The Handbook of Computer Networks Key Concepts Data Transmission and Digital and Optical Networks Volume 1 Hossein Bidgoli
The Handbook of Computer Networks Key Concepts Data Transmission and Digital and Optical Networks Volume 1 Hossein Bidgoli
com
https://ebookgate.com/product/the-handbook-of-computer-
networks-key-concepts-data-transmission-and-digital-and-
optical-networks-volume-1-hossein-bidgoli/
OR CLICK HERE
DOWLOAD NOW
https://ebookgate.com/product/handbook-of-information-security-1st-
edition-hossein-bidgoli/
ebookgate.com
https://ebookgate.com/product/the-handbook-of-optical-communication-
networks-1st-edition-mohammad-ilyas/
ebookgate.com
https://ebookgate.com/product/encyclopedia-of-information-systems-
four-volume-set-1st-edition-hossein-bidgoli/
ebookgate.com
https://ebookgate.com/product/optical-networks-first-edition-debasish-
datta/
ebookgate.com
Connection oriented Networks SONET SDH ATM MPLS and
Optical Networks 1st Edition Harry G. Perros
https://ebookgate.com/product/connection-oriented-networks-sonet-sdh-
atm-mpls-and-optical-networks-1st-edition-harry-g-perros/
ebookgate.com
https://ebookgate.com/product/computer-networks-andrew-s-tanenbaum/
ebookgate.com
https://ebookgate.com/product/instrument-engineers-handbook-process-
software-and-digital-networks-4th-ed-edition-eren/
ebookgate.com
https://ebookgate.com/product/handbook-on-array-processing-and-sensor-
networks-1-auflage-edition-simon-haykin/
ebookgate.com
https://ebookgate.com/product/performance-analysis-of-queuing-and-
computer-networks-1st-edition-g-r-dattatreya/
ebookgate.com
HANDBOOK
OF
COMPUTER
NETWORKS
HANDBOOK
OF
COMPUTER
NETWORKS
Key Concepts, Data Transmission, and
Digital and Optical Networks
Volume 1
Hossein Bidgoli
Editor-in-Chief
California State University
Bakersfield, California
Copyright © 2008 by John Wiley & Sons, Inc. All rights reserved
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used
their best efforts in preparing this book, they make no representations or warranties
with respect to the accuracy or completeness of the contents of this book and specifi-
cally disclaim any implied warranties of merchantability or fitness for a particular pur-
pose. No warranty may be created or extended by sales representatives or written sales
materials. The advice and strategies contained herein may not be suitable for your
situation. You should consult with a professional where appropriate. Neither the pub-
lisher nor author shall be liable for any loss of profit or any other commercial damages,
including but not limited to special, incidental, consequential, or other damages.
For general information on our other products and services or for technical support,
please contact our Customer Care Department within the United States at (800)
762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that
appears in print may not be available in electronic books. For more information about
Wiley products, visit our web site at www.wiley.com.
10 9 8 7 6 5 4 3 2 1
To so many fine memories of my mother Ashraf, my father
Mohammad, and my brother Mohsen, for their uncompromising
belief in the power of education.
About the Editor-in-Chief
Hossein Bidgoli, Ph.D., is professor of Management Encyclopedia, The Handbook of Information Security, and
Information Systems at California State University. The Encyclopedia of Information Systems.
Dr. Bidgoli helped set up the first PC lab in the United The Encyclopedia of Information Systems was the
States. He is the author of 43 textbooks, 27 manuals, and recipient of one of the Library Journal’s Best Reference
over five dozen technical articles and papers on various Sources for 2002 and The Internet Encyclopedia was recip-
aspects of computer applications, information systems ient of one of the PSP Awards (Professional and Scholarly
and network security, e-commerce, and decision support Publishing), 2004. Dr. Bidgoli was selected as the Califor-
systems published and presented throughout the world. nia State University, Bakersfield’s 2001–2002 Professor of
Dr. Bidgoli also serves as the editor-in-chief of The Internet the Year.
Editorial Board
Qi Bi E. Eugene Schultz
Bell Laboratories, Alcatel-Lucent Technologies High Tower Software and University of California-
Berkeley Lab
Feng Cao
Cisco Systems, Inc. Hideyuki Sotobayashi
National Institute of Information and Communications
James E. Goldman Technology (NICT), Japan
Purdue University
Ivan Stojmenovic
Ari Juels University of Ottawa, Canada
RSA Laboratories
Tatsuya Suda
Raymond R. Panko University of California, Irvine
University of Hawaii, Manoa
Pierangela Samarati
Università di Milano, Italy
Contents
xi
xii CONTENTS
Digital Phase Modulation and Demodulation 509 Fiber-Optic Filters and Multiplexers 850
Zartash Afzal Uzmi Hamid Hemmati
Orthogonal Frequency Division Multiplexing 591 SONET and SDH Networks 929
Shinsuke Hara M. Farooque Mesiya
Part 3: Digital and Optical Networks Volume II: LANs, MANs, WANs, The
Digital Communication Basics 629 Internet, and Global, Cellular, and
Robert W. Heath and Atul A. Salvekar Wireless Networks
Digital Radio Broadcasting 642 Part 1: LANs, MANs, and WANs
Zhuojun Joyce Chen
Local Area Networks 3
Spread Spectrum Signals for Digital Wayne C. Summers
Communications 675
Filippo Giannetti and Marco Luise Ethernet LANs 19
William Stallings
Optical Fiber Communications 692
Habib Hamam and Sghaier Guizani Token Ring LANs 27
Norman C. Strole, Werner Bux, and
Optical Transmitters, Receivers, and Noise 708
Robert D. Love
Ken Pedrotti
Optical Fiber LANs 40
Optical Signal Regeneration 729
Mo Adda, Amanda Peart, and Jau Ming Chew
Mingshan Zhao
Windows 2000 Operating System 57
Optical Sources 745
Dario Forte
Tin Win and Serge Demidenko
Incentive Issues in Peer-to-Peer Systems 168 E-Mail Threats and Vulnerabilities 469
Yu-Kwong Kwok David Harley
Storage Area Network Fundamentals 189 Virtual Private Networks 488
Vladimir V. Riabov G. I. Papadimitriou, M. S. Obaidat, C. Papazoglou, and
Fiber Channel 205 A.S.Pomportsis
Jiying Zhao Cryptography 505
Storage Area Networks: Architectures Ari Juels
and Protocols 217
Access Control 518
Nirwan Ansari and Si Yin
Sabrina De Capitani di Vimercati, Sara Foresti,
Distributed Intelligent Networks 235 Stefano Paraboschi, and Pierangela Samarati
G. N. Prezerakos and I. S. Venieris
Biometrics 539
Smart Cards: Communication Protocols and James L. Wayman
Applications 251
Firewalls 553
Michael Tunstall, Konstantinos Markantonakis,
James E. Goldman
Damien Sauveron, and Keith Mayes
xvii
xviii CONTRIBUTORS
The Handbook of Computer Networks is the first compre- 4. Each chapter provides extensive online and off-line
hensive examination of the core topics in the computer references for additional reading. This will enable
network field. The Handbook of Computer Networks, a the readers to go further with their understanding of
3-volume reference work, with 202 chapters, 3400+ pages, a given topic.
is a comprehensive coverage of the computer network 5. More than 1000 illustrations and tables throughout
field with coverage of the core topics. the series highlight complex topics and assist further
The primary audience is the libraries of 2-year and understanding.
4-year colleges and universities with Computer Science, 6. Each chapter provides extensive cross-references.
Computer Engineering, Network Engineering, Telecom- This helps the readers to read other chapters related
munications, Data Communications, MIS, CIS, IT, IS, to a particular topic, providing a one-stop knowledge
Data Processing, and Business departments, public and base for a given topic.
private libraries and corporate libraries throughout the
7. More than 2500 glossary items define new terms and
world, and educators and practitioners in the networking
buzzwords throughout the series, assisting in under-
and telecommunications fields.
standing of concepts and applications.
The secondary audience is a variety of professionals
and a diverse group of academic and professional courses 8. The Handbook includes a complete table of contents
for the individual volumes. and index sections for easy access to various parts of
Among industries expected to become increasingly the series.
dependent upon the computer networks and telecommu- 9. The series emphasizes both technical as well as man-
nications and active in understanding the many issues agerial issues. This approach provides researchers,
surrounding this important and fast-growing field are: educators, students, and practitioners with a bal-
government agencies, military, education, libraries, anced understanding and the necessary background
health, medical, law enforcement, accounting firms, law to deal with problems related to understanding com-
firms, justice, manufacturing, financial services, insur- puter networks and telecommunications issues and
ance, communications, transportation, aerospace, energy, to be able to design a sound computer and telecom-
biotechnology, retail, and utilities. munications system.
Each volume incorporates state-of-the-art core infor- 10. The series has been developed based on the current
mation and computer networks and telecommunications core course materials in several leading universi-
topics, practical applications, and coverage of the emerg- ties around the world and current practices in lead-
ing issues in the computer networks field. ing computer, telecommunications, and networking
This definitive 3-volume Handbook offers coverage of corporations. This format should appeal to a diverse
both established and cutting-edge theories and develop- group of educators and researchers in the network-
ments in the computer networks and telecommunica- ing and telecommunications fields.
tions fields. The Handbook contains chapters from global
experts in academia and industry. The Handbook offers We chose to concentrate on fields and supporting tech-
the following unique features: nologies that have widespread applications in academic
and business worlds. To develop this Handbook, we care-
fully reviewed current academic research in the network-
1. Each chapter follows a unique format including Title ing field in leading universities and research institutions
and Author, Outline, Introduction, Body, Conclusion, around the world.
Glossary, Cross-References, and References. This Computer networks and telecommunications, net-
unique format assists the readers to pick and choose work security, management information systems,
various sections of a chapter. It also creates consis- network design and management, computer informa-
tency throughout the entire series. tion systems (CIS), and electronic commerce curricu-
2. The Handbook has been written by more than lums, recommended by the Association of Information
270 experts and reviewed by more than 1000 aca- Technology Professionals (AITP) and the Association for
demics and practitioners chosen from around the Computing Management (ACM) were carefully inves-
world. These diverse collections of expertise have tigated. We also researched the current practices in
created the most definitive coverage of established the networking field carried out by leading network-
and cutting-edge theories and applications of this ing and telecommunications corporations. Our work
fast-growing field. assisted us in defining the boundaries and contents of
3. Each chapter has been rigorously peer reviewed. this project. Its chapters address technical as well as
This review process assures the accuracy and com- managerial issues in the networking and telecommuni-
pleteness of each topic. cations fields.
xxiii
xxiv PREFACE
principles, technologies, protocols, and applications in into a fascinating and enlightening one-stop knowledge
detail. The chapters conclude with coverage of wireless base in computer networks and telecommunications that
wide area networks and wireless broadband access. “talks” to readers. This has been a massive effort, but one
of the most rewarding experiences I have ever had. So
many people have played a role that it is difficult to know
Distributed Networks where to begin.
The chapters in this group investigate distributed net- I should like to thank the members of the editorial
works, their fundamentals, architectures, and applica- board for participating in the project and for their expert
tions. Grid computing, cluster computing, and peer-to-peer advice on help with the selection of topics, recommen-
networks are discussed in detailed. These chapters also dations for authors, and reviewing the materials. Many
explore storage area networks, fiber channels, and fault thanks to more than 1000 reviewers who devoted their
tolerant systems. This part concludes with a discussion of time by providing advice to me and the authors for
distributed algorithms and distributed databases. improving the coverage, accuracy, and comprehensive-
ness of these materials.
Network Planning, Control, and I thank my senior editor Matt Holt, who initiated the
idea of the Handbook. Through a dozen drafts and many
Management reviews, the project got off the ground and then was man-
The chapters in this group discuss theories, methodolo- aged flawlessly by Matt and his professional team. Matt
gies, and technologies that enhance successful network and his team made many recommendations for keeping
planning, control, and management. After discussion of the project focused and maintaining its lively coverage.
network capacity planning and network modeling, the Jessica Campilango, our editorial coordinator, assisted
chapters concentrate on the identification of threats and our authors and me during the many phases of its devel-
vulnerabilities in a network environment. The chapters opment. I am grateful for all her support. When it came
then present a number of tools and technologies that if to the production phase, the superb Wiley production
properly utilized could significantly improve the integrity team took over. Particularly I want to thank Deborah
of data resources and computer networks by keeping hack- Schindlar and Miriam Palmer-Sherman, our production
ers and crackers at bay. This part concludes with a discus- editors. I am grateful for all their hard work. I also want
sion of business continuity planning, e-mail, and Internet to thank Lynn Lustberg, our project manager from ICC
use policies, and computer network management. Macmillan Inc. Her thoroughness made it easier to com-
plete the project. I am grateful to all her efforts. I thank
Computer Network Popular Applications Kim Dayman and Christine Kim, our marketing team, for
their impressive marketing campaign launched on behalf
and Future Directions of the Handbook.
Chapters in this group present several popular applications Last, but not least, I want to thank my wonderful wife,
of computer networks and telecommunications systems. Nooshin, and my two children, Mohsen and Morvareed,
These applications could not have been successfully uti- for being so patient during this venture. They provided
lized without a sound computer network and telecom- a pleasant environment that expedited the completion
munications system. Some of these applications include of this project. Mohsen and Morvareed assisted me in
conferencing, banking, electronic commerce, travel and sending out thousands of e-mail messages to our authors
tourism, and Web-based training and education. This part and reviewers. Nooshin was a great help in designing and
concludes with a discussion of future trends in computer maintaining the authors’ and reviewers’ databases. Their
networking including biologically inspired networking, efforts are greatly appreciated. Also, my two sisters, Azam
active networks, and molecular communication. and Akram, provided moral support throughout my life.
Specialists have written the Handbook for experienced To this family, any expression of thanks is insufficient.
and not so experienced readers. It is to these contributors
that I am especially grateful. This remarkable collection of Hossein Bidgoli
scholars and practitioners have distilled their knowledge California State University, Bakersfield
Guide to The Handbook of Computer Networks
PART 1
Key Concepts
Handbook of Computer Networks: Key Concepts, Data
Transmission, and Digital and Optical Networks
by Hossein Bidgoli
Copyright © 2008 John Wiley & Sons, Inc.
3
4 THE TELECOMMUNICATIONS INDUSTRY
0.60
Average Revenue per Minute ($)
0.50
0.40
0.30
0.20
0.10
0.00
Figure 1: Average revenue per minute for inter-
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
00
01
02
03
Year 1984–2003
LANDLINE VOICE MARKET 5
90.0%
80.0%
70.0%
60.0%
50.0%
40.0%
30.0%
84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 00 01
Figure 2: AT&T’s share of total long-distance 19 19 19 19 19 19 19 19 19 19 19 19 19 19 19 19 20 20
revenues, 1984–2001 Year
minute (in 2003 dollars), but the average price was less Table 1: Percentage Shares of Total Toll Service Revenues
than ten cents per minute by 2003. Much of the decline for Long-Distance Carriers, 1984–2001
resulted from lower costs to connect calls to local tele-
phone networks (Taylor and Taylor 1993). AT&T’s market
share declined from more than 90 percent in 1984 to less All Other Long
than 40 percent in 2001 (see Figure 2). MCI and Sprint Year AT&T MCU Sprint Distance Carriers
were the second- and third-largest providers of long dis- 1984 90.1 4.5 2.7 2.6
tance during this time, and their market shares grew as
AT&T’s declined. Table 1 shows the annual market share 1985 86.3 5.5 2.6 5.6
for the long-distance market between 1984 and 2001 (the 1986 81.9 7.6 4.3 6.3
most recent year the FCC produced these statistics). By
2001, MCI’s market share had grown to 23.4 percent, and 1987 78.6 8.8 5.8 6.8
Sprint’s had grown to 9.3 percent.
1988 74.6 10.3 7.2 8.0
Overall, the traditional long-distance landline voice
market is in serious decline for two reasons. First, the 1989 67.5 12.3 8.4 11.8
“death of distance” (Cairncross 2001) has been caused
1990 65.0 14.5 9.7 10.8
by a shift in long-distance traffic away from the public
switched telephone network (PSTN) onto private data 1991 63.2 15.6 9.9 11.3
networks and the public Internet. This shift was first led
by international traffic that could avoid voice call termi- 1992 60.8 18.1 9.7 11.5
nation charges and high regulated prices by carrying the 1993 58.1 19.7 10.0 12.3
voice traffic over data lines. Even within the United States,
regulatory policies caused prices for domestic long- 1994 55.2 20.7 10.1 14.0
distance calls to be high above their marginal cost. These 1995 51.8 24.6 9.8 13.8
high margins eroded as competitive alternatives became
available. The second reason for the decline of the long- 1996 47.9 25.6 9.7 26.8
distance landline voice was the high market penetration 1997 43.8 25.6 9.5 21.0
of wireless phones with significantly different pricing.
In 1998, AT&T Wireless’s Digital One Rate incorporated 1998 43.1 23.5 8.5 24.9
long distance into the company’s wireless plan at no ad-
1999 40.5 23.7 9.8 26.0
ditional charge above that for airtime. This pricing plan
was quickly adopted by other wireless firms. Under this 2000 37.9 22.4 9.0 30.7
plan, customers had monthly bundles of minutes on their
2001 37.4 23.4 9.3 23.8
wireless phone contracts that they would lose if they were
not used. Thus, the effective marginal price of a long- Source: Federal Communications Commission (2003), Table 7.
distance call on a wireless phone was zero as long as
users did not exceed their allotted minutes. Not long after
this, wireless plans included free calls during nights and
weekends (e.g., airtime during night and weekends did
not count against customers’ monthly allotments of min- 1996). Even after divestiture, AT&T was regulated under
utes). Thus, customers shifted much of their usage away rate-of-return regulation by the FCC; it is one of the heavi-
from landline long distance and onto wireless phones. est forms of regulation because it limits both profits and
Regulation of the long-distance market also changed prices. Because MCI and Sprint had much lower market
substantially during this time (Sappington and Weisman shares, they were not regulated but still filed their rates
6 THE TELECOMMUNICATIONS INDUSTRY
with the FCC. This asymmetric regulation allowed MCI costs. The upstart companies became known as competi-
and Sprint to know AT&T’s rates with certainty and tive access providers (CAPs) or alternative local transport
respond in a competitive manner. The FCC changed from companies (known as ALTs). These companies continued
rate-of-return regulation to price-cap regulation in 1989, to expand the local telecommunications services they of-
but not until 1995 was AT&T declared nondominant and fered until full-fledged local competition was introduced
effectively deregulated. by TA96. These upstart companies became known as
competitive local exchange carriers (CLECs) after this leg-
islation. The traditional local telephone companies then
Local Voice Market became known as incumbent local exchange carriers (IL-
The path taken by the local voice market has been similar ECs). Several rules from TA96 sought to put CLECs on
to that of the long-distance market. Each local market an equal footing with ILECs. One rule was local number
was historically served by a monopoly local telephone portability. For many business and individuals, changing
company that was rate-of-return regulated by the state phone numbers when changing phone service presented
regulatory board. Most cities and heavily populated areas a great barrier to switch carriers. Because the ILECs
were served by subsidiaries of AT&T until divestiture in started with all the customers, this gave them an unfair
1984. At divestiture, local telephone subsidiaries were sep- advantage in a fully competitive marketplace. To combat
arated from AT&T’s long-distance and equipment pieces. that advantage, local number portability required that
The local telephone pieces of AT&T were broken into seven all phone companies allow their customers to take their
different companies called regional Bell operating compa- phone number with them when they changed local com-
nies (RBOCs): NYNEX, Bell Atlantic, BellSouth, Amer- panies (Black 2002, 99).
itech, Southwestern Bell, US West, and Pacific Telesis. Rates for local telephone service did not decline as
These companies corresponded to different geographic they did in the long-distance market. In fact, the recurring
regions of the country (see Figure 3). The companies did monthly charge for basic telephone service has increased
not serve all customers in their regions but only major pop- from 1986 to 2004 as shown in Figure 4: The average
ulation centers. Other local telephone companies known monthly residential charge rose from $17.70 in 1986 to
as independents (because they were independent of the $24.31 in 2004 (in nominal dollars). Part of the increase in
Bell system), served customers in the other areas. local residential rates has been a shift in recovering costs
Local telephone companies did not face competition away from per-minute charges (access charges) charged to
until much later than their long-distance counterparts. In long-distance companies and toward per-line subscriber
fact, competition in the local market came about because line charges (SLCs) charged to end users.
of competition in long distance. Competition in local mar- The total number of switched access lines has de-
kets started in large urban areas where new start-up com- creased from a high of approximately 192.5 million lines
panies provided direct connections from the customer in December 2000 to approximately 175.5 million in
to the long-distance network and thereby bypassed the December 2005 (FCC 2006, 5). Much of the decline has
local telephone network. This competition arose because been caused by people disconnecting second lines that
of artificially high regulated rates that the local tele- were used for Internet connections or teenagers. These
phone companies charged to long-distance companies to individuals have switched to broadband connections for
connect their networks to customers. Much of this by- Internet use and substituted wireless phones for teenag-
pass was uneconomic in the sense that it was caused by ers. ILECs have suffered not only from the overall decline
regulatory rules rather than underlying differences in in the size of the market but also from competition with
26.00
25.00
24.00
86
87
88
89
90
91
92
93
94
95
96
97
98
99
00
01
02
03
04
19
19
19
19
19
19
19
19
19
19
19
19
19
19
20
20
20
20
20
Figure 4: Total monthly charges for local Year
services in urban areas, 1986–2004 Total Monthly Charges
25.0
20.0
Market Share (%)
15.0
10.0
5.0
0.0
9
5
00
01
02
03
04
05
-9
-0
-0
-0
-0
-0
-0
n-
n-
n-
n-
n-
n-
ec
ec
ec
ec
ec
ec
ec
Ju
Ju
Ju
Ju
Ju
Ju
Figure 5: Growth in CLEC market share,
D
D
1999–2005 Date
CLECs. CLEC market share has increased steadily from Telesis in 1997, SNET in 1998, and Ameritech in 1999. SBC
4.3 percent in December 1999 to 17.8 percent in June merged with AT&T in late 2005 and took on the AT&T name
2004 (see Figure 5). for the company. On March 5, 2006, the new AT&T an-
In addition to suffering from the decline in second nounced plans to purchase BellSouth. US West was ac-
lines, the local wireline market faces competitive threats quired by Qwest, a long-distance company in 2000. Thus,
from so-called intermodal forms of competition for only AT&T, Verizon, and Qwest will remain from the eight
primary lines to a household. Loomis and Swann (2005) companies formed from the 1984 divestiture of AT&T.
have shown clear links among wireless, wireline, and
broadband telecommunications. In the future, more
and more households will go “wireless-only” and discon- Long-Distance and Local Voice Market
nect their wireline services. Others will shift their voice Markets that are in decline often see industry consolida-
usage toward voice over IP (VoIP), using their broadband tion through mergers as a means to decrease costs in or-
connections and disconnecting their traditional landline der to survive in a shrinking market. The local and long-
phones. distance markets have seen much industry consolidation
The local landline market has changed considerably be- with the top local provider (SBC) merging with the top
cause of mergers since AT&T’s 1984 divestiture. Figure 3 long-distance company (AT&T) and the second-largest lo-
(RBOCs at divestiture) has changed to Figure 6 (RBOCs cal company (Verizon) merging with the second-largest
today). In 1997, Bell Atlantic merged with NYNEX to be- long-distance company (MCI). With these mergers, the
come the new Bell Atlantic. In 2000, the new Bell Atlan- distinction between local and long distance is difficult to
tic merged with GTE, the largest independent telephone discern except as a regulatory artifact.
company, to become Verizon. Verizon merged with MCI In spite of blurring lines between long distance and
in 2006. Southwestern Bell Corporation changed its name local services, two important regulatory and public pol-
to SBC Communications in 1995 and acquired Pacific icy decisions concern the interaction between these two
8 THE TELECOMMUNICATIONS INDUSTRY
industry segments. These decisions include universal areas that are less densely populated, more rural, and there-
service and intercarrier compensation. fore of higher cost. Because of the policy of geographic
Universal service is the public policy of having a rate averaging, the high-cost rural telephone companies
telephone network that is available, integrated, and have needed subsidies to continue to maintain low rates.
affordable to all Americans (Mueller 1997). Historically, These funds have come from high access charges for long-
long-distance calls were priced above their marginal distance calls as well as surcharges on bills of all telecom-
costs in order to price local telephone service below its munications service providers.
marginal cost. This cross-subsidization was approved by Access charges are a large part of the second public
both federal and state regulators to ensure that local policy decision concerning local and long distance serv-
telephone service would be affordable to most people. ices: intercarrier compensation. Intercarrier compensa-
The divestiture of AT&T broke the linkage between long- tion started with access-charge plans around the time
distance and local rates. As AT&T long distance faced of divestiture. Because AT&T was split between its long-
more competition, policy makers feared that local rates distance and local pieces, a mechanism of prices had to
would increase and that households would disconnect be developed to charge long-distance companies for their
their local phone service. Local rates did increase follow- use of the local telephone network in order to connect
ing divestiture, but households did not disconnect their a long distance call. Economists had argued that these
phones. Instead, households responded to their total bill charges should only include variable traffic-sensitive
in which local rates increased but long-distance rates costs of completing the long-distance calls; the fixed non–
decreased even more rapidly. As a result, the market traffic-sensitive costs should be paid for by end users in the
penetration rate rose from 91.4 percent in 1984 to 93.3 form of a per-line charge (later called the subscriber line
percent in 1990 (Hausman and Belinfante 1993). charge, or SLC). Because of rate shock and concerns about
In addition to the cross-subsidy issue from long dis- universal service, the SLC was not set high enough to pay
tance to local, TA96 added the e-rate program under the for all of the non–traffic-sensitive costs; the remainder
category of universal service. The e-rate program pro- was collected through increases in access charges above
vides subsidies ranging from 20 percent to 90 percent the traffic-sensitive cost level. This decision ultimately led
for Internet access to schools and libraries, depending to bypassing of local networks and the rise of CAPs and
on how disadvantaged they are. The fund was capped CLECs as discussed earlier.
at $2.25 billion, and the amount of requests for funding TA96 recognized that the system of access charges was
quickly exceeded the funds available. This program fun- flawed and needed to be overhauled. The law charged the
damentally changed the understanding of universal serv- FCC with developing a solution, and the FCC devoted
ice. Previously, only landline voice service was treated as the third of its trilogy of orders from TA96 to access-
needing support under universal service; the e-rate pro- charge reform. The FCC reform plan, however, has a large
gram now extends this same type of support to Internet failure. Instead of raising the SLC, the FCC created a brand
access. new charge—a presubscribed interexchange carrier charge
Another area of universal service is support for high- (PICC)—that the local companies charged to the long-
cost rural telephone companies. The RBOCs generally distance companies based on the number of customers who
serve only densely populated areas of their states. These had that company as their default long-distance carrier.
areas are generally cheaper to serve because of economies Revenue raised from this new charge was used to lower
of scale and geographical considerations. Each area of a access charges. The FCC also distinguished between pri-
state that is not served by an RBOC is served by an in- mary and other lines coming into a residence and allowed
dependent telephone company. The independents serve the SLC and PICC to be higher for nonprimary lines. The
WIRELESS VOICE MARKET 9
FCC wanted the long-distance companies to absorb the BellSouth, and Cingular, as well as by approximately one-
PICC charges as their per-minute access charges declined. quarter of the small rural companies. Qwest, Verizon,
Instead, the companies passed on the new PICC charges and most wireless providers have reserved judgment on
to consumers as a new fee and, in some cases, charged the plan.
more than the PICC charge. The end result was worse
than if the FCC had simply raised the SLC directly. After
two years, the FCC admitted its mistake and eliminated WIRELESS VOICE MARKET
the PICC charge and began raising the SLC. The wireless voice segment of the telecommunications
Intercarrier compensation includes more than just ac- industry has been one of its fastest-growing segments.
cess charges for long-distance service. Because TA96 for- This segment started in 1985 when two cellular provid-
malized rules for full-blown local competition between ers were awarded licenses in each geographic territory by
ILECs and CLECs, intercarrier compensation has also the FCC. One license was given to the landline company,
included payments, called reciprocal compensation, and the other was awarded by a combination of merit
between ILECs and CLECs for terminating local traf- hearings and lottery. This duopoly structure did not make
fic between subscribers. Reciprocal compensation rates for a competitive environment, but the industry grew at
were set at a fraction of the price of access charges even a rapid clip because of the high demand for mobility in
though the physical act of terminating a phone call is the communications. This robust demand led to calls for the
same whether it originates across the country or across FCC to allocate more radio spectrum to wireless teleph-
the street. Charging different prices for the same service is ony. As a result, an additional 120 megahertz (MHz) of
referred to as price discrimination by economists and in- radio spectrum was sold by the FCC in its broadband
vites arbitrage (buying in the low market and selling in the personal communication system (PCS) auctions from
high market) unless there is an easy way to prevent it. In December 1994 to January 1997 (compared to 50 MHz for
the case of reciprocal compensation, CLECs could accept cellular at that time). In all, 2074 licenses were awarded,
long-distance traffic from the long-distance company and and more than $20 billion was bid.
pass it on to the ILEC as local traffic. The CLEC would To ensure more competition than under the former
only pay the low per-minute reciprocal compensation duopoly structure, the FCC imposed a spectrum cap such
rate, and the long-distance company would avoid the much that no single company could have a license for more than
higher access-charge rate. This act would be even easier 45 MHz in any single market. In November 2001, the FCC
if the CLEC and the long-distance company were part raised that limit to 55 MHz; in January 2003, the commis-
of the same holding company. Thus, there was pressure sion eliminated the spectrum cap altogether. The elimi-
to lower access charges and make reciprocal compensa- nation has led to mergers and industry consolidation. In
tion rates higher than their marginal cost. 2004, Cingular bought AT&T Wireless (at that time, a com-
One byproduct of having reciprocal compensation pany independent of AT&T Long Distance); in 2005, Alltel
rates higher than their marginal costs was that CLECs bought Western Wireless and Sprint merged with Nex-
could make a profit from terminating local traffic. One tel. These mergers helped solidify the dominance of four
type of customer with the highest amount of terminat- nationwide wireless carriers—Cingular, Verizon Wire-
ing traffic is the Internet service provider (ISP). ISPs with less, Sprint-Nextel, and T-Mobile—with several smaller
dialup access have large modem banks that allow indi- regional carriers. The firms’ market shares are shown in
viduals to connect to the Internet by placing local calls. Table 2.
If the ISP is a customer of the CLEC and the individual In August 2006, the FCC began an auction of an ad-
connecting to the Internet is a customer of the ILEC, then ditional 90 MHz of wireless spectrum. The bidders with
the ILEC must pay the CLEC per-minute reciprocal com- the largest upfront deposit include a consortium of satel-
pensation for the duration of the Internet connection. In lite TV providers, including DirecTV and EchoStar; and
this way, some CLECs received 40 percent to 70 percent a group of cable TV companies, including Comcast, Time
of their total revenue from reciprocal compensation from Warner Cable, and Cox Communications. Wireless pro-
the ILECs. The FCC eventually ruled that a call to an ISP viders T-Mobile, Cingular, and Verizon Wireless have also
was not a local call and therefore should not be subject to registered at the auction to acquire additional spectrum.
reciprocal compensation rules. This ruling placed some
CLECs into bankruptcy.
The rules for intercarrier compensation get even more
Table 2: Market Share by Subscriber for the Top Four Mobile
difficult when VoIP providers and wireless carriers are
Telephone Operators
added to the mix. Efforts to reform intercarrier compen-
sation and the universal service fund in order to provide
a consistent plan that addresses many of the concerns Mobile Telephone Operator Market Share (%)
already raised have been led by coalitions of industry
players and regulators. One plan, known as the Missoula Cingular Wireless 27.1
Plan (named for the town in which the group met at one Verizon Wireless 24.2
point), was filed with the FCC in August 2006 and will
be the subject of comments and debate in the coming Sprint PCS 11.9
years. The Missoula Plan task force has worked under the T-Mobile 9.6
auspices of the National Association of Regulatory Util-
ity Commissioners (NARUC) and is sponsored by AT&T, Source: Federal Communications Commission. 2005. Tables 2 and 4.
10 THE TELECOMMUNICATIONS INDUSTRY
In 2008, the FCC will auction off additional spectrum declined greatly with the slight increase in recent years
that is now occupied by local television stations. because of increased usage.
Before the creation of these nationwide carriers, the The wireless industry has experienced several pricing
wireless industry was served by smaller regional carriers. innovations that have spurred its growth. The first in-
Because customers wanted to use their wireless phones novation was AT&T’s Digital One Rate, which was intro-
outside of their carriers’ regions, each company devel- duced in May 1998. This plan combined wireless airtime
oped roaming agreements so its customers could utilize and long-distance charges into a single rate, effectively
another company’s network while in its territory. The absorbing the long-distance surcharge for long-distance
charges for using this roaming feature were passed along calls made on wireless phones. This pricing plan was
to the customer. Because roaming charges were much quickly copied by the other wireless companies. As men-
higher than the standard home rate for calls, customers tioned earlier, this type of pricing plan cut landline long-
complained frequently and loudly to their carriers. The distance usage significantly. On the flip side, it spurred
development of nationwide carriers allowed consumers wireless growth because of the “savings” in long distance
to use their own companies’ networks and choose pricing that was introduced in this plan. In January 2004, AT&T
plans that would avoid all roaming charges. Wireless also introduced mobile-to-mobile calling where-
Wireless subscribers and revenues have increased rap- by calls to another AT&T Wireless subscriber would be
idly over time. Figure 7 shows the rapid increase in the free. These free calls did not count against a customer’s
number of wireless subscribers, and Figure 8 shows monthly allotment of minutes; the plan helped spur cus-
the increase in minutes of use over wireless networks. As tomers to get their friends and family to switch to the
of December 2003, nationwide wireless penetration was same carrier. Similar “in-network” plans were introduced
54 percent. The average minutes used per month in- later by many other wireless companies.
creased from 255 minutes in 2000 to 599 minutes in 2003. Wireless companies have also provided customers with
Figure 9 shows that the average total bill for wireless has discounted or sometimes even free phones with a one- or
200
Mobile Wireless Subscribers (Millions)
180
160
140
120
100
80
60
40
20
0
Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec
84 86 88 90 92 94 96 98 00 02 04 Figure 7: Number of mobile wireless sub-
Date scribers, 1984–2004
700
600
Average MOU per Month
500
400
300
200
100
0
1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 Figure 8: Average minutes of mobile wireless
Year telephone use (MOU) per month, 1993–2003
WIRELESS VOICE MARKET 11
100.00
80.00
40.00
20.00
0.00
Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec Dec
Figure 9: Average monthly bill for mobile 87 88 89 90 91 92 93 94 95 96 97 98 99 00 01 02 03 04
wireless telephone service, 1987–2004 Date
two-year contract. Providing a discount for the cost of the FCC does hold power over the wireless spectrum
buying a phone in order to use the wireless service less- licenses that the wireless companies use and can impose
ened the upfront financial burden of getting service even rules on how the firms operate; one example is the ruling
if the monthly charge was higher as a result. Wireless on local number portability.
companies have also signed exclusive deals with phone As the cellular industry began, the FCC required all
manufacturers to capture consumer interest in the U.S. providers to use a single analog standard called ad-
latest technology. One example is Cingular’s exclusive vanced mobile phone service (AMPS). In the mid-1990s,
limited-time contract with Motorola to sell its RAZR line the wireless providers began building second-generation
of phones. (2G) networks that used digital technology. These 2G net-
As wireless phones increasingly became a substitute works were better than the AMPS network because they
for landline usage, many customers started to see their had better signal quality and used the radio spectrum
wireless phones as substitutes for their landline phones. more efficiently. The FCC did not mandate a 2G stand-
Surveys have shown that 10 percent to 15 percent of house- ard, and two different types of standards developed. The
holds have “cut the cord” and gone wireless only. This first set of standards takes samples by time and is similar
percentage has been highest among younger people and to time division multiplexing of landline networks. The
new households. One problem that the wireless industry time-slicing techniques include time division multiple
faced in this substitution was that one landline phone access (TDMA), global system for mobile (GSM), and in-
could serve many individuals in the household. If the tegrated digital enhanced network (iDEN). GSM was the
household consisted of a family of four, this would mean standard used in Europe, and most U.S. companies that
four separate wireless plans to substitute for one landline started using TDMA, like Cingular, have since switched
phone. To effectively lower the price of this substitution to GSM. Nextel uses the iDEN standard. The second set
and spur growth elsewhere, the wireless companies in- of standards used complex algorithms to compress dig-
troduced family plans in which family members could ital signals. This standard is called code division multiple
join another family member’s plan for as low as $10 per access (CDMA), and it is used by Verizon Wireless and
month and share their bundled minutes. These family Sprint PCS. TDMA was proven to work on a large scale
plans lowered the price for a household to substitute sooner and enjoyed a “first-mover” advantage. CDMA is
wireless phones for its landline phone. more sophisticated and expensive but ultimately was able
As discussed earlier, local number portability required to use radio spectrum more efficiently than TDMA. How-
local landline companies to allow their customers to keep ever, once a company has chosen a standard, switching
their local telephone numbers when they switched car- technologies becomes expensive. Third-generation wire-
riers. This rule applied only to landline companies, so a less services (3G) have been developed in Europe and
wireless customer who changed carriers would have to Asia. Two competing standards are available: universal
change phone number and notify all of his or her con- mobile telephone service (UMTS) (also called WCDMA),
tacts of the new number. This hassle gave customers a which was mandated in Europe; and CDMA2000, which
great incentive to stay with their current providers and is used in parts of Asia.
hindered free and equal competition in the market. In Of the five nationwide mobile telephone operators, Cin-
November 2003, the FCC required companies in the top gular and T-Mobile use TDMA or GSM as their 2G digital
one hundred markets to implement local number port- technology, Sprint PCS and Verizon Wireless use CDMA,
ability and roll it out nationwide by May 2004. and Nextel uses iDEN. Verizon Wireless has deployed
Unlike landline telecommunications, the FCC and 1 RTT technology throughout its network. Discussion
state regulatory commissions do not regulate and never of the wireless carriers upgrade plans to 3G networks will
have regulated wireless firms’ prices or profits. However, be delayed until the section on data and Internet access.
12 THE TELECOMMUNICATIONS INDUSTRY
VIDEO AND CABLE TELEVISION Table 3: Direct Broadcast Satellite Market Share as
Percentage of Multichannel Video Programming Distribution
Before the advent of cable TV, video programming
was delivered by over-the-air broadcasts. The FCC
licensed television channels to broadcast over very high Date Market Share (%)
frequency (VHF) from channels 2 to 13 and ultrahigh fre-
quency (UHF) for channels above 13. In a typical local June 2000 15.65
market, the FCC would license three to four VHF chan- June 2001 18.67
nels and several more UHF channels. A VHF station is
often affiliated with one of the major commercial televi- June 2002 20.83
sion net-works: ABC, CBS, NBC, and, later, FOX. Some June 2003 22.68
of these stations are owned by the network, and some are
independently owned but have the right to carry the net- June 2004 25.09
work programming in their particular markets. Although June 2005 27.72
a small percentage of homes receive their video program-
ming from over-the-air broadcasts, the local network af- Source: Federal Communications Commission. 2006a. Table B-1.
filiated stations are usually carried to homes over cable
TV and satellite (Nuechterlein and Weiser 2005, 360). Table 4: Number of Subscribers for Top Cable TV
Cable TV started as noncommercial community Firms, 2004
antenna TV and was not originally seen as a competitive
threat to broadcast TV over the airwaves. However,
as more and more cable-only channels became available Company Number of Subscribers
and more and more homes were passed by cable TV, ca- Comcast 21,569,521
ble TV became increasingly popular. As of June 2004, 98.8
percent of homes in the United States are passed by cable Time Warner 10,955,507
TV and 61 percent of homes passed subscribed to
Cox 6,386,867
cable TV (FCC 2005, 14). Cable TV firms use coaxial cable
to deliver cable content, and their networks were tradition- Charter 6,211,505
ally one-way networks that delivered video content from
Adelphia 5,426,991
the cable headend to end users. To provide cable modem
service (discussed in the next section), cable firms had to Cablevision 2,944,235
upgrade their networks to become two-way networks so
that users could send as well as received information. Bright House 2,187,410
Although local broadcast stations were being seen by Mediacom 1,532,110
fewer and fewer people over the airwaves, they were still
seen by many people on their cable systems as cable TV Source: Federal Communications Commission. 2005. Eleventh annual
report on the status of competition in the market for delivery of video
companies retransmitted local over-the-air stations on programming, February 2005, Tables B-1 and B-3.
their cable systems. At first, this seemed to “save” the local
broadcast channels from a slow death as the over-the-air
Table 5: Top Ten Firms by Market Share in the Video Market
market shrank, but station owners soon became jealous
as a Whole, 2005
as other content channels received payment from the
cable firms for their channels while the broadcast chan-
nels were essentially free. To change this situation, the Market Share (% of
Cable Act of 1992 gave broadcasters the right to forbid Rank Company Subscribers)
retransmission without their consent. This property right
gave broadcasters the ability to negotiate a fee from a 1 Comcast 22.99
cable company for retransmission of its station. The 2 DirecTV 15.72
broadcaster could waive this right and require the cable
TV operator to carry its station under “must carry” rules. In 3 EchoStar 12.27
most cases, broadcasters did not receive high monetary 4 Time Warner 11.69
compensation but were able to negotiate additional chan-
nel “slots” on a cable firm’s lineup in exchange for the 5 Cox 6.73
right to use its local network channel.
6 Charter 6.37
In addition to broadcast TV, cable operators faced
competition from another “wireless” provider. By the 7 Adelphia 5.50
mid-1990s, direct broadcast satellite (DBS) providers such
8 Cablevision 3.22
as DirecTV and Dish Network entered the video-delivery
market. The DBS market share of the video market has 9 Bright House 2.34
increased steadily, reaching 25 percent by 2004, as shown
in Table 3. Among cable TV firms, Comcast is the largest 10 Mediacom 1.55
with more than 21 million customers (see Table 4). Tak- Source: Federal Communications Commission. 2006. Twelfth annual
ing the video market as a whole, Comcast has the largest report on the status of competition in the market for delivery of video
market share with 23 percent, and DirecTV has a programming, February 2006, Table B-3.
VIDEO AND CABLE TELEVISION 13
market share of 16 percent. The top ten firms are shown in However, the Cable Act of 1984 removed cable systems
Table 5. from municipal rate regulation where it existed. Because
Within the cable TV industry, firms are organized as of this deregulation and other causes, cable rates rose
multiple system operators (MSOs). There has been signifi- 43 percent from 1986 to 1989. This sudden rise in rates
cant consolidation in the cable TV industry and across led to calls for federal rate regulation. Thus, the Cable Act
the landline telecommunications industry and cable TV. of 1992 required the FCC to regulate cable TV rates. This
In 1998, AT&T, the largest long-distance company at the lasted until the Telecommunications Act of 1996 removed
time, bought TCI, then the largest cable TV operator. Then, rate regulation for all cable services except basic-tier
in 1999, AT&T bought Media One, the fifth-largest cable cable service.
TV operator. TCI and Media One became AT&T Broad- In addition to high prices and both the regulation and
band, which was sold in 2001 to Comcast, the second- deregulation of prices, the industry has also faced contro-
largest MSO. It seems that the convergence between cable versy surrounding so-called à la carte pricing. À la carte
TV and landline voice communications took longer than pricing refers to a pricing scheme in which consumers
AT&T anticipated, and the cable TV properties were would only pay for channels they wanted and would not be
more valuable to another MSO than they were to a long- required to buy packages or tiers of programming. Cable
distance landline voice company. TV firms have consistently claimed that such a pricing
Prices for cable TV have risen steadily over the past scheme would raise the costs to all consumers because
several years. Figure 10 shows the average price for basic programming and advertising is based on the number
service, while Figure 11 shows the average total cable bill of subscribers and this number would be reduced under
for customers overall. Basic cable service has risen from such a scheme. The FCC originally agreed with the indus-
$11.57 in 1997 to $13.80 in 2004, but the average total try’s analysis but has changed its mind recently. To head
monthly bill has almost doubled from $24.34 in 1995 to off a requirement to offer à la carte pricing, several firms
$45.32 in 2004. have begun to offer “family-friendly” packages to placate
Cable TV has been regulated and deregulated sev- the most vocal advocates of à la carte pricing.
eral times. Before 1984, some municipalities regulated Cable TV providers not only face current competition
cable TV rates in addition to awarding local franchises. from DBS but also now face future competition from
14.00
13.50
Monthly Rate ($)
13.00
12.50
12.00
11.50
11.00
Figure 10: Average monthly rates for basic 1997 1998 1999 2000 2001 2002 2003 2004
services, 1997–2004 Year
50.00
45.00
Average Total Monthly Rates ($)
40.00
35.00
30.00
25.00
20.00
15.00
10.00
5.00
0.00
Figure 11: Average monthly rates, 1995– 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004
2004 Years
14 THE TELECOMMUNICATIONS INDUSTRY
the RBOCs that are rolling out fiber networks to provide Despite having these roots in government funding, the
IPTV in addition to high-speed Internet access. IPTV is Internet was privatized on April 30, 1995. There were then
projected to offer several enhancements over traditional five major backbone providers: uunet, ANS, SprintLink,
cable TV, including greater interactivity, easier guides BBN, and MCI. By 2000, uunet and ANS were brought
and channel changing, and even more channels. RBOCs by MCI WorldCom, BBN was part of Genuity, MCI’s old
have been hindered in their efforts to roll out video serv- network was owned by Cable and Wireless, and AT&T
ices because of local franchise agreements. Cable TV had created its own IP network using its own fiber and
companies usually have franchise agreements with local purchasing IBM’s Global Network. These backbone pro-
municipalities, and the RBOCs argue that it would be too viders had peering arrangements to exchange traffic and
expensive and onerous to negotiate city-by-city franchise provide links to regional networks and ISPs.
agreements in order for them to provide service. They The exponential growth of the Internet would not have
have asked Congress to issue a national franchise license occurred without the development of easy-to-use end-user
for them to provide video programming nationwide and applications. The first applications were e-mail systems
have already obtained statewide franchise authority in that could exchange messages between systems. End-
several states. user e-mail interfaces became easier to use with more and
If one takes a larger definition of the relevant market, more features. Netscape and its World Wide Web browser
cable TV also faces competition from videotape and DVDs popularized the use of the Internet beyond simply e-mail,
and Internet video downloads such as iTunes and video and customer demand grew rapidly. The explosive growth
iPod. With convergence comes another emerging distri- of Web sites and extensions of basic browser functions
bution channel for video programming: the Internet. Web drove consumers to demand access to the Internet and,
sites such as YouTube, Google Video, MSN video, and eventually, higher speed access.
Yahoo Video are increasing the amount of free and paid Starting in the mid-1990s, the number of residential
content for viewers. In addition, TV networks are distribut- second lines soared, driven by demand for dialup Internet
ing their content over their own Web sites and partnering access (Cassel 1999). It was not long before the attraction
with others to sell online versions of their TV content. of always-on connectivity, faster speeds, and declining
The video programming and distribution industry is prices spurred a switch from second lines to broadband
also somewhat vertically integrated. Several cable TV sys- technologies. Broadband is defined by the FCC as speeds
tems own parts of many of the programming channels 200k or faster in one direction, which is low by some
that they and others carry on their systems. For exam- standards. The current technologies that offer broadband
ple, Cablevision has a 60 percent ownership of American speeds are cable modems, DSL, satellite, and WiFi. The
Movie Classics, Cox owns 24.6 percent of Discovery Chan- broadband market shows the greatest evidence of conver-
nel, and Time Warner completely owns HBO. TV networks gence, with cable TV firms offering cable modem service
are owned by larger corporations that also own video con- and landline voice companies offering DSL. As shown
tent and programming. CBS is owned by Viacom, NBC is in Figure 12, cable modems have the highest percentage
owned by General Electric and Vivendi, ABC is owned by market share of the broadband market with 59 percent;
Disney, and FOX is owned by News Corporation. Vertical ADSL follows with 37.2 percent. Cable modems were first
integration could make it difficult for new firms to enter in to the marketplace, but ADSL has tried to close the gap in
competition with the cable TV firms. The Cable Act of 1992 recent years with lower pricing that has led to increased
required cable firms to make their own programming market share. Table 6 shows the number of lines served
available on reasonable terms to rivals. This requirement by various companies that provide cable modems, with
was renewed by the FCC in 2002. Comcast being the largest provider. Table 7 shows the
Some cable TV firms are offering voice communica-
tions (local and long distance) over their broadband cable
modem systems in direct competition with the RBOCs Other wireline, 2.04%
and the long-distance companies. Most of the firms are Fiber or powerline, 1.06%
using VoIP to provide these services over their broadband Satellite or wireless, 0.72%
cable-modem networks. Several cable companies have
also partnered with Sprint-Nextel to offer wireless phones.
Convergence is taking place as RBOCs enter the video
market and cable TV firms offer voice services. Both types
of firms are gearing up to provide the quadruple play of
voice, video, data, and wireless.
Table 6: Major Cable Modem Providers, Ranked by are looking to build broadband networks where private
Subscribership, First Quarter 2005 companies have not deployed any broadband technolo-
gies. Other cities have opted for a landline fiber solution
similar to the Utah Telecommunication Open Infrastruc-
Company Number of Subscribers ture Agency (UTOPIA) project. Municipal broadband has
Comcast 7,410,000 been a politically controversial topic, with private firms
looking to bar municipalities from providing broadband
Time Warner 4,120,000 services out of fear that subsidies from taxpayers will
Cox 2,750,000 provide an unequal playing field and potentially delay or
stop private investment.
Charter 1,980,000 Another politically sensitive issue concerning the In-
Adelphia 1,490,000 ternet has been called “net neutrality.” Net neutrality does
not have a precise definition but usually refers to a policy
Cablevision 1,440,000 that broadband providers cannot charge content provid-
ers to send information over their broadband lines to end
Total North America 21,150,000
users. This policy debate begin when broadband provid-
Source: Leichtman Research Group, cited in The digital fact book. 2005. ers such as Verizon, AT&T, and Comcast proposed charg-
7th ed. ing content providers such as Google and Yahoo to send
data over their lines. The providers would create “fast
lanes” for high-bandwidth applications such as movie
Table 7: Major DSL Providers by Subscribership, First
downloads or streaming video. The providers claim that
Quarter 2005
this would ensure these applications have the bandwidth
available when they need it and would support enhanced
Company DSL Subscribers infrastructure. Critics claim that users will end up paying
twice for access to content.
SBC 5,610,000 Aside from Sprint’s announcement concerning
Verizon 3,940,000 WiMAX, wireless companies are already upgrading their
networks to provide wireless data that surpass minimum
BellSouth 2,350,000 broadband speeds. Until the major carriers upgraded their
Qwest 1,120,000 networks, less than 2 percent of their mobile traffic was
data. Their second-generation networks—using GSM,
Sprint 550,000 CDMA, and TDMA—yielded data speeds of 9.6 to 19.2
Covad 550,000 kilobytes per second (kbps). Recently, however, several
networks have been upgrading to third-generation net-
Total North America 14,700,000 work technologies such as evolution data optimized (or
only) (EvDO) in major cities across the United States.
Source: Leichtman Research Group, cited in The digital fact book. 2005.
7th ed.
These third-generation networks allow broadband speeds
for laptops, personal digital assistants (PDAs), and cell
phones from anywhere the signal reaches. Verizon Wire-
various companies that provide ADSL, with SBC being the less launched its CDMA2000 1 EVDO network in late
largest. 2003 and now offers it in several major U.S. cities. Sprint
Landline broadband faces increasing competition from began to deploy this same technology in July 2005. Cin-
wireless technologies. The wireless technology with gular Wireless is planning to deploy WCDMA with high-
the most users is WiFi, which is used in home wireless speed data packet access (HSDPA) technology in many
networks and coffee shops. WiFi is also used by wireless major U.S. markets. This technology will allow average
Internet service providers (WISPs) to provide Internet download speeds of 400 kbps to 700 kbps with burst rates
services in rural communities. WiMAX is an emerging of up to several megabytes per second (Mbps); CDMA2000
wireless technology that promises wider ranges and faster 1 EV-DO, on the other hand, delivers average user
speeds than WiFi; thus, it may be a better competitor to speeds of 400 kbps to 700 kbps and allows maximum
wireline broadband. Sprint-Nextel recently announced data-throughput speeds of 2.4 Mbps.
its intention to build a “4G” wireless broadband network
using WiMAX technology.
In addition to private companies building wireless INTERNATIONAL
broadband networks, cities and local governments have
taken the initiative to build new networks. WiFi networks TELECOMMUNICATIONS
are being deployed across much larger geographies such Although much of this chapter has focused on the U.S.
as the cities of Philadelphia and San Francisco. In these telecommunications market, similar convergence of
cases, city governments are taking the initiative to have industry markets has occurred elsewhere in the world. In
the technology deployed by partnering with private firms some cases, the United States has been in the forefront
to build and manage the networks. These cities already of these changes; in other cases, notably wireless and
have wireline broadband services available to most city broadband data, the United States has lagged behind.
residents. In other cases, smaller rural municipalities The movement of landline voice services from monopoly
16 THE TELECOMMUNICATIONS INDUSTRY
to competition in both local and long distance has fol- Competitive access provider (CAP): Smaller local
lowed the U.S. pattern with some delay. In many cases, landline company that provided bypass of the ILEC
countries first had to transition from state-owned tel- network. These companies later became known as
ecommunications monopolies to private, regulated firms. CLECs.
In Canada, several telephone companies were owned by Competitive local exchange carrier (CLEC): Smaller,
provincial governments. In the United Kingdom, British upstart company that competes with ILECs for local
Telecom was privatized in 1985. In other parts of Europe, landline voice customers.
France Telecom and Deutsche Telecom moved from state- Digital subscriber line (DSL): A broadband Internet
owned telephone and telegraph monopolies to private access service provided by LECs.
companies. In Japan, Nippon Telephone and Telegraph Direct broadcast satellite (DBS): Wireless video pro-
Corporation started the process in 1985, but in 1996 it viders such as DirecTV and Dish Network that com-
was restructured into a holding company with a separate pete with cable TV companies.
long-distance division and two local telephone companies, Evolution data optimized (or only) (EvDO): A third-
NTT East and NTT West. generation wireless standard that enables broadband
After privatization, all of these countries opened their data speeds on wireless networks.
landline markets to competition. In 1985, the United Federal Communications Commission (FCC): The
Kingdom opened entry into telecom services and Japan federal agency created by the Communication Act of
allowed long distance and international calling compe- 1934, which regulates interstate telecommunications.
tition. Canada allowed competition in long distance in Fiber to the curb (FTTC): The use of fiber optic cable
1992 and local competition in 1997. The European Union to the pedestal or neighborhood and copper or coaxial
opened all telecommunications markets to competition cable from that point to the home.
in 1998 (Crandall 2005). Fiber to the premises (FTTP): The use of fiber optic
On the wireless telecommunications front, the move cable directly to the home that replaces copper or co-
toward competition took a similar but delayed path in axial cable.
mimicking the U.S. experience. Most of the developed Global system for mobile (GSM): A 2G wireless net-
countries only had one or two wireless carriers as late as work standard that uses time-slicing techniques.
1991. Even today, many countries only have two to four High-speed data packet access (HSDPA): A 3G wire-
wireless carriers competing. In spite of being in the fore- less data standard.
front in wireline and wireless competition, the United Incumbent local exchange carrier (ILEC): Tradi-
State has lagged behind in its auction of 3G radio spectra tionally regulated monopoly providers of local voice
and deployment of 3G services. In addition, the United landline services.
States ranked tenth in broadband penetration at the end Integrated digital enhanced network (iDEN): A
of 2003 (Organisation for Economic Co-operation and 2G wireless network standard that uses time-slicing
Development 2005, 129). techniques.
Internet protocol television (IPTV): Delivers video
(television) programming to homes using Internet
CONCLUSION protocols.
Internet service provider (ISP): Company that pro-
Having looked at each of the telecommunications indus-
vides Internet access to end users.
try segments separately, we clearly see that each segment
Multiple system operators (MSO): Cable TV compa-
faces competitive inroads by other industry segments.
nies that provide video programming via many differ-
The landline voice market (both local and long-distance)
ent local systems.
faces competition from wireless voice and cable TV com-
National Association of Regulatory Utility Commis-
panies. Cable TV firms are facing increasing competition
sioners (NARUC): Umbrella organization represent-
from DBS firms and local telephone companies using
ing state and federal regulatory commissions.
IPTV. Local voice companies, cable TV firms, and wire-
Presubscribed interexchange carrier charge (PICC):
less firms are competing for the broadband data market.
New charge as a result of TA96 instituted by the FCC
Large multimarket firms will continue to increase their
to lower switched access fees. Charged by local com-
market shares or market reach in each of the quadruple
panies to long-distance companies.
play markets of landline voice, high-speed Internet ac-
Public switched telephone network (PSTN): The tra-
cess, TV and entertainment, and wireless voice and data.
ditional voice network operated by ILECs and long-
distance voice companies.
Regional Bell operating company (RBOC): Any of
GLOSSARY seven local telephone companies created from the di-
Advanced mobile phone service (AMPS): Wireless vestiture of AT&T in 1984.
analog standard used in the United States. Second generation (2G): Wireless network stand-
Alternative local transport carrier (ALT): Smaller ards that use digital technology, including TDMA and
local landline company that provided bypass of the CDMA.
ILEC network. These companies later became known Subscriber line charge (SLC): Per-line prices charged to
as CLECs. end users that started around the time of divestiture.
Code division multiple access (CDMA): A 2G wireless Telecommunications Act of 1996 (TA96): The most
standard that uses complex algorithms to compress recent, wide-ranging telecommunication law; techni-
the digital signal. cally, a rewrite of the Communications Act of 1934.
FURTHER READING 17
Third generation (3G): Wireless network standards Mueller, M. L., Jr. 1997. Universal service: Competition,
that provide faster data transmission and include interconnection, and monopoly in the making of the
UMTS and WCDMA. American telephone system. Cambridge: MIT Press.
Time division multiple access (TDMA): A 2G wireless Nuechterlein, J. E., and P. J. Weiser. 2005. Digital cross-
network standard that uses time-slicing techniques. roads: American telecommunications policy in the
Universal mobile telephone service (UMTS): A 3G Internet age. Cambridge: MIT Press.
wireless standard also known as WCDMA. Organisation for Economic Co-operation and Develop-
Voice over Internet protocol (VoIP): Using Internet ment. 2005. OECD communications outlook 2005.
protocols to transmit voice conversations over data Paris: Author.
networks. Sappington, D. E. M., and D. L. Weisman. 1996. Design-
Wireless fidelity (WiFi): The popular name given to ing incentive regulation for the telecommunications in-
802.11 standards for transmitting data wirelessly. dustry. Cambridge: MIT Press.
Wireless Internet service provider (WISP): Company Taylor, W. E., and L. D. Taylor. 1993. Postdivestiture long-
that provides Internet access to end users using wire- distance competition in the United States. American
less technology, usually over an unlicensed spectrum. Economic Review (May): 185–90.
Worldwide interoperability for microwave access
(WiMAX): A newer wireless standard that allows
higher speed and longer ranges than WiFi.
FURTHER READING
Breznick, A. 2005. Baby Bells trump cable on data front.
www.cabledatacomnews.com/dec05/dec05-5.html (re-
CROSS REFERENCES trieved February 10, 2006).
See Cable Modems; Data Communications Basics; DSL Brock, G. W. 1994. Telecommunication policy for the infor-
(Digital Subscriber Line); Voice Communications Systems: mation age. Cambridge: Harvard University Press.
KTS, PBX, Centrex, and ACD; Voice over IP (VoIP). ———. 2003. The second information revolution. Cam-
bridge: Harvard University Press.
Crandall, R. W., and H. Furchtgott-Roth. 1996. Cable TV:
Regulation or competition. Washington, DC: Brookings
REFERENCES Institution.
Black, S. K. 2002. Telecommunications law in the Internet Crandall, R. W., and L. Waverman. 1995. Talk is cheap:
age. San Diego: Academic Press. The promise of regulatory reform in North American
Cairncross, F. C. 2001. The death of distance: How the telecommunications. Washington, DC: Brookings
communications revolution is changing our lives. Bos- Institution.
ton: Harvard Business School Press. Federal Communications Commission (FCC). 2003.
Cassel, C. A. 1999. Demand for and use of additional lines Statistics of the long distance telecommunications in-
by residential customers. In The future of the telecom- dustry, May 2003. Washington, DC: Industry Analy-
munications industry: Forecasting and demand analy- sis and Technology Division Wireline Competition
sis, edited by D. G. Loomis and L. D. Taylor, 43–59. Bureau.
Norwell, MA: Kluwer Academic Publishers. ———. 2005. High-speed services for Internet access, 2004.
Crandall, R. W. 2005. Competition and chaos: U.S. tele- Washington, DC: Industry Analysis and Technology
communications since the 1996 Telecom Act. Washing- Division Wireline Competition Bureau.
ton, DC: Brookings Institution, 2005. ———. 2005. Report on cable industry prices, 2004 05-12.
Duesterberg, T. J., and K. Gordon. 1997. Competition and Washington, DC: Industry Analysis and Technology
deregulation in telecommunications: The case for a new Division Wireline Competition Bureau.
paradigm. Indianapolis: Hudson Institute. ———. 2005. Tenth annual report and analysis of com-
Federal Communications Commission (FCC). 2003. Sta- petitive market conditions with respect to commercial
tistics of the long distance telecommunications indus- mobile services September, 2005. Washington, DC:
try, May 2003. Washington, DC: Industry Analysis and Industry Analysis and Technology Division Wireline
Technology Division Wireline Competition Bureau. Competition Bureau.
———. 2005. Eleventh annual report on the status of com- ———. 2005. Trends in telephone service, 2004. Washing-
petition in the market for delivery of video programming, ton, DC: Industry Analysis and Technology Division
February 2005. Washington, DC: Industry Analysis and Wireline Competition Bureau.
Technology Division Wireline Competition Bureau. ———. 2006. Twelfth annual report on the status of compe-
———. 2006. Local telephone competition: Status as of tition in the market for delivery of video programming,
December 31, 2005. Washington, DC: Industry Analy- February, 2006. Washington, DC: Industry Analysis and
sis and Technology Division Wireline Competition Technology Division Wireline Competition Bureau.
Bureau. Johnson, L. L. 1994. Toward competition in cable televi-
Hausman, T., and A. Belinfante. 1993. Effects of the breakup sion. Cambridge: MIT Press.
of AT&T on telephone penetration in the United States. Laffont, J.-J., and J. Tirole. 2000. Competition in telecom-
American Economic Review (May): 178–84. munications. Cambridge: MIT Press.
Loomis, D. G., and C. M. Swann. 2005. Intermodal com- Lenard, T. M., and M. J. Pickford. 2005. The digital econ-
petition in local telecommunications markets. Infor- omy fact book. 7th ed. Washington, DC: Progress Free-
mation Economics and Policy 17(1): 97–113. dom Foundation.
18 THE TELECOMMUNICATIONS INDUSTRY
Maxwell, K. 1999. Residential broadband. New York: John Shapiro, C., and H. R. Varian. 1999. Information rules.
Wiley & Sons. Boston: Harvard Business School Press.
McKnight, L. W., and J. Bailey, eds. 1997. Internet eco- Vogelsang, I., and B. M. Mitchell. 1997. Telecommunica-
nomics. Cambridge: MIT Press. tions competition: The last ten miles. Cambridge: MIT
McKnight, L. W., W. Lehr, and D. D. Clark. 2001. Internet Press.
telephony. Cambridge: MIT Press. Webb, W. 2001. The future of wireless communications.
McMillan, J. 1994. Selling spectrum rights. Journal of Boston: Artech House.
Economic Perspectives 8(3): 145–62.
Schneiderman, R. 1997. Future talk: The changing wire-
less game. New York: IEEE Press.
Handbook of Computer Networks: Key Concepts, Data
Transmission, and Digital and Optical Networks
by Hossein Bidgoli
Copyright © 2008 John Wiley & Sons, Inc.
Table 1: Major Data Communications Event in North America processing was justified because data-processing per-
sonnel were in short supply; economy of scale, both in
hardware and software, could be realized; and only large
Event Year
organizations could afford computers.
Telegraph invented 1837
Western Union founded 1856
Telephone invented 1876 Decentralized Data Processing
Bell Company founded 1877 In a decentralized data-processing system, each user, office,
AT&T created 1885 department, or division has its own computer. All data-
Telephone system regulation begins in processing tasks can be implemented within each sepa-
Canada 1892 rate organizational unit. This system is certainly more
Telephone system regulation begins in responsive to the user than centralized processing. Nev-
United States 1910 ertheless, decentralized systems have certain problems,
Direct-dial long-distance service begins 1951 including lack of coordination among organizational
IBM introduces remote job entry 1954 units, the excessive cost of having many systems, and du-
First U.S. communications satellite sent plication of efforts.
into orbit 1958
FCC approves private microwave
communication networks 1959 Distributed Data Processing
Satellites begin to transmit international
telephone calls 1962 Distributed data processing (DDP) solves two of the ma-
Packet-switching network concept proposed jor problems associated with the first two types of data-
by the Rand Corporation 1964 processing configurations: (1) lack of responsiveness
Carterfone court decision permits non-Bell in centralized processing, and (2) lack of coordination in
telephone equipment to be used 1968 decentralized processing. Distributed data processing
ARPAnet (the foundation of the Internet) has overcome these problems by maintaining centralized
begins operation 1969 control while decentralizing operations.
Court permits MCI to provide long-distance In DDP, processing power is distributed among several
services 1970 locations. Databases, processing units, or input/output de-
Ethernet LAN specifications formulated 1972 vices may be distributed. A good example is a newspaper
IBM announces its systems network publishing business in which reporters and editors are
architecture (SNA) 1974 scattered around the world. Reporters gather news stories,
Microcomputer LANs introduced 1982 enter them into their personal computers (PCs), edit them,
Breakup of AT&T into seven regional Bell and use a communications medium to forward them to
operating companies 1984 the editor in charge. The reporter and the editor can be
Cellular phones begin service 1984 thousands of miles apart. Since the mid-1970s, with ad-
Telecommunications Act of 1996 deregulates vancements in networking and microcomputers, this type
U.S. telephone system 1996 of data-processing configuration has gained popularity.
More than 50 percent of American households Some of the unique advantages of a DDP system include:
own a personal computer 1998
SBC and AT&T merge 2005 • access to unused processing power by an overused
Lucent and Alcatel merge 2006 location;
• design modularity (i.e., computer power can be added
or removed based on need);
• distance and location independence;
• increased compatibility with organizational growth by
highlights important events in North America that have the addition of workstations;
led to today’s modern communications systems. • fault tolerance because of the availability of redundant
resources as a security measure (i.e., if one component
fails, a redundant component will take over);
DATA-PROCESSING CONFIGURATIONS • resource sharing (e.g., of expensive high quality laser
printers);
Over the past sixty years as the computer field has ad-
vanced, three types of data-processing configurations have • system reliability (i.e., system failure can be limited to
emerged: centralized, decentralized, and distributed. only one site); and
• user orientation (i.e., the system is more responsive to
user needs).
Centralized Data Processing
In a centralized data-processing system, one central loca- Some of the disadvantages of DDP include dependence
tion performs all data-processing tasks. In the early days on communications technology, incompatibility among
of computer technology (1950s and 1960s), this type of equipment, and more challenging network management.
22 DATA COMMUNICATIONS BASICS
IMPORTANT CONCEPTS IN DATA alphabetic and numeric characters that IBM developed
for its mainframe operating systems. It is the code for text
COMMUNICATIONS files used in IBM’s OS/390 operating system that many
To better understand a data communications system and corporations run on IBM’s S/390 servers. In an EBCDIC
its operations, several keywords and concepts should be file, each alphabetic, numeric, and special character is
defined. These keywords and concepts will be further represented with an eight-bit binary number (a string
explained throughout the Handbook. of eight 0’s or 1’s). As many as 256 characters (letters of
the alphabet, numerals, and special characters) can be
Data Codes represented (28 ⫽ 256). Conversion programs allow dif-
ferent operating systems to change a file from one code
Computers and communications systems use data codes to another. Table 2 illustrates selected examples of ASCII
to represent and transfer data among various comput- and EBCDIC.
ers and network systems. Three popular types of data
codes are:
Serial versus Parallel Transmission
• Baudot code, In serial transmission, data travels in a single-file bit
• ASCII (American standard code for information inter- stream, one bit following after another. In other words,
change), and the network cable is like a one-lane road along which
• EBCDIC (extended binary coded decimal interchange computers either send or receive information at any given
code). time. In parallel transmission, an entire byte is transmit-
ted at one time. Telephone lines are serial; PC printer
The Baudot code was named after French engineer Jean- cables are usually parallel. A network interface card takes
Maurice-Emile Baudot. It was first used to measure the data traveling in parallel as a group and restructures it
speed of telegraph transmissions. It uses five-bit patterns so that it will flow through the one-bit wide path on the
to represent the characters A to Z, the numbers 0 to 9, network cable. A network interface card is an expansion
and several special characters. Using Baudot code up to card that is required to connect a computer to a local area
thirty-two characters can be represented mathematically network (LAN).
as 25 ⫽ 32. This is not enough, however, to represent all
the letters of most alphabets (uppercase and lowercase) Transmission Modes
and special characters.
Transmission modes include synchronous, asynchronous,
To overcome this limitation, Baudot code uses down-
and isochronous. In synchronous transmission, several
shift (11111) and upshift (11011) character code. By do-
characters are blocked together in parallel for transmis-
ing this, as many as sixty-four different characters can
sion. At the beginning and end of each block there are
be defined, doubling the code’s original size. This process
empty bits, but these make up a small percentage of the
is similar to typing using the keyboard. If the caps lock
total number of messages. Synchronous transmission is
key on the keyboard is pressed, then all of the characters
used to reduce overall communications costs.
typed after this will be transmitted as uppercase; as soon
In asynchronous transmission, each character is sent
as it is pressed again, all the characters will be transmit-
serially through a medium as an independent message.
ted as lowercase. Therefore, using Baudot, every charac-
Each message is one character long, and the character
ter except for a space is either an upshift character or a
is preceded by a start bit and ended with a stop bit. This
downshift character. For example, 10001 represents both
type of transmission is more expensive than synchronous
the letter Z and ⫹ (the plus sign). The letter Z is a down-
shift character, and the plus sign is an upshift character.
Although Baudot code is no longer used, it illustrates
how information is transmitted by a small number of bit Table 2: Selected Keyboard Symbols in ASCII and EBCDIC
combinations.
In the early 1960s, the American National Standards
Institute developed the American Standard Code for In- Symbol ASCII EBCDIC
formation Interchange, or ASCII (pronounced ask-ee). It Space 0100000 01000000
is the most common format for text files, is used exten- A 1000001 11000001
sively in PC applications, and is ubiquitous on the Inter- B 1000010 11000010
net. In an ASCII file, each alphabetic, numeric, or special Z 1011010 11101001
character is represented with a seven-bit binary number a 1100001 10000001
(a string of seven 0’s or 1’s). As many as 128 characters b 1100010 10000010
can be represented (27 ⫽ 128). UNIX and DOS-based op- z 1111101 10101001
erating systems and the majority of PC applications use * 0101010 01011100
ASCII for text files. Windows NT and 2000 use a newer % 0100101 01101100
code called unicode. The extended ASCII is an eight- ( 0101000 01001101
bit code used by IBM mainframe computers that allows 0 0110000 11110000
256 (28 ⫽ 256) characters to be represented. 1 0110001 11110001
Extended binary coded decimal interchange code, or 9 0111001 11111001
EBCDIC (pronounced “ehb-suh-dik”) is a binary code for
OPEN SYSTEM INTERCONNECTION (OSI) REFERENCE MODEL 23
transmission but may be more accurate. The parity bit between the physical connection to the network and the
is used for an error-checking procedure in which the end-user application. The seven layers are as follow:
number of 1’s must always be the same—either odd or
even—for each group of bits transmitted without error. layer 7, or application layer;
There are two types of parity: even and odd. In even layer 6, or presentation layer;
parity, the bits are counted before they are transferred; layer 5, or session layer;
if the total number of 1 bits is even, then the parity bit is
layer 4, or transport layer;
set to 0 (the sum of the bits must be even). If the number
of 1 bits is odd, then the parity bit is set to 1, making the layer 3, or network layer;
result even. An odd parity bit is set to 1 if the number of layer 2, or data-link layer; and
1’s in a given set of bits is even (making the total number layer 1, or physical layer.
of 1’s odd).
In isochronous transmission, the elements of both syn- Each layer in the architecture performs a specific task.
chronous and asynchronous forms of transmission are It only communicates with the layers directly above
combined. Each character is required to have both a start and below it; no communications are allowed directly be-
bit and a stop bit; however, as in synchronous data trans- tween layers that are not directly adjacent to one another.
mission, the sender and receiver are synchronized. For example, the session layer (layer 5) can only commu-
nicate with the presentation and transport layers (6 and 4,
respectively).
Data Flow The lowest layers—1 and 2—define the network’s phys-
The three elementary types of data flow are simplex, full ical media such as network adapter cards and the cable.
duplex, and half-duplex. In a simplex transmission, com- They also define how data bits will be transmitted over
munication can take place in only one direction: A ware- the medium. The highest layers define how user applica-
house sends its daily transactions to the main office, for tions will access communication services. The higher the
example. Radio and television signal transmissions are layer, the more complex its function.
examples of simplex transmission. Each layer provides a specific service or action that
In a half-duplex transmission, communication takes prepares the data to be transmitted over the network to
place in both directions, but not at the same time. This another computer. The layers are separated from each
is similar to a walkie-talkie radio; only one person can other by boundaries called interfaces. Requests are passed
talk at a time. The amount of time required for half- from one layer, through the interface, to the next layer,
duplex data flow to switch between sending and receiving and each layer builds on the services or actions provided
is called turnaround time. The turnaround time for differ- by the layer below it.
ent circuits varies and can be obtained from their techni- Although the OSI model is the best known and most
cal specification manual. widely used model for describing network communica-
In a full-duplex transmission, communication can take tions, it has been criticized for being difficult to under-
place in both directions at the same time. stand and for the long time spent to have it finalized.
Table 3 provides a description and the purpose of each
layer in the open systems interconnection model.
The basic purpose of each layer is to provide services
OPEN SYSTEM INTERCONNECTION to the next layer. Virtual communication occurs between
peer layers of the sending and receiving computers. For
(OSI) REFERENCE MODEL example, the transport layer adds information to the
In 1979, the International Organization for Standardi- packet that only the transport layer on the receiving com-
zation (ISO) developed the open system interconnection puter can interpret.
(OSI) reference model. The OSI reference model is a seven- To send a packet from a source computer to a destina-
layer architecture that defines the method of transmission tion computer, information is sent down through each of
of data from one computer to another over a network. the seven layers, picking up formatting or addressing in-
The model is used to control and describe the flow of data formation from each layer as it proceeds. The completed
packet, having passed through all seven layers, is then understand. It might perform data compression, protocol
transmitted out of the network interface card, over the conversion, and data translation.
network cable, to the destination computer. At the des- Data encryption and character set translation such as
tination computer, the packet is sent up through each of ASCII to 4 EBCDIC and vice versa are also performed
the seven layers in the reverse order. Each layer reads and by protocols at this layer. The redirector utility operates
strips away the information sent to it by its peer layer on here and literally redirects requests for input/output op-
the sending computer, then passes the packet up to the erations to resources on a network server. Examples of
next layer. When the packet finally arrives at the applica- presentation layer protocols are hypertext transfer proto-
tion layer on the destination computer, all of the format- col (HTTP) and AppleShare file protocol (AFP).
ting and addressing information has been stripped away
and the information is back in its original form.
On the sending computer, information must be passed Layer 5: The Session Layer
through all of the lower layers before being transmitted The session layer provides services to and receives serv-
over the network cable. On the receiving end, the infor- ices from layers 6 and 4 (presentation and transport). The
mation is passed up from the lowest to the highest layer. layer is responsible for establishing a dialogue between
This means that only the physical layer is capable of com- computers and establishes, maintains, and breaks con-
municating directly with its counterpart layer on another nections or “conversations” between computers over the
computer. No other layer can pass information directly to network. It is responsible for dialogue control by regulat-
its counterpart layer on another computer. ing which side transmits, when, and for how long. Session
The following sections describe the purpose of each of initiation must arrange for all of the desired and required
the seven layers of the OSI model and identify the serv- services between session participants such as logging onto
ices they provide to adjacent layers. the network, transferring files, and checking security.
The session layer also provides synchronization
Layer 7: The Application Layer by placing checkpoints at specific intervals in the data
stream to help prevent large data losses. With the use of
The top (seventh) layer of the OSI model is the applica-
checkpoints, if the network fails, only the data after the
tion layer. It provides services to and receives services
last checkpoint has to be retransmitted.
from layer 6, the presentation layer. The application layer
Examples of session layer protocols are transmission
serves as the window that application programs use to
control protocol (TCP) and network basic input/output
access network services. This layer provides the services
system (NetBIOS).
that directly support user applications such as software
for file transfer, database access, and e-mail. It is applica-
tion dependent and performs different tasks in different
applications.
Layer 4: The Transport Layer
Programs, which use services of the network, reside The transport layer provides services to and receives serv-
in this layer. These programs are the ultimate consum- ices from layers 5 (the session layer) and 3 (the network
ers of network services of the lower layers. The transmis- layer). The transport layer (sometimes called the host-to-
sion of messages used by these programs is the primary host or end-to-end layer) is responsible for providing flow
goal of the lower protocols. This is the end user’s access to control and error handling. This layer generates the re-
the network system. The application layer handles general ceiver’s address and ensures the integrity of the transmit-
network access, flow control, and error recovery. Its main ted messages. The transport layer ensures that packets
objective is to provide a set of utilities for application are delivered error-free, in sequence, and with no losses
programs. Examples of application layer programs are: or duplications. This layer also provides various methods
of flow control, ordering of received data, and acknowl-
• AppleShare (Apple); edgment of correctly received data. It is responsible for
• file transfer protocol (FTP); breaking large blocks of data into smaller packets, if
• hypertext transfer protocol (HTTP), the protocol used needed, and eliminating duplicate packets.
to access World Wide Web documents written in hyper- At the destination computer, the transport layer un-
text markup language (HTML); and packs messages, reassembles the original messages, and
sends an acknowledgment of receipt. Examples of trans-
• X.400.
port layer protocols include TCP and sequenced packet
exchange (SPX) (Novell).
Layer 6: The Presentation Layer
The presentation layer provides services to and receives
services from layers 7 and 5 (application and session, re- Layer 3: The Network Layer
spectively). The layer formats the message and is known The network layer provides services to and receives serv-
as the network’s translator. It translates data from a ices from the transport and data-link layers (4 and 2). The
format provided to it by the application layer from the layer is responsible for message addressing and routing
sending computer into a commonly recognized format. as well as addressing messages and translating logical ad-
At the destination computer, the presentation layer trans- dresses and names into physical addresses. It also deter-
lates the commonly recognized format back into a for- mines which path a packet should take based on network
mat that the receiving computer’s application layer can conditions and priority of service. The network layer also
NETWORK TYPES 25
handles tasks such as packet switching, routing, and con- responsible for data encoding and bit synchroniza-
trolling data congestion. Software at this layer accepts tion, ensuring that when a bit is transmitted as a 1, it is
messages from the transport layer and ensures that the received as a 1 (not as a 0) at the destination computer.
packets are directed to their proper destination. Exam- The physical media can be coaxial, fiber-optic, or
ples of network layer protocols include TCP, the Internet twisted-pair cable. The layer defines the specifics of im-
protocol (IP), and internetwork packet exchange (IPX) plementing a particular transmission medium. It defines
(Novell). the type of cable, frequency, terminations, and so forth.
The physical layer can be changed to other new technolo-
gies as they are developed without affecting the operation
Layer 2: The Data-Link Layer of upper layers, assuming that the interlayer interfaces
The data-link layer provides services to and receives serv- are implemented properly.
ices from layers 3 and 1 (network and physical, respec- Examples of physical layer implementation include:
tively). The layer oversees the establishment and control
of the communications link; its primary task is to resolve • token ring;
the problems caused by damaged, lost, or duplicate mes- • ArcNet;
sages so that succeeding layers are protected against
transmission errors and can assume that no errors take
• Ethernet:
place. The layer also is responsible for the detection of • 10Base-2, for thin Ethernet (coaxial) cable, com-
physical errors, notification of such errors, and estab- monly known as “thinnet”;
lishing and terminating logical links. It performs error • 10Base-5, for thick Ethernet (coaxial) cable, com-
detection, correction, and retransmission of packets if monly known as “thicknet”;
necessary. • 10Base-T, for unshielded twisted-pair cable,
Generally, the source computer’s data-link layer waits commonly known as “twisted pair”;
for an acknowledgment from the destination computer’s • 10Base-F, for fiber-optic cable, commonly known as
data-link layer. The destination data-link layer detects “fiber”; and
any problems with the transmission. If an acknowledg-
• other higher speed Ethernets now available, including
ment is not received, then the source data-link layer initi-
100BASE-FX, 100BASE-SX, and 100BASE-BX; and
ates a retransmission.
When the 802 standards committee (an industry • wireless:
standards-setting group) decided that more detail was • broadcast radio;
necessary at the data-link layer, the layer was divided into • infrared light;
two sublayers: the logical link control (LLC) and the media • microwave radio; and
access control (MAC) sublayers. The LLC is the higher of
• spread-spectrum radio.
the two sublayers, and it manages data-link communica-
tion and defines the use of logical interface points called
service access points (SAPs). The MAC sublayer provides NETWORK TYPES
shared access for the computers’ network adapter cards to There are three major types of network systems: local
the physical layer. The MAC sublayer communicates di- area network (LAN), wide area network (WAN), and met-
rectly with the network adapter card and is responsible ropolitan area network (MAN).
for delivering error-free data between two computers on A LAN system connects peripheral equipment that is
the network. It performs most of the data-link layer func- in close proximity. Usually, this kind of system is limited
tions such as error detection and retransmission. to a certain geographical area such as a building, and one
Examples of data-link layer implementation are Eth- company owns it. The geographical scope of a LAN can
ernet, token bus, and token ring. be from a single office to a building or an entire campus.
The speed of LANs varies from 10 Mbps (million bits per
second) to 10 Gbps (trillion bits per second). A LAN is
Layer 1: The Physical Layer usually a prerequisite for an automated office in which
The physical layer provides services to and receives serv- word processing, e-mail, and electronic message distri-
ices only from layer 2, the data-link layer. The physical bution are integrated in one system. To establish a LAN
layer is the lowest layer of the OSI model. It specifies system, careful planning and a thorough assessment of a
the electrical connections between the computer and the particular organization’s information needs are required.
transmission medium (such as the network cable). This A WAN system does not limit itself to a certain geo-
layer defines the physical media through which the host graphical area. It may span several cities, states, or even
communicates over the network. For example, it defines countries. Usually, several different parties own the
the number and function of each pin on a connector. system. The geographical scope of a WAN can be from
The layer is primarily concerned with transmitting between two or more cities to crossing international bor-
binary data (0’s and 1’s), or bits, over a communication ders. The speed of a WAN depends on the speed of its
network and defines the rules by which binary data are individual interconnections (called links), and it can vary
transmitted, including the appropriate electrical or opti- from 28,800 bps to 155 Mbps. As an example, consider a
cal impulse, electrical voltages, and full duplex or half- company that has its headquarters in Washington, D.C.,
duplex data flow and connector cable standards such and an office in each of thirty states. With a WAN sys-
as RS232, RS449, or radio frequency. This layer is also tem, all of these offices can be in continuous contact with
26 DATA COMMUNICATIONS BASICS
the headquarters and send and receive information. An As this definition indicates, standard formats play a
airline reservation system is another good example of critical role in an EDI environment. Sending e-mail or
a WAN. A customer can reserve an airline ticket in the faxes or posting through bulletin boards does not require
United States and pick it up in Asia or Africa. a specific data format and standard.
A WAN system may use many different technologies. Electronic data interchange was initially developed to
For example, it may use different communication media improve response time, reduce paperwork, and eliminate
(coaxial cables, satellites, and fiber optics) and terminals potential transcription errors. EDI represents the ap-
of different sizes and sophistication (PCs, workstations, plication of computer and communications technology,
and mainframes) and be connected to other networks. supporting innovative changes in business processes.
A committee of the Institute of Electrical and Elec- It uses a comprehensive set of standards and protocols
tronic Engineers has developed specifications for a pub- for the exchange of business transactions in a computer-
lic, independent, high-speed network that connects a compatible format. This may cover the following applica-
variety of data communications systems, including LANs tions:
and WANs in metropolitan areas. This new set of stand-
ards is called a metropolitan area network (MAN). A MAN • acknowledgments of business transactions,
is designed to deliver data, video, and digital voice to all • financial reporting,
organizations within a metropolitan area. Its geographi- • inquiries,
cal scope usually covers a city and contiguous neighbor- • invoices,
ing cities. The speed of MANs varies from 34 Mbps to 155 • order status,
bps. Table 4 compares these three types of networks.
• payments,
• pricing,
APPLICATIONS OF DATA • purchasing,
COMMUNICATIONS • receiving,
Early in this chapter we saw several applications of data • scheduling, and
communications. Volume 3 of the Handbook explores • student information.
several applications of data communications and net-
working. For now, we would like to introduce two popu- EDI is the closest option to implementing a paperless
lar applications of data communications: electronic data business-transaction processing system. Many businesses
interchange and electronic commerce. With the rapidly use EDI as a substitute for their usual method of com-
increasing popularity of the Internet, these applications munication where paper documents such as purchase or-
are gaining more users. ders, invoices, or shipping notices were physically carried
from department to department, mailed or faxed from
one organization to another, or manually re-entered into
Electronic Data Interchange the computer of the recipient. Also, organizations use EDI
Data communications can help companies transmit data to electronically communicate, having documents and
electronically over telephone lines and other communi- other types of information transmitted immediately
cations media. These data can be directly entered into and accurately in a computer-compatible format.
a trading partner’s business application. However, data EDI is different from sending e-mail or sharing files
communications can only solve a part of the problem. through a network (LANs, WANs, or MANs) or through
The data are captured first and then electronically trans- an electronic bulletin board. Using these communica-
mitted. Some manual intervention must take place here. tions systems, the format of the transmitted data must be
This is where electronic data interchange (EDI) plays such the same for the sender and receiver or successful com-
an important role. For the purpose of this chapter, we munication will not result. When EDI is used, the format
define EDI as follows: of the data does not need to be completely the same.
When documents are transmitted, the translation soft-
A computer-to-computer exchange of data in a ware of EDI converts the document into an agreed-upon
public or industry standard format using pub- standard format. Once the data are received, translation
lic or private networks among trading partners. software changes them into the appropriate format.
Such an exchange may include requests for An EDI message is held within two parts known
quotation, purchase orders, student information, as envelopes. The outside envelope contains the inter-
invoices, or transaction balances. change control information to address the message being
CONVERGENCE OF VOICE, DATA, AND VIDEO 27
Table 5: Advantages and Disadvantages of EDI • gaining additional knowledge about potential
customers;
• improved customer service;
Advantages Disadvantages
• improved relationships with the financial community;
Improved competitiveness Different standards • improved relationships with suppliers;
Improved convenience May incur additional
• increased return of capital because no or minimal in-
Increased control in costs
ventory is needed;
payments Security issues
Increased customer service Supplier dependence • increased flexibility and ease of shopping;
Increased response and • increased return on investment; and
access to vital information • increased number of potential customers.
Reduced errors in ordering,
shipping and receiving Possible capacity and throughput problems, initial in-
Reduced labor costs vestment, and security issues are among the important
Reduced order lead time, disadvantages of electronic commerce. However, all indi-
resulting in reduced cations point to the elimination of these problems thereby
inventory paving the way for EC to become a common took among
all types of businesses.
has an impact not only on technology development and Data communications applications can enhance the
products, but also on companies and individuals. Con- efficiency and effectiveness of decision makers by ensur-
vergence is even affecting national boundaries, with in- ing the timely delivery of relevant information. For ex-
creasing numbers of companies having global access to ample, data communications supports just-in-time de-
information and even beginning to undertake worldwide livery of goods, resulting in reduced inventory costs and
project development using the Internet. Convergence increased competitive advantage for organizations that
is just starting; as it increases, the boundaries between effectively use this technology. Large corporations such
products and national borders will blur even further. as Wal-Mart, Home Depot, J.C. Penney, Dow Chemical,
Convergence is possible because of a unique combination UPS, and FedEx are examples of companies that have
of factors that has just only begun to exist, including been successfully using data communications technolo-
technological innovation, changes in market structure, gies in order to stay ahead of their competitors. Compa-
and regulatory reform. Common applications of conver- nies such as Ford and Intel are using virtual teams to cut
gence include: across boundaries of geography, time, and organization
to put together powerful teams that develop products
• e-commerce, quickly and effectively.
• entertainment (the number of television channels avail- Data communication systems have generated oppor-
able will increase substantially, and movies and video tunities for companies to use e-mail instead of the postal
on demand will become a reality), system and to transfer files online rather than by ship-
• increased availability and affordability of video and ping magnetic tapes and disks. An integrated network
computer conferencing, and enhances managerial control, shortens product- and
service-development life cycles, and provides better in-
• consumer applications (virtual classrooms, telecom-
formation to those who need it most. Most important, an
muting, virtual teams, and so forth).
integrated network is a crucial part of an organization’s
international information systems infrastructure. Data
The Internet is probably the most important driving force
communications applications directly or indirectly affect
behind the growth and popularity of the convergence phe-
all types of organizations. The following are some of the
nomenon. It is a vehicle for the delivery of both existing
highlights of this growing technology.
services (for example, e-mail, video, sound, and voice te-
lephony) and completely new services. The Internet is dis-
• More employees will get their education online through
placing traditional computer networks and showing signs
virtual classrooms that use data communications
of how it may provide a platform that, over time, replaces
technologies. This will bring the latest in technology
traditional methods of trading. For example, traditional
and product information right to an employee’s work-
business-to-business trading on closed corporate networks
station.
is giving way to commerce on global open networks.
The Internet is also providing an alternative means of • Online searches over the Internet and other networks
offering core telecommunications business activity (even bring the latest information on products, services, and
if differences in quality still distinguish the two services) innovation right to the employee.
through the delivery of telephony. The Internet is also a • The Internet and data communications will facilitate
significant platform for broadcasting services. Advances and enable lifelong learning, and knowledge will be-
in digital technologies are helping to move the conver- come an asset of even further importance for individu-
gence of technologies forward, and when standards be- als in the future.
come available and accepted, the rate of change may • Boundaries between work life and personal life will
speed up even further. become ever more diffuse as data communications be-
The lack of bandwidth is probably the most significant come widely available both in homes and businesses.
obstacle for the widespread applications of the conver- • Improved data communications technologies will re-
gence technologies. As new users come online, bandwidth duce the cost and complexity of staying in touch with
demands increase exponentially. In addition, corporate people.
and consumer securities and privacy are other issues that • Customers will be able to use their televisions and PCs
must be resolved before convergence can really take off.
to access the Internet, shop, make phone calls, and con-
Security measures such as firewalls and sophisticated en-
duct video and computer conferencing.
cryption routines are parts of the solution (Akers 1998;
Bidgoli 2002; Caldwell and Foley 1998).
There are at least seven critical areas within the data
communications field that managers should clearly un-
WHY DO MANAGERS NEED TO KNOW derstand:
6. globalization issues; and geographical scope of a MAN usually covers a city and
7. applications of data communications. contiguous neighboring cities.
Modem: Abbreviation of modulator-demodulator; this
The Handbook will explain these various areas in several device converts digital signals to analog signals and vice
chapters in detail. versa for transference over analog telephone lines.
Open system interconnection (OSI) reference
model: A seven-layer architecture that defines the
CONCLUSION method of transmission of data from one computer to
another over a network.
This chapter discussed data communications and net-
Wide area network (WAN): A type of network that is
working principles. It introduced basic components of a
not limited to a certain geographical area. It may span
data communications system, types of networks, and im-
several cities, states, or even countries. Usually, several
portant events in data communications growth in North
different parties own it. The geographical scope of a
America. The chapter introduced some of the important
WAN can be from intercity to international borders.
keywords and concepts in the data communications
field, including data codes, serial and parallel transmis-
sion, transmission modes, data flow, and the open system CROSS REFERENCES
interconnection reference model. The chapter discussed
See Local Area Networks; Metropolitan Area Networks;
electronic data interchange and electronic commerce as
Terrestrial Wide Area Networks.
two of the fastest-growing applications of data commu-
nications. We concluded with a brief discussion on the
convergence of data, voice, and video and a brief discus- REFERENCES
sion on why managers need to know about data commu-
Akers, J. 1998. Ten ways to prepare for convergence. Busi-
nications.
ness Communications Review, 28(2): S9.
Bidgoli, H. 2002. Electronic commerce: Principles and
practice. San Diego: Academic Press.
GLOSSARY Blinch, R. 1998. Convergence coming: Voice, data and
Communications media: Channels that connect video convergence prompts mergers in the telecom-
sender and receiver devices. Communications media munications industry. Computer Dealer News, 13 July,
can be either conducted (wired or guided), such as co- p. 34.
axial cable; or radiated (wireless) such as satellite. Caldwell, B., and J. Foley. 1998. IBM means e-business.
Data codes: Formats used to represent and transfer http://www.informationweek.com/668/68iuebz.htm
data among various computers and network systems. (accessed April 30, 2007).
Popular types include Baudot, ASCII, and EBCDIC. Chakravarty, S. N. 1998. The convergence factor. Forbes,
Data communications: The electronic transfer of data July 27, p. 46.
from one location to another.
Electronic commerce (EC): All of the activities a firm
performs to sell and buy services and products using FURTHER READING
computers and communications technologies. Bidgoli, H. 2000. Handbook of business data communica-
Electronic data interchange (EDI): A computer-to- tions: A managerial perspective. San Diego: Academic
computer exchange of data in a public or industry Press.
standard format using public or private networks Kogan, A., E. F. Sudit, and M. A. Vasarhely. 1997. The
among trading partners. era of electronic commerce. Management Accounting,
Local area network (LAN): A network that connects September, pp. 26–30.
peripheral equipment that is in close physical proxim- Margolin, B. 1997. Chip makers keeping pace with chang-
ity. Usually this kind of system is limited to a certain ing modem technologies. Computer Design, August,
geographical area such as a building, and one com- pp. 101–102.
pany usually owns it. Romei, L. K. 1997. Networking connectivity gains
Metropolitan area network (MAN): A network that momentum. Managing Office Technology, May, pp.
is designed to deliver data, video, and digital voice 16–18.
to all organizations within a metropolitan area. The
Exploring the Variety of Random
Documents with Different Content
The Project Gutenberg eBook of When
Whirlybirds Call
This ebook is for the use of anyone anywhere in the United States
and most other parts of the world at no cost and with almost no
restrictions whatsoever. You may copy it, give it away or re-use it
under the terms of the Project Gutenberg License included with this
ebook or online at www.gutenberg.org. If you are not located in the
United States, you will have to check the laws of the country where
you are located before using this eBook.
Language: English
"Very well," assented the older man. "Perhaps the best place to
begin is with their name. When we first occupied this planet, a bare
twenty years ago, we called them wolfhawk-whirlybirds and
tigerhawk-whirlybirds because they preyed on vicious animals. The
whirlybirds were our best friends in those days. The only trouble is
that they ran out of tigers and wolves to eat."
"Presumed they are now called peoplehawk-whirlybirds?" DeCrabbe
frowningly asked in his clipped speech.
"Exactly!" answered the older man. "Although that isn't their full
name. From the way they attack—"
"Most important," interrupted Five-gun. "Give to me in detail."
"They prefer to attack strollers, although they have attacked on city
streets when there is little traffic. They fly with amazing speed,
considering they are an untidy ball forty feet in diameter, and they
are on top of their victims before the unlucky ones are aware of the
menace. Blowing their victims down with a rush of air from their
feathers, they grab them up by the heels, carry them high aloft and
drop them on piles of rock outside of town."
"They are downdraft-peoplehawk-whirlybirds then?" asked
DeCrabbe.
"That's almost it," agreed the mayor. "I have not yet told you of their
cries. As they rise in the air with the victim dangling from their
talons by his heels, they utter a pleased 'Coo! Coo!' like a gentle
dove. That is why they are called Coocoo-downdraft-peoplehawk-
whirlybirds."
"Approve of adequate names," nodded Five-gun, unbending a trifle.
"First step toward efficiency. Only one thing haven't made clear.
Presumably have shotguns and rifles. Why unable drive off these
predators yourselves?"
The mayor laughed bitterly. "It would be easy to tell you'd just
arrived on this planet—although the birds are not well known in the
other cities either; they are all concentrated in this area. Yes, our
sportsmen tried to shoot down the whirlybirds. No luck, of course.
Imagine the problems you have when one of these forty-foot balls of
commotion comes at you: You try to aim but you can't hold your
arm still because of the swirling wind they raise; and then the dust
clouds thicken and you're firing wildly, and you can't begin to tell
which is body and which is feathers anyway."
"Very well," accepted Charles DeCrabbe mercifully. "You've made
attempt. My first step therefore the attachment of high explosives to
boobytrapped mannequins. Brought these with me."
Updated editions will replace the previous one—the old editions will
be renamed.
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the
terms of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or
expense to the user, provide a copy, a means of exporting a copy, or
a means of obtaining a copy upon request, of the work in its original
“Plain Vanilla ASCII” or other form. Any alternate format must
include the full Project Gutenberg™ License as specified in
paragraph 1.E.1.
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
1.F.4. Except for the limited right of replacement or refund set forth
in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
ebookgate.com