Make payments with PayPal - it's fast, free and secure!

bus network
Last modified: May 14, 1998

Figure

 

A network in which all nodes are connected to a single wire (the bus) that has two endpoints. Ethernet 10Base-2 and 10Base-5 networks, for example, are bus networks. Other common network types include star networks and ring networks.

collapsed backbone
Last modified: March 3, 2000
Network backbone that consists of the backplane of a single switch, rather than multiple switches connected together.

From the ports of the single switch, cables connect to the hubs of individual LAN segments.

Collapsed backbones are typically used for mid-sized LAN networks. The architecture is easier to manage and easier to keep secure, not to mention less costly.

EtherLoop
Last modified: April 19, 2000
Created by Nortel spin-off Elastic Networks, EtherLoop (a.k.a next generation DSL) is Ethernet over standard twisted pair (POTS ) technology that allows for simultaneous voice and high-speed data communications. Speeds range from 125 Kbps to 6 Mbps over distances of up to 21,000 feet.

Similar to Ethernet, Etherloop transmits data packets in bursts. Between bursts, EtherLoop looks for problems and interference in the lines and knows to steer clear and find an alternate path. Also, EtherLoop is Ethernet compliant, so it is easily adaptable to existing Ethernet systems.

EtherLoop also borrows from the best of DSL to offer point-to-point security and a non-shared medium (more users don't slow down connection speed), But unlike DSL, EtherLoop avoids impacting other services such as ISDN, T-1, ADSL, HDSL and SDSL, which are in the same cable binder group.

EtherLoop is not proprietary. Elastic Networks plans on licensing the technology to manufacturers who can design and create their own EtherLoop solutions.

MAC Layer
Last modified: November 9, 1999
The Medium Access Control Layer is one of two sublayers that make up the Data Link Layer of the OSI model. The MAC layer is responsible for moving data packets to and from one Network Interface Card (NIC) to another across a shared channel.

The MAC sublayer uses MAC protocols to ensure that signals sent from different stations across the same channel don't collide.

Different protocols are used for different shared networks, such as Ethernets, Token Rings, Token Buses, and WANs.

mesh
Last modified: August 26, 1999
Mesh is a network topology in which devices are connected with many redundant interconnections between network nodes.

There are two types of mesh topologies: full mesh and partial mesh.

Full mesh topology occurs when every node has a circuit connecting it to every other node in a network. Full mesh is very expensive to implement but yields the greatest amount of redundancy, so in the event that one of those nodes fails, network traffic can be directed to any of the other nodes. Full mesh is usually reserved for backbone networks.

Partial mesh topology is less expensive to implement and yields less redundancy than full mesh topology. With partial mesh, some nodes are organized in a full mesh scheme but others are only connected to one or two in the network. Partial mesh topology is commonly found in peripheral networks connected to a full meshed backbone.

ring network
Last modified: September 1, 1996
A local-area network (LAN) whose topology is a ring. That is, all of the nodes are connected in a closed loop. Messages travel around the ring, with each node reading those messages addressed to it. One of the advantages of ring networks is that they can span larger distances than other types of networks, such as bus networks, because each node regenerates messages as they pass through it.

star network
Last modified: May 19, 1998

Figure

 

A local-area network (LAN) that uses a star topology in which all nodes are connected to a central computer. The main advantages of a star network is that one malfunctioning node doesn't affect the rest of the network, and it's easy to add and remove nodes. The main disadvantage of star networks is that they require more cabling than other topologies, such as a bus or ring networks. In addition, if the central computer fails, the entire network becomes unusable.

Standard twisted-pair Ethernet uses a star topology.

token bus network
Last modified: October 30, 1997
A type of local-area network (LAN) that has a bus topology and uses a token -passing mechanism to regulate traffic on the bus. A token bus network is very similar to a token ring network, the main difference being that the endpoints of the bus do not meet to form a physical ring. Token bus networks are defined by the IEEE 802.4 standard.

token-ring network
Last modified: November 4, 1997

Figure

 

(1) A type of computer network in which all the computers are arranged (schematically) in a circle. A token, which is a special bit pattern, travels around the circle. To send a message, a computer catches the token, attaches a message to it, and then lets it continue to travel around the network.

(2) When capitalized, Token Ring refers to the PC network protocol developed by IBM. The IBM Token-Ring specification has been standardized by the IEEE as the IEEE 802.5 standard.

topology (summary)
Last modified: May 19, 1998

Figure

 

The shape of a local-area network (LAN) or other communications system. There are three principal topologies used in LANs.
bullet bus topology: All devices are connected to a central cable, called the bus or backbone. Bus networks are relatively inexpensive and easy to install for small networks. Ethernet systems use a bus topology.
bullet ring topology : All devices are connected to one another in the shape of a closed loop, so that each device is connected directly to two other devices, one on either side of it. Ring topologies are relatively expensive and difficult to install, but they offer high bandwidth and can span large distances.
bullet star topology: All devices are connected to a central hub. Star networks are relatively easy to install and manage, but bottlenecks can occur because all data must pass through the hub.

These topologies can also be mixed. For example, a bus-star network consists of a high-bandwidth bus, called the backbone, which connects a collections of slower-bandwidth star segments.

architecture
Last modified: September 1, 1997
A design. The term architecture can refer to either hardware or software, or to a combination of hardware and software. The architecture of a system always defines its broad outlines, and may define precise mechanisms as well.

An open architecture allows the system to be connected easily to devices and programs made by other manufacturers. Open architectures use off-the-shelf components and conform to approved standards. A system with a closed architecture, on the other hand, is one whose design is proprietary, making it difficult to connect the system to other systems.

ATM
Last modified: November 4, 1997
Short for Asynchronous Transfer Mode, a network technology based on transferring data in cells or packets of a fixed size. The cell used with ATM is relatively small compared to units used with older technologies. The small, constant cell size allows ATM equipment to transmit video, audio, and computer data over the same network, and assure that no single type of data hogs the line.

Current implementations of ATM support data transfer rates of from 25 to 622 Mbps (megabits per second). This compares to a maximum of 100 Mbps for Ethernet, the current technology used for most LANs.

Some people think that ATM holds the answer to the Internet bandwidth problem, but others are skeptical. ATM creates a fixed channel, or route, between two points whenever data transfer begins. This differs from TCP/IP, in which messages are divided into packets and each packet can take a different route from source to destination. This difference makes it easier to track and bill data usage across an ATM network, but it makes it less adaptable to sudden surges in network traffic.

When purchasing ATM service, you generally have a choice of four different types of service:
bullet Constant Bit Rate (CBR) specifies a fixed bit rate so that data is sent in a steady stream. This is analogous to a leased line.
bullet Variable Bit Rate (VBR) provides a specified throughput capacity but data is not sent evenly. This is a popular choice for voice and videoconferencing data.
bullet Unspecified Bit Rate (UBR) does not guarantee any throughput levels. This is used for applications, such as file transfer, that can tolerate delays.
bullet Available Bit Rate (ABR) provides a guaranteed minimum capacity but allows data to be bursted at higher capacities when the network is free.

bandwidth
Last modified: May 14, 1998
The amount of data that can be transmitted in a fixed amount of time. For digital devices, the bandwidth is usually expressed in bits per second (bps) or bytes per second. For analog devices, the bandwidth is expressed in cycles per second, or Hertz (Hz).

The bandwidth is particularly important for I/O devices. For example, a fast disk drive can be hampered by a bus with a low bandwidth. This is the main reason that new buses, such as AGP, have been developed for the PC.

channel
Last modified: September 1, 1997
(1) In communications, the term channel refers to a communications path between two computers or devices. It can refer to the physical medium (the wires) or to a set of properties that distinguishes one channel from another. For example, TV channels refer to particular frequencies at which radio waves are transmitted. IRC channels refer to specific discussions.

(2) For IBM PS/2 computers, a channel is the same as an expansion bus.

circuit switching
Last modified: September 1, 1997
A type of communications in which a dedicated channel (or circuit) is established for the duration of a transmission. The most ubiquitous circuit-switching network is the telephone system, which links together wire segments to create a single unbroken line for each telephone call.

The other common communications method is packet switching, which divides messages into packets and sends each packet individually. The packets may take different routes and may arrive out of order. The Internet is based on a packet-switching protocol, TCP/IP.

Circuit-switching systems are ideal for communications that require data to be transmitted in real-time. Packet-switching networks are more efficient if some amount of delay is acceptable.

Circuit-switching networks are sometimes called connection-oriented networks. Note, however, that although packet switching is essentially connectionless, a packet switching network can be made connection-oriented by using a higher-level protocol. TCP, for example, makes IP networks connection-oriented.

client/server architecture
Last modified: December 22, 1997
A network architecture in which each computer or process on the network is either a client or a server. Servers are powerful computers or processes dedicated to managing disk drives (file servers), printers (print servers), or network traffic (network servers ). Clients are PCs or workstations on which users run applications. Clients rely on servers for resources, such as files, devices, and even processing power.

Another type of network architecture is known as a peer-to-peer architecture because each node has equivalent responsibilities. Both client/server and peer-to-peer architectures are widely used, and each has unique advantages and disadvantages.

Client-server architectures are sometimes called two-tier architectures, refers to client/server architectures in which the user interface runs on the client and the database is stored on the server. The actual application logic can run on either the client or the server. A newer client/server architecture, called a three-tier architecture introduces a middle tier for the application logic.

connectionless
Last modified: May 1, 1997
Refers to network protocols in which a host can send a message without establishing a connection with the recipient. That is, the host simply puts the message onto the network with the destination address and hopes that it arrives. Examples of connectionless protocols include Ethernet, IPX, and UDP.

In contrast, connection-oriented protocols require a channel to be established between the sender and receiver before any messages are transmitted. Examples of connection-oriented protocols include the telephone, TCP, and HTTP.

coaxial cable
Last modified: September 1, 1997

A type of wire that consists of a center wire surrounded by insulation and then a grounded shield of braided wire. The shield minimizes electrical and radio frequency interference.

Coaxial cabling is the primary type of cabling used by the cable television industry and is also widely used for computer networks. Although more expensive than standard telephone wire, it is much less susceptible to interference and can carry much more data. Because the cable television industry has already connected millions of homes with coaxial cable, many analysts believe that they are the best positioned to capitalize on the much-heralded information highway.

CSMA/CD
Last modified: June 1, 1999
Short for Carrier Sense Multiple Access / Collision Detection, a set of rules determining how network devices respond when two devices attempt to use a data channel simultaneously (called a collision). Standard Ethernet networks use CSMA/CD. This standard enables devices to detect a collision. After detecting a collision, a device waits a random delay time and then attempts to re-transmit the message. If the device detects a collision again, it waits twice as long to try to re-transmit the message. This is known as exponential back off.

CSMA/CD is a type of contention protocol. A type of network protocol that allows nodes to contend for network access. That is, two or more nodes may try to send messages across the network simultaneously. The contention protocol defines what happens when this occurs

data compression
Last modified: May 14, 1998
Storing data in a format that requires less space than usual. Compressing data is the same as packing data.

Data compression is particularly useful in communications because it enables devices to transmit the same amount of data in fewer bits. There are a variety of data compression techniques, but only a few have been standardized. The CCITT has defined a standard data compression technique for transmitting faxes (Group 3 standard) and a compression standard for data communications through modems (CCITT V.42bis). In addition, there are file compression formats, such as ARC and ZIP.

Data compression is also widely used in backup utilities, spreadsheet applications, and database management systems. Certain types of data, such as bit-mapped graphics, can be compressed to a small fraction of their normal size.

dial-up access
Last modified: May 11, 1999
Refers to connecting a device to a network via a modem and a public telephone network. Dial-up access is really just like a phone connection, except that the parties at the two ends are computer devices rather than people. Because dial-up access uses normal telephone lines, the quality of the connection is not always good and data rates are limited. In the past, the maximum data rate with dial-up access was 56 Kbps (56,000 bits per second), but new technologies such as ISDN are providing faster rates.

An alternative way to connect two computers is through a leased line, which is a permanent connection between two devices. Leased lines provide faster throughput and better quality connections, but they are also more expensive.

DLC
Last modified: October 14, 1997
Short for Data Link Control, the second lowest layer in the OSI Reference Model. Every network interface card (NIC) has a DLC address or DLC identifier (DLCI) that uniquely identifies the node on the network. Some network protocols, such as Ethernet and Token-Ring use the DLC addresses exclusively. Other protocols, such as TCP/IP, use a logical address at the Network Layer to identify nodes. Ultimately, however, all network addresses must be translated to DLC addresses. In TCP/IP networks, this translation is performed with the Address Resolution Protocol (ARP).

For networks that conform to the IEEE 802 standards (e.g., Ethernet ), the DLC address is usually called the Media Access Control (MAC) address.

OSI Model

Layer Name Function
7 Application Layer Program-to-program communication.
6 Presentation Layer Manages data representation conversions. For example, the Presentation Layer would be responsible for converting from EBCDIC to ASCII.
5 Session Layer Responsible for establishing and maintaining communications channels. In practice, this layer is often combined with the Transport Layer.
4 Transport Layer Responsible for end-to-end integrity of data transmission.
3 Network Layer Routes data from one node to another.
2 Data Link Layer Responsible for physical passing data from one node to another.
1 Physical Layer Manages putting data onto the network media and taking the data off.

Ethernet
Last modified: May 15, 1998
A local-area network (LAN) protocol developed by Xerox Corporation in cooperation with DEC and Intel in 1976. Ethernet uses a bus or star topology and supports data transfer rates of 10 Mbps. The Ethernet specification served as the basis for the IEEE 802.3 standard, which specifies the physical and lower software layers. Ethernet uses the CSMA/CD access method to handle simultaneous demands. It is one of the most widely implemented LAN standards.

A newer version of Ethernet, called 100Base-T (or Fast Ethernet), supports data transfer rates of 100 Mbps. And the newest version, Gigabit Ethernet supports data rates of 1 gigabit (1,000 megabits) per second.

FDM
Last modified: July 1, 1997
Abbreviation of Frequency Division Multiplexing, a multiplexing technique that uses different frequencies to combine multiple streams of data for transmission over a communications medium. FDM assigns a discrete carrier frequency to each data stream and then combines many modulated carrier frequencies for transmission. For example, television transmitters use FDM to broadcast several channels at once.

fiber optics
Last modified: April 29, 1998

Figure

 

A technology that uses glass (or plastic) threads (fibers) to transmit data. A fiber optic cable consists of a bundle of glass threads, each of which is capable of transmitting messages modulated onto light waves.

Fiber optics has several advantages over traditional metal communications lines:
bullet Fiber optic cables have a much greater bandwidth than metal cables. This means that they can carry more data.
bullet Fiber optic cables are less susceptible than metal cables to interference.
bullet Fiber optic cables are much thinner and lighter than metal wires.
bullet Data can be transmitted digitally (the natural form for computer data) rather than analogically.

The main disadvantage of fiber optics is that the cables are expensive to install. In addition, they are more fragile than wire and are difficult to split.

Fiber optics is a particularly popular technology for local-area networks. In addition, telephone companies are steadily replacing traditional telephone lines with fiber optic cables. In the future, almost all communications will employ fiber optics.

Frame Relay
Last modified: November 17, 1997
A packet-switching protocol for connecting devices on a Wide Area Network (WAN). Frame Relay networks in the U.S. support data transfer rates at T-1 (1.544 Mbps) and T-3 (45 Mbps) speeds. In fact, you can think of Frame Relay as a way of utilizing existing T-1 and T-3 lines owned by a service provider. Most telephone companies now provide Frame Relay service for customers who want connections at 56 Kbps to T-1 speeds. (In Europe, Frame Relay speeds vary from 64 Kbps to 2 Mbps.

In the U.S., Frame Relay is quite popular because it is relatively inexpensive. However, it is being replaced in some areas by faster technologies, such as ATM.

hub
Last modified: December 8, 1997
A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets.

A passive hub serves simply as a conduit for the data, enabling it to go from one device (or segment) to another. So-called intelligent hubs include additional features that enables an administrator to monitor the traffic passing through the hub and to configure each port in the hub. Intelligent hubs are also called manageable hubs.

A third type of hub, called a switching hub, actually reads the destination address of each packet and then forwards the packet to the correct port.

IEEE
Last modified: April 13, 1998
Abbreviation of Institute of Electrical and Electronics Engineers, pronounced I-triple-E. Founded in 1884, the IEEE is an organization composed of engineers, scientists, and students. The IEEE is best know for developing standards for the computer and electronics industry. In particular, the IEEE 802 standards for local-area networks are widely followed.

IEEE 802 standards
Last modified: November 25, 1997
A set of network standards developed by the IEEE. They include:
bullet IEEE 802.1: Standards related to network management.
bullet IEEE 802.2: General standard for the data link layer in the OSI Reference Model. The IEEE divides this layer into two sublayers -- the data link control (DLC) layer and the media access control (MAC) layer. The MAC layer varies for different network types and is defined by standards IEEE 802.3 through IEEE 802.5.
bullet IEEE 802.3: Defines the MAC layer for bus networks that use CSMA/CD. This is the basis of the Ethernet standard.
bullet IEEE 802.4: Defines the MAC layer for bus networks that use a token-passing mechanism (token bus networks).
bullet IEEE 802.5: Defines the MAC layer for token-ring networks.
bullet IEEE 802.6: Standard for Metropolitan Area Networks (MANs).

ISO
Last modified: May 16, 1998
Short for International Organization for Standardization. Note that ISO is not an acronym; instead, the name derives from the greek word iso, which means equal. Founded in 1946, ISO is an international organization composed of national standards bodies from over 75 countries. For example, ANSI (American National Standards Institute) is a member of ISO. ISO has defined a number of important computer standards, the most significant of which is perhaps OSI (Open Systems Interconnection), a standardized architecture for designing networks.

ITU
Last modified: March 11, 1997
Short for International Telecommunication Union, an intergovernmental organization through which public and private organizations develop telecommunications. The ITU was founded in 1865 and became a United Nations agency in 1947. It is responsible for adopting international treaties, regulations and standards governing telecommunications. The standardization functions were formerly performed by a group within the ITU called CCITT, but after a 1992 reorganization the CCITT no longer exists as a separate body.

Communications Protocols



Protocol
Maximum Transmission Rate
Duplex Mode
Bell 103 300 bps Full
CCITT V.21 300 bps Full
Bell 212A 1,200 bps Full
ITU V.22 1,200 bps Half
ITU V.22bis 2,400 bps Full
ITU V.29 9,600 bps Half
ITU V.32 9,600 bps Full
ITU V.32bis 14,400 bps Full
ITU V.34 36,600 bps Full
ITU V.90 56,000 bps Full

leased line
Last modified: February 26, 1998
A permanent telephone connection between two points set up by a telecommunications common carrier. Typically, leased lines are used by businesses to connect geographically distant offices. Unlike normal dial-up connections, a leased line is always active. The fee for the connection is a fixed monthly rate. The primary factors affecting the monthly fee are distance between end points and the speed of the circuit. Because the connection doesn't carry anybody else's communications, the carrier can assure a given level of quality.

For example, a T-1 channel is a type of leased line that provides a maximum transmission speed of 1.544 Mbps. You can divide the connection into different lines for data and voice communication or use the channel for one high speed data circuit. Dividing the connection is called multiplexing.

Increasingly, leased lines are being used by companies, and even individuals, for Internet access because they afford faster data transfer rates and are cost-effective if the Internet is used heavily.

local-area network
Last modified: May 16, 1998
A computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected to other LANs over any distance via telephone lines and radio waves. A system of LANs connected in this way is called a wide-area network (WAN).

Most LANs connect workstations and personal computers. Each node (individual computer ) in a LAN has its own CPU with which it executes programs, but it is also able to access data and devices anywhere on the LAN. This means that many users can share expensive devices, such as laser printers, as well as data. Users can also use the LAN to communicate with each other, by sending e-mail or engaging in chat sessions.

There are many different types of LANs Ethernets being the most common for PCs. Most Apple Macintosh networks are based on Apple's AppleTalk network system, which is built into Macintosh computers.

The following characteristics differentiate one LAN from another:
bullet topology : The geometric arrangement of devices on the network. For example, devices can be arranged in a ring or in a straight line.
bullet protocols : The rules and encoding specifications for sending data. The protocols also determine whether the network uses a peer-to-peer or client/server architecture.
bullet media : Devices can be connected by twisted-pair wire, coaxial cables, or fiber optic cables. Some networks do without connecting media altogether, communicating instead via radio waves.

LANs are capable of transmitting data at very fast rates, much faster than data can be transmitted over a telephone line; but the distances are limited, and there is also a limit on the number of computers that can be attached to a single LAN.

MAC address
Last modified: October 15, 1997
Short for Media Access Control address, a hardware address that uniquely identifies each node of a network. In IEEE 802 networks, the Data Link Control (DLC) layer of the OSI Reference Model is divided into two sublayers: the Logical Link Control (LLC) layer and the Media Access Control (MAC) layer. The MAC layer interfaces directly with the network media. Consequently, each different type of network media requires a different MAC layer.

On networks that do not conform to the IEEE 802 standards but do conform to the OSI Reference Model, the node address is called the Data Link Control (DLC) address.

media
Last modified: October 5, 1997
(1) Objects on which data can be stored. These include hard disks, floppy disks, CD-ROMs, and tapes.

(2) In computer networks, media refers to the cables linking workstations together. There are many different types of transmission media, the most popular being twisted-pair wire (normal electrical wire), coaxial cable (the type of cable used for cable television), and fiber optic cable (cables made out of glass).

(3) The form and technology used to communicate information. Multimedia presentations, for example, combine sound, pictures, and videos, all of which are different types of media.

multiplex
Last modified: November 10, 1997
To combine multiple signals (analog or digital) for transmission over a single line or media. A common type of multiplexing combines several low-speed signals for transmission over a single high-speed connection. The following are examples of different multiplexing methods:
bullet Frequency Division Multiplexing (FDM) : each signal is assigned a different frequency
bullet Time Division Multiplexing (TDM) : each signal is assigned a fixed time slot in a fixed rotation
bullet Statistical Time Division Multiplexing (STDM): time slots are assigned to signals dynamically to make better use of bandwidth
bullet Wavelength Division Multiplexing (WDM) : each signal is assigned a particular wavelength; used on optical fiber.

network
Last modified: September 1, 1996

Figure

 

A group of two or more computer systems linked together. There are many types of computer networks, including:
bullet local-area networks (LANs) : The computers are geographically close together (that is, in the same building).
bullet wide-area networks (WANs) : The computers are farther apart and are connected by telephone lines or radio waves.

In addition to these types, the following characteristics are also used to categorize different types of networks:
bullet topology : The geometric arrangement of a computer system. Common topologies include a bus, star, and ring.
bullet protocol : The protocol defines a common set of rules and signals that computers on the network use to communicate. One of the most popular protocols for LANs is called Ethernet. Another popular LAN protocol for PCs is the IBM token-ring network .
bullet architecture : Networks can be broadly classified as using either a peer-to-peer or client/server architecture.

Computers on a network are sometimes called nodes. Computers and devices that allocate resources for a network are called servers.

node
Last modified: May 16, 1998
(1) In networks, a processing location. A node can be a computer or some other device, such as a printer. Every node has a unique network address, sometimes called a Data Link Control (DLC) address or Media Access Control (MAC) address.

OSI
Last modified: May 16, 1998

Short for Open System Interconnection, an ISO standard for worldwide communications that defines a networking framework for implementing protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one station, proceeding to the bottom layer, over the channel to the next station and back up the hierarchy.

At one time, most vendors agreed to support OSI in one form or another, but OSI was too loosely defined and proprietary standards were too entrenched. Except for the OSI-compliant X.400 and X.500 e-mail and directory standards, which are widely used, what was once thought to become the universal communications standard now serves as the teaching model for all other protocols.

Most of the functionality in the OSI model exists in all communications systems, although two or three OSI layers may be incorporated into one.

OSI is also referred to as the OSI Reference Model or just the OSI Model.

packet switching
Last modified: February 17, 1998
Refers to protocols in which messages are divided into packets before they are sent. Each packet is then transmitted individually and can even follow different routes to its destination. Once all the packets forming a message arrive at the destination, they are recompiled into the original message.

Most modern Wide Area Network (WAN) protocols, including TCP/IP, X.25, and Frame Relay, are based on packet-switching technologies. In contrast, normal telephone service is based on a circuit-switching technology, in which a dedicated line is allocated for transmission between two parties. Circuit-switching is ideal when data must be transmitted quickly and must arrive in the same order in which it's sent. This is the case with most real-time data, such as live audio and video. Packet switching is more efficient and robust for data that can withstand some delays in transmission, such as e-mail messages and Web pages.

A new technology, ATM, attempts to combine the best of both worlds -- the guaranteed delivery of circuit-switched networks and the robustness and efficiency of packet-switching networks.

PCM
Last modified: May 14, 1997
Short for Pulse Code Modulation, a sampling technique for digitizing analog signals, especially audio signals. PCM samples the signal 8000 times a second; each sample is represented by 8 bits for a total of 64 Kbps. There are two standards for coding the sample level. The Mu-Law standard is used in North America and Japan while the A-Law standard is use in most other countries.

PCM is used with T-1 and T-3 carrier systems. These carrier systems combine the PCM signals from many lines and transmit them over a single cable or other medium.

peer-to-peer architecture
Last modified: May 18, 1998
A type of network in which each workstation has equivalent capabilities and responsibilities. This differs from client/server architectures, in which some computers are dedicated to serving the others. Peer-to-peer networks are generally simpler and less expensive, but they usually do not offer the same performance under heavy loads.

protocol
Last modified: September 1, 1996
An agreed-upon format for transmitting data between two devices. The protocol determines the following:
bullet the type of error checking to be used
bullet data compression method, if any
bullet how the sending device will indicate that it has finished sending a message
bullet how the receiving device will indicate that it has received a message

There are a variety of standard protocols from which programmers can choose. Each has particular advantages and disadvantages; for example, some are simpler than others, some are more reliable, and some are faster.

From a user's point of view, the only interesting aspect about protocols is that your computer or device must support the right ones if you want to communicate with other computers. The protocol can be implemented either in hardware or in software.

switch
Last modified: March 22, 1998
In networks, a device that filters and forwards packets between LAN segments. Switches operate at the data link layer (layer 2) of the OSI Reference Model and therefore support any packet protocol. LANs that use switches to join segments are called switched LANs or, in the case of Ethernet networks, switched Ethernet LANs.

TDM
Last modified: July 5, 1997
Short for Time Division Multiplexing, a type of multiplexing that combines data streams by assigning each stream a different time slot in a set. TDM repeatedly transmits a fixed sequence of time slots over a single transmission channel. Within T-Carrier systems, such as T-1 and T-3, TDM combines Pulse Code Modulated (PCM) streams created for each conversation or data stream.

throughput
Last modified: May 18, 1998
The amount of data transferred from one place to another or processed in a specified amount of time. Data transfer rates for disk drives and networks are measured in terms of throughput. Typically, throughputs are measured in Kbps, Mbps and Gbps.

twisted-pair cable
Last modified: September 1, 1996
A type of cable that consists of two independently insulated wires twisted around one another. One wire carries the signal while the other wire is grounded and absorbs signal interference. Twisted-pair cable is used by older telephone networks and is the least expensive type of local-area network (LAN) cable. Other types of cables used for LANs include coaxial cables and fiber optic cables.

WDM
Last modified: October 12, 1999
Abbreviation of Wavelength Division Multiplexing, a type of multiplexing developed for use on optical fiber. WDM modulates each of several data streams onto a different part of the light spectrum. WDM is the optical equivalent of FDM.

wide-area network
Last modified: August 12, 1997
A computer network that spans a relatively large geographical area. Typically, a WAN consists of two or more local-area networks (LANs).

Computers connected to a wide-area network are often connected through public networks, such as the telephone system. They can also be connected through leased lines or satellites. The largest WAN in existence is the Internet.

X.25
Last modified: August 11, 1997
A popular standard for packet-switching networks. The X.25 standard was approved by the CCITT (now the ITU) in 1976. It defines layers 1, 2, and 3 in the OSI Reference Model.

X.400
Last modified: August 24, 1997
An ISO and ITU standard for addressing and transporting e-mail messages. It conforms to layer 7 of the OSI model and supports several types of transport mechanisms, including Ethernet, X.25, TCP/IP, and dial-up lines.

X.500
Last modified: August 24, 1997
An ISO and ITU standard that defines how global directories should be structured. X.500 directories are hierarchical with different levels for each category of information, such as country, state, and city. X.500 supports X.400 systems

This information came from http://webopedia.internet.com

Return to previous menu