11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

334 networkGoogle Groups, is the best-known <strong>and</strong> most complete suchsite.Further ReadingGoogle Groups. Available online. URL: http://groups.google.com.Accessed August 16, 2007.Hauben, Michael, <strong>and</strong> Ronda Hauben. Netizens: On the History <strong>and</strong>Impact <strong>of</strong> Usenet <strong>and</strong> the Internet. Los Alamitos, Calif.: IEEE<strong>Computer</strong> Society Press, 1997.Lueg, Christopher, <strong>and</strong> Danyel Fisher, eds. From Usenet to CoWebs:Interacting with Social Information Spaces. London: Springer,2003.Pfaffenberger, Bryan. The USENET Book: Finding, Using, <strong>and</strong> SurvivingNewsgroups on the Internet. Reading, Mass.: Addison-Wesley, 1995.Spencer, Henry, <strong>and</strong> David Lawrence. Managing Usenet. Sebastopol,Calif.: O’Reilly, 1998.networkIn the 1940s, the main objective in developing the first digitalcomputers was to speed up the process <strong>of</strong> calculation. Inthe 1950s, the machines began to be used for more generaldata-processing tasks by governments <strong>and</strong> business. By the1960s, computers were in use in most major academic, government,<strong>and</strong> business organizations. The desire for usersto share data <strong>and</strong> to communicate both within <strong>and</strong> outsidetheir organization led to efforts to link computers togetherinto networks.<strong>Computer</strong> manufacturers began to develop proprietarynetworking s<strong>of</strong>tware to link their computers, but they werelimited to a particular kind <strong>of</strong> computer, such as a DEC PDPminicomputer, or an IBM mainframe. However, the U.S.Defense Department, seeing the need for a robust, decentralizednetwork that could maintain links between theircomputers under wartime conditions, funded the development<strong>of</strong> a protocol that, given appropriate hardware tobridge the gap, could link these disparate networks (seeInternet, local area network).Network ArchitectureToday’s networks are usually defined by open (that is, nonproprietary)specifications. According to the OSI (open systemsinterconnection) model, a network can be consideredto be a series <strong>of</strong> seven layers laid one atop another (see datacommunication).The physical layer is at the bottom. It specifies the physicalconnections between the computers, which can be anythingfrom ordinary phone lines to cable, fiber optic, orwireless. This layer specifies the required electrical characteristics(such as voltage changes <strong>and</strong> durations that constitutethe physical signal that is recognized as either a 1 or 0in the “bit stream.”The next layer, called the data link layer, specifies howdata will be grouped into chunks <strong>of</strong> bits (frames or packets)<strong>and</strong> how transmission errors will be dealt with (see errorcorrection).The network layer groups the data frames as parts <strong>of</strong> aproperly formed data packet <strong>and</strong> routes that packet fromthe sending node to the specified destination node. A variety<strong>of</strong> routing algorithms can be used to determine the mostefficient route given current traffic or line conditions.The transport layer views the packets as part <strong>of</strong> a completetransmission <strong>of</strong> an object (such as a Web page) <strong>and</strong>ensures that all the packets belonging to that object aresorted into their original sequence at the destination. Thisis necessary because packets belonging to the same messagemay be sent via different routes in keeping with trafficor line conditions.The session layer provides application programs communicatingover the network with the ability to initiate,terminate, or restart an interrupted data transfer.The presentation layer ensures that data formats areconsistent so that all applications know what to expect.This layer can also provide special services (see encryption<strong>and</strong> data compression).Finally, the application layer gives applications highlevelcomm<strong>and</strong>s for performing tasks over the network,such as file transfer protocol (ftp).Most modern operating systems support this model.The Internet protocol (see TCP/ip) has become the linguafranca for most networking, so modern versions <strong>of</strong> Micros<strong>of</strong>tWindows <strong>and</strong> the Macintosh Operating System as wellas all versions <strong>of</strong> UNIX provide the services that applicationsneed to make <strong>and</strong> manage TCP/IP connections.Networks that link computers remotely (such as overphone lines) are sometimes called wide area networks, orWANs. Networks that link computers within an <strong>of</strong>fice,home, or campus, usually using cables, are called localarea networks (LANs). See local area network for moredetails about LAN architecture <strong>and</strong> s<strong>of</strong>tware.TrendsIt has become the norm for desktop <strong>and</strong> portable computersto have access to the Internet. A computer from whichone cannot send or receive e-mail or view Web pages almostgives the perception <strong>of</strong> being crippled, because so manyapplications now assume that they can access the network.For example, the latest antivirus programs regularly checktheir manufacturer’s Web site <strong>and</strong> download the latest virusdefinitions <strong>and</strong> s<strong>of</strong>tware patches. Recent versions <strong>of</strong> Windows,too, include a built-in update facility that can obtainsecurity patches <strong>and</strong> newer versions <strong>of</strong> device drivers.The flip side <strong>of</strong> the power <strong>of</strong> networking to keep everyPC (<strong>and</strong> its user) up to date is the vulnerability to bothintrusion attempts <strong>and</strong> viruses (see computer crime <strong>and</strong>security). Virtually all networks include a layer <strong>of</strong> s<strong>of</strong>twarewhose job it is to attempt to block intrusions <strong>and</strong> protectsensitive information (see firewall).Besides attending to security, network administrators<strong>and</strong> engineers must continually monitor the trafficon the network, looking for bottlenecks, such as an <strong>of</strong>tenrequesteddatabase being stored on a file server with a relativelyslow hard drive. Besides upgrading key hardware,another approach to relieve congestion is to adopt a distributeddatabase (see database management system)that stores “data objects” throughout the network <strong>and</strong> c<strong>and</strong>ynamically relocate them to improve access.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!