply message, the Code field specifies the outcome of the request.
6. Access Key. This field is of 64 bits. In a Create Group Request message, the
access key field contains zero. In all other Request messages, the access key
field contains the access key assigned to the host group identified in the Group
Address field (zero for public groups). In a Create Group Reply message, the
access key field contains either a non-zero 64-bit number (if the request for a
private group is granted) or zero. In all other Reply messages, the access key
field contains the same access key as in the corresponding Request.
Do you know?
IGMP is defined in RFC 1112.
1.8 SUMMARY
In this unit, we studied various design issues of network layer. Network layer provides
best route from source to destination using adaptive routing algorithm like distance
vector routing and link state routing. A serous drawback of distance vector routing is
count to infinity problem. It is also responsible for congestion control using leaky
bucket and token leaky bucket algorithm. The four main protocols that operates on
network layer are ARP, RARP, ICMP, IGMP. Network layer mainly works on IP
address. IP addresses are 32bits.IP addresses have been divided into five classes
namely A,B,C,D,E.ICMP and .ICMP and IGMP are error reporting protocols.ARP
and RARP are used for address translation.
32
2. Computer Networks, A. S. Tanenbaum 4th Edition, Practice Hall of India, New Network Layer
Delhi. 2003.
3. Douglas E. Comer, Internetworking with TCP/IP Vol.1: Principles, Protocols, and
Architecture (4th Edition).
6. www. wikipedia.org
1.10 SOLUTION/ANSWERS
33
Network, Transport
and Application UNIT 2 TRANSPORT LAYER
Layer
Structure Page No.
2.0 Introduction 34
2.1 Objective 34
2.2 Addressing 35
2.3 Reliable delivery 35
2.4 Flow control 38
2.5 Connection Management 38
2.6 Multiplexing 40
2.7 Congestion Control 40
2.8 Quality of Cervices (QoS) 42
2.9 TCP window Management 43
2.10 Ports 44
2.11 Summary 46
2.12 References/Further Reading 46
2.13 Solution /Answers 47
2.0 INTRODUCTION
The transport layer supports two protocols in TCP/IP protocol suite. One is
Transmission Control Protocol (TCP). TCP is connection oriented that provides
reliable end-to-end transmission. Another protocol is User Datagram Protocol (UDP).
UDP is simple and provides well sequenced transport function when reliability and
serving are less important than size and speed. Transport layer services are
implemented by transport protocols used between two transport entities. Transport
layer services are similar to the data link services. Data link layer is designed to
provide its services within a single network, while the transport layer provides
services across an inter network made up of many networks. There are seven
categories of services provided by the transport layer. These services are End to end
delivery, Addressing, Reliable delivery, Flow control, Connection management,
Multiplexing and Congestion Control.
2.1 OBJECTIVE
After going through this unit, you should be able to:
• Know the Functions and Services of transport layer
• Understand the Working of transport layer
• Understand the TCP Window management
• Know the different transport layer design issues
34
Transport Layer
2.2 ADDRESSING
Transport layer interact with the functions of session layer. Many protocols combine
session, presentation and application level protocols into a single package called an
application. In these cases delivery to the session layer functions is, in effect delivery
to the application. So communication occurs not just from end machine to end
machine but from end application to end application. Data generated by an application
on one machine must be received not just by other machines but by the correct
application on that machine.
In most cases, we end up with the communication between many to many entities,
called service access points as shown in figure 2 given below. To ensure accurate
delivery from service access point to service access point we used another level of
addressing in addition to the network and data link level.
1 2 3 6 5 9
Transport Transport
Network Network
Physical Physical
35
Network, Transport • Duplication control
and Application
Layer Reliable
Delivery
Mechanisms full errors handling at this layer are based on error detection and
retransmission. With the error handling, performed using algorithms
implemented in software such as checksum “error detection and correction”.
Segmentation: When the size of the data units received from the upper layer is
too long for the network layer datagram and data link layer frame to handle, the
transport layer divides it into smaller usable blocks. This dividing process is
called segmentation.
Concatenation: When the sizes of the data units belonging to a single session
are so small that several can fit together into a single data queue are frame, the
transport protocol combines them into a single data unit. This combining
process is called concatenation.
Sequence Number: Most transport layer services add sequence number at the
end of each segment.
If a longer data unit has been segmented the sequence number indicate the
reassembly.
If several shorter units have been concatenated the numbers indicate the end of
each subunit and allow them to be separated accurately at the destination.
c) Loss Control: The third aspect of reliability covered by the transport layer is
loss control as depicted in figure 4. The transport layer ensures all pieces of the
transmission arrive at the destination, not just some of them. When data have
been segmented for delivery, some segments may be lost in transmit. Sequence
number allows the receiver’s transport layer protocol to identify any missing
segment and request in delivery.
36
Transport Layer
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
2. List the methods or mechanism provided by Transport layer for reliable delivery
of data.
……………………………………………………………………………………
……………………………………………………………………………………
37
Network, Transport
and Application
2.4 FLOW CONTROL
Layer Like the data link layer transport layer is responsible for flow control. Flow control is
performed end to end rather than across a single link. Transport layer flow control
uses a sliding window protocol. The window at the transport layer can vary in size to
accommodate buffer occupancy as depicted in figure 6 given below.
Sliding window is used to make data transmission more efficient as well as to control
the flow of data so that the receiver does not become overwhelmed. Sliding window
used at the transport layer are usually byte oriented rather than frame oriented.
2. An acknowledgement can expand the size of the window based on the sequence
number of the acknowledged data segment.
38
This step is called connection establishment. Connection establishment requires three Transport Layer
actions called three way handshake as shown in figure 7 given below.
• The computer requesting the connection sends a connection request packet to
the intended receiver.
• The responding computer returns a confirmation packet to the requesting
computer.
• The requesting computing returns a packet acknowledging the confirmation.
Connection Termination: Once all of the data have been transferred, the connection
must be terminated.
39
Network, Transport
and Application
2.6 MULTIPLEXING
Layer To improve transmission efficiency, the transport layer has the option of multiplexing.
Multiplexing at this layer occurs in two ways as shown in figure 9:
1. Upward -meaning that multiple transport layer connections use the same
network connection
1 2 3 2
Transport
Layer
Transport
Layer
Upward Downward
40
Transport Layer
Figure 10:
Open Loop: Polices are applied to prevent congestion before it happens.
41
Network, Transport The size of the congestion window increase exponentially. The sender sends one
and Application segment receives one acknowledgement, increases the size to two segments, sends
Layer two segments, receives ack for two segments; increase the size to four and so on.
In other words, after receiving the 3rd ACK, the size of the window has been
increased to eight segments (i.e. 23 = 8). To avoid congestion before it happen one
must slow down this exponential growth. After the size reaches the threshold, the size
is increased one segment for each acknowledgement even if as ACK is for several
segment.
Multiplicative Decrease
If the congestion occurs the congestion windows size must be decreased. The only
way the sender causes that connection has occur through a lost segment. If the sender
does not receive an acknowledgement for a segment before it transmission timer
matured, it assumes that there is congestion.
The strategy says if a time out occurs, the threshold must be set to half of the
congestion window size and the congestion or size should start from one again.
2. Delay is defined as the time interval elapsed between the departures of data
from the source to its arrival at the destination.
3. Jitter: Jitter refers to the variation in time between packets arriving at the
destination.
2. Buffering: Flows can be buffered on the receiving side before being delivered.
Buffering those does not affected the reliability of bandwidth and increases the
delay but it smoothes out the jitter.
Here we discuss some scheduling techniques to improve the quality of service such as:
i) FIFO Queuing
42
Transport Layer
FIFO Queuing
In FIFO Queuing packets wait in a buffer (Queue) until the node is ready to
process them. If the average rate is higher than the average processing rate, the
queue will fill up and new packets will be discarded.
Priority Queuing
In this packets are first assigned to priority class. Each priority class has its
own Queue. The packets in the highest priority Queue are processed first. But if
there is a continuous flow in high-priority Queue, the packets in the low priority
Queues will never have a chance to be processes.
The system processes packets in each queue in a round-robin fashion with the
number of packets selected from each queue based on the corresponding weight.
For example: If the weights are 3, 2 and 1, three packets are processed from the
first queue, two from the second queue and one from the third queue.
If the system does not impose priority on the classes, all weights can be equal.
In thus way, we have fair queuing with priority.
4. Traffic Shaping
a) Leaky bucket
b) Token bucket
A sliding window is used to make transmission more efficient as well as to control the
flow of data so that the destination does not become over whelmed with data. TCP’s
sliding window is byte oriented
43
Network, Transport
and Application
Layer
Receiver Buffer is Full
1 byte
Receiver Buffer is Full
2. But the interactive application reads one byte from the buffer, so one byte space
becomes empty.
3. The receiving TCP sends a window update to the sender informing that it can
send 1 byte.
5. The buffer is full again and the window size is 0. The behavior can continue
forever’s.
The sender can also help to improve the situation. It should not send tiny segments
instead it must wait and send a full segment or at least one containing half of the
receivers buffers size.
2.10 PORTS
In computer networking of connection-based communication port is like a medium
through which, an application establish a connection with another application by
binding a socket by a port number. Addressing the information and the port number,
accompanied the data transfer over the network.
44
The Ports are used by TCP and UDP to deliver the data to the right application, are Transport Layer
identified by a 16-bit number present in the header of a data packet. Ports are typically
used to map data to a particular process running on a client. If we consider a letter
(data packet) sent to a particular apartment (IP) with house no. (Port no), at this time
the port no. is the most important part for the delivery of the letter. In order for the
delivery to work, the sender needs to include a house number along with the address
to ensure the letter gets to the right destination.
Do you know?
TCP and UDP ports are 16 bit number
The TCP and UDP protocols use ports to map incoming data to a particular process
running on a computer.
Types of Port
1. Well known port (0 to 1023)-They are controlled by IANA
Do you know?
Port number permits unique identification of several simultaneous processes using
TCP/UDP
Now we are aware of the importance of the port number. In the same order there are
some ports which are predefine and called reserved ports. Some of them are given in
Table 1given below:
45
Network, Transport Do you know?
and Application
Layer If we consider the range of the port numbers, there are 0 to 65,535 ports available.
Tips
The port numbers ranging from 0 - 1023 are reserved ports or we can say that are
restricted ports. All the 0 to 1023 ports are reserved for use by well-known services
such as FTP, telnet and http and other system services. These ports are called well-
known ports.
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
2.11 SUMMARY
Transport layer is mainly responsible for end to end reliable delivery, segmentation
and concatenation. Two main protocols that operate on transport layer are TCP and
UDP.TCP provides reliable connection oriented service while UDP provides
unreliable connectionless service. The data link and transport layer perform many of
the same duties .The data link layer function in a single network, while the transport
layer operates across an internet. Flow control at the transport layer is handles by
three walled sliding window. Multiplexing can be downward of upward in transport
layer. Connection establishment and termination can be done by using three way
handshakes. Transport layer works on port address. To know more about the
Transport layer and its protocols (TCP and UDP), student may please refer to the
course material of BCS-61TCP/IP Programming or BCS-54 Network Programming.
46
5. Larry L. Peterson, Computer Networks: A Systems Approach, 3rd Edition (The Transport Layer
Morgan Kaufmann Series in Networking).
7. www.wikipedia.org
47
Network, Transport
and Application
Layer
UNIT 3 APPLICATION LAYER
Structure Page No.
3.0 Introduction 48
3.1 Objectives 49
3.2 Client Server Architecture 49
3.3 Domain Name Server (DNS) 49
3.3.1 The DNS name space
3.3.2 Resource records
3.3.3 Name servers
3.3.4 Remote login (telnet)
3.3.5 The telnet application
3.3.6 The telnet protocol
3.4 Remote Login (Telnet) 54
3.4.1 The FTP application
3.4.2 The FTP protocol
3.5 File Transfer Protocol (FTP) 55
3.6 Network Management 56
3.6.1 Configuration management
3.6.2 Reconfiguration
3.6.3 Documentation
3.6.4 Fault management
3.6.5 Reactive fault management
3.6.6 Proactive fault management
3.6.7 Performance management
3.6.8 Security management
3.6.9 Accounting management
3.6.10 SNMP protocol
3.7 Word Wide Web and Client Server Applications 61
3.7.1 Architectural overview ( www)
3.8 Electronic Mail 70
3.8.1 Architecture and services
3.8.2 The user agent
3.9 Summary 73
3.10 References/Further Readings 73
3.11 Solutions / Answers 73
3.0 INTRODUCTION
The application layer contains a variety of protocols that are commonly needed by
users. One widely-used application protocol is HTTP (Hyper Text Transfer Protocol),
which is the basis for the World Wide Web. When a browser wants a Web page, it
sends the name of the page it wants to the server using HTTP. The server then sends
the page back. Other application protocols are used for file transfer, electronic mail,
and network news. The application layer enables the user, whether human or software,
to access the network. It provides user interfaces and support for services such as
electronic mail, remote file access and transfer, shared database management, and
other types of distributed information services. Application-layer functions typically
include identifying communication partners, determining resource availability, and
synchronizing communication. When identifying communication partners, the
application layer determines the identity and availability of communication partners
for an application that has data to transmit. When determining resource availability,
the application layer must decide whether sufficient network or the requested
communication exists. This unit covers the details of all important functions and
48
`
services of Application layer including different protocols available in Application Application Layer
layer.
3.1 OBJECTIVES
After going through this unit, you will be able to:
• define and know the functions of Application layer
• Understand the working of Domain Name Server
• Know the features and services of Telnet and FTP
• Understand the Network Management issues
• Understanding of the WWW Client/Server architecture
• Know the Email Architecture and Services
Server
When both clients and servers exchange important information to each other
connection establishes. Once with connection or link established, both client and
server could exchange any information with each other. We will read more details of
client/server architecture further in this unit during discussion about Word Wide Web.
49
Network, Transport
and Application Way back in the ARPANET, there was simply a file, hosts.txt that listed all the hosts
Layer
and their IP addresses. Every night, all the hosts would fetch it from the site at which
it was maintained. For a network of a few hundred large timesharing machines, this
approach worked reasonably well.
However, when thousands of minicomputers and PCs were connected to the net,
everyone realized that this approach could not continue to work forever. For one
thing, the size of the file would become too large. However, even more important,
host name conflicts would occur constantly unless names were centrally managed,
something unthinkable in a huge international network due to the load and latency. To
solve these problems, DNS (the Domain Name System) was invented.
50
`
In November 2000, ICANN approved four new, general-purpose, top-level domains, Application Layer
namely, biz (businesses), info (information), name (people's names), and pro
(professions, such as doctors and lawyers). In addition, three more specialized top-
level domains were introduced at the request of certain industries. These are aero
(aerospace industry), coop (co-operatives), and museum (museums). Other top-level
domains will be added in the future.
Each domain is named by the path upward from it to the (unnamed) root. The
components are separated by periods (pronounced ''dot''). Domain names can be either
absolute or relative. An absolute domain name always ends with a period (e.g.,
eng.sun.com.), whereas a relative one does not. Relative names have to be interpreted
in some context to uniquely determine their true meaning. In both cases, a named
domain refers to a specific node in the tree and all the nodes under it.
Domain names are case insensitive, so edu, Edu, and EDU mean the same thing.
Component names can be up to 63 characters long, and full path names must not
exceed 255 characters.
In principle, domains can be inserted into the tree in two different ways. For example,
cs.yale.edu could equally well be listed under the US country domain as cs.yale.ct.us.
In practice, however, most organizations in the United States are under a generic
domain, and most outside the United States are under the domain of their country.
There is no rule against registering under two top-level domains, but few
organizations except multinationals do it (e.g., sony.com and sony.nl).
Each domain controls how it allocates the domains under it. For example, Japan has
domains ac.jp and co.jp that mirror edu and com. The Netherlands does not make this
distinction and puts all organizations directly under nl. Thus, all three of the following
are university computer science departments:
51
Network, Transport Naming follows organizational boundaries, not physical networks. For example, if the
and Application computer science and electrical engineering departments are located in the same
Layer
building and share the same LAN, they can nevertheless have distinct domains.
A resource record is a five-tuple. Although they are encoded in binary for efficiency,
in most expositions, resource records are presented as ASCII text, one line per
resource record. The format we will use is as follows:
The Time_to_live field gives an indication of how stable the record is. Information
that is highly stable is assigned a large value, such as 86400 (the number of seconds in
1 day). Information that is highly volatile is assigned a small value, such as 60 (1
minute).
The third field of every resource record is the Class. For Internet information, it is
always IN. For non-Internet information, other codes can be used, but in practice,
these are rarely seen.
The Type field tells what kind of record this is. The most important types are listed in
Table. 1.2.2.
To avoid the problems associated with having only a single source of information, the
DNS name space is divided into non-overlapping zones. One possible way to divide
52
`
the name space is shown in figure 3. Each zone contains some part of the tree and Application Layer
also contains name servers holding the information about that zone.
Normally, a zone will have one primary name server, which gets its information from
a file on its disk, and one or more secondary name servers, which get their
information from the primary name server. To improve reliability, some servers for a
zone can be located outside the zone.
Figure 3: Part of the DNS name space showing the division into zones.
Where the zone boundaries are placed within a zone is up to that zone's administrator.
This decision is made in large part based on how many name servers are desired, and
where.
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
53
Network, Transport ……………………………………………………………………………………
and Application
Layer ……………………………………………………………………………………
The NVT terminals on the two hosts exchange data in the 7-bit U.S. variant of the
ASCII format, with each character sent as an octet with the first bit set to19-21-10.
Some control information, such as end-of-line indication, is transmitted as the
character sequence CR (carriage return) followed by an LF (linefeed). Each Telnet
control message starts with the special octet (Interpret as Command (IAC)) octet of all
1s) to ensure that the recipient interprets the subsequent octets as a command.
Otherwise, each octet is interpreted as data (e.g., a user keystroke). Sending control
messages on the same connection as the data is referred to as inband signaling. The
initial control messages between the client and the server are used to exchange
information about their capabilities (Telnet option negotiation). For example, the
client may indicate the type and speed of its terminal, and whether data is to be sent
one character or one line at a time. After the capabilities exchange, the server instructs
the client to send a login identifier and password. Once the authentication completes,
the user interacts directly with the remote machine. The client application relays user
keystrokes to the server, and the server relays the output back to the client, using
inband signaling, with the interpretation that commands follow the IAC octet of all
ones. Telnet cannot rely on the conventional data stream alone to carry such control
sequences between client and server.
54
`
Application Layer
3.5 FILE TRANSFER PROTOCAL (FTP)
FTP allows a user to copy files to and from a remote machine. The client program
also sends commands to the server program to coordinate the copying of files between
the two machines on behalf of the user.
2. A data connection is created each time a file is transferred between the client
and the server. The IP type of service for the data connection should be to
maximize throughput since this connection is file transfer, and we want to send
this entire file over a high bandwidth line. The specification of FTP includes
more than 30 different commands, which are transmitted over the control
connection in NVT ASCII format. The commands are not case-sensitive and
may have arguments; each command ends with a two character sequence of a
carriage return (CR) followed by a line feed (LF). It must be emphasized here
that these commands are different from the commands typed by the user at the
interface provided by the client. Transferring a single file for instance requires
only a single user-level command (e.g., put or get), but this single command
triggers the client to send a set of FTP commands to the server. The FTP server
responds to each command with a three-digit reply code (for the FTP client) and
an optional text message (for the user).
55
Network, Transport
and Application The control connection persists over a sequence of FTP commands, as the client
Layer
and the server continue their dialogue. The typical interaction starts with a
command that identifies the user on the server machine followed by another
command to send the user password. The arguments for these commands are
gleaned from the user's input (his account name and password). The server uses
this information to verify whether the user has an authorized account on the
remote machine, and in the case of anonymous FTP decides on the set of19-21-
3directories to which the anonymous guest has access. The next set of
commands depends on the user request to send, receive, or view the files in a
present directory.
The actual file (data) transfer uses a separate TCP connection established by the
host sending the data. For instance, if the user wants to retrieve the file
midterm.pdf from the remote server, the server initiates the creation of the TCP
data connection. In case, the user wants to put a file into the remote machine, it
is the client who initiates the creation of the TCP connection. The data
connection is usually established on port 20 on the server machine. In the
former case (when the file is to be retrieved from the server), the server does not
know the destination port for the FTP client. So before sending the command to
retrieve the file, the client instructs its operating system to allocate a port
number (above 1023) for such a transaction. This information is given to the
server via the control connection. The data connection is created (using the
usual TCP 3 way handshake), and the server writes the contents of the file, and
closes the connection. The client reads the bytes from its socket upto the end of
file (EOF) character. Also, unlike Telnet, FTP does not require the data transfer
to 7 bit ASCII characters (NVT format); it actually permits a wide range of data
types including binary files. The client requests the form of data transfer using
the control connection. In practice, each data transfer requires a separate TCP
connection. In contrast, the control connection can persist across multiple data
transfers.
We can say that the functions performed by a network management system can be
divided into five broad categories: configuration management, fault management,
performance management, security management, and accounting management.
56
`
Reconfiguration, which means adjusting the network components and features, can be
a daily occurrence in a large network. There are three types of reconfiguration:
hardware reconfiguration, software reconfiguration, and user-account reconfiguration.
Hardware reconfiguration covers all changes to the hardware. For example, a desktop
computer may need to be replaced. A router may need to be moved to another part of
the network. A sub network may be added or removed from the network. All these
need the time and attention of network management. In a large network, there must be
specialized personnel trained for quick and efficient hardware reconfiguration.
Unfortunately, this type of reconfiguration cannot be automated and must be manually
handled case by case.
Software reconfiguration covers all changes to the software. For example, new
software may need to be installed on servers or clients. An operating system may need
updating. Fortunately, most software reconfiguration can be automated. For example,
updating an application on some or all clients can be electronically downloaded from
the server.
3.6.3 Documentation
The original network configuration and each subsequent change must be recorded
meticulously. This means that there must be documentation for hardware, software,
and user accounts. Hardware documentation normally involves two sets of
documents: maps and specifications. Maps track each piece of hardware and its
connection to the network. There can be one general map that shows the logical
relationship between each sub-network. There can also be a second general map that
shows the physical location of each sub-network. For each sub network, then, there
are one or more maps that show all pieces of equipment. The maps use some kind of
standardization to be easily read and understood by current and future personnel. Each
piece of hardware also needs to be documented. There must be a set of specifications
for each piece of hardware connected to the network. These specifications must
include information such as hardware type, serial number, vendor (address and phone
number), time of purchase, and warranty information. All software must also be
documented. Software documentation includes information such as the software type,
the version, the time installed, and the license agreement. Most operating systems
have a utility that allows the documentation of user accounts and their privileges. The
management must make sure that the files with this information are updated and
secured. Some operating systems record access privileges in two documents one
shows all files and access types for each user; the other shows the list of users that
have a particular access to a file.
57
Network, Transport 3.6.5 Reactive Fault Management
and Application
Layer A reactive fault management system is responsible for detecting, isolating, correcting,
and recording faults. It handles short-term solutions to faults. The first step taken by a
reactive fault management system is to detect the exact location of the fault. A fault is
defined as an abnormal condition in the system. When a fault occurs, either the
system stops working properly or the system creates excessive errors. A good example
of a fault is a damaged communication medium. This fault may interrupt
communication or produce excessive errors.
The next step taken by a reactive fault management system is to isolate the fault. A
fault, if isolated, usually affects only a few users. After isolation, the affected users
are immediately notified and given an estimated time of correction. The third step is
to correct the fault. This may involve replacing or repairing the faulty
component(s).After the fault is corrected, it must be documented. The record should
show the exact location of the fault, the possible cause, the action or actions taken to
correct the fault, the cost, and time it took for each step. Documentation is extremely
important for several reasons:
• The problem may recur. Documentation can help the present or future
administrator or technician solve a similar problem.
• The frequency of the same kind of failure is an indication of a major problem in
the system. If a fault happens frequently in one component, it should be
replaced with a similar one, or the whole system should be changed to avoid the
use of that type of component.
• The statistic is helpful to another part of network management, performance
management.
Capacity
One factor that must be monitored by a performance management system is the
capacity of the network. Every network has a limited capacity, and the performance
management system must ensure that it is not used above this capacity. For example,
if a LAN is designed for 100 stations at an average data rate of2 Mbps, it will not
operate properly if 200 stations are connected to the network. The data rate will
decrease and blocking may occur.
Traffic
58
`
Traffic can be measured in two ways: internally and externally. Internal traffic is Application Layer
measured by the number of packets (or bytes) traveling inside the network for a given
period. External traffic is measured by the exchange of packets (or bytes) outside the
network. During peak hours, when the system is heavily used, blocking may occur if
there is excessive traffic.
Throughput
We can measure the throughput of an individual device (such as a router) or a part of
the network. Performance management monitors the throughput to make sure that it is
not reduced to unacceptable levels.
Response Time
Response time is normally measured from the time a user requests a service to the
time the service is granted. Other factors such as capacity and traffic can affect the
response time. Performance management monitors the average response time and the
peak-hour response time. Any increase in response time is a very serious condition as
it is an indication that the network is working above its capacity.
59
Network, Transport A typical agent usually
and Application
Layer • Implements full SNMP protocol.
• Stores and retrieves management data as defined by the Management Information
Base.
• Can asynchronously signal an event to the manager
• Can be a proxy for some non-SNMP manageable network node.
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
60
`
Application Layer
3.7 WORD WIDE WEB AND CLIENT SERVER
APPLICATIONS
The World Wide Web is an architectural framework for accessing linked documents
spread out over millions of machines all over the Internet. In the last decade on so it
went from being a way to distribute high-energy physics data to the application that
millions of people think of as being ''The Internet.'' Its enormous popularity stems
from the fact that it has a colorful graphical interface that is easy for beginners to use,
and it provides an enormous wealth of information on almost every conceivable
subject.
The Web (also known as WWW) began in 1989 at CERN, the European center for
nuclear research. CERN has several accelerators at which large teams of scientists
from the participating European countries carry out research in particle physics. These
teams often have members from half a dozen or more countries. Most experiments are
highly complex and require years of advance planning and equipment construction.
The Web grew out of the need to have these large teams of internationally dispersed
researchers collaborate using a constantly changing collection of reports, blueprints,
drawings, photos, and other documents.
The initial proposal for a web of linked documents came from CERN physicist Tim
Berners-Lee in March 1989. The first (text-based) prototype was operational 18
months later. In December 1991, a public demonstration was given at the Hypertext
'91 conference in San Antonio, Texas.
This demonstration and its attendant publicity caught the attention of other
researchers, which led Marc Andreessen at the University of Illinois to start
developing the first graphical browser, Mosaic. It was released in February 1993.
Mosaic was so popular that a year later, Andreessen left to form a company, Netscape
Communications Corp., whose goal was to develop clients, servers, and other Web
software. When Netscape went public in 1995, investors, apparently thinking this was
the next Microsoft, paid $1.5 billion for the stock. This record was all the more
surprising because the company had only one product, was operating deeply in the
red, and had announced in its prospectus that it did not expect to make a profit for the
foreseeable future. For the next three years, Netscape Navigator and Microsoft's
Internet Explorer engaged in a ''browser war,'' each one trying frantically to add more
features (and thus more bugs) than the other one. In 1998, America Online bought
Netscape Communications Corp. for $4.2 billion, thus ending Netscape's brief life as
an independent company.
In 1994, CERN and M.I.T. signed an agreement setting up the World Wide Web
Consortium (sometimes abbreviated as W3C), an organization devoted to further
developing the Web, standardizing protocols, and encouraging interoperability
between sites. Berners-Lee became the director. Since then, several hundred
universities and companies have joined the consortium. Although there are now more
books about the Web than you can shake a stick at, the best place to get up-to-date
information about the Web is (naturally) on the Web itself.
61
Network, Transport invented by a visionary M.I.T. professor of electrical engineering, Vannevar Bush, in
and Application 1945, long before the Internet was invented.
Layer
Pages are viewed with a program called a browser, of which Internet Explorer and
Netscape Navigator are two popular ones. The browser fetches the page requested,
interprets the text and formatting commands on it, and displays the page, properly
formatted, on the screen. Web pages, starts with a title, contain some information, and
ends with the e-mail address of the page's maintainer. Strings of text that are links to
other pages, called hyperlinks, are often highlighted, by underlining, displaying them
in a special color, or both. To follow a link, the user places the mouse cursor on the
highlighted area, which causes the cursor to change, and clicks on it. Although non
graphical browsers, such as Lynx, exist, they are not as popular as graphical browsers.
Voice-based browsers are also being developed.
The basic model of how the Web works is shown in Figure 4, Here the browser is
displaying a Web page on the client machine. When the user clicks on a line of text
that is linked to a page on the abcd.com server, the browser follows the hyperlink by
sending a message to the abcd.com server asking it for the page. When the page
arrives, it is displayed. If this page contains a hyperlink to a page on the xyz.com
server that is clicked on, the browser then sends a request to that machine for the
page, and so on indefinitely.
It is sufficient to know that a URL has three parts: the name of the protocol (http), the
DNS name of the machine where the page is located (www.abcd.com), and (usually)
the name of the file containing the page (products.html).
When a user clicks on a hyperlink, the browser carries out a series of steps in order to
fetch the page pointed to. Suppose that a user is browsing the Web and finds a link on
Internet telephony that point to ITU's home page, which is
http://www.itu.org/home/index.html. Let us trace the steps that occur when this link is
selected.
1. The browser determines the URL (by seeing what was selected).
62
`
2. The browser asks DNS for the IP address of www.itu.org. Application Layer
Many browsers display which step they are currently executing in a status line at the
bottom of the screen. In this way, when the performance is poor, the user can see if it
is due to DNS not responding, the server not responding, or simply network
congestion during page transmission.
In addition to having ordinary text (not underlined) and hypertext (underlined), Web
pages can also contain icons, line drawings, maps, and photographs. Each of these can
(optionally) be linked to another page. Clicking on one of these elements causes the
browser to fetch the linked page and display it on the screen, the same as clicking on
text. With images such as photos and maps, which page is fetched next may depend
on what part of the image was clicked on.
Not all pages contain HTML. A page may consist of a formatted document in PDF
format, an icon in GIF format, a photograph in JPEG format, a song in MP3 format, a
video in MPEG format, or any one of hundreds of other file types. Since standard
HTML pages may link to any of these, the browser has a problem when it encounters
a page it cannot interpret.
Rather than making the browsers larger and larger by building in interpreters for a
rapidly growing collection of file types, most browsers have chosen a more general
solution. When a server returns a page, it also returns some additional information
about the page. This information includes the MIME type of the page. Pages of type
text/html are just displayed directly, as are pages in a few other built-in types. If the
MIME type is not one of the built-in ones, the browser consults its table of MIME
types to tell it how to display the page.
There are two possibilities: plug-ins and helper applications. A plug-in is a code
module that the browser fetches from a special directory on the disk and installs as an
extension to itself, as illustrated in Figure 5(a) Because plug-ins run inside the
browser, they have access to the current page and can modify its appearance. After the
plug-in has done its job (usually after the user has moved to a different Web page), the
plug-in is removed from the browser's memory.
63
Network, Transport
and Application
Layer
In addition, the browser makes a set of its own procedures available to the plug-in, to
provide services to plug-ins. Typical procedures in the browser interface are for
allocating and freeing memory, displaying a message on the browser's status line, and
querying the browser about parameters.
Before a plug-in can be used, it must be installed. The usual installation procedure is
for the user to go to the plug-in's Web site and download an installation file. On
Windows, this is typically a self-extracting zip file with extension .exe. When the zip
file is double clicked, a little program attached to the front of the zip file is executed.
This program unzips the plug-in and copies it to the browser's plug-in directory. Then
it makes the appropriate calls to register the plug-in's MIME type and to associate the
plug-in with it. On UNIX, the installer is often a shell script that handles the copying
and registration.
The other way to extend a browser is to use a helper application. This is a complete
program, running as a separate process. It is illustrated in Figure 5(b). Since the helper
is a separate program, it offers no interface to the browser and makes no use of
browser services. Instead, it usually just accepts the name of a scratch file where the
content file has been stored, opens the file, and displays the contents. Typically,
helpers are large programs that exist independently of the browser, such as Adobe's
Acrobat Reader for displaying PDF files or Microsoft Word. Some programs (such as
Acrobat) have a plug-in that invokes the helper itself.
Many helper applications use the MIME type application. A considerable number of
subtypes have been defined, for example, application/pdf for PDF files and
application/msword for Word files. In this way, a URL can point directly to a PDF or
Word file, and when the user clicks on it, Acrobat or Word is automatically started
and handed the name of a scratch file containing the content to be displayed.
Consequently, browsers can be configured to handle a virtually unlimited number of
document types with no changes to the browser. Modern Web servers are often
64
`
configured with hundreds of type/subtype combinations and new ones are often added Application Layer
every time a new program is installed.
Helper applications are not restricted to using the application MIME type. Adobe
Photoshop uses image/x-photoshop and Real One Player is capable of handling
audio/mp3, for example.
On UNIX, this registration process is generally not automatic. The user must
manually update certain configuration files. This approach leads to more work but
fewer surprises.
Browsers can also open local files, rather than fetching them from remote Web
servers. Since local files do not have MIME types, the browser needs some way to
determine which plug-in or helper to use for types other than its built-in types such as
text/html and image/jpeg. To handle local files, helpers can be associated with a file
extension as well as with a MIME type. With the standard configuration, opening
foo.pdf will open it in Acrobat and opening bar.doc will open it in Word. Some
browsers use the MIME type, the file extension, and even information taken from the
file itself to guess the MIME type. In particular, Internet Explorer relies more heavily
on the file extension than on the MIME type when it can.
Here, too, conflicts can arise since many programs are willing, in fact, eager, to
handle, say, .mpg. During installation, programs intended for professionals often
display checkboxes for the MIME types and extensions they are prepared to handle to
allow the user to select the appropriate ones and thus not overwrite existing
associations by accident. Programs aimed at the consumer market assume that the user
does not have a clue what a MIME type is and simply grab everything they can
without regard to what previously installed programs have done.
The ability to extend the browser with a large number of new types is convenient but
can also lead to trouble. When Internet Explorer fetches a file with extension exe, it
realizes that this file is an executable program and therefore has no helper. The
obvious action is to run the program. However, this could be an enormous security
hole. All a malicious Web site has to do is produce a Web page with pictures of, say,
movie stars or sports heroes, all of which are linked to a virus. A single click on a
picture then causes an unknown and potentially hostile executable program to be
fetched and run on the user's machine. To prevent unwanted guests like this, Internet
Explorer can be configured to be selective about running unknown programs
automatically, but not all users understand how to manage the configuration.
65
Network, Transport The steps that the server performs in its main loop are as follows:
and Application
Layer 1. Accept a TCP connection from a client (a browser).
Modern Web servers have more features, but in essence, this is what a Web server
does.
A problem with this design is that every request requires making a disk access to get
the file. The result is that the Web server cannot serve more requests per second than
it can make disk accesses.
One obvious improvement (used by all Web servers) is to maintain a cache in memory
of the n most recently used files. Before going to disk to get a file, the server checks
the cache. If the file is there, it can be served directly from memory, thus eliminating
the disk access. Although effective caching requires a large amount of main memory
and some extra processing time to check the cache and manage its contents, the
savings in time are nearly always worth the overhead and expense.
The next step for building a faster server is to make the server multithreaded. In one
design, the server consists of a front-end module that accepts all incoming requests
and k processing modules, as shown in Figure 6. The k + 1 threads all belong to the
same process so the processing modules all have access to the cache within the
process' address space. When a request comes in, the front end accepts it and builds a
short record describing it. It then hands the record to one of the processing modules.
In another possible design, the front end is eliminated and each processing module
tries to acquire its own requests, but a locking protocol is then required to prevent
conflicts.
Figure 6: A multithreaded Web server with a front end and processing modules.
The processing module first checks the cache to see if the file needed is there. If so, it
updates the record to include a pointer to the file in the record. If it is not there, the
processing module starts a disk operation to read it into the cache (possibly discarding
some other cached files to make room for it). When the file comes in from the disk, it
is put in the cache and also sent back to the client.
The advantage of this scheme is that while one or more processing modules are
blocked waiting for a disk operation to complete (and thus consuming no CPU time),
other modules can be actively working on other requests. Of course, to get any real
66
`
improvement over the single-threaded model, it is necessary to have multiple disks, so Application Layer
more than one disk can be busy at the same time. With k processing modules and k
disks, the throughput can be as much as k times higher than with a single-threaded
server and one disk.
In theory, a single-threaded server and k disks could also gain a factor of k, but the
code and administration are far more complicated since normal blocking READ
system calls cannot be used to access the disk. With a multithreaded server, they can
be used since then a READ blocks only the thread that made the call, not the entire
process.
Modern Web servers do more than just accept file names and return files. In fact, the
actual processing of each request can get quite complicated. For this reason, in many
servers each processing module performs a series of steps. The front end passes each
incoming request to the first available module, which then carries it out using some
subset of the following steps, depending on which ones are needed for that particular
request.
Step 1 is needed because the incoming request may not contain the actual name of the
file as a literal string. For example, consider the URL http://www.cs.vu.nl, which has
an empty file name. It has to be expanded to some default file name. Also, modern
browsers can specify the user's default language (e.g., Italian or English), which
makes it possible for the server to select a Web page in that language, if available. In
general, name expansion is not quite so trivial as it might at first appear, due to a
variety of conventions about file naming.
Step 2 consists of verifying the client's identity. This step is needed for pages that are
not available to the general public. We will discuss one way of doing this later in this
chapter.
Step 3 checks to see if there are restrictions on whether the request may be satisfied
given the client's identity and location. Step 4 checks to see if there are any access
restrictions associated with the page itself. If a certain file (e.g., .htaccess) is present
in the directory where the desired page is located, it may restrict access to the file to
particular domains, for example, only users from inside the company.
Steps 5 and 6 involve getting the page. Step 6 needs to be able to handle multiple
disk reads at the same time.
67
Network, Transport Step 7 is about determining the MIME type from the file extension, first few words of
and Application the file, a configuration file, and possibly other sources.
Layer
Step 8 is for a variety of miscellaneous tasks, such as building a user profile or
gathering certain statistics.
Step 9 is where the result is sent back and step 10 makes an entry in the system log
for administrative purposes. Such logs can later be mined for valuable information
about user behavior, for example, the order in which people access the pages.
If too many requests come in each second, the CPU will not be able to handle the
processing load, no matter how many disks are used in parallel. The solution is to add
more nodes (computers), possibly with replicated disks to avoid having the disks
become the next bottleneck. This leads to the server farm model of Figure 7. A front
end still accepts incoming requests but sprays them over multiple CPUs rather than
multiple threads to reduce the load on each computer. The individual machines may
themselves be multithreaded and pipelined as before.
Sometimes a trick, called TCP handoff, is used to get around this problem. With this
trick, the TCP end point is passed to the processing node so it can reply directly to the
client, shown in Figure 8(b). This handoff is done in a way that is transparent to the
client.
Figure 8: (a) Normal request-reply message sequence. (b) Sequence when TCP handoff is
used.
68
`
Hyper Text Transfer Protocol (HTTP) is used mainly to transfer data on World Wide
Web. The commands from the client are embedded in a request message .The contents
of the request message are embedded in a response message. HTTP uses the services
of TCP at port 80.
The first line of response indicates that the server is also using HTTP version 1.0 .the
return code of 200 indicates that the server processed the request successfully.
Request message can be of following types:
Method Action
GET Requests a document from the server
HEAD Request information about the document but not the
document itself; i.e. head of the HTML page
POST Sends some information from client to server. It appends
the data to the existing document.
PUT Sends a document from to server. It replaces the existing
document.
TRACE Echoes the incoming request
CONNECT Reserved
OPTION Enquire about available options
69
Network, Transport
and Application 3.8 ELECTRONIC MAIL
Layer
Electronic mail, or e-mail, as it is known to its many fans, has been around for over
two decades. Before 1990, it was mostly used in academia. During the 1990s, it
became known to the public at large and grew exponentially to the point where the
number of e-mails sent per day now is vastly more than the number of snail mail (i.e.,
paper) letters.
E-mail, like most other forms of communication, has its own conventions and styles.
In particular, it is very informal and has a low threshold of use. People who would
never dream of calling up or even writing a letter to a Very Important Person do not
hesitate for a second to send a sloppily-written e-mail.
E-mail is full of jargon such as BTW (By The Way), ROTFL (Rolling On The Floor
Laughing), and IMHO (In My Humble Opinion). Many people also use little ASCII
symbols called smileys or emoticons in their e-mail.
The first e-mail systems simply consisted of file transfer protocols, with the
convention that the first line of each message (i.e., file) contained the recipient's
address. As time went on, the limitations of this approach became more obvious.
Some of the complaints were as follows:
4. If someone was planning to be away on business for several weeks and wanted
all incoming e-mail to be handled by his secretary, this was not easy to arrange.
5. The user interface was poorly integrated with the transmission system requiring
users first to edit a file, then leave the editor and invoke the file transfer
program.
6. It was not possible to create and send messages containing a mixture of text,
drawings, facsimile, and voice.
Composition refers to the process of creating messages and answers. Although any
text editor can be used for the body of the message, the system itself can provide
assistance with addressing and the numerous header fields attached to each message.
For example, when answering a message, the e-mail system can extract the
70
`
originator's address from the incoming e-mail and automatically insert it into the Application Layer
proper place in the reply.
Transfer refers to moving messages from the originator to the recipient. In large part,
this requires establishing a connection to the destination or some intermediate
machine, outputting the message, and releasing the connection. The e-mail system
should do this automatically, without bothering the user.
Reporting has to do with telling the originator what happened to the message. Was it
delivered? Was it rejected? Was it lost? Numerous applications exist in which
confirmation of delivery is important and may even have legal significance (''Well,
Your Honor, my e-mail system is not very reliable, so I guess the electronic subpoena
just got lost somewhere'').
Displaying incoming messages is needed so people can read their e-mail. Sometimes
conversion is required or a special viewer must be invoked, for example, if the
message is a PostScript file or digitized voice. Simple conversions and formatting are
sometimes attempted as well.
Disposition is the final step and concerns what the recipient does with the message
after receiving it. Possibilities include throwing it away before reading, throwing it
away after reading, saving it, and so on. It should also be possible to retrieve and
reread saved messages, forward them, or process them in other ways.
In addition to these basic services, some e-mail systems, especially internal corporate
ones, provide a variety of advanced features. Let us just briefly mention a few of
these. When people move or when they are away for some period of time, they may
want their e-mail forwarded, so the system should be able to do this automatically.
Most systems allow users to create mailboxes to store incoming e-mail. Commands
are needed to create and destroy mailboxes, inspect the contents of mailboxes, insert
and delete messages from mailboxes, and so on.
Sending E-mail
To send an e-mail message, a user must provide the message, the destination address,
and possibly some other parameters.
Reading E-mail
Typically, when a user agent is started up, it looks at the user's mailbox for incoming
e-mail before displaying anything on the screen. Then it may announce the number of
71
Network, Transport messages in the mailbox or display a one-line summary of each one and wait for a
and Application command.
Layer
SMTP server (Simple Mail Transfer Protocol)
For email messaging, every domain maintains an email server. The server runs
protocols software that enable email communication. There are two main emails
protocols: POP and SMTP. Because both the email protocol software programs run on
server computers, the server computers are themselves called POP server and SMTP
server. A single server can host both the POP and SMTP server programs.
SMTP is the Internet protocol used to transfer electronic mail between computers.
The second generation of SMTP is called ESMTP (for Extended SMTP), but the
differences are not important for this introduction.
It actually transfers the email message from the SMTP server of the sender to the
SMTP server of the recipient. Its main job is to carry the message between the sender
and the receiver. It uses TCP/IP underneath. That is, it runs on top of TCP/IP.
At the sender’s site, an SMTP server takes the message sent by a user’s computer.
The SMTP server at the sender’s end then transfers the message to the SMTP server of
the recipient.
The SMTP server at the recipient’s end takes the message and stores it in the
appropriate user’s mailbox.
……………………………………………………………………………………
……………………………………………………………………………………
b) What are the uses of the Internet?
(A) Communication
(B) Information Retrieval
(C) Presentation of Information
(D) All of the above
……………………………………………………………………………………
……………………………………………………………………………………
c) net domain is used for
(A) Educational institution
(B) Internet infrastructure and service providers
(C) International organizations
(D) None of the above
……………………………………………………………………………………
……………………………………………………………………………………
72
`
……………………………………………………………………………………
3.9 SUMMARY
This completes our discussion on the application layer. Include identifying
communication partners, determining resource availability, and synchronizing
communication. When identifying communication partners, the application layer
determines the identity and availability of communication partners for an application
with data to transmit. When determining resource availability, the application layer
must decide whether sufficient network or the requested communication exists. The
unit very well defines the concept of DNS and various internet and communication
related issues like www, emailing system, FTP, Telnet etc. To know further about
different application layer protocol students may refer to the course material of BCS-
052: Network Programming and Administration
6. www. wikipedia.org
73
Network, Transport 3. A single name server could contain the entire DNS database and respond to all
and Application queries about it. In practice, this server would be so overloaded as to be useless.
Layer
Furthermore, if it ever went down, the entire Internet would be crippled. To
avoid the problems associated with having only a single source of information,
the DNS name space is divided into non-overlapping zones. A zone will have
one primary name server, which gets its information from a file on its disk, and
one or more secondary name servers, which get their information from the
primary name server. To improve reliability, some servers for a zone can be
located outside the zone.
3. Configuration management system must know, at any time, the status of each
entity and its relation to other entities. Configuration management can be
divided into two subsystems: reconfiguration and documentation.
74
`
involves two sets of documents: maps and specifications. Maps track each piece Application Layer
of hardware and its connection to the network. There can be one general map
that shows the logical relationship between each sub-network. There can also be
a second general map that shows the physical location of each sub-network. For
each sub network, then, there are one or more maps that show all pieces of
equipment. The maps use some kind of standardization to be easily read and
understood by current and future personnel. Each piece of hardware also needs
to be documented. There must be a set of specifications for each piece of
hardware connected to the network
2. FTP and HTTP were developed to make Internet transmission better. FTP is
used to exchange files between computer accounts, to transfer files between an
account and a desktop computer (upload), or to access software archives on the
Internet. It's also commonly used to download programs and other files to your
computer from other servers. It transfers files in two different formats ASCII
for text files and Binary format for binary files. This allows a user to perform
basic file and directory management operations such as deleting, copying, or
renaming. HTTP is used primarily in today’s society as a set of rules for
exchanging files (text, graphic images, sound, video, and other multimedia files)
on the World Wide Web. It also provides access to other protocols like FTP,
SMTP, NNTP, WAIS, Gopher, Telnet, and TN3270. Essential concepts that are
part of HTTP include (as its name implies) the idea that files can contain
references to other files whose selection will elicit additional transfer requests.
Any web server machine contains, in addition to the HTML and other files it
can serve, an HTTP daemon, a program that is designed to wait for HTTP
requests and handle them when they arrive.
75
Network, Transport
and Application UNIT 4 NETWORK APPLICATIONS
Layer
4.0 Introduction 76
4.1 Objectives 76
4.2 Internet Applications 76
4.2.1 Email
4.2.2 Chatting
4.3 Social Networking 79
4.3.1 Blogs
4.3.2 Online multiplayer gaming
4.3.3 Facebook
4.3.4 Emerging Trends
4.3.5 Characteristics of social Networking
4.4 Railway Reservation System 85
4.5 Information Sharing 91
4.6 Electronic Governance 92
4.7 Online Processing and Collaborations 95
4.8 Mobile Applications 98
4.9 Summary 100
4.10 References/Further Readings 100
4.11 Solutions/Answers 101
4.0 INTRODUCTION
In this unit we are concentrating on the kind of applications that are used on
the Internet. It is the part of network protocol (in the sense that they exchange
messages with their peers on other machines) and part of traditional application
program (in the sense that they interact with the windowing system, the file system,
and ultimately, the user). It includes some of the most popular network applications
available today Like: The World Wide Web and Email etc. We have also discussed
some of the real-time applications like social networking, chatting, Railway
Reservation system, Mobile Applications etc.
4.1 OBJECTIVES
After going through this unit you will be able to:
• define the logical structure of the Internet Applications;
• define the structure and working of network applications;
• define the concept of information sharing;
• discuss the basic features of E-Governance; and
• define the various components of mobile Applications;
76
resources and services, such as the inter-linked hypertext documents of the World Network Applications
Wide Web (WWW) and the infrastructure to support email.
The origins of the Internet reach back to research of the 1960s, commissioned by
the United States government in collaboration with private commercial interests to
build robust, fault-tolerant, and distributed computer networks. The funding of a new
U.S. backbone by the National Science Foundation in the 1980s, as well as private
funding for other commercial backbones, led to worldwide participation in the
development of new networking technologies, and the merger of many networks.
The commercialization of what was by the 1990s an international network resulted in
its popularization and incorporation into virtually every aspect of modern human life.
As of 2011, more than 2.2 billion people – nearly a third of Earth's population — use
the services of the Internet.
The term the Internet, when referring to the entire global system of IP networks, has
been treated as a proper noun and written with an initial capital letter. In the media
and popular culture, a trend has also developed to regard it as a generic term or
common noun and thus write it as "the internet", without capitalization. Some guides
specify that the word should be capitalized as a noun but not capitalized as an
adjective.
The terms Internet and World Wide Web are often used in everyday speech without
much distinction. However, the Internet and the World Wide Web are not one and the
same. The Internet establishes a global data communications system between
computers. In contrast, the Web is one of the services communicated via the Internet.
It is a collection of interconnected documents (web pages) and other resources, linked
by hyperlinks and URLs. In addition to the Web, the Internet also powers a multitude
of other services, including (among others) email, file transfer, newsgroups, and
online games. Web services can exist apart from the internet, such as on a private
intranet.
77
Network, Transport The Internet allows greater flexibility in working hours and location, especially with
and Application the spread of unmetered high-speed connections. The Internet can be accessed almost
Layer anywhere by numerous means, including through mobile Internet devices. Mobile
phones, data cards, handheld game consoles and cellular routers allow users to
connect to the Internet wirelessly. Within the limitations imposed by small screens
and other limited facilities of such pocket-sized devices, the services of the Internet,
including email and the web, may be available. Service providers may restrict the
services offered and mobile data charges may be significantly higher than other access
methods.
The low cost and nearly instantaneous sharing of ideas, knowledge, and skills has
made collaborative work dramatically easier, with the help of collaborative software.
Not only can a group cheaply communicate and share ideas but the wide reach of the
Internet allows such groups more easily to form. An example of this is the free
software movement, which has produced, among other things, Linux, Mozilla Firefox,
and OpenOffice.org. Internet chat, whether in the form of an IRC chat room or
channel, via an instant messaging system, or a social networking website, allows
colleagues to stay in touch in a very convenient way when working at their computers
during the day. Messages can be exchanged even more quickly and conveniently than
via email. These systems may allow files to be exchanged, drawings and images to be
shared, or voice and video contact between team members.
4.2.1 Email
Electronic mail is one of the most popular tools made available through the Internet. It
is an efficient and effective means of network communication. You can call it as an
electronic postal system. One of the most valuable features of communicating via
email is that it is asynchronous, meaning the recipient need not be at a computer to
receive the message you send. The message will be stored and available to be read
when the recipient is ready to read it. In order to send and receive email, you must
have access to an Email account.
4.2.2 Chatting
Chatting may refer to any kind of communication over the Internet that offers a real
time direct transmission of text-based messages from sender to receiver, hence the
delay for visual access to the sent message shall not hamper the flow of
communications in any of the directions. Online chat may address point-to-
point communications as well as multicast communications from one sender to many
receivers and voice and video chat or may be a feature of a Web conferencing service.
Online chat in a lesser stringent definition may be primarily any direct text-based or
video-based (webcams), one-on-one chat or one-to-many group chat (formally also
known asynchronous conferencing), using tools such as instant messengers, Internet
Relay Chat, talkers and possibly MUDs. The expression online chat comes from the
word chat which means "informal conversation". Online chat includes web-based
applications that allow communication - often directly addressed, but anonymous -
between users in a multi-user environment. Web conferencing is a more specific
78
online service, which is often sold as a service, hosted on a web server controlled by Network Applications
the vendor.
“Real-time communication between two users via computer. Once a chat has been
initiated, either user can enter text by typing on the keyboard and the entered text will
appear on the other user's monitor. Most networks and online services offer a
chat feature.”
Social networking websites such as Facebook, Twitter, and MySpace have created
new ways to socialize and interact, some of these social networking groups are
depicted in the Figure 1. Users of these sites are able to add a wide variety of
information to pages, to pursue common interests, and to connect with others. It is
also possible to find existing acquaintances, to allow communication among existing
groups of people. Sites like LinkedIn foster commercial and business connections.
YouTube and Flickr specialize in users' videos and photographs.
79
Network, Transport
and Application
Layer
4.3.1 Blogs
Blog is a website where entries are written as commentary or news on a particular
subject such as food, politics, or local news; some function as more personal online
diaries. A typical blog combines text, images, and links to other blogs, web pages, and
other media related to its topic. The ability for readers to leave comments in an
interactive format is an important part of many blogs. Most blogs are primarily
textual, although some focus on art, photographs, videos and music and are part of a
wider network of social media. One of the Blogging service named Blogger is
depicted in the Figure 2.
80
Blogging is gaining popularity in education, as it removes the technical barriers of Network Applications
writing and publishing online, which encourages students to keep a record of their
ideas and thinking over time. Blogging also facilitate readers to give critical feedback
on any topic, readers can add comments, where readers can be teachers, other students
or a wider viewers. Teachers should investigate the potential of blogs, media-sharing
services and other social software, which can be used create new learning
opportunities. Students can also use the blogs as blog can provide a personal space
online, to ask questions, comment on other questions, publish work, and link to other
web sources. However a blog needn't be restricted to a single author, it can merge
different kinds of ideas, including fellow students, teachers, and subject specialists.
An example: http://edu.blogs.com/.
Internet usage has been correlated to users' loneliness. Lonely people tend to use the
Internet as an outlet for their feelings and to share their stories with others, such as in
the "I am lonely will anyone speak to me" thread.
81
Network, Transport example, share interests, activities, backgrounds, or real-life connections. A social
and Application network service consists of a representation of each user (often a profile), his/her
Layer social links, and a variety of additional services. Most social network services
are web-based and provide means for users to interact over the Internet, such as e-
mail and instant messaging. Online community services are sometimes considered as a
social network service, though in a broader sense, social network service usually
means an individual-centered service where as online community services are group-
centered. Social networking sites allow users to share ideas, activities, events, and
interests within their individual networks.
The main types of social networking services are those that contain category places
(such as former school year or classmates), means to connect with friends (usually
with self-description pages), and a recommendation system linked to trust. Popular
methods now combine many of these, with Facebook, Twitter and Google+ widely
used worldwide.
4.3.3 Facebook
At present, Facebook is one of the popular Social Networking sites used by millions
of people around the world, especially young people including your learners to
connect to each other; Figure 3 shows the Login/Signup page for Facebook. This site
is a free and effective way of communication on-line with your learners. You can, for
example, send the messages, assignments and on-line resources for your subject. They
in turn can communicate with you by posting questions etc.
82
4.3.4 Emerging Trends Network Applications
As the increase in popularity of social networking is on a constant rise, new uses for
the technology are constantly being observed.
At the forefront of emerging trends in social networking sites is the concept of "real-
time web" and "location-based." Real-time allows users to contribute content, which
is then broadcast as it is being uploaded - the concept is analogous to live radio and
television broadcasts. Twitter set the trend for "real-time" services, wherein users can
broadcast to the world what they are doing, or what is on their minds within a 140-
character limit. Facebook followed suit with their "Live Feed" where users' activities
are streamed as soon as it happens. While Twitter focuses on words, Clixtr, another
real-time service, focuses on group photo sharing wherein users can update their
photo streams with photos while at an event. Facebook, however, remains the largest
photo sharing site - Facebook application and photo aggregator Pixable estimates that
Facebook will have more 100 billion photos by mid of 2011. In April, 2012, the
image-based social media network Pinterest had become the third largest social
network in the United States.
Companies have begun to merge business technologies and solutions, such as cloud
computing, with social networking concepts. Instead of connecting individuals based
on social interest, companies are developing interactive communities that connect
individuals based on shared business needs or experiences. Many provide specialized
networking tools and applications that can be accessed via their websites, such
as LinkedIn. Others companies, such as Monster.com, have been steadily developing a
more "socialized" feel to their career center sites to harness some of the power of
social networking sites. These more business related sites have their own
nomenclature for the most part but the most common naming conventions are
"Vocational Networking Sites" or "Vocational Media Networks", with the former
more closely tied to individual networking relationships based on social networking
principles.
Foursquare gained popularity as it allowed for users to "check-in" to places that they
are frequenting at that moment. Gowalla is another such service that functions in
much the same way that Foursquare does, leveraging the GPS in phones to create a
location-based user experience. Clixtr, though in the real-time space, is also a
location-based social networking site, since events created by users are automatically
geotagged, and users can view events occurring nearby through the Clixtr iPhone app.
Recently, Yelp announced its entrance into the location-based social networking space
through check-ins with their mobile app; whether or not this becomes detrimental to
Foursquare or Gowalla is yet to be seen, as it is still considered a new space in the
Internet technology industry.
One popular use for this new technology is social networking between businesses.
Companies have found that social networking sites such as Facebook and Twitter are
great ways to build their brand image.
There are five major uses for businesses and social media: to create brand awareness,
as an online reputation management tool, for recruiting, to learn about new
technologies and competitors, and as a lead generation tool to intercept potential
prospects. These companies are able to drive traffic to their own online sites while
encouraging their consumers and clients to have discussions on how to improve or
change products or services.
83
Network, Transport By sharing information and knowledge with one another, people are able to "increase
and Application both their learning and their flexibility in ways that would not be possible within a
Layer self-contained hierarchical organization." Social networking is allowing scientific
groups to expand their knowledge base and share ideas, and without these new means
of communicating their theories might become "isolated and irrelevant".
Social networks and their educational uses are of interest to many researchers. “Social
networking sites, like much else on the internet, represent a moving target for
researchers and policy makers.” Recent trends indicate that 47% of American adults
use a social network. A national survey in 2009 found that 73% of online teenagers
use SNS, which is an increase from 55% three years earlier. Recent studies have
shown that social network services provide opportunities within professional
education, curriculum education, and learning. However, there are constraints in this
area.
Networking allows participants the opportunity for just-in-time learning and higher
levels of engagement. The use of SNSs allow educators to enhance the prescribed
curriculum. When learning experiences are infused into a website, students utilize
everyday for fun, students realize that learning can and should be a part of everyday
life. It does not have to be separate and unattached. Informal learning consists of the
learner setting the goals and objectives. It has been claimed that media no longer just
influence our culture. They are our culture. With such a high number of users between
the ages of 13-18, a number of skills are developed. Participants hone technical skills
in choosing to navigate through social networking services. This includes elementary
items such as sending an instant message or updating a status. The developments of
new media skills are paramount in helping youth navigate the digital world with
confidence. Social networking services foster learning through "Participatory
Culture." A participatory culture consists of a space that allows engagement, sharing,
mentoring, and an opportunity for social interaction. Participants of social network
services avail of this opportunity. Informal learning, in the forms of participatory and
social learning online, is an excellent tool for teachers to sneak in material and ideas
that students will identify with and therefore, in a secondary manner, students will
84
learn skills that would normally be taught in a formal setting in the more interesting Network Applications
and engaging environment of social learning.
Sites like Twitter provide students with the opportunity to converse and collaborate
with others in real time. Social networking services provide a virtual “space” for
learners.
Social Interaction
Social networking is a way for one person to meet up with other people on the net.
People use social networking sites for meeting new friends, finding old friends, or
locating people who have the same problems or interests they have, called niche
networking.
More and more relationships and friendships are being formed online and then carried
to an offline setting. The relationships which start online are much more likely to
succeed.
Being able to meet some-one as a "friend" and see what common interests you share
and how you have built up your friend base and "likes" you can truly see a fuller
picture of the person you are talking with. Most sites are free instead of being paid
based which allows younger people with stricter budgets to enjoy some of the same
features as those of adults who are more likely to be able to afford pay based sites.
While not the intended or original use for these social sites, a large area of their
current function has stemmed from people wanting to meet other people in person and
with the extremely busy schedules of most people, it is a fast, reliable and easy way in
which to do so that costs you little time and money (if any). Users do not necessarily
share with others the content which is of most interest to them, but rather that which
projects a good impression of themselves.
However, Indian railway ticket reservation is no more a tedious job. Just lay your
hands on any railway reservation booking outlet around you and make your way to the
differing journey. With the onset of online railway reservation system things got much
simpler for the passengers to book railway tickets online.
Indian railway is working incessantly to endow simply the best services to the
passengers in India. Anyone with a system can have rail reservation instantly with no
hassle. However, there are also systems of making railway reservation enquiry from
virtually any place with your computer. This is how the whole system of
booking railway tickets got easier in terms of accessibility and affordability. You are
no longer required to sweat and fret over train ticket reservation in India. For any
inquiry or for that matter any info you require regarding railway reservations just log
onto the official site of Indian railways and you will have it.
85
Network, Transport
and Application Sitting at your home in front of a computer can give you all the relevant information
Layer on booking tickets in Indian railways. Booking any train on Indian
Railways computerized passenger reservation system (PRS) network from any
originating station or train passing through system station to any destination is that
much easy nowadays. Be it about booking tickets, reservation enquiry, internet tickets
(i-tickets), electronic tickets (e-tickets) or cancellation of tickets, things are just in
place for the convenience of passengers.
86
that reserved tickets from any station of Indian Railways could be issued to any Network Applications
other station from a single window. "CONCERT from CRIS has been able to
improve the services to the passenger by offering single-window service to the
passengers. RTR gives the user location transparency for the distributed
database system. Thus, the reservation from one station to any other station can
be given from a single window covering the round trip, which means passengers
only have to stand in one queue. Indian railways perform various services to the
passengers by using information technology, these are as follows:
i) Passenger Reservation System Solution
ii) Unreserved Ticketing System for Railways
iii) Mobile Ticketing
iv) Web Ticketing
v) Kiosk-based Ticketing
vi) Centralized (Hybrid) Ticketing System
vii) Time Table and Scheduling System
viii) Traffic Management Systems
ix) Passenger Information Display System
As more and more people turned to the Web to find information about various
services, Indian Railways decided to provide information related to passenger
reservations to the public over the Internet. In 2000, CRIS designed and implemented
Indian Railways' own Web site, which receives a staggering 1.2 million hits per day.
The site is hosted by CRIS and runs on the OpenVMS AlphaServer platform.
The impact of IMPRESS / CONCERT on the system's users as well as on the Indian
Railways has been tremendous. The benefits include substantial savings in
transportation costs and in reservation time, telescopic fare benefits for cluster
journeys, reduced malpractice and, above all, a modern, efficient and convenient
system.
For the Railways, there is substantial reduction in cost per ticket issued, manpower
savings (a 40 per cent increase in transactions handled per day), savings in space
required, less strenuous work, higher productivity and fewer errors in fare
computation, concession calculations, etc.
The application has been designed as an open distribution system, so that the data and
transaction volume can be segregated between multiple host sites. Networking is an
inherent feature of the application.
87
Network, Transport • The IMPRESS software can support both graphic user interface (GUI) and
and Application character-based terminals, which act as front-ends installed at the booking
Layer
counters to cater to passenger requests.
• This software conforms to open standards. Hence, it can be interfaced to other
applications like airline reservation systems, hotel reservation systems, etc.,
which are also based on open standards.
• The IMPRESS software is 'parametric' in terms of data and business rules, for
fare computation, refund rules, cancellation, break journey rules, etc. Here,
business rules are also kept as data items in the back-end repository instead of
being part of the application logic. Therefore, the system can absorb changes in
business rules immediately, without having to regenerate the object code.
• The application is secured against intrusion by two-level user authentications as
the topmost guard. Below it, the data is secured from external access through
multiple-level privileges. A data encryption facility is available across the
WAN to prevent hacking.
• Ticketing for Indian Railways
Almost 14 million of the 15 million people whom the Railways transports every day
travel on unreserved tickets. Handling them has been a huge problem. The Indian
Railways plans to cover 943 more stations in 2006-07, and ensure that a total of 6,000
stations have UTS as of March 31, 2009. Unreserved tickets were earlier offered only
two hours before the scheduled departure of trains. This not only caused
inconvenience to passengers (as they wait in long queues to purchase their tickets)
but it also affected the IR adversely in terms of loss in revenues, cumbersome
reporting and in poor demand analysis. While some of the trains ran overcrowded, the
others went partially vacant.
The implementation of UTS eliminated the earlier lapses in ticketing and helped the
IR to substantially control overcrowding. The system comprised a network of
terminals wherefrom the passengers could buy unreserved tickets for any journey 30
days in advance.
The Unreserved Ticketing System allowed advance planning and rational analysis of
passenger demands for unreserved coaches. It also helped the IR to effectively
monitor sale of tickets on various trains and regulate the train capacities to the
fluctuating demands of passengers. With an aggressive use of leading hardware, data
management and network technology, IR could successfully address the needs of the
passengers of unreserved trains.
A network covering 63, 140 route kms (as on March 31, 2002), the Indian
Railways traverse the length and breadth of the country. Even though the railways
have been divided into zones for better management and functionality, the railway
reservations or the process for booking train tickets is centrally computerised.
Operating 14,444 trains daily, the IRCTC or Indian Railway Catering and Tourism
Corporation Limited, ensures that train schedule and train timings remain prompt. In
effect, Indian Railways is the largest railway system in the world to be functioning
under a single management. .
The most cost efficient mode of transport, Indian Railways enjoy preference over
other public transport systems. Used extensively for passenger and freight transfer,
Indian Railways proves itself the forerunner in the transport sector as the most
affordable, convenient and well connected network. With thousands of railway
stations across the country, superior safety standards, lower environmental hazard and
relatively low train fare, Indian Railways is the first choice for transfer goods and
commodities .
88
Network Applications
While the Indian Railway booking system has always been well organised, one
immensely crucial step has been the launch of the IRCTC website (IRCTC online rail
ticket reservation system is depicted in the following Figure 4), making all processes
related to Indian Railways a breeze. Besides allowing online booking of rail ticket (s),
it offers everything from railway map to railway ticket fare to timetable of train (s). A
complete railway enquiry system is in place, with a click of the mouse allowing one to
access / check the Indian Railways timetable, railway ticket availability and booking
for any sector besides complete online train ticket reservations. Visitors to the website
can use it not only for railway ticket reservation / booking but also to find out ticket
availability and ticket confirmation or PNR status for any ticket on any train within
the Indian Railways network
Central Indian Railways: This is the oldest of Indian railway zones and one of the
largest of the 16 zones formed by Indian railways.
Eastern Indian Railways: The Eastern Railway (ER) zone is one of the important
Indian Railway zones. With its headquarters in Kolkata, the Eastern Zone is divided
further into four divisions namely Mald, Howrah, Asansol and Sealdah for better
working.
Northern Indian Railways: It is one of the nine older zones of Indian Railways. New
Delhi, the national capital of India serves as headquarters of this Indian Railway Zone
Southern Indian Railways: This is the first zone formed after India got liberated
89
Network, Transport from British Rule. Southern Indian Railway Zone was established on April 14, 1951
and Application by combination of always of three states.
Layer
Western Indian Railways: This Indian railways zone is amongst the most hustling
and lively rail networks of the country. The headquarters of Western Indian Railway
is situated in Mumbai city.
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
c) The mail server as defined in the text uses the __________ protocol.
A) HTTP
B) FTP
C) POP
D) SMTP
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
90
Network Applications
4.5 INFORMATION SHARING
Information sharing describes “the exchange of data between various organizations,
people and technologies”.
When it comes to personal information however, no matter how easy it is to port the
actual data, there are laws in most countries prohibiting the sharing of personal data
without explicit permission being granted. In the US and Europe it is a criminal
offense to share any personal data about anyone without such explicit permission.
.
There is plenty of other information sharing that does not fall under the law and
information sharing is increasing as more networks and organizations connect and
information becomes easier to share across the internet.
Data was formerly frequently kept in silos and often not shared among other entities
due to its proprietary, non-portable format or the inability to import/export data. Even
simple items such as dates were stored in a whole range of different formats making
the sharing of such a simple field a potential nightmare. The same applied to a whole
range of data, and even if it was compatible it was often not possible to physically
transfer the data from one platform to another. .
Today these problems have all been coded out and information sharing is common
between computer networks; information sharing has become especially prevalent due
to social networking. These 21st century network models actively encourage the
sharing of information across social networks.
Facebook has 750 million accounts, YouTube has over 400 million and the other
social networking sites and applications have established between them a sharing
network of over a billion people. In terms of information sharing this is a global
proportion with almost 10% of the world's population sharing information across
common networks regularly. .
After the terrorist attacks of September 11th, information sharing became one of the
United States government's goals in developing their resources to try to avert such
atrocities. It was mandated among government agencies and departments that
personnel create a methodology for regularly sharing relevant information. The US
needed information sharing improvements to respond to various threats more
effectively. The lesson was learned that when information is hoarded instead of
shared, those needing it may not be able to react in a timely manner Using information
sharing intelligently has been shown to be a more effective way to manage any
organization; a government or a business. .
91
Network, Transport Information sharing is crucial to many businesses, helping to promptly meet customer
and Application and client needs through customer relationship systems which share information about
Layer products and services and improve access to their customers. .
Information sharing has also allowed easy availability of credit history details which
helps consumers access more services. Consumers can have access to banking,
financial and credit products from across the nation and even internationally where
appropriate. .
Hospitals sharing medical records (under stringent conditions) about people so that
their medical personnel can make better decisions, is a good example of how
organizations can share information for productive purposes rather than for social
entertainment as with Facebook. .
92
individuals. E-government is an easy way for the public to be more involved in Network Applications
political campaigns. It could increase voter awareness, which could lead to an
increase in citizen participation in elections. It is convenient and cost-effective for
businesses, and the public benefits by getting easy access to the most current
information available without having to spend time, energy and money to get it.
Characteristics of E-Governance
E-government allows citizens to interact with computers to achieve objectives at any
time and any location, and eliminates the necessity for physical travel to government
agents sitting behind desks and windows. Improved accounting and record keeping
can be noted through computerization, and information and forms can be easily
accessed, equaling quicker processing time. A network architecture of E-governance
is shown in the Figure 5 given blow. It shows the different parties and agencies of
governance can be connected using different networks devices and Internet.
93
Network, Transport
and Application
Layer
Social networking is an emerging area for e-democracy. The social networking entry
point is within the citizens’ environment and the engagement is on the citizens’ terms.
Proponents of e-government perceive government use of social networks as a medium
to help government act more like the public it serves. Examples can be found at
almost every state government portal through Facebook, Twitter,
and YouTube widgets. Government and its agents also have the opportunity to follow
citizens to monitor satisfaction with services they receive. Through ListServs, RSS
feeds, mobile messaging, micro-blogging services and blogs, government and its
agencies can share information to citizens who share common interests and concerns.
Government is also beginning to Twitter.
E-Government Forum
94
Since electronic government is new to everyone throughout the world, why couldn’t Network Applications
an international matching system be developed so that anyone around the world can
search by government function (e.g., Chief Information Officer); role (e.g., state or
federal Department of Transportation); city, state, or country; type of technology used
in development of the e-government system; sharing of best practices; licensing or
buying existing software or platforms from the agency concerned; collaborating in the
integrated development of a vertical (statewide) or horizontal (national or
international) systems; or exchanging ideas. Theoretically, ALL government
employees in the United States or throughout the world could be included. This could
be easily achieved using modern technology and foster greater peace and
understanding. Almost like an online Peace Corps.
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
95
Network, Transport ……………………………………………………………………………………
and Application
Layer ……………………………………………………………………………………
……………………………………………………………………………………
The concepts have however been extended from their computing and
telecommunication meanings into the area of human interaction and conversation,
such that even offline can be used in contrast to the common usage of online. For
example, discussions taking place during a business meeting are "online", while issues
that do not concern all participants of the meeting should be "taken offline" —
continued outside of the meeting.
An online system is differs from an offline system in that templates are employed
whenever the user inserts content into a web page for publication. These templates
area said to be ‘on demand’ in that they are applied as per the user’s requirements.
96
The downsides to this type of system include a slowing down of performance due to Network Applications
the fact that every time a user views a page, that page is retrieved from the database
which slows down the processing speed exponentially.
This system requires a fast connection and an up to date browser especially in regard
to content creation. Both of these are improving all the time but performance speeds
are quicker on a local computer as used for an offline system.
Types of Collaborations:
Project management
Project Management developed from different fields of application including
construction, engineering, and defense.
Learning community
A learning community is a group of people who share common emotions, values or
beliefs, are actively engaged in learning together from each other, and by habituation.
Such communities have become the template for a cohort-
based, interdisciplinary approach to higher education. This may be based on an
advanced kind of educational or 'pedagogical' design. the participants of learning
community must feel some sense of loyalty and belonging to the group (membership)
that drive their desire to keep working and helping others, also the things that the
participant do in must affect what happened in the community, that means, an active
and not just a reactive performance (influence). Besides a learning community must
give the chance to the participants to meet particular needs (fulfillment) by expressing
personal opinions, asking for help or specific information and share stories of events
with particular issue included (emotional connections) emotional experiences.
Business
Collaboration in business can be found both inter- and intra-organization and ranges
from the simplicity of a partnership and crowd funding to the complexity of
a multinational corporation. Collaboration between team members allows for better
communication within the organization and throughout the supply chains. It is a way
of coordinating different ideas from numerous people to generate a wide variety of
knowledge. Collaboration with a selected few firms as opposed to collaboration with
a large number of different firms have been shown to positively impact firm
performance and innovation outcomes. The recent improvement in technology has
provided the world with high speed internet, wireless connection, and web-based
collaboration tools like blogs, and wikis, and has as such created a "mass
collaboration." People from all over the world are efficiently able to communicate and
97
Network, Transport share ideas through the internet, or even conferences, without any geographical
and Application barriers. The power of social networks it beginning to permeate into business culture
Layer where many collaborative use are being found including file sharing and knowledge
transfer.
Education
Generally defined, an Educational Collaborative Partnership is ongoing involvement
between schools and business/industry, unions, governments and community organiza
tions. Educational Collaborative Partnerships are established by mutual agreement
between two or more parties to work together on projects and activities that will
enhance the quality of education for students while improving skills critical to success
in the workplace.
Technology
Due to the complexity of today's business environment, collaboration in technology
encompasses a broad range of tools that enable groups of people to work together
including social networking, instant messaging, team spaces, web sharing, audio
conferencing, video, and telephony. Broadly defined, any technology that facilitates
linking of two or more humans to work together can be considered a collaborative
tool. Wikipedia, Blogs, even Twitter are collaborative tools. Many large companies
are developing enterprise collaboration strategies and standardizing on a collaboration
platform to allow their employees, customers and partners to intelligently connect and
interact.
The popularity of mobile applications has continued to rise, as their usage has become
increasingly prevalent across mobile phone users.
For mobile applications, the fixed telephone system is not suitable. Mobile phones are
currently in widespread use for voice and will soon be in widespread use for data. The
first generation was analog, dominated by AMPS. The second generation was digital,
with D-AMPS, GSM, and CDMA the major options. The third generation will be
digital and based on broadband CDMA.
An alternative system for network access is the cable television system, which has
gradually evolved from a community antenna to hybrid fiber coax. Potentially, it
98
offers very high bandwidth, but the actual bandwidth available in practice depends Network Applications
heavily on the number of other users currently active and what they are doing.
Mobile apps were originally offered for general productivity and information
retrieval, including email, calendar, contacts, and stock market and weather
information. However, public demand and the availability of developer tools drove
rapid expansion into other categories, such as mobile games, factory
automation, GPS and location-based services, banking, order-tracking, and ticket
purchases. The explosion in number and variety of apps made discovery a challenge,
which in turn led to the creation of a wide range of review, recommendation, and
curation sources, including blogs, magazines, and dedicated online app-discovery
services.
Mobile Apps are apps or services that can be pushed to a mobile device or
downloaded and installed locally.
……………………………………………………………………………………
……………………………………………………………………………………
b) How is this problem solved in analogue cellular network?
(I) Base Station continuously transmits the Mobile Identification
Number (MIN) and received by the mobile phone.
(II) Mobile phone continuously transmits the Signal Audio Tone
(SAT) and received by the base station.
(III) Overall size of the cluster is increased
(IV) Increasing the bandwidth allocated to each user.
……………………………………………………………………………………
……………………………………………………………………………………
c) Why does GSM use TDMA, as opposed to CDMA?
99
Network, Transport (I) When GSM was planned, CDMA was not approved as a multiple
and Application access system.
Layer (II) TDMA is better than CDMA.
(III) CDMA is not really needed in Europe.
(IV) CDMA is too expensive to implement.
(A) I and III
(B) I only
(C) II and III
(D) I and IV
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
4.9 SUMMARY
This completes our discussion on the introductory concepts of Network Applications.
The internet architecture discussed in the unit, we have also discussed WWW and
email formats in detail. The information given on various topics such as Information
Sharing, Railway Reservation System, E-Governance, Social Networking, Online
Processing etc. We have also includes the discussions based on latest trends and
technology used for the internet applications (Mobile Applications) which helps the
reads to keep your knowledge up to date. In addition to further readings and test their
skills question answer sessions are included at the end of each sections. In the next
block of this course, you will learn fundamental details for setting up a small local
area network including wired and wireless setup. Next block will also cover the
foundational details of network security protocols and wireless networking.
100
3. Douglas E. Comer, Internetworking with TCP/IP Vol.1: Principles, Protocols, and Network Applications
Architecture (4th Edition).
6. www.wikipedia.org
4.11 SOLUTIONS/ANSWERS
2. The main standards that relate to the protocols of email transmission and
reception are:
i) Simple Mail Transfer Protocol (SMTP) - which is used with the TCP/IP
protocol suite? It has traditionally been limited to the text based
electronic messages.
ii) Multipurpose Internet Mail Extension (MIME) - Which allows the
transmission and reception of mail that contains various types of data,
such as speech, images, and motion video? It is a newer standard than
STMP and uses much of its basic protocol.
iii) S/MIME (Secure MIME). RSA Data security created S/MIME which
supports encrypted e-mail transfer and digitally signed electronic mail.
2. Goal’s of e-government
101
Network, Transport One goal of e-government will be greater citizen participation. Through the
and Application internet, people from all over the country can interact with politicians or public
Layer servants and make their voices heard. Blogging and interactive surveys will
allow politicians or public servants to see the views of the people they represent
on any given issue. Chat rooms can place citizens in real-time contact with
elected officials, their offices or provide them with the means to replace them
by interacting directly with public servants, allowing voters to have a direct
impact and influence in their government. These technologies can create a more
transparent government, allowing voters to immediately see how and why their
representation in the capital is voting the way they are. This helps voters better
decide who to vote for in the future or how to help the public servants become
more productive. A government could theoretically move more towards a
true democracy with the proper application of e-government.
3. Mobile Apps are internet applications designed to run on smartphones and other
mobile devices. mobile applications help users by connecting them to Internet
services more commonly accessed on desktop or notebook computers. While
opportunities abound, we have identified three advantages of using mobile apps
for your business: speed, volume of information, and advertising.
102