Professional Documents
Culture Documents
Communications Systems Notes
Communications Systems Notes
Communications Systems Notes
Big Title
Section Title
Subheading
Section
● Communications systems enable people and systems to share and exchange data and information electronically
● This communication occurs between transmitting and receiving hardware and software over a network
● Each device on a network is called a node
● As each message leaves its source it is encoded into a form suitable for transmission along the communication
medium, which could be wired or wireless connection
● During its travels, the message may follow a variety of different paths through many different networks and
connection devices
● Different types of connection device use different networks and connection devices
● Different types of connection device use different strategies to determine which path each message will follow -
switches device based on the MAC address, whilst routers use the IP address, for example
● Eventually the message arrives at the receiver, who decodes the message as it arrives at its destination
○ The network could be a local area network (LAN)
○ Wide area network (WAN)
○ It could be the Internet, intranet, or extranet
● For communication to be successful requires components to agree on a set of rules known as protocols
● Establishing and agreeing on which set of protocols will be used and the specific detail of each protocol must
occur before any data can be transmitted or received - called handshaking
● Protocols are classified according to the level or layer they operate
● The protocols are classified into 3 levels - Application level, Communication Control and Addressing level, and
Transmission level
● As messages pass through the interface between sender and transmitter they are encoded - they descend the
stack of protocols and are finally transmitted
● Each message is progressively encoded using the protocol/s operating at each level
● As messages are received, they pass through the interface between receiver and destination - the original
message is decoded by each protocol in turn as it ascends through each level of the protocol stack
● In the IPT syllables there are three levels that are defined based off the full seven level of the OSI (open systems
interconnection) model
● In both models’ communication occurs in both directions even when the actual message only travels in one
direction
● The receiver transmits data back to the transmitter including data to acknowledge receipt, request more data or
to ask for data to be resent should it not be received correctly
Characteristics of Communication Systems
Overview of Protocol Levels
● The transmitter and receiver must on agree on how the hardware will be used to transfer messages
● The hardware actually used for transmission resides within the IPT transmission level, which includes the
physical layer of the OSI model
● The physical layer includes NICs, hubs and the different types of physical and wireless transmission media
● These components actually move the data from the transmitter to the receiver determine by the higher software
layers
● Each layer performs its functions within data from the layer above during transmitting and the layer below during
receiving
● Each packet of data must descend the OSI model stack, be transmitted and then ascend the stack on the
receiving computer
IPT Application Level
7. OSI Application Layer
● The actual data to be transmitted is created by a software application
● This data is organised in a format understood by the application that will receive the data
6. OSI Presentation Layer
● The data is reorganised into a form suitable for transmission
● E.g., compressing an image and representing it as a series of ASCII characters suited to the Operating System
● The Presentation Layer is commonly part of the application or is executed directly by the application
● Is often related to the requirements of the operating system
● Protocols at this layer are HTTP, DNS, FTP, SMTP, POP, IMAP, and SSL
IPT Communication Control and Addressing Level
5. OSI Session Layer
● Where communication with the network is established, commences, and is maintained
● It determines when a communication session is started with a remote computer and also when it ends
● E.g., when performing an Internet banking transaction, the session layer ensure communication continues until
the entire transaction is completed
● Also includes security to ensure a user has the appropriate access rights
4. OSI Transport Layer
● The transport layer manages the correct transmission of each packet of data
● Ensures that packets failing to reach their destination are retransmitted
● Protocols at this layer are TCP, IP
3. OSI Network Layer
● This is where packets are directed to their destination
● IP operates here - its job is to address and forward packets to their destination
● There is no attempt to check each packet actually arrives
● Routers also operate at this layer by directing packets along the best path based on their IP address
● Routers often have their software stored in flash memory and can be configured remotely from an attached
computer
IPT Transmission Level
2. OSI Data Link Layer
● This layer defines how the transmission media is actually shared
● Device drivers that control the physical transmission hardware operate at this layer
● They determine the final size of transmitted packets, the speed of transfer, and other physical characteristics
● Hardware at this level are Switches
● Protocols at this level are Ethernet, MAC address, Token Ring, SONET, FDDI
1. OSI Physical Layer
● This layer performs the actual physical transfer, hence it is composed solely of hardware
● It converts the bits in each message into the signals that are transmitted down the transmission media
● The transmission media could be twisted pair within a LAN, Copper telephone cable in ADSL, coaxial cable,
Optical fibre, or even a wireless connection
Overview of how messages are passed between source and Destination
Message Creation
● The message is compiled at the source in preparation for sending
● This takes place in a software application and may involve the collection of message data from one of the
system’s users or participants
Examples of message creation
● A user writing an email using an email client such as Outlook
● A web server retrieving requested HTML files from secondary storage in preparation for transmission to a web
browser
● A DBMS server extracting records from a database for transmission to a client application
● Speaking during a VoIP phone conversation
● Pressing the delete key to remove a file stored on a file server
Organisation of packets at the interface between source and transmitter
● When a message is being prepared for transmission, it descends the stack of protocols from the Application
Level down to where it is ready for physical transmission by the hardware operating at the transmission level
● Each protocol wraps the data packet from the layer above with its own header and trailer
● The header and trailer contain data relevant to the protocol operating at that layer
● The protocols within each layer are applied independently of the protocols operating in other layers
● Some protocols include the address of the receiver within the header and may include some form of error
detection code
●Ethernet uses CRC-32 standard whilst fax machines and other telephone lines use CRC-16-X25 within the
X.25-CCITT protocol
● Many high-speed long-distance protocols such as SONET use 64-bit or even 128 bit CRCs
● The differences between each CRC type are the way they are implemented - e.g., CRC-32 the final CRC value is
reversed prior to sending
Hamming Distances and Error Correction - Extension
Purpose
The needs the weekly management meeting aim to fulfil
● Efficiently disseminating information to all managers throughout the organisation
● Improving the efficiency of decision making processes by managers - particularly with regard to including branch
managers in the decision making process
● Encouraging the sharing of ideas and strategies between members of the management team
● Sharing of staff issues occurring at the local level with a view to more amicably and consistently resolving such
issues across the entire organisation
● Maintaining and enhancing interpersonal relationships between the members of the management team
● Inclusion of all manager, even if this means rescheduling
The purpose of this business conferencing system is to:
● Provide the ability for all managers to contribute equally at weekly management meetings
● Enable managers at remote locations to participate in all meetings without the need to travel
● Output audio of sufficient quality such that all voices can be understood at all locations - including when multiple
people are speaking at the same time or different locations
● Reduce the costs through a reduction in the number of face-to-face management meetings required
● Be simple to setup so meetings can be rescheduled at late notice with minimal effort
● Include only reliable, commonly available, well-tested technologies that provide a high quality of service without
the need for onsite technical expertise to use
Data/Information
Data/ Information Data Type External Entity Source OR Sink
Participants
● The general manager
● Four division managers at head office (one of them acting as chairman)
● The five branch managers located in different country towns throughout NSW
Information Technology
● Standard telephones used by each branch manager to dial into the system, enter their Guest PIN, and also to
speak and listen during the conference
● Polycom SoundStation 2W Wireless Conference phone used at head office
○ Includes three high quality microphones to collect head office participant’s voices
○ Also includes high quality speaker for displaying audio from branch managers
○ Is full-duplex to allow branch voices to be heard whilst head office participants are speaking
● Teleconferencing server controlling a PABX (Private Automatic Branch Exchange) that connects the PSTN
circuits originating from head office with each of the PSTN circuits origination from the branches
○ This server is maintained by a teleconferencing company who charges for its service
● PSTN used to transmit and receive all data
○ The data is in analog form at each branch, at head office, and also as it enters the PABX at the
teleconferencing company
Information Processes
Step 1: Setup by chairman
● Prior to the teleconference the chairman rings the phone number of the teleconferencing server
● The chairman enters the Host PIN and is prompted by the server to configure the conference
● The server uses simulated voice prompts the chairman responds by entering numbers on their phone keypad
● The configuration includes the date and time of the conference together with the creation of a Guest PIN
● The chairman provides the time and Guest PIN to each of the branch manager participants
Step 2: Participants enter conference
● Just prior to the scheduled start time the chairman dials the teleconference server and enters the Host PIN using
the conference phone
● They follow the voice prompts to commence the conference
● To join the conference each branch manager participant dials the ‘Dial in Number’ and enters the Guest PIN
● The teleconferencing server directs the PABX to connect the telephone line from each branch manager
participant to the head office line
● Once all branch managers have dialled in the conference can commence
● The company pays per minute charge for each connection used during a teleconference
Step 3: Conference takes place
● During the teleconference all participants’ voices are transmitted and received along the same single circuit
● As is the case with any standard phone call, each local telephone only displays remote voices (and other audio)
● Prior to display local audio is filtered from the signal by the local phone
Step 4: Conference ends
● The conference ends automatically when the conference phone hangs up
● This occurs as soon as the teleconferencing server detects that the phone line that commenced the conference
has been disconnected
● The teleconferencing server then calculates the charge for the conference based on the total conference time
and the number of participants
Advantages/Disadvantages
Advantages
● Reduction costs associated with travel and accommodation
● Branch managers are not absent from their offices as often and unproductive travel time can be used more
productively
● No additional hardware or software required apart from the conference phone at head office
● There is no need for onsite technical help as the technical side of the conference has been outsourced to the
teleconferencing company
● Simple to setup and schedule conferences as required
● Face to face meetings must be scheduled well in advance, whilst teleconferences can occur when and as
required
● This allows urgent decisions and issues to be resolved and information to be disseminated more efficiently
● More regular communication between the complete management team results in better informed decisions and
improved communication of these decisions
● Issues occurring at the local level are better understood by head office, more appropriate solutions result
Disadvantages
● Face to face communication includes body language and facial expressions which are lost
● Branch managers are not physically present whilst division managers and the general manager are
● Reduces the ability of branch managers to develop close interpersonal relationships with other members of
management
● Difficult to maintain concentration during extended phone calls
2. Distance Education System, Sharing Audio, Video, and other data using both PSTN and the Internet
Environment/Boundaries
● A teleconferencing system used by ABC university
● The system transmits audio over the PSTN using a system similar to the business meeting system
● Also transmits and receives live video and other digital data using IP over the Internet
● Courses use the system so that students at remote sites both observe and contribute to live presentations as
they occur in front of local students
● Present and local students are present within a purpose built teleconferencing room at the uni
● Each remote student connects to the conference via a standard telephone line for audio content and via a web
browser running on a personal computer with a broadband connection for video and other data
Purpose
● Students at the university are able to complete many degrees as either full-time on-campus students or as
part-time off-campus students
● The teleconferencing system aims to provide the off-campus students equal access to live presentations without
the need for lecturers to duplicate or significantly modify their presentations
The purpose of the teleconferencing system is to:
● Enable remote off-campus students to be equal participants in live presentations
● Remove the need for lecturers to prepare different material for on and off campus students
● Allow individual remote students to connect to teleconferences using their existing hardware and broadband
internet connections
● Allow presenters to seamlessly operate the technology with minimal disruption to the local student’s view of the
presentation
Data/Information
Participants
● Lecturers who present material from the purpose built teleconferencing room
● Full-time students who are present within the teleconferencing room
● Part-time students who connect to the teleconference presentation from their own home or office
Information Technology
Teleconferencing room
● Personal computer with web browser, WebConference.com software and high-speed Internet connection
● Three large monitors - one for displaying video of participants, another for other application data, the third for
displaying data to the presenter so they do not need to turn away from their audience
● DLP data projector used by presenter to display any data source to the local students using a remote control
● Document camera for collecting images and video of paper documents as well as 3D objects
● Video camera with pan, tilt and focussing functions as well as the ability to follow the current speaker’s voice
● DVD and video player - the output can replace the normal video camera
● High quality microphones throughout the room - the main presenter wears a lapel microphone
● The microphone system includes echo cancelling so that audio from the speakers is not retransmitted
● High quality speaker system optimised for voice frequency output
Remote students
● Personal computer with web browser connected to a broadband internet connection
● WebConference.com software which is downloaded and run automatically within the student’s browser
● Web camera for collecting local video
● Standard telephone, however a headset is recommended
● Multiple server farms that include collections of the following servers in a variety of locations throughout the world
Servers
● Conferencing management server used to control the setup and running of each conference - this includes
directing connections to other servers and other server farms before and during the conference
● Chat and video server receives video and chat data from all participants and transmits this data out as required -
server creates and transmits suitable streams of video data to each participant’s web browser based on the
current speed of each participant’s internet connection
● Desktop and remote control server used to receive and transmit application data
● Telephone conferencing server used to connect all PSTN lines from all participants to form a single shared circuit
Information Processes
● Collecting - audi using telephone and conference room microphones, video using cameras, text using keyboard,
images using document camera
● Displaying - audio using speakers in conference room and speaker in remote student’s rooms, video and other
data types are displayed on monitors and using the DLP data projector
● Raw video is collected as a sequence of images called frames by the video camera
● The raw video frames are fed in real time through a software-based codec
● The compressed video data is transmitted via the internet to the chat and video server
● Each chat and video server includes streaming video server software able to determine the optimum
transmission speed for each participant’s internet link
● The stream of video is ultimately transmitted as a sequence of IP dataframes
● As the stream of IP datagrams are received the same H.264 codec is used by the receiver’s computer to
decompress the video and are displayed on the receiver’s monitor
Advantages/Disadvantages
● Restricted to technical advantages/disadvantages
Advantages
● Remote students do not require any specialised or dedicated information technology apart from the free and
automatically installed software operating within their browser
● Video streams are automatically adjusted to suit the speed of each participants internet connection
● The quality of audio is not affected by poor or congested internet connections
● The system includes redundant servers and server farms so that failure of a single server or connection to a
single server farm does not disrupt conferences
Disadvantages
● Some remote students will experience poor quality video due to slower internet connections
● Most remote students connect from their home and their home telephone is tied up for the duration of each
conference
Messaging Systems
1. Voicemail and Phone Information Services
● Calls that are not answered after a predetermined time are diverted to the voice mail system
● These systems answer the call and play a pre-recorded outgoing message (OGM)
● The OGM welcomes the caller and provides instruction on how to leave a message
● The voice mail system then digitally records the users voice and stores it within the customers voice mailbox
● At some later time the customer rings the voicemail system, verifies their identity using a numeric password and
listens to the voice messages held in the voice mailbox
● During message retrieval the customer uses their phone keypad to enter commands that control the voicemail
system
● The voice mail system is normally a service provided by a local telephone provider
● The servers used to process messages are located and owned by the telephone company
● Businesses and government organisations may maintain their own sophisticated voicemail system with
integrated email and fax
● Large information systems may provide automated information services and call forwarding functionality
● Majority of phone information systems include a hierarchical audio menu where customers navigate down
through the menus to locate information or be directed to specific personnel
● Available options at each level are read out as an OGM with the customer responding through their phone
keypad or through voice to progress to the next level
Features present in Phone Information Services
● Voicemail management for users - customer enters the extension number of the person required and if no
answer the system records the customers message
● Support for multiple incoming and outgoing lines of different types
● Fax on demand where customers navigate a menu system to locate and request particular documents
● Call attendant functions were the menu system filters callers through to the correct department
● Text to Speed (TTS) capabilities that allow text to be read to users over the phone
● Call logging to databases - e.g. callerid, time and length of call
● Provision of information to others - OGMs include information rather than just details on navigating the menu
system
● Automated ordering systems that allow customers to order and pay for products
● Automated surveys where answers to questions are stored within a linked database
● Integration of voice mail with other messaging systems - e.g. voicemail conversion to email for mailbox
Storyboarding and simulating an example IPT phone Information Service
2. Voice Over Internet Protocol (VoIP)
● Voice over Internet Protocol transfers voice calls over the public internet
● It is a broadband internet connection used to transfer telephone calls using IP
● It is possible to transfer voice over the Internet using any Internet connection combined with a microphone,
speakers, and a free instant messaging application
● VoIP also provides an interface to the PSTN
● It allows VoIP calls to be made to any normal telephone across the globe
● Calls are cheaper through VoIP as the public Internet carries the data for free
● If both ends of the call are using VoIP then commercial PSTN isn’t used
● VoIP is a suite of protocols - IP, audio codecs to modulate the voice data, RTP (real time protocol), UDP (User
Datagram Protocol)
● RTP is used to control streaming of data packets - maintaining constant speed, keeping packets correctly
sequenced
● UDP (instead of TCP) to fire off packets more rapidly without error checking or flow control
VoIP Providers
● VoIP providers maintain one or more servers that translate normal telephone numbers into IP addresses
● VoIP providers maintain gateway servers that convert analog phone calls to IP packets and vice versa
● Gateway - device that connects two networks
● Users who sign up with a VoIP provider connect using their existing broadband modem and internet connection
● Broadband modems are available with built-in support for VoIP
● Soft phones have a VoIP software application that operates on existing Internet connected computer
● Voice boxes that connect existing analog handsets to existing broadband modems
● VoIP providers must maintain a network that allows customers to connect to phones on the PSTN
● VoIP gateway servers have to be installed in locations around the world to join to PSTN
● VoIP providers share their gateway servers with other international VoIP providers
● Local VoIP providers enter into an agreement with their local PSTN phone company who create a cricut between
PSTN users and the local VoIP gateway for the duration of each call
● The VoIP gateway server manages the packet switched side of the connection and conversion of data between
the Internet and the local PSTN
Advantages of VoIP compared to PSTN
● Low cost long distance calls
● No added cabling required to add extra VoIP lines
● Additional digital services such as voice mail, conference calls, video calls, are much simpler to add as the data
is digital
● VoIP calls can originate from any location with Internet connection
Disadvantages of VoIP compared to PSTN
● IP and Internet form a packet switched network which was not designed for continuous delivery of real time data
● If congestion occurs then some packets will be delayed or lost causing reduced audio quality
● PSTN maintains a complete circuit for the duration of a call and quality issues are rarely encountered
● Emergency VoIP calls cannot be made when there is a power failure
● PSTN lines are powered by the local telephone line and continue to operate without power
● Broadband Internet connections are unreliable in terms of Quality of Service compared to PSTN
3. Electronic Mail
● During transmission all email messages are composed of two components - an envelope and a contents
component
● The envelope contains information required to transfer the message to its destination
● The envelope data is examined and used by SMTP (simple mail transfer protocol) servers to relay email
messages to other SMTP servers and finally reach to their destination
● The contents component contains various headers with the actual message
● SMTP examines and adds to these headerse but does not alter the actual message
Email Contents and Component
● The contents component contains the actual message and various header fields to specify the sender, receiver,
date/time, subject, and relationship of the message to other related messages
● RFC2822 ‘Internet Message Format’ is the standard that specifies how the content of all email messages are
organised
● This includes - specifying header fields for the recipients and a subject, entering the body of the message
● The email client application adds the sender’s address, date/time, other headers
● The main header fields are To:, Cc:, Bcc:, and Subject
● To: Cc: and Bcc are known as destination fields
● The content of all email messages are composed of a sequence of headers lines and the lines of text in the body
of the message
● All data is represented in ASCII characters
● Each header field is composed of a field name followed by a colon, the field data, and a carriage return line feed
combination (referred to as CRLF meaning the ASCII character 13 followed by the ASCII character 10)
● RFC2822 specifies all possible header fields
● All header fields are grouped into seven categories - destination address fields, orginiator fields, identification
fields, informational fields, resent fields, trace fields, optional fields
Destination Address fields
● Include To:, Cc:, and Bcc:
● To: field contains the addresses of the primary recipients of the message
● Cc is short for carbon copy where recipients receive a copy however the message is not directed at them
● Bcc is short for blind carbon copy and is for recipients who receive the message but their addresses are not
reveal to the other recipients
Originator Fields
● Date:, From:, Sender:, and Reply-to:
● All email messages must contain at least a Date: and From: originator field
● The Date: field is used to specify the date and time that the user indicated the message was complete and ready
to send
● This is the time that the user pressed send within the email client application
● The message may not actually be sent by SMTP until some later time
● From: field is specify the single email address that actually sent the message if sent by more than one person
● Reply-To: field is optional and used to specify one or more email address where replies should be sent
● If Reply-To field exists then the the address/es in the From: field are used for replies
Identification Fields
● Headers used to identify individual message to allow email applications to maintain links between a thread of
messages
● Designed for machines to read rather than humans
● Three possible identification fields - Message-ID:, In-Reply-To: and References:
● Each field contains unique identifiers for individual email messages
● Message-ID should exist within all messages and should be globally unique
● Uniqueness is achieved through a domain name (or IP address) on the right hand side of @ symbol
● Some systems use the date and time or user’s mailbox in combination with other unique code on left hand side
● When user replies to a message an In-Reply-To: field is created that contains the original messages Message-ID
● The original Message-ID is appended to the References: header field that lists all Message-IDs of the previous
related messages - used to display threads of messages
Information Fields
● Include Subject:, Comment:, Keywords: headers
● All three header fields are optional
● The Subject: field is used to briefly identify the topic of the message
● When replying to messages the string ‘Re:’ is appended to the start of existing subject field data
● Theywords: field contains a comma separated list of important words or phrases that may be relevant to the
receiver
Resent, Trace, and Optional Fields
● Resent fields include Resent-From:, Resent-To:, Resent-Message-ID:
● Resent header fields are added to the start of a message each time an existing message is resent
● Resent headers are for information only
● Trace fields are added by SMTP servers who deliver messages across the internet
● They describe the path the message has taken from sender to receiver
● Trace headers are to enable technical staff to determine the path taken by each message if delivery errors occur
● Most email clients and SMTP servers provide a command for trace headers to be viewed
● Optional header fields are added to provide additional functionality
● This includes virus checking and specifying MIME (multipurpose internet mail extensions) headers
MIME (Multipurpose Internet Mail Extensions)
● MIME is the protocol used to code non-text data and attachments into ASCII so they can be transmitted within
email messages
● Non-text data including HTML email messages, image fields, video files, other types of files
● MIME allows for transmission of foreign language characters as well
● STMP servers that deliver the email treat the entire message as ASCII text
● The receiving email client reads the MIME headers and formats the message accordingly
● If an attachment is detected then the original file is recreated
Transmitting and Receiving Email Messages
● Email uses two Application Level protocols: SMTP and either POP or IMAP
● SMTP is used to send email messages from an email SMTP client application to an SMTP server
● Emails are received by an email client application from a POP (Post office protocol) server or IMAP (Internet
Message Access Protocol) server
● Sending an email using an account involves email SMTP client establishing an SMTP connection to the SMTP
server
● The email is then transferred to this server and if the user wishes to download their email then the client
application establishes a POP connection
● The user logs into the server with the username and password and finally receives all messages stored in the
mailbox
How does an email arrive in the mailbox on the POP or IMAP server?
● The senders SMTP server establishes a SMTP connection with the recipients SMTP server
● This is done through determining the IP address of the recipient SMTP server through a DNS (domain name
server) lookup
● Once the IP address of the mail server is found the email message is sent over the Internet to the machine with
the IP address
● Once the message has been sent to the recipients SMTP server the message is passed to the corresponding
POP, or IMAP server placing the message into the recipient's mailbox
● SMTP POP IMAP and DNS are protocols operating at the Application level
● SMTP POP and IMAP are all part of software applications running on both email clients and mail servers
● DNS servers operate separately
Electronic Commerce
1. Automatic Teller Machine (ATM)
2. Electronic Funds Transfer at Point of Sale (EFTPOS)
●EFTPOS terminals are now standard equipment at the register of most retail stores
●Using the EFTPOS system buyers can pay for goods electronically using a credit or debit card
●EFTPOS terminals include keypads, a magnetic stripe reader for collecting, a screen, and a small thermal printer
as display devices
● EFTPOS terminals transmits and receive transaction data over the PSTN
● Wireless versions communicate over mobile networks and others on Ethernet over Internet
● Data is secured during transmission using a public two key encryption system
● Larger department stores have EFTPOS terminals and processes integrated with the stores internal register and
point of sale systems
● Smaller stores EFTPOS terminals operate independently of the stores register
EFTPOS Steps
● Customer swipes card through magnetic stripe reader and card number is read
● Merchant enters sa;es amount into EFTPOS terminal keypad
● Customer selects account and enters their PIN via keypad
● EFTPOS terminal dials host server and connects
● EFTPOS terminal transmits encrypted card number, account type, PIC, and sale amount to host server
● Host server determines the customers financial institution
● Host server connects to customers financial institution and transmits encrypted transaction details including card
number, account type, PIN, sale amount
● Financial institution approves transaction if it can verify the customer based on their PIN, if the customer has
sufficient funds, and has not used their daily EFTPOS limit
● If the transaction is approved the financial institution responds to host by transmitting a unique transaction ID with
an OK
● The financial institution reserves the funds to prevent them being used by other transactions
● The host processor receives the OK from the financial institution and causes the transfer of funds from the
customers account to the hosts cash account - this is electronic funds transfer (EFT)
● Host verifies the funds have been transferred to its cash account and records all details of the transaction
● Host sends an OK to the EFTPOS terminal to confirm the transfer is complete
● The EFTPOS terminal responds to the host that it has received the message
● The host receives the OK from the terminal and commits the transaction
● If no OK is received then the entire transaction is reversed
● The EFTPOS terminal prints a receipt for the customer and merchant
● Each evening the host processor calculates the total amount owing to each merchant and transfers the totals via
an automatic clearing house (ACH) from the host’s cash account into each merchant’s account
3. Internet Banking
● Internet backing allows bank customers to pay bills, transfer money between accounts, and perform various other
functions from their home or office
● Internet banking is more cost effective for banks and more convenient for customers
● To access Internet banking the customer must have a computer connected to the internet, a user ID and
password
● The customer’s web browser connects directly to the bank’s web server using an URL with https
● This means the website may have SSL (secure socket layer) or TLS (transport layer security) protocols for
secure encryption of the website
● These both operate at the Communication Control and Addressing Level just above TCP
● SSL and TLS both use public key encryption
● URL may also include .shtml which refers to hypertext markup language documents with embedded ‘server-side
includes- that cause the bank’s web server to add data specific to the customer prior to transmitting the page
● Server-side means that the server executes programming code and the resulting output is sent to the client
● Other server side systems include CGI (Common Gateway Interface) and ISAPI (Internet Server Application
Programmers Interface)
● For internet banking server-side code causes SQL SELECT statements to execute on the banks database
servers
4. Trading Over the Internet
● The buying, selling, and comparing of goods over the internet
● Has resulted in the creation of virtual businesses
● Virtual businesses do not require shop fronts and are able to operate across the globe without office space
● These are examples of virtual organisations
● Virtual Organisation: An organisation or business whose members are geographically separated and work
together using electronic communication to achieve common goals
Issues in trading over the internet
● Businesses sell over the internet may not establish customer trust and loyalty
● Traditional shop-fronts may appear to provide better quality services
● The only contact with the internet business is through the website or email messages
● The security of transactions is the other concern
● Details such as credit card numbers and account numbers are sensitive
● Companies such as PayPal resolve this issue by acting as a middleman
● The buyer submits their details to the middleman who makes the payment to the seller on behalf of the buyer
● The seller never receives the customer’s credit card or account details
● Funds are withdrawn from the buyer’s account and deposited into the seller’s account by the middleman
Network Communication Concepts
Client-Server Architecture
● Client-Server Architecture: Servers provide specific processing services for clients. Clients request a service,
and wait for a response while the server processes the request
● Where two different computers are present on the network - servers and clients
● The server provides particular processing resources and services to the client machine
● The client machines then perform their own processing
● Each server provides processing services to multiple clients
Client-server processing
● Is a form of distributed processing
● Different computers are used to perform the information processes necessary to achieve the system purpose
● Occurs sequentially - for each particular client-server operation just one CPU is ever processing data at a
particular time
● Many operations may occur simultaneously but still be sequential
● When a particular operation is being performed either the client or the server is processing
● The client and servers just communicate through requests and responses
LANs
● One machine may serve as an Internet server for all other computers on the LAN
● Computers may act as servers to other computers but are clients themselves
● A computer can be a server for some tasks but a client for others
● On larger LANs it is common for all network tasks to be performed by one or more servers
● These servers commonly run a network operating system (NOS)
NOS
● Control authentication of users for security
● Authentication: The process of determining if someone, or something, is who they claim to be
● Users must log into the network server before they can perform any processing
● This may be through passwords, digital certificates, biometric data, fingerprints
● Also provide a file server, print server and other services to users
● Fat client
Client Applications
● Provide the user interface and manage all interactions with end-users
● Includes collecting and displaying information
● Users are unaware of the client and server interactions and do not need to be involved
Thin Clients
● Similar to a terminal
● Performing basic tasks such as receiving data, displaying data, transmitting input back to the mainframe
● Can be basic low specification PCs, often without secondary storage - relying on servers for processing
● Other thin clients are software based - connected through RDP (Remote Desktop Protocol)
● RDP can be used to connect and execute any application running on a remote server
● RDP sends the screen display from the remote computer to the thin client
● User can log into and operate the server through the thin client
● RDP is used by IT staff to manage servers through remote locations, allows employees to access the work
network from home
Network Topologies
● Topology describes the way the devices (nodes) are connected
● Node is any device connected to the network
● Includes computers, printer, hubs, switches, and routers
● All nodes must be able to communicate with a suite of protocols as defined for the network
● Nodes are connected to each other via transmission media - wired or wireless
● The topology of a network describes these connections in the physical layout and how data is logically
transferred between nodes
● Physical Topology: The physical layout of devices on a network and how the cables and wires connect these
devices
● Logical Topology: How data is transmitted and received between devices on a network regardless of their
physical connections
Physical Topologies
Physical Bus Topology
● All nodes are connected to a single backbone - known as a trunk or bus
● The backbone is a single cable that carries data packets to all nodes
● Each node attaches and listens for data present on the backbone
● Terminators are placed at the end of the backbone to prevent the reflection of the signal back down the cable
● Used mostly for LANs
● Used for some high-speed backbones/other long distance connections within commercial and government WANs
● High-speed backbones may link two buildings
● Second backbone installed for redundant connection
● Advantages
○ Require less cable than star wired topologies
● Disadvantages
○ Unable to accommodate a large number of nodes
○ Single break in backbone disables the entire network
Physical Star Topology
● All nodes connect to a central node via individual cables
● Used in many LANs including wireless LANs
● The central node is the device that connects all other nodes allowing communication between each other
● Central node is likely a switch with multiple ports - previously hub, multistation access unit (MAU) or central
computer
● MAUs are used in token ring networks so a physical star topology can be used with a token ring’s logical ring
topology
● For wireless LANs a WAP (wireless access point) is the central node
● Advantages
○ Each node has its own cable and individual nodes can be disconnected without affecting other nodes
○ New nodes can be added easily without disabling the network
○ Identifying the fault is simplified since single nodes can be disconnected
● Disadvantages
○ More cabling required
○ If fault occurs in central node all nodes are disabled
RTS/CTS
● Allows nodes to reserve the transmission media in advance
● System can be turned completely off or on
● Commonly the system is used for frames exceeding a present byte length
● A node waiting to send frames sends an RTS (Request to Send) containing a duration ID field that specifies the
time the sending node will require the transmission media
● In response a CTS (clear to send) frame that contains a duration field is returned
● Nodes only send data frames after they have received a CTS frame
● Other nodes also receive the CTS frame so they do not commence sending until sufficient time has elapsed
Retrying
● All OSI layer 2 protocols specify a limit to the number of retries for individual frames
● Eventually some frames are dropped
● There are MAC strategies that avoid the possibility of collisions completely
● TDMA (time division multiplexing) is used on fixed and mobile networks whilst polling is used for some data
networks
● 802.11 WLAN allows the option for polling functionality
● Polling gives total control of media access to one node
● The node then asks each node in turn if it wishes to transmit
Logical Ring Topology
● When each node receives frames from one and only one node transmits frames to one node
● Each node receives and transmits each frame so all frames circulate around the entire ring
● The destination or recipient node takes a copy prior to transmitting the frame
● Collisions are impossible
Token Ring
● Replaced by Ethernet
● Early IBM Token Rings were wired to a physical ring topology
● Later versions used a physical star topology with the central node being a MAU (multiple access unit)
● MAUs are able to automatically sense when a node is not attached or powered and close the ring
● Token ring networks implemented within long-distance high-speed networks - FDDI and SONET
● A single frame (known as a token) circulates the ring continuously
● When a node wishes to sent data it waits for the token
● The node then attaches its data to the token and sends it on its way
● The frame containing the data continues around being received and transmitted until it reaches the recipient
● The recipient takes a copy of the data and sends the frame onto the next node
● The frame then returns to the original sender to be removed and the token is resent
● The token continues to circulate until the next node wishes to send