ch06 PDF
ch06 PDF
Early Efforts
In the early 1970s, when computers were first linked by networks, the idea of harness-
ing unused CPU cycles was born. A few early experiments with distributed comput-
ing—including a pair of programs called Creeper and Reaper—ran on the Internet’s
predecessor, the ARPAnet (Advanced Research Projects Agency net).
In 1973, the Xerox Palo Alto Research Center (PARC) installed the first Ether-
net network and the first full-fledged distributed computing effort was underway. This
first program routinely cruised around 100 Ethernet-connected computers. The scien-
tists who created this program envisioned their program moving from machine to ma-
chine using idle resources for beneficial purposes. The program would roam
throughout the PARC network, replicating itself in each machine’s memory. Each
program used idle resources to perform a computation and had the ability to repro-
duce and transmit clones to other nodes of the network. The programs enabled users
to distribute graphic images and shared computations for rendering realistic computer
graphics.
In another effort, Richard Crandall, now a distinguished scientist at Apple Com-
puter, started putting idle, networked NeXT computers to work. Crandall installed
software that allowed the machines, when not in use, to perform computations and to
combine efforts with other machines on the network. His Zilla software first focused
on finding, factoring, and testing huge prime numbers and then moved on to test en-
cryption at NeXT.
Peer processing. The next form is true peer processing. In this arena, the various
computers in the processing mix communicate with each other about what they are
doing as they are doing it. For example, a complex mathematical calculation might be
Chapter 6 Telecommunications and Networks W33
broken down into several different steps, each of which may need to be repeated nu-
merous times during a particular run.
In a peer setting, each “function” of the overall calculation would be assigned to a
separate system. The various systems can communicate with each other, passing data
and processing requests back and forth as needed. This sort of peer computing may be
either “brokered” or “pure peer.” In a brokered system, a central server manages the
communication between peers. In a pure peer system, the various peers always com-
municate directly with each other, by using either network broadcasts or multiple di-
rect connections. United Technologies’ peer-processing project could best be
described as a pure peer system because it does not rely on a central server to broker
the work.
Peer communication. The most widely used form of peer application is peer commu-
nication. At its simplest level, one computer communicates directly with another, usu-
ally at the immediate request of the user. This communication may involve file
sharing, message transmission, or similar functions.
Many peer communication functions are built into contemporary network operat-
ing systems, while some network operating systems may be viewed as inherently peer-
to-peer. Microsoft Windows and Novell NetWare networks are primarily server based
with peer functions added, while systems such as Linux may be described as more
peer-oriented.
Peer applications often add specific functionality beyond the operating system,
designed to operate outside a corporate network or across different platforms. Instant
messaging systems, which let users chat with one another using text and content-
sharing services, such as Gnutella and Napster, combine a peer application running on
the user’s computer with a centralized database running on a server system.
Thanks to a constant stream of radio signals from dozens of satellites circling the
planet, a handheld device the size of a pocket calculator can tell you your position on
Earth to within a few dozen feet. It will also tell you with great precision your speed
and the direction you are traveling. Best of all, the GPS (Global Positioning System)
is free.
GPS was initially managed by the U.S. Air Force, but is now administered by the
U.S. Naval Observatory. The system was launched in 1978, when Rockwell Interna-
tional began boosting the first of 11 specially built satellites into orbit. These Block I
satellites were experimental and are no longer in use. In 1993, however, when a group
of 24 Block II satellites was in orbit, the GPS, called NavStar, became operational.
The GPS has many applications, the most vital of which is to help civilian ships
and aircraft locate their position and determine their direction of travel. Handheld
GPS receivers, which sell for $100 and up, offer the same benefits for hikers; some
cars also have built-in GPS receivers, complete with electronic street maps. The sys-
tem also transmits the time of day, accurate to within 340 nanoseconds.
Initially, the Department of Defense built the GPS for military purposes. GPS
satellites actually transmit two sets of direction-finding and time-of-day signals: one
encrypted for military use, and the other for civilian use. Until May 2000, the civilian
signals were intentionally degraded with random errors, reducing accuracy to 100 me-
ters or worse. The government still reserves the right to lower the accuracy of the
civilian signals in the event of a national emergency.
W34 Chapter 6 Telecommunications and Networks
The NavStar system is made up of three parts: radio receivers, satellites, and
ground-control systems. A GPS receiver determines its location by listening to trans-
missions from four NavStar satellites. For the service to work anywhere on the planet,
the GPS must always have a minimum of 24 satellites in orbit. This collection of satel-
lites is known as the NavStar constellation. These satellites circle the Earth in six dif-
ferent paths, each of which is 12,550 miles above the Earth’s surface. Four satellites
are in each path, spaced out evenly in the orbit. And each satellite circles the Earth in
just under 12 hours.
Each 2,000-pound satellite transmits a powerful radio wave that contains a unique
data-navigation message. The signal serves as a kind of signature, providing the exact
time of day as well as the identity of the transmitting satellite. Every few minutes,
each satellite transmits the constellation’s ephemeris—the position and orbital veloc-
ity of each satellite in the GPS. Each satellite also transmits its signals on two different
frequencies simultaneously (1227.60 MHz and 1575.42 MHz) to lessen potential inter-
ference. The satellites are controlled by five ground stations, with the master control
at Schriever Air Force Base in Colorado Springs, Colorado.
On Earth, a GPS receiver consults its own stored copy of the ephemeris to deter-
mine which satellites should be “visible,” or over the horizon. It listens for the signals
from those satellites, which are quite weak after passing through the atmosphere. The
signals can be easily blocked by electronic noise, sheet metal, or even the water inside
a dense canopy of tree leaves.
Once the receiver has acquired a signal, it decodes the data navigation message.
By using its internal clock, and comparing the time the satellite sent the message to
the time the receiver acquired it, the receiver can compute the time the message spent
in transit, thus determining the distance from the satellite. The GPS receiver also lis-
tens for additional signals. Once it has received data navigation messages from three
satellites, the receiver can determine roughly where it is, but not the exact position.
Computing the exact position by using time delays is actually an equation with
four unknowns: latitude, longitude, altitude, and time. A fourth satellite provides the
GPS receiver’s onboard computer with the data needed to compensate for signal
propagation delays as they pass through the Earth’s atmosphere, as well as inaccura-
cies in the receiver’s internal clock. With four satellites, the receiver can determine its
position, typically to within 72 feet horizontally, and 90 feet vertically. That is not pre-
cise enough data to land an airplane on a runway, but it is more than adequate for
making sure the plane is heading in the right direction.
NavStar is undergoing continuous improvement. Even though each satellite has
an estimated life of about 7.5 years, the plan is to maintain 28 fully operational satel-
lites in orbit at all times in order to ensure performance.
In November 2000, the NavStar system entered a new phase, when the govern-
ment awarded a $16 million contract to Boeing and Lockheed Martin Space Systems
to design the next-generation Block III GPS.
Chapter 6 Telecommunications and Networks W35
• Transmission cost is the same • Any one-way transmission over a Advantages and Disadvantages
whatever the distance between the satellite link has an inherent of Satellites
sending and receiving stations propagation delay of approximately
within the satellite’s footprint. one-quarter of a second, making (page 172)
• Cost remains the same whatever satellite links inefficient for some
the number of stations receiving data communications needs (voice
that transmission (simultaneous communication).
reception). • Due to launch weight limitations,
• They can carry very large amounts they carry or generate very little
of data. electrical power. Low power of
• Extraterrestrial; there is no need to signal, coupled with distance, can
dig trenches. result in extremely weak signals at
• Satellite signals easily cross or span the receiving earth station.
political borders, often with • Signals are not secure—they are
minimal government regulation. available to all receivers within the
• Transmission errors in a digital footprint, intended or not.
satellite signal occur almost • Some frequencies are susceptible to
completely at random. Thus, interference from bad weather or
statistical methods for error ground-based microwave signals.
detection and correction can be
applied efficiently and reliably.
• Users can be highly mobile while
sending and receiving signals.
• Home networks
• Invisible security domes and fences
• Collision-avoidance sensors
• High-precision positioning/tracking systems
Terrestrial fixed wireless (also called broadband wireless). The most effective option
for businesses other than fiber optics may come from the terrestrial wireless sector.
Broadband wireless is generally packet based and is most appropriate for business
customers who are currently using leased-line service but need more bandwidth than
T1 service delivers. DSL and broadband wireless have similar transmission rates for
customers. The technology connects fiber to rooftop antennas that relay the data from
building to building.
Broadband wireless takes less time to deploy than wireline technologies and does
not affect existing infrastructure. Further, the technology can be less expensive than
wireline technologies because deployment involves little construction beyond mount-
ing the antennas and wiring them into the buildings.
Broadband wireless has disadvantages. The weather can be a major problem. In
regions of the country that are subject to heavy rain or snowstorms, wireless services
can be impeded for several days each year. It is also possible that, as broadband wire-
less gains more customers, businesses may suffer from interference caused by others
using the frequency, thus prohibiting the transfer of data. Another barrier has been
finding cooperative landlords who will agree to have base stations (antennas) on their
rooftops. For these wireless networks to be effective, antennas must be aimed directly
at one another and be within a five-mile range. If tree foliage or some other obstruc-
tion blocks the antennas’ line of sight, data cannot be transferred.
Wireless local loop (WLL). Like cellular telephone systems, WLL systems carry
voice and data traffic over radio frequencies between local users and the public
switched telephone network. However, the emphasis in WLL is in replacing the local
loop that connects the subscriber’s premises to the telephone network, rather than the
provisioning of mobile services.
Fixed WLL has four potential uses:
• To bring telephony to underserved parts of the world
• To provide advanced services to businesses
• To provide an alternative to wireline services for business and residential areas
• To serve as an alternative local loop technology for new market entrants in deregu-
lated markets
WLL systems are being deployed in South America, Asia, Eastern Europe, and
other developing countries without adequate wireline services where WLL systems
offer the advantage of rapid deployment and avoid the cost of burying wires and ca-
bles. In fact, some developing countries use almost exclusively wireless systems. WLL
is attractive particularly where rocky or soggy terrain makes cabled systems difficult
to install. WLL can also satisfy the need to expand the number of connected cus-
tomers quickly.
avoids the high cost of installing fiber or coaxial cable. In North America, demand for
Internet access generates the most MMDS activity.
Table W6.1 The Seven Layers of the OSI Model (page 183)
Layer 1: Physical layer Transmits raw bits over a communication channel. Its
purpose is to provide a physical connection for the
transmission of data among network entities and the
means by which to activate and deactivate a physical
connection.
Layer 2: Data link layer Provides a reliable means of transmitting data across a
physical link; breaks up the input data into data frames
sequentially and processes the acknowledgment frames
sent back by the receiver.
Layer 3: Network layer Routes information from one network computer to
another; accepts messages from source host and sees to it
that they are directed toward the destination. Computers
may be physically located within the same network or
within another network that is interconnected in some
fashion.
Layer 4: Transport layer Provides a network-independent transport service to the
session layer; accepts data from session layer, splits it up
into smaller units as required, passes these to the
network layer, and ensures all pieces arrive correctly at
other end.
Layer 5: Session layer Provides user’s interface into network, where user must
negotiate to establish connection with process on another
machine. Once the connection is established, the session
layer can manage the dialogue in an orderly manner.
Layer 6: Presentation layer Translates messages to and from the format used in the
network to a format used at the application layer.
Layer 7: Application layer Includes activities related to users, such as supporting file
transfer, handling messages, and providing security.
W40 Chapter 6 Telecommunications and Networks