SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Applications of Networking

1. Resource Access
                Regardless of the physical location of the resources and the users, networks can provide
   special computing resources with convenient access at any time to its users. These resources sharing
   may be of specialized computers, software or other devices that are expensive or unique. For example
   accessing a corporate supercomputer from workstations at remote research laboratories.


2. Data Access
            Networks can provide access to unique database to its local and remote users.


3. Communication and Data Exchange
            Networks allow users to exchange data, graphs or documents and to communicate using
   email, bulletin boards or by teleconference, irrespective of the time or their location.


4. Decentralization of Data Processing
            A complicated job can be divided into multiple modules and can be distributed to different
   departments for processing.


5. Easy Communication
            Various organizations cooperating in a task can communicate with each other on network
   and exchange information.




   Internet Security
                  As internet is open to all, the security, privacy, authenticity and anonymity issues play a
   vital role as one need to be sure about these things, then only he can use the Internet to its fullest
   extent. As information and its transfer are crucial for every one who is using the internet, there need to
   be provisions, which is reliable then only one can connect to internet. The security of internet can be
   divided into two broad categories, namely:
1. Client-Server Security
       2. Data & Transaction Security


Client-Server Security
               This security is for preventing unauthorized access to restricted databases and other
information which is confidential. This is an authorization mechanism, which makes it sure that the users,
who are authorized only should be able to connect and access the information. These mechanisms are required
to ensure that only authenticated users can access the resources, which they are entitled to. Password
protection, encrypted smart cards, biometrics, firewalls etc. are some of the methods adopted to ensure client-
server security.


Data & Transaction Security
               As the data transmissions and transactions occur across the network, there are fair chances that
they can be intercepted, read and manipulated as well as the source and destination can be tracked. To prevent
this one has to provide security to the data and transactions, which is usually done by using data encryptions,
which is implemented through various cryptographic methods.


Security Methods for Client/Server & Data/Transaction Security


   1. Password Scheme:
                   This is an easy solution to provide security, so that unauthorized users do not get access to the
       data. This is the first level of security, which can be provided. Here, the authorized users are assigned
       user names and a password is associated to them, which are to provided when connecting to the site.
       But this security measure can be broken easily, if common words or proper names are used as
       passwords, but if alphanumeric passwords of bigger length are used, then it is very difficult to break
       them.
               Another problem is that, if the login is remote, then the password travels through the system to
       server for authentication, in meantime, it can be trapped, for this reason the passwords are to be
       encrypted before transmitting them.
                    But in spite of these threats, password schemes are still the most popular forms of ensuring
       security.
2. Firewalls
           Firewall is accepted as the network protection mechanism, it is a barrier between corporate
   network and the outside world, which will ensure that the authentic users only connect as well only the
   data which is harmless enters and leaves the system.
           The term firewall can be defined as a device, a computer or a router which is placed between
   the network and the internet to control and monitor the traffic between the inside and outside world.
           Firewall is a device which is used to shield vulnerable areas from various dangers. The firewall
   system is located at a gateway point which actually is the connecting point to the outside world.
   Firewalls come in many varieties and offer different features, but the basic feature is to filter the traffic
   of data and control it.


3. Encryption
           This method of data and transaction security is used for retaining confidentiality and integrity
   of the data being transmitted. Data confidentiality is that property, which makes data contents to be
   safe from being read, while on the path of transmission, which is made sure by using cryptography
   algorithms for encrypting data, which no one can interpret. Along with data being confidential, it has
   to remain unmodified, while on transit i.e. the data should be intact without any modifications, while it
   is on way to destination. This is made sure by using various encryption techniques like Secret-Key
   Cryptography, Data Encryption Standard(DES), Public Key Cryptography RSA etc.


   Analog Signals
   Analog signals are continuous in nature, they carry information in the form of waves e.g., the way
   sound travels in the medium such as telephone lines. Analog communication uses general purpose
   communication channels. These signals are characterized by two parameters such as amplitude and
   frequency.


   Digital Signals
   Digital signals are discrete in nature. They transfer information in the form of 0s and 1s. in digital
   communication, data are transmitted directly in binary form that is a sequence of 0s and 1s. to transmit
   binary data over these channels 0s and 1s should be converted to the electrical signals. This is done by
   Modem (modulator-demodulator). Digital signals are preferred over analog signals. Because of the
discrete nature, these signals are not affected by noise or any other disturbances. Moreover, computer
at the receiving end does not perform any conversion as in analog signals i.e. analog to digital.




Packet Transmission:
•   Computers use data grouped into packets for transmission
•   Local Area Networks
•   Wide Area Networks
•   Addressing and Routing

Concepts of Packets:

• Computer networks divide data into small blocks called packets
• Packets are send individually
• Often called packet networks and packet switching networks
• Motivation for using packets
  o Sender and receiver needs to coordinate transmission to ensure that data
     arrives correctly
  o Helps determine which blocks arrive intact and which do not
  o Computers often share underlying connections and hardware
  o Packet switching helps ensure fairness to access
Shared Resources:
1. The first networks
   1.1. A 5 MB file at 56 Kbps will take 12 min to transfer from A to D
   1.2. B & C must wait
2. Packet networks
   2.1. Divide data into packets of 1000 bytes each
   2.2. A sends a packet to D taking only 143 ms
   2.3. B transmits data to C
   2.4. A continues
3. No long delays
Packets and TDM

1) Time Division Multiplexing
  a) Many resources take turns accessing the shared communication resources
2) All sources receive prompt service
3) The source with less




Packets and Frames

1.   Packet refers to a small block of data
2.   Each hardware technology uses different packet format
3.   Frame denotes packet used with specific type of network
4.   EX : RS-232 mechanism
     4.1. Does not include a mechanism that allows a sender to signal the end of a block of
          characters
     4.2. Sending and receiving computers must agree on such details

5. Network systems can choose two unused values to define format
6. EX: RS-232 can use frame delimiters
   6.1. Soh –start of header
   6.2. Eot – end of transmission
7. Overhead is an disadvantage
   7.1. An extra, unnecessary character between blocks of data
8. Advantageous when large delays or computer crashes
   8.1. Missing eot indicates sending computer crashed
   8.2. Missing soh indicates receiver missed beginning of frame
Packet transmission:

               A packet transmission rate control scheme between nodes on a wireless Ad-hoc
       network is proposed considering the characteristics of Wireless LAN rent transmission
       efficiencies by different transmission distances. Many energy efficient routing algorithms
       researches have been conducted only on the assumption of ideal experimental cases. This
       paper considers the way of finding suitable transmission rate for the transmission distances
       between nodes on a mobile Ad-hoc networks so that a more realizable method is presented.
       In this research, a controlling algorithm for transmission data rates by the distances
       between mobile nodes is realized using Fuzzy logic, possibly available to be applied to Ad-
       hoc network routing, and simulations are conducted to verify the enhancements in
       throughput.


       Long distance communication:

method of forming a long distance communication channel between two
telephone devices each of which are connected to a PSTN, said method
comprising

a user of one of said telephone devices initiating and establishing a
telephone communication with a first commercial access provider node of
INTERNET and providing thereto a telephone address,

using INTERNET to establish a communication channel between said first
commercial access provider node and a second commercial access provider
node of INTERNET and providing said telephone address to said second
commercial access provider node,

said second commercial access provider node using said telephone address
and a telephone dial out capability of said second commercial access
provider node to establish a communication with a telephone device at the
telephone address using a PSTN, and

using the INTERNET communication channel to link said telephone devices and
form a real time voice communication between said telephone devices.

2. A method as claimed in claim 1 including, after initiating said
telephone communication with said first commercial access provider node,
said first commercial access provider node communicates with said user to
establish authorization for completing a long distance communication.

3. A method as claimed in claim 1 wherein said first and second commercial
access provider nodes encrypt signals there between and decrypt received
signals such that signals transmitted over INTERNET are encrypted.
4. A method as claimed in claim 1 wherein said telephone devices are
conventional telephones.

5. A method as claimed in claim 4 wherein signals transmitted between said
commercial access nodes using INTERNET are encrypted.

6. A method as claimed in claim 1 wherein the originating telephone device
has a predetermined arrangement with said first commercial access provider
node and said second telephone device has no prior relationship with
either of said commercial access provider nodes.

7. A method as claimed in claim 5 wherein each commercial access node has
different DID telephone addresses for voice and facsimile transmissions.

8. A method of establishing a long distance telephone communication between
an initiating telephone device and a receiving device telephone identified
by a telephone address, said method comprising using a PSTN to initiate a
telephone communication with a commercial access provider node of a
digitized packet based network and provide the node with said telephone
address, said commercial access provider node causing a real time voice
communication channel to be formed between said telephone devices, which
communication channel includes an initial PSTN segment between the
initiating telephone device and said commercial access provider node a
digitized packet based network segment between said commercial access
provider node, and a further commercial access provider node and a PSTN
segment between said further commercial access provider node and the
telephone device identified by the telephone address, wherein the further
commercial access provider node uses the telephone address and the PSTN to
initiate the PSTN segment there between.

9. A method as claimed in claim 8 wherein said telephone devices are
conventional telephones.

10. A method of forming a long distance telephone communication between a
first telephone device and a second telephone device which communication
is capable of transmitting real time voice communications similar to
existing long distance voice telephone communications, comprising the
steps of

forming an initial telephone link between the first telephone device and a
commercial access provider node of a digitized packet based network and
providing thereto a telephone address of the second telephone device, said
commercial access provider forming an appropriate digitized packet based
communication channel with a further commercial access provider node
located in closer proximity to the location of the second telephone device
and providing thereto said telephone address, said further commercial
access provider establishing a telephone link with said second telephone
device using said telephone address, and then linking said telephone
devices using said digitized packet based communication channel thereby
forming a real time voice communication between said telephone devices.

11. A method as claimed in claim 10 wherein said second telephone device
requires no prearrangement with said further commercial access provider
node.

12. A communication arrangement for long distance telephone to telephone
voice communication comprising a first provider node of a digitized packet
based network having means to allow users to initiate a telephone
communication with a desired telephone device identified by a telephone
address by the steps of initially forming a communication with said first
provider node and providing said telephone address thereto,

said first provider node cooperating with a second provider node of said
digitized packet network to form a real time voice communication channel
there between and said second provider node including dial out capabilities
which are used upon receipt of the telephone address provided thereto to
form a telephone communication with the telephone device,

said second provider cooperating with said first provider node to link the
telephone devices using a digitized packet based network segment between
said provider nodes and using PSTN segments between the initiating
telephone device and the first provider node and between the second
commercial access provider node and said telephone device identified by
said telephone address,

wherein the first and second provider nodes appropriately process the
signals for transmission using the digitized packet based network.

13. A communication arrangement as claimed in claim 12 wherein the signals
transmitted over the digitized packet based network are encrypted by said
commercial access provider nodes.

14. A long distance telephone communication arrangement having three
distinct communication segments, comprising a first communication segment
which carries voice communication over a PSTN between a first telephone
device and a first commercial access provider node of a digitized racket
based network a second segment between said first commercial access
provider node and a second commercial access provider node of said
digitized packet based network which exchange digitized voice packets
there between based on communications received from the first and third
segments, said third segment carrying voice communication over a PSTN
between a second telephone device and said second commercial access
provider node after said second commercial access provider node has
established said third segment with said second telephone device, and
wherein said second commercial access provider establishes said third
segment with said second telephone device by using the telephone address
of said second telephone device provided thereto by said first provider
which received the telephone address in a communication from said first
telephone device.

15. A long distance telephone communication arrangement as claimed in claim
14 wherein said first and second commercial access provider nodes carry
out all necessary signal conversion to and from the first and third
segments.

16. A long distance telephone communication arrangement as claimed in claim
14 wherein said first and second commercial access provider nodes encrypt
signals transmitted on the second segment.

17. A long distance telephone communication arrangement as claimed in claim
14 wherein said first and second commercial access provider nodes convert
the signals for transmission by the second segment to a different form
relative to the signals carried by the first and third segments.

18. A long distance telephone communication arrangement having three
distinct communication segments for transmitting a signal, comprising a
first communication segment which carries voice communication over a PSTN
between a first telephone device and a first commercial access provider of
a digitized packet based network, a second segment between said first
commercial access provider and a second commercial access provider of said
digitized packet based network which exchange digitized voice packets
there between based on communications received thereby, and a third segment
which carries voice communication over a PSTN between a second telephone
device and said second commercial access provider and wherein said first
and second commercial access providers convert the signal to and from the
first and third segments whereby the signal carried by the second segment
is in a form different from the signal carried by at least one of the
first and third segments, and wherein said second commercial access
provider establishes said third segment with said second telephone device
by using the telephone address of said second telephone device provided
thereto by said first provider which received the telephone address in a
communication from said first telephone device.

19. A long distance telephone communication arrangement comprising a
digitized packet based network segment between at least two commercial
access providers of the digitized packet based network, said commercial
access providers cooperating to form a communication channel having a real
time digitized packet based communication segment, said communication
channel linking a first telephone device and a second telephone device,
said communication channel being established upon receipt of an initial
telephone communication with one of said commercial access providers from
said first telephone device which communication includes a telephone
address of the second telephone device, and where after said telephone
address is transmitted over the digitized packet based network to the
other commercial access provider which uses the same to form a telephone
communication with said second telephone device identified by the
telephone address, and thereafter said telephone devices are connected
using the digitized packet based segment.

Weitere ähnliche Inhalte

Was ist angesagt?

Data communication & network
Data communication & networkData communication & network
Data communication & networkHannan Pathan
 
What are data networks?
What are data networks?What are data networks?
What are data networks?James Steele
 
COMMUNICATION DEVICES: HARDWARE REQUIREMENTS AND FUNCTIONS OF COMMUNICATION D...
COMMUNICATION DEVICES: HARDWARE REQUIREMENTS AND FUNCTIONS OF COMMUNICATION D...COMMUNICATION DEVICES: HARDWARE REQUIREMENTS AND FUNCTIONS OF COMMUNICATION D...
COMMUNICATION DEVICES: HARDWARE REQUIREMENTS AND FUNCTIONS OF COMMUNICATION D...Kak Yong
 
Data Communication and Networks
Data Communication and NetworksData Communication and Networks
Data Communication and NetworksChAwais15
 
Networking online assignment
Networking online assignmentNetworking online assignment
Networking online assignmentKavitha Dhanesh
 
Note: Introduction to Computer Networks
Note: Introduction to Computer Networks Note: Introduction to Computer Networks
Note: Introduction to Computer Networks Hasibul Islam Nirob
 
Introduction of Computer Networking Technoloy
Introduction of Computer Networking TechnoloyIntroduction of Computer Networking Technoloy
Introduction of Computer Networking TechnoloyAmmar Rahman
 
Computer Network its application & network types
Computer Network its application & network typesComputer Network its application & network types
Computer Network its application & network typesMolayChakraBorty
 
Advance Computer networks
Advance Computer networksAdvance Computer networks
Advance Computer networksTrinity Dwarka
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer networkTrinity Dwarka
 
Communication & data network
Communication & data networkCommunication & data network
Communication & data networkShashikant Saryam
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkOnline
 

Was ist angesagt? (20)

Data communication & network
Data communication & networkData communication & network
Data communication & network
 
What are data networks?
What are data networks?What are data networks?
What are data networks?
 
Dc assignment
Dc assignmentDc assignment
Dc assignment
 
Communications
CommunicationsCommunications
Communications
 
COMMUNICATION DEVICES: HARDWARE REQUIREMENTS AND FUNCTIONS OF COMMUNICATION D...
COMMUNICATION DEVICES: HARDWARE REQUIREMENTS AND FUNCTIONS OF COMMUNICATION D...COMMUNICATION DEVICES: HARDWARE REQUIREMENTS AND FUNCTIONS OF COMMUNICATION D...
COMMUNICATION DEVICES: HARDWARE REQUIREMENTS AND FUNCTIONS OF COMMUNICATION D...
 
Data Communication and Networks
Data Communication and NetworksData Communication and Networks
Data Communication and Networks
 
Itm 4
Itm 4Itm 4
Itm 4
 
Networking online assignment
Networking online assignmentNetworking online assignment
Networking online assignment
 
Note: Introduction to Computer Networks
Note: Introduction to Computer Networks Note: Introduction to Computer Networks
Note: Introduction to Computer Networks
 
Introduction of Computer Networking Technoloy
Introduction of Computer Networking TechnoloyIntroduction of Computer Networking Technoloy
Introduction of Computer Networking Technoloy
 
Computer Network its application & network types
Computer Network its application & network typesComputer Network its application & network types
Computer Network its application & network types
 
Telecommunication and networks
Telecommunication  and networksTelecommunication  and networks
Telecommunication and networks
 
Advance Computer networks
Advance Computer networksAdvance Computer networks
Advance Computer networks
 
Computer Communications
Computer CommunicationsComputer Communications
Computer Communications
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer network
 
Network Resources
Network ResourcesNetwork Resources
Network Resources
 
Communication & data network
Communication & data networkCommunication & data network
Communication & data network
 
Networking
NetworkingNetworking
Networking
 
Chapter4
Chapter4Chapter4
Chapter4
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 

Ähnlich wie Unit2[1]

Ähnlich wie Unit2[1] (20)

Combuter term3 new
Combuter term3 newCombuter term3 new
Combuter term3 new
 
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG coursesSULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
 
Presentation1 Networking.pptx
Presentation1 Networking.pptxPresentation1 Networking.pptx
Presentation1 Networking.pptx
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptx
 
new data.pdf
new data.pdfnew data.pdf
new data.pdf
 
new data.pdf
new data.pdfnew data.pdf
new data.pdf
 
Chapter No 1 Introduction to Network and Network Models.pptx
Chapter No 1 Introduction to Network and Network Models.pptxChapter No 1 Introduction to Network and Network Models.pptx
Chapter No 1 Introduction to Network and Network Models.pptx
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Computer networking For Class XII
Computer networking For Class XIIComputer networking For Class XII
Computer networking For Class XII
 
Lecture2
Lecture2Lecture2
Lecture2
 
Data communications ch 1
Data communications   ch 1Data communications   ch 1
Data communications ch 1
 
Internet tybcom
Internet tybcomInternet tybcom
Internet tybcom
 
waleed khaliqi DataCommunication Lec !
waleed khaliqi DataCommunication Lec !waleed khaliqi DataCommunication Lec !
waleed khaliqi DataCommunication Lec !
 
Note1
Note1Note1
Note1
 
Packet switching
Packet switchingPacket switching
Packet switching
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 
Networks: The Big Picture
Networks: The Big PictureNetworks: The Big Picture
Networks: The Big Picture
 
Note 1
Note 1Note 1
Note 1
 
group 10.pptx
group 10.pptxgroup 10.pptx
group 10.pptx
 
Computer network unit 1 notes
Computer network unit  1 notesComputer network unit  1 notes
Computer network unit 1 notes
 

Mehr von Anshumali Singh (20)

Unit3rd
Unit3rdUnit3rd
Unit3rd
 
Unit2.1
Unit2.1Unit2.1
Unit2.1
 
Unit2
Unit2Unit2
Unit2
 
Shai 2
Shai 2Shai 2
Shai 2
 
Shai
ShaiShai
Shai
 
Outputdevice
OutputdeviceOutputdevice
Outputdevice
 
Lecture 9
Lecture 9Lecture 9
Lecture 9
 
Lecture 8
Lecture 8Lecture 8
Lecture 8
 
Lecture 7
Lecture 7Lecture 7
Lecture 7
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Lecture 4
Lecture 4Lecture 4
Lecture 4
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Lecture2
Lecture2Lecture2
Lecture2
 
Lecture2
Lecture2Lecture2
Lecture2
 
Datastorage
DatastorageDatastorage
Datastorage
 
Unit Iv
Unit IvUnit Iv
Unit Iv
 
First Chapter
First ChapterFirst Chapter
First Chapter
 

Unit2[1]

  • 1. Applications of Networking 1. Resource Access Regardless of the physical location of the resources and the users, networks can provide special computing resources with convenient access at any time to its users. These resources sharing may be of specialized computers, software or other devices that are expensive or unique. For example accessing a corporate supercomputer from workstations at remote research laboratories. 2. Data Access Networks can provide access to unique database to its local and remote users. 3. Communication and Data Exchange Networks allow users to exchange data, graphs or documents and to communicate using email, bulletin boards or by teleconference, irrespective of the time or their location. 4. Decentralization of Data Processing A complicated job can be divided into multiple modules and can be distributed to different departments for processing. 5. Easy Communication Various organizations cooperating in a task can communicate with each other on network and exchange information. Internet Security As internet is open to all, the security, privacy, authenticity and anonymity issues play a vital role as one need to be sure about these things, then only he can use the Internet to its fullest extent. As information and its transfer are crucial for every one who is using the internet, there need to be provisions, which is reliable then only one can connect to internet. The security of internet can be divided into two broad categories, namely:
  • 2. 1. Client-Server Security 2. Data & Transaction Security Client-Server Security This security is for preventing unauthorized access to restricted databases and other information which is confidential. This is an authorization mechanism, which makes it sure that the users, who are authorized only should be able to connect and access the information. These mechanisms are required to ensure that only authenticated users can access the resources, which they are entitled to. Password protection, encrypted smart cards, biometrics, firewalls etc. are some of the methods adopted to ensure client- server security. Data & Transaction Security As the data transmissions and transactions occur across the network, there are fair chances that they can be intercepted, read and manipulated as well as the source and destination can be tracked. To prevent this one has to provide security to the data and transactions, which is usually done by using data encryptions, which is implemented through various cryptographic methods. Security Methods for Client/Server & Data/Transaction Security 1. Password Scheme: This is an easy solution to provide security, so that unauthorized users do not get access to the data. This is the first level of security, which can be provided. Here, the authorized users are assigned user names and a password is associated to them, which are to provided when connecting to the site. But this security measure can be broken easily, if common words or proper names are used as passwords, but if alphanumeric passwords of bigger length are used, then it is very difficult to break them. Another problem is that, if the login is remote, then the password travels through the system to server for authentication, in meantime, it can be trapped, for this reason the passwords are to be encrypted before transmitting them. But in spite of these threats, password schemes are still the most popular forms of ensuring security.
  • 3. 2. Firewalls Firewall is accepted as the network protection mechanism, it is a barrier between corporate network and the outside world, which will ensure that the authentic users only connect as well only the data which is harmless enters and leaves the system. The term firewall can be defined as a device, a computer or a router which is placed between the network and the internet to control and monitor the traffic between the inside and outside world. Firewall is a device which is used to shield vulnerable areas from various dangers. The firewall system is located at a gateway point which actually is the connecting point to the outside world. Firewalls come in many varieties and offer different features, but the basic feature is to filter the traffic of data and control it. 3. Encryption This method of data and transaction security is used for retaining confidentiality and integrity of the data being transmitted. Data confidentiality is that property, which makes data contents to be safe from being read, while on the path of transmission, which is made sure by using cryptography algorithms for encrypting data, which no one can interpret. Along with data being confidential, it has to remain unmodified, while on transit i.e. the data should be intact without any modifications, while it is on way to destination. This is made sure by using various encryption techniques like Secret-Key Cryptography, Data Encryption Standard(DES), Public Key Cryptography RSA etc. Analog Signals Analog signals are continuous in nature, they carry information in the form of waves e.g., the way sound travels in the medium such as telephone lines. Analog communication uses general purpose communication channels. These signals are characterized by two parameters such as amplitude and frequency. Digital Signals Digital signals are discrete in nature. They transfer information in the form of 0s and 1s. in digital communication, data are transmitted directly in binary form that is a sequence of 0s and 1s. to transmit binary data over these channels 0s and 1s should be converted to the electrical signals. This is done by Modem (modulator-demodulator). Digital signals are preferred over analog signals. Because of the
  • 4. discrete nature, these signals are not affected by noise or any other disturbances. Moreover, computer at the receiving end does not perform any conversion as in analog signals i.e. analog to digital. Packet Transmission: • Computers use data grouped into packets for transmission • Local Area Networks • Wide Area Networks • Addressing and Routing Concepts of Packets: • Computer networks divide data into small blocks called packets • Packets are send individually • Often called packet networks and packet switching networks • Motivation for using packets o Sender and receiver needs to coordinate transmission to ensure that data arrives correctly o Helps determine which blocks arrive intact and which do not o Computers often share underlying connections and hardware o Packet switching helps ensure fairness to access Shared Resources: 1. The first networks 1.1. A 5 MB file at 56 Kbps will take 12 min to transfer from A to D 1.2. B & C must wait 2. Packet networks 2.1. Divide data into packets of 1000 bytes each 2.2. A sends a packet to D taking only 143 ms 2.3. B transmits data to C 2.4. A continues 3. No long delays
  • 5. Packets and TDM 1) Time Division Multiplexing a) Many resources take turns accessing the shared communication resources 2) All sources receive prompt service 3) The source with less Packets and Frames 1. Packet refers to a small block of data 2. Each hardware technology uses different packet format 3. Frame denotes packet used with specific type of network 4. EX : RS-232 mechanism 4.1. Does not include a mechanism that allows a sender to signal the end of a block of characters 4.2. Sending and receiving computers must agree on such details 5. Network systems can choose two unused values to define format 6. EX: RS-232 can use frame delimiters 6.1. Soh –start of header 6.2. Eot – end of transmission 7. Overhead is an disadvantage 7.1. An extra, unnecessary character between blocks of data 8. Advantageous when large delays or computer crashes 8.1. Missing eot indicates sending computer crashed 8.2. Missing soh indicates receiver missed beginning of frame
  • 6. Packet transmission: A packet transmission rate control scheme between nodes on a wireless Ad-hoc network is proposed considering the characteristics of Wireless LAN rent transmission efficiencies by different transmission distances. Many energy efficient routing algorithms researches have been conducted only on the assumption of ideal experimental cases. This paper considers the way of finding suitable transmission rate for the transmission distances between nodes on a mobile Ad-hoc networks so that a more realizable method is presented. In this research, a controlling algorithm for transmission data rates by the distances between mobile nodes is realized using Fuzzy logic, possibly available to be applied to Ad- hoc network routing, and simulations are conducted to verify the enhancements in throughput. Long distance communication: method of forming a long distance communication channel between two telephone devices each of which are connected to a PSTN, said method comprising a user of one of said telephone devices initiating and establishing a telephone communication with a first commercial access provider node of INTERNET and providing thereto a telephone address, using INTERNET to establish a communication channel between said first commercial access provider node and a second commercial access provider node of INTERNET and providing said telephone address to said second commercial access provider node, said second commercial access provider node using said telephone address and a telephone dial out capability of said second commercial access provider node to establish a communication with a telephone device at the telephone address using a PSTN, and using the INTERNET communication channel to link said telephone devices and form a real time voice communication between said telephone devices. 2. A method as claimed in claim 1 including, after initiating said telephone communication with said first commercial access provider node, said first commercial access provider node communicates with said user to establish authorization for completing a long distance communication. 3. A method as claimed in claim 1 wherein said first and second commercial access provider nodes encrypt signals there between and decrypt received signals such that signals transmitted over INTERNET are encrypted.
  • 7. 4. A method as claimed in claim 1 wherein said telephone devices are conventional telephones. 5. A method as claimed in claim 4 wherein signals transmitted between said commercial access nodes using INTERNET are encrypted. 6. A method as claimed in claim 1 wherein the originating telephone device has a predetermined arrangement with said first commercial access provider node and said second telephone device has no prior relationship with either of said commercial access provider nodes. 7. A method as claimed in claim 5 wherein each commercial access node has different DID telephone addresses for voice and facsimile transmissions. 8. A method of establishing a long distance telephone communication between an initiating telephone device and a receiving device telephone identified by a telephone address, said method comprising using a PSTN to initiate a telephone communication with a commercial access provider node of a digitized packet based network and provide the node with said telephone address, said commercial access provider node causing a real time voice communication channel to be formed between said telephone devices, which communication channel includes an initial PSTN segment between the initiating telephone device and said commercial access provider node a digitized packet based network segment between said commercial access provider node, and a further commercial access provider node and a PSTN segment between said further commercial access provider node and the telephone device identified by the telephone address, wherein the further commercial access provider node uses the telephone address and the PSTN to initiate the PSTN segment there between. 9. A method as claimed in claim 8 wherein said telephone devices are conventional telephones. 10. A method of forming a long distance telephone communication between a first telephone device and a second telephone device which communication is capable of transmitting real time voice communications similar to existing long distance voice telephone communications, comprising the steps of forming an initial telephone link between the first telephone device and a commercial access provider node of a digitized packet based network and providing thereto a telephone address of the second telephone device, said commercial access provider forming an appropriate digitized packet based communication channel with a further commercial access provider node located in closer proximity to the location of the second telephone device
  • 8. and providing thereto said telephone address, said further commercial access provider establishing a telephone link with said second telephone device using said telephone address, and then linking said telephone devices using said digitized packet based communication channel thereby forming a real time voice communication between said telephone devices. 11. A method as claimed in claim 10 wherein said second telephone device requires no prearrangement with said further commercial access provider node. 12. A communication arrangement for long distance telephone to telephone voice communication comprising a first provider node of a digitized packet based network having means to allow users to initiate a telephone communication with a desired telephone device identified by a telephone address by the steps of initially forming a communication with said first provider node and providing said telephone address thereto, said first provider node cooperating with a second provider node of said digitized packet network to form a real time voice communication channel there between and said second provider node including dial out capabilities which are used upon receipt of the telephone address provided thereto to form a telephone communication with the telephone device, said second provider cooperating with said first provider node to link the telephone devices using a digitized packet based network segment between said provider nodes and using PSTN segments between the initiating telephone device and the first provider node and between the second commercial access provider node and said telephone device identified by said telephone address, wherein the first and second provider nodes appropriately process the signals for transmission using the digitized packet based network. 13. A communication arrangement as claimed in claim 12 wherein the signals transmitted over the digitized packet based network are encrypted by said commercial access provider nodes. 14. A long distance telephone communication arrangement having three distinct communication segments, comprising a first communication segment which carries voice communication over a PSTN between a first telephone device and a first commercial access provider node of a digitized racket based network a second segment between said first commercial access provider node and a second commercial access provider node of said digitized packet based network which exchange digitized voice packets there between based on communications received from the first and third segments, said third segment carrying voice communication over a PSTN
  • 9. between a second telephone device and said second commercial access provider node after said second commercial access provider node has established said third segment with said second telephone device, and wherein said second commercial access provider establishes said third segment with said second telephone device by using the telephone address of said second telephone device provided thereto by said first provider which received the telephone address in a communication from said first telephone device. 15. A long distance telephone communication arrangement as claimed in claim 14 wherein said first and second commercial access provider nodes carry out all necessary signal conversion to and from the first and third segments. 16. A long distance telephone communication arrangement as claimed in claim 14 wherein said first and second commercial access provider nodes encrypt signals transmitted on the second segment. 17. A long distance telephone communication arrangement as claimed in claim 14 wherein said first and second commercial access provider nodes convert the signals for transmission by the second segment to a different form relative to the signals carried by the first and third segments. 18. A long distance telephone communication arrangement having three distinct communication segments for transmitting a signal, comprising a first communication segment which carries voice communication over a PSTN between a first telephone device and a first commercial access provider of a digitized packet based network, a second segment between said first commercial access provider and a second commercial access provider of said digitized packet based network which exchange digitized voice packets there between based on communications received thereby, and a third segment which carries voice communication over a PSTN between a second telephone device and said second commercial access provider and wherein said first and second commercial access providers convert the signal to and from the first and third segments whereby the signal carried by the second segment is in a form different from the signal carried by at least one of the first and third segments, and wherein said second commercial access provider establishes said third segment with said second telephone device by using the telephone address of said second telephone device provided thereto by said first provider which received the telephone address in a communication from said first telephone device. 19. A long distance telephone communication arrangement comprising a digitized packet based network segment between at least two commercial access providers of the digitized packet based network, said commercial access providers cooperating to form a communication channel having a real
  • 10. time digitized packet based communication segment, said communication channel linking a first telephone device and a second telephone device, said communication channel being established upon receipt of an initial telephone communication with one of said commercial access providers from said first telephone device which communication includes a telephone address of the second telephone device, and where after said telephone address is transmitted over the digitized packet based network to the other commercial access provider which uses the same to form a telephone communication with said second telephone device identified by the telephone address, and thereafter said telephone devices are connected using the digitized packet based segment.