Introduction to Communications Technologies A Guide for Non Engineers 3rd Edition Stephan S. Jones instant download
Introduction to Communications Technologies A Guide for Non Engineers 3rd Edition Stephan S. Jones instant download
https://ebookname.com/product/introduction-to-communications-
technologies-a-guide-for-non-engineers-3rd-edition-stephan-s-
jones/
https://ebookname.com/product/information-and-communication-
technologies-in-healthcare-1st-edition-stephan-jones/
https://ebookname.com/product/introduction-to-matlab-for-
engineers-3rd-edition-william-j-palm/
https://ebookname.com/product/a-guide-to-microsoft-
excel-2002-for-scientists-and-engineers-3rd-edition-bernard-
liengme/
https://ebookname.com/product/ceramicus-redivivus-the-early-iron-
age-potters-field-in-the-area-of-the-classical-athenian-agora-
hesperia-supplement-31-john-k-papadopoulos/
Two Component Signaling Systems Part A 1st Edition
Melvin I. Simon
https://ebookname.com/product/two-component-signaling-systems-
part-a-1st-edition-melvin-i-simon/
https://ebookname.com/product/life-exposed-biological-citizens-
after-chernobyl-adriana-petryna/
https://ebookname.com/product/voyage-of-rediscovery-a-cultural-
odyssey-through-polynesia-ben-r-finney/
https://ebookname.com/product/the-hound-of-the-baskervilles-
webster-s-spanish-thesaurus-edition-arthur-conan-doyle/
https://ebookname.com/product/abnormal-child-psychology-5th-
ed-5th-edition-eric-j-mash/
Archaeologies of Art Time Place and Identity 1st
Edition Inés Domingo Sanz
https://ebookname.com/product/archaeologies-of-art-time-place-
and-identity-1st-edition-ines-domingo-sanz/
Introduction to
COMMUNICATIONS
TECHNOLOGIES
A Guide for Non-Engineers
Third Edition
Stephan S. Jones
Ronald J. Kovac
Frank M. Groom
Introduction to
COMMUNICATIONS
TECHNOLOGIES
A Guide for Non-Engineers
Third Edition
OTHER COMMUNICATIONS BOOKS FROM AUERBACH
Analytical Evaluation of Nonlinear Distortion Network Innovation through OpenFlow and SDN:
Effects on Multicarrier Signals Principles and Design
Theresa Araújo Edited by Fei Hu
ISBN 978-1-4822-1594-6 ISBN 978-1-4665-7209-6
Architecting Software Intensive Systems: Neural Networks for Applied Sciences and
A Practitioners Guide Engineering: From Fundamentals to Complex
Anthony J. Lattanze
Pattern Recognition
ISBN 978-1-4200-4569-7
Sandhya Samarasinghe
Cognitive Radio Networks: Efficient Resource ISBN 978-0-8493-3375-0
Allocation in Cooperative Sensing, Cellular
Communications, High-Speed Vehicles, Rare Earth Materials: Properties and Applications
and Smart Grid A.R. Jha
Tao Jiang, Zhiqiang Wang, and Yang Cao ISBN 978-1-4665-6402-2
ISBN 978-1-4987-2113-4 Requirements Engineering for Software and
Complex Networks: An Algorithmic Perspective Systems, Second Edition
Kayhan Erciyes Phillip A. Laplante
ISBN 978-1-4665-7166-2 ISBN 978-1-4665-6081-9
Data Privacy for the Smart Grid Security for Multihop Wireless Networks
Rebecca Herold and Christine Hertzog Edited by Shafiullah Khan and Jaime Lloret Mauri
ISBN 978-1-4665-7337-6 ISBN 9781466578036
Generic and Energy-Efficient Context-Aware
Software Testing: A Craftsman’s Approach,
Mobile Sensing
Fourth Edition
Ozgur Yurur and Chi Harold Liu
ISBN 978-1-4987-0010-8 Paul C. Jorgensen
ISBN 978-1-46656068-0
Machine-to-Machine Communications:
Architectures, Technology, Standards, and The Future of Wireless Networks: Architectures,
Applications Protocols, and Services
Vojislav B. Misic and Jelena Misic Edited by Mohesen Guizani, Hsiao-Hwa Chen,
ISBN 978-1-4665-6123-6 and Chonggang Wang
Managing the PSTN Transformation: ISBN 978-1-4822-2094-0
A Blueprint for a Successful Migration to The Internet of Things in the Cloud:
IP-Based Networks A Middleware Perspective
Sandra Dornheim Honbo Zhou
ISBN 978-1-4987-0103-7 ISBN 978-1-4398-9299-2
MIMO Processing for 4G and Beyond:
The State of the Art in Intrusion Prevention
Fundamentals and Evolution
and Detection
Edited by Mário Marques da Silva and
Francisco A. Monteiro Al-Sakib Khan Pathan
ISBN 978-1-4665-9807-2 ISBN 978-1-4822-0351-6
Third Edition
Stephan S. Jones
Ronald J. Kovac
Frank M. Groom
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
© 2016 by Taylor & Francis Group, LLC
CRC Press is an imprint of Taylor & Francis Group, an Informa business
This book contains information obtained from authentic and highly regarded sources. Reasonable
efforts have been made to publish reliable data and information, but the author and publisher cannot
assume responsibility for the validity of all materials or the consequences of their use. The authors and
publishers have attempted to trace the copyright holders of all material reproduced in this publication
and apologize to copyright holders if permission to publish in this form has not been obtained. If any
copyright material has not been acknowledged please write and let us know so we may rectify in any
future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or
hereafter invented, including photocopying, microfilming, and recording, or in any information stor-
age or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copy-
right.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222
Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that pro-
vides licenses and registration for a variety of users. For organizations that have been granted a photo-
copy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are
used only for identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
and the CRC Press Web site at
http://www.crcpress.com
Contents
Preface................................................................................................................ xv
Authors.............................................................................................................xvii
1 Systems and Models of Communications Technologies:
Shannon–Weaver, von Neumann, and the Open System
Interconnection Model...........................................................................1
Computing Model........................................................................................3
Open System Interconnection Model...........................................................5
Summary......................................................................................................8
Review Questions.........................................................................................9
Multiple Choice.......................................................................................9
Matching Questions...............................................................................10
Short Essay Questions............................................................................11
2 Basic Concepts of Electricity.................................................................13
Common Units of Technical Measurement................................................13
Signals........................................................................................................14
Current.......................................................................................................17
Resistance...................................................................................................19
Voltage........................................................................................................19
Capacitance................................................................................................20
Inductance..................................................................................................21
Power..........................................................................................................22
Electrical Circuits.......................................................................................22
Filters..........................................................................................................24
AC-to-DC Conversion................................................................................24
Summary....................................................................................................27
Review Questions.......................................................................................28
Multiple Choice.....................................................................................28
Matching Questions...............................................................................30
Short Essay Questions............................................................................32
v
vi ◾ Contents
3 Modulation Schemes.............................................................................33
Spectrum....................................................................................................33
Amplitude Modulation...............................................................................36
Frequency Modulation................................................................................39
Phase Modulation...................................................................................... 40
Pulse-Amplitude Modulation.....................................................................41
Pulse-Code Modulation............................................................................. 42
Amplitude Shift Keying............................................................................. 44
Adaptive Differential Pulse-Code Modulation........................................... 44
Phase-Shift Keying.....................................................................................45
Orthogonal Frequency-Division Multiplexing........................................... 46
Quadrature Amplitude Modulation............................................................47
Multiple-Frequency Shift Keying................................................................48
Summary....................................................................................................48
Review Questions.......................................................................................49
True/False..............................................................................................49
Multiple Choice.....................................................................................49
Short Essay Questions............................................................................50
4 Signaling Formats, Multiplexing, and Digital Transmissions..............53
Digital Formats...........................................................................................53
Multiplexing...............................................................................................57
Frequency-Division Multiplexing...........................................................57
Time-Division Multiplexing...................................................................58
Digital Circuits...........................................................................................58
Frequency-Hopping Spread Spectrum........................................................59
Direct-Sequence Spread Spectrum..............................................................60
Summary....................................................................................................61
Review Questions.......................................................................................61
Multiple Choice.....................................................................................61
Matching Questions...............................................................................63
Short Essay Questions............................................................................63
5 Legacy to Current-Day Telephone Networks........................................65
Circuit Switching vs. Packet Switching...................................................... 66
Legacy of the Circuit-Switching Network............................................. 66
Signaling System 7.............................................................................68
Integrated Services Digital Network..................................................69
Packet Switching....................................................................................71
Packet Headers..................................................................................72
Quality of Service..............................................................................72
Connectionless vs. Connection Oriented...........................................73
Asynchronous Transfer Mode................................................................73
ATM Architecture.............................................................................73
Contents ◾ vii
Review Questions.....................................................................................128
True/False............................................................................................128
Multiple Choice...................................................................................129
Short Essay Questions..........................................................................130
8 The Language of the Internet: Transmission Control Protocol/
Internet Protocol (TCP/IP).................................................................131
Business and Human Factors....................................................................131
Technical Factors......................................................................................133
Message Casting...................................................................................133
Message Addressing..............................................................................135
Network Routing.................................................................................137
Centralized Routing........................................................................138
Decentralized Routing.....................................................................139
Language of the Network: Routed Protocols........................................140
TCP/IP............................................................................................140
IPX/SPX..........................................................................................142
SNA.................................................................................................142
SNA Access Programs......................................................................144
IPv6..................................................................................................... 145
Regulatory and Legal Factors....................................................................146
Summary..................................................................................................147
Review Questions.....................................................................................148
Multiple Choice...................................................................................148
Short Essay Questions..........................................................................149
9 Wireless Local Area Networks............................................................151
Business and Human Factors.................................................................... 151
Technical Factors...................................................................................... 152
Basics of Radio Frequency.................................................................... 152
Wireless Protocols................................................................................154
802.11n Protocol..............................................................................154
802.11ac Protocol............................................................................ 155
802.11ad Protocol............................................................................ 157
What Is a WLAN?............................................................................... 157
Aspects to Consider.............................................................................. 159
Access Technology........................................................................... 159
Frequency Range.............................................................................160
Antennas......................................................................................... 161
Range and Bandwidth.....................................................................163
Interference......................................................................................164
Security...........................................................................................164
Wireless Metropolitan Area Networks.................................................165
Regulatory and Legal Factors...............................................................165
x ◾ Contents
Summary..................................................................................................166
Review Questions.....................................................................................166
True/False............................................................................................166
Multiple Choice...................................................................................167
Short Essay Questions..........................................................................169
10 Mobile Wireless Technologies.............................................................171
Advanced Mobile Phone Service...............................................................171
Multiple-Access Technologies...................................................................173
Mobile Switching.................................................................................175
Fourth-Generation Wireless (4G).........................................................177
Future of 4G....................................................................................177
Future of Worldwide Interoperability for Microwave Access
(WiMAX).......................................................................................178
Fifth-Generation Wireless (5G)............................................................178
Time-Division Synchronous Code-Division Multiple Access...............179
Enhanced Data Rate for GSM Environment (EDGE).........................179
General Packet Radio Service (GPRS)..................................................180
High-Speed Downlink Packet Access...................................................180
Antennas.............................................................................................. 181
Smart Antennas....................................................................................183
Microwave Signals................................................................................184
Engineering Issues for Microwave Signaling.........................................187
Summary..................................................................................................189
Review Questions.....................................................................................190
Multiple Choice...................................................................................190
Matching Questions............................................................................. 191
Short Essay Questions..........................................................................195
11 Virtualization......................................................................................197
Compute Virtualization............................................................................197
Hypervisor...........................................................................................198
Kernel Module.....................................................................................198
Virtual Machine Monitor.....................................................................199
Virtualized Storage...................................................................................199
Virtual Machine–Based Storage Options............................................ 200
Block-Level Storage........................................................................ 200
File-Level Storage........................................................................... 200
Virtual Provisioning and Automated Storage Tiering...........................201
Thin Pools and Thin Logical Units (LUNs).....................................201
Virtualizing the Workstation....................................................................202
Benefits of Desktop Virtualization.......................................................202
Desktop Virtualization Techniques......................................................203
Contents ◾ xi
Review Questions.....................................................................................230
True/False............................................................................................230
Multiple Choice...................................................................................230
Short Answer Questions.......................................................................231
14 Video Basics.........................................................................................233
The Business and Human Factors.............................................................233
High-Quality VC.................................................................................... 234
Medium-Quality VC................................................................................235
Low-Quality VC.......................................................................................236
The Technical Factors...............................................................................236
Image Scanning........................................................................................237
Color........................................................................................................240
Transmission of Video..............................................................................241
High-Definition Television.......................................................................242
Summary................................................................................................. 244
Review Questions.....................................................................................245
True/False............................................................................................245
Multiple Choice.................................................................................. 246
Short Essay Questions..........................................................................247
15 Digital Media......................................................................................249
Introduction.............................................................................................249
Digital Media...........................................................................................250
Convergence.........................................................................................250
Digital Photography..................................................................................252
Advantages of the Digital Form over Analog Form..............................252
Convenience....................................................................................252
Personalization.................................................................................252
Technical Differences between Digital and Analog Forms...................252
Camera Sensor.................................................................................254
Storage Media..................................................................................255
Compression....................................................................................256
Digital Darkroom Techniques.........................................................257
Printing................................................................................................257
Advanced Darkroom Technique..........................................................258
New Opportunities..............................................................................259
Digital Video........................................................................................... 260
Digital Video: Genesis and Advantages over Analog Video................. 260
Technical Differences between the Digital and Analog Forms.............261
New Opportunities..............................................................................263
Digital Audio............................................................................................263
Advantages over Analog Version...........................................................263
Technical Differences between Digital and Analog Forms.................. 264
Contents ◾ xiii
New Opportunities..............................................................................265
3-D Digital Gaming.................................................................................267
Advantages over the Analog Version.....................................................267
Technical Differences between the Digital and Analog Forms.............269
New Opportunities..............................................................................272
Summary..................................................................................................273
Review Questions.....................................................................................274
True/False............................................................................................274
Multiple Choice...................................................................................275
Short Answer Questions.......................................................................276
16 Network Security and Management....................................................277
Introduction.............................................................................................277
Network Security Threats.........................................................................278
Who Are the Bad Guys?...........................................................................278
Hackers................................................................................................278
Types of Network and Computer Attacks................................................ 280
Social Engineering Attacks.................................................................. 280
DOS Attacks....................................................................................... 280
Malware Attacks..................................................................................281
Virus................................................................................................281
Worm..............................................................................................281
Trojan Horse...................................................................................281
Sniffing................................................................................................282
Data Theft.......................................................................................282
Data Alternation..............................................................................282
Spoofing..........................................................................................282
The Payback of Security............................................................................282
Customer Trust....................................................................................282
Mobility...............................................................................................283
Increased Productivity..........................................................................283
Reduced Cost.......................................................................................283
Basics of Security......................................................................................283
Authentication..........................................................................................283
What You Know................................................................................. 284
What You Have................................................................................... 284
Who You Are...................................................................................... 284
Accounting...............................................................................................285
Encryption................................................................................................285
Symmetric Key.................................................................................... 286
Asymmetric Key.................................................................................. 286
Access Control and Site Security...............................................................289
Security Policy..........................................................................................290
xiv ◾ Contents
Our original effort in writing this book was to create a starting point for those in
the business community who did not have a high level of technical expertise but
needed to have some understanding of the technical functions of their information
and communication technologies (ICT) in a corporate environment. As was true
with the first edition of this book, if you are already an engineer, find some other
form of pleasure reading—this text is not designed for you!
The third edition of Introduction to Communications Technologies: A Guide for
Non-Engineers has been updated to attempt to keep pace with the ever-changing
industry associated with ICT. The basic fundamentals of communicating informa-
tion have not changed: system models and electricity are still the building blocks
of how we send information around the world. However, with the advancement of
faster processors within our communicating devices, we have seen a rapid change in
how information is modulated, multiplexed, managed, and moved!
We have also tried to include in this edition some forward perspectives on where
the networks we currently use will migrate in the next few years. With streaming
video, Internet Protocol–defined voice communications, advanced wireless data
networking, and a convergence of our various communication methods (i.e., voice,
data, and media) to be delivered on a single platform, various sections address this
changing landscape. As an example, the chapter on Multiprotocol Label Switching
(MPLS) gives the reader a valuable understanding of what should be expected from
vendor services for external networking offerings in the near term, of how the core
of the network is changing, and of how traffic engineering is impacted by MPLS-
defined virtual private networks (VPNs).
As with our previous editions, we have made a concerted effort to avoid trying
to confuse readers with too many equations or having them perform calculus gym-
nastics. These formulas and functions are critical in creating the granular compo-
nents and operations of each technology; however, understanding the application
and its purpose to the business environment does not require a scientific calculator.
Reading this text should provide a knowledgeable starting point for further explo-
ration into any areas impacting the reader’s communication challenges.
We use this text in our core curriculum to help students without technical
undergraduate degrees entering our graduate professional program in information
xv
xvi ◾ Preface
Student Acknowledgments
Our thanks to the following individuals for their assistance and contributions to
this text:
William Brunson
Jessica Chaffin
Jonathan Chamboneth
Matt Cresswell
Larissa Denton
Charles Geyer
Rebekah Hobbs
Maria Lee
Breanna Parker
Kalyn Sprague
Steven Williams
Authors
Stephan S. Jones, PhD, joined the Center for Information and Communication
Sciences faculty in August of 1998. He came to Ball State University (BSU), Muncie,
Indiana, after completing his doctoral studies at Bowling Green State University,
Bowling Green, Ohio, where he served as the dean of continuing education, devel-
oping a distance learning program for the College of Technology’s undergraduate
technology education program. Dr. Jones was instrumental in bringing the new
program on board because of his technical background and extensive research in
the distance learning field.
Prior to coming to higher education, Dr. Jones spent over 16 years in the com-
munication technology industry. He owned his own interconnect, providing high-
end commercial voice and data networks to a broad range of end users. Dr. Jones
provided all the engineering and technical support for his organization, which grew
to over 20 employees and became one of the top 100 interconnects in the coun-
try. Having sold his portion of the organization in December of 1994, Dr. Jones
worked for Panasonic Communications and Systems Company as a district sales
manager providing application engineering and product support to distributors in
a five-state area.
Since coming to BSU, Dr. Jones has been engaged in development efforts
to provide up-to-date equipment for the graduate students’ production labs, the
Network Integration Center, and the Wireless Institute’s lab. He has also partnered
with local nonprofits to provide community support for their information technol-
ogy needs through graduate student service learning projects. He has appeared as a
presenter at regional development gatherings and has provided research agendas to
facilitate the application of broadband technologies for underserved constituencies.
In his new role as the director of the graduate program, he is charged with making
the success of the past 20 years viable for the next generation of information and
communication technology students.
Frank M. Groom, PhD, is a professor in the Graduate Center for Information and
Communication Science at Ball State University, Muncie, Indiana. His research is
concentrated in the areas of high-bandwidth networking, distributed systems, and
the storage of multimedia objects. Dr. Groom is the author of seven books, most
xvii
xviii ◾ Authors
recently having finished The Basics of Voice over IP Networking and The Basics of
802.11 Wireless LANs. Among his best known books are The Future of ATM and The
ATM Handbook. Dr. Groom earned his PhD from the University of Wisconsin–
Milwaukee in information systems. He is the former senior director of information
systems for Ameritech.
Ronald J. Kovac, PhD, is a full professor in the Center for Information and Commu
nication Sciences at Ball State University, Muncie, Indiana. The center prepares gradu-
ate students in the field of telecommunications. Previous to this position, Dr. Kovac
was the telecommunication manager for the state of New York and a CIO for a large
computing center located on the east coast. Dr. Kovac’s previous studies included
electrical engineering, photography, and education. Dr. Kovac has published two
books and over 50 articles and has completed numerous international consult-
ing projects in both the education and telecommunications field. Additionally, he
speaks worldwide on issues related to telecommunications and holds numerous cer-
tifications, including the Cisco Certified Network Associate (CCNA), the Cisco
Certified Academy Instructor (CCAI), and the almost-complete Cisco Certified
Network Professional (CCNP).
Chapter 1
1
2 ◾ Introduction to Communications Technologies
person or device at the distant end of the communication signal be able to receive the
transmitted signal? Will the person or device at the receiving end need to decipher or
decode the signal in any way? What would happen if noise were introduced into the
transmitted signal? Would it cause the transmission signal to be corrupted in any way?
Exhibit 1.1 shows how communications can be understood in terms of a model
(or systems format). The source (transmitting side of communications) signaling
systems need to encode the information to be transmitted so that it fits onto the
medium or channel that is used to convey the information. The medium could be
air, copper wires, or even fiber optics. When we speak to another human, we first
determine whether or not the person understands the language we are speaking. As
the source, we encode our information in the language and put it on the medium
(air) to be delivered to the other person. What if the transmitting person has French
as his or her primary language and the receiving person does not? The receiving
person will need to decode the French language into one that he or she is able to
understand. The return signal from the receiving person may ask the transmitting
person, “Is this what you are trying to tell me? If it is, then we can discuss this topic
further.” This type of transmit/receive/confirm format is the basis of human com-
munication and is also employed in data networking transmissions.
Claude Shannon developed a mathematical equation that defines the theoreti-
cal limit of the capacity of information transmitted in this model. He theorized
(and later proved) that the amount of information being transmitted was based on
a number of factors, including noise, frequency, transmission, and the strength of
the signals. The formula is
C = Blog2(1 + S/N)
Encoder Encoder
Decoder Decoder
the Internet. This formula tells us that as the noise in a transmission increases, the
capacity to send information decreases. As the frequency (or bandwidth) at which
we transmit increases, the capacity for information transfer increases. We will dis-
cuss the topics of frequency and bandwidth in Chapter 3.
Computing Model
Any device on a communication network can be considered a node. A node can
be a computer, telephone, router, server, tandem switch, or any number of devices
that receive and transmit information on their respective networks. If every device
connected to a network used a different format for collecting, storing, modify-
ing, or transmitting information, the design of networks and the components con-
nected to them would be extremely difficult to accomplish. John von Neumann, a
mathematician whose theories led to the development of the first electronic digital
computer, proposed a model based on work originally presented by Alan Turing (a
mathematician who is famous for leading the group responsible for deciphering the
Enigma code during World War II). Von Neumann’s idea is known as the stored
program model. Exhibit 1.2 is a simple block diagram of von Neumann’s model.
The general structure of this model is based on four primary components, and
a fifth component is necessary for interblock signaling. This model can be extrapo-
lated to define how the nodes connected to any communication network operate:
The fifth component of this model is the bus structure. The information that needs
to be exchanged between these blocks relies on an interconnecting medium referred
to as a bus. Bus structures can be found in everything from digital wristwatches to
the most sophisticated high-speed computer device. We will look at this model and
how it relates to a computer and, using the same model, define how it works with
telephone systems, data networking equipment, and other nodal devices.
The main memory on the computer is its working area. The program files that are
needed to run specific applications are stored in this work area. An analogy is with a
large legal pad of paper. The program running on a computer occupies the top page of
a writing tablet: this area of memory is also called the random access memory (RAM) of
a computer. If it needs more information to process a request, the system will look into
the pages available on the tablet to see if the data are there. To retrieve more informa-
tion for a program or to pull a completely new program into the work area, the system
needs to retrieve more pages of information (data). Another typical memory storage
area is the hard drive, which, according to our model, is viewed as an I/O device.
The process of responding to requests for data is based on a set of instruc-
tions written in binary language. Most of us have never seen the machine language
that runs our digital devices, but it is the mother tongue of the information age.
Requests for printer or modem access (instructions for information retrieval) and
other functions are acted upon by the central processing unit (CPU). The CPU
relies on the ALU to crunch numbers and feed the information back so that it can
control the flow of data.
Exhibit 1.3 represents a more detailed view of the stored program model. The
memory portion of the diagrams is now populated with the various pages of infor-
mation necessary to operate the computer: BIOS, operating system, and applica-
tion programs. The bus structure represented by arrows in Exhibit 1.2 is shown in
Database manager
ALU SL CAR
Network
operating Control
Control unit memory
system
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or
expense to the user, provide a copy, a means of exporting a copy, or
a means of obtaining a copy upon request, of the work in its original
“Plain Vanilla ASCII” or other form. Any alternate format must
include the full Project Gutenberg™ License as specified in
paragraph 1.E.1.
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
1.F.4. Except for the limited right of replacement or refund set forth
in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookname.com