Chapter 7

Local Area Networks and E-Mail

Instructor’s Notes

Chapter Overview

In this chapter you will learn about networks; hardware, software, and processing capabilities. You will also learn how to use networks by selecting a secure password and logging into a network. Further, you will learn how to share files, about groupware, and about using e-mail.
 

Lecture Notes

Key Terms

Application server (321): Computer that runs a specific application software package and forwards the results of processing to workstations.

BNC connector (318): Round, silver connector used with a coaxial cable.

Client/server architecture (321): Use of an application server to utilize the processing power of both the server and the workstation.

Coaxial cable (318): Cable that resembles a cable TV cable and uses a BNC connector.

Dedicated file server (319): Server devoted only to the task of delivering programs and data files to workstations.

Default printer (316): The printer that is used when the user has not indicated a preference. Drive mapping (310): Assigning a drive letter to a network server disk drive.

E-mail (327): Correspondence conducted between one or more users on a network.

E-mail address (328): A person’s user ID, the @ symbol, and the name of his or her e-mail server.

E-mail attachment (331): A file that travels through the e-mail system along with an e-mail message.

E-mail client software (327): The software on a workstation that helps each user read, compose, send, and delete messages.

E-mail message (327): A letter or memo sent electronically from one user to another.

E-mail server software (327): Software on the network or Internet server that controls the flow of e-mail.

E-mail system (327): The hardware and software that collects and delivers e-mail messages.

Ethernet (317): Popular network type.

File locking (313): Precaution against losing data that only allows one user on a network to edit a particular data file at one time.

Gateway (329): An electronic link that connects e-mail systems.

Host computer (321): Minicomputer or mainframe with attached terminals that does all the processing for the terminals.

Local area network (LAN) (308): A network located in a relatively limited area, such as a building or campus.

Local resources (308): A computer’s usual resources, including hard drive, software, data, and printer.

Network administrator (309): The person responsible for setting up user accounts and maintaining a network.

Network client software (323): Software installed on the local hard disk of each workstation that gathers login information, handles drive mapping, and directs printouts to the network printer.

Network hub (318): A device that joins communications lines together.

Network license (324): Network license that permits use of a program by multiple people on a network.

Network operating system (NOS) (323): The software that manages network resources, controls the flow of data, maintains security, and tracks user accounts.

Network printer (308): Printer that provides output capabilities to all users on a network.

Network resources (308): Resources obtained through a network, including application software, storage space for data files, and remote printers.

Network server (308): Computer connected to the network that serves or distributes resources to network users.

Network server software (323): Software installed on a file server that controls file access form the server hard disk, manages the print queue, and tracks user data.

NIC (network interface card) (317): Small circuit board that sends data from your workstation out over the network and collects incoming data for your workstation.

Node (308): Each device on a network.

Non-dedicated file server (320): A computer on a network that performs a dual role as both file server and workstation. Also known as peer-to-peer capability.

Peer-to-peer (320): The capability of a computer on a network to perform a dual role as both file server and workstation. Also called a non-dedicated file server.

Print job (320): A file that has been sent to a print queue.

Print queue (320): A special holding area where files are stored until they are printed.

Print server (320): Server that receives files from other workstations then forwards them to a specific network printer.

RJ-45 connector (318): Square plastic connector used with a twisted-pair cable.

Sharing (312): The use of one program by many users simultaneously.

Stand-alone computer (308): A computer that is not connected to a network.

Store and forward technology (327): Technology that allows a server to store messages and forward them to a workstation when accessed by a user.

Terminal emulation software (322): Software that makes your computer function as if it were a terminal on a network.

Timesharing system (321): A system containing a host computer and terminals whereby resources are shared in a cyclical manner.

Token Ring (317): Popular network type.

Twisted-pair cable (317): Cable that looks resembles a telephone cable and uses an RJ-45 connector. Also called a UTP or STP.

User account (309): Account that provides access to network resources and accumulates information about your network use.

Wide area network (WAN) (308): A network that covers a large geographical area.

Wireless network (318): Networks that use radio or infrared signals to transmit data form one network device to another.

Workflow software (326): Software that automates the process of electronically routing documents form one person to another in a specified sequence and time.

Workstation (308): A computer connected to a local area network.

Workstation installation (324): Installation that copies some of the program files to your local hard disk, then updates the Windows Registry and the Windows Start menu to include a listing for the new program.


Local Area Networks

The chapter begins with the information about networks that is most immediately of interest to a computer user— how to use a network. If you have been using a network in the computer lab at school or at work, many of the concepts presented in this section should be familiar to you, though you may not have previously learned the appropriate terminology.

Use Figure 7-6 to see how a file can be accessed by more than one user at a time. You might note that this figure applies to all types of servers, except a non-dedicated server. If you store a file on a non-dedicated server that also happens to be your own workstation, other network users can access that file if they have rights to do so.

Review Figure 7-7 to understand why it is important to lock data files so two people cannot use them at the same time. Use Figure 7-9 to see how a workstation accesses a network printer.

Network Hardware

In this section the discussion touches briefly on network cards and cables, then focuses on network server architecture.

In this section of the chapter, students are presented with a number of different server types: dedicated and non-dedicated file servers, print servers, and application servers.

A dedicated file server (Figure 7-13) is devoted to the task of delivering programs and data files to workstations. If your school has a "Novell network" it has one or more file servers which act as a central repository for programs and data files. These servers are not used as workstations for everyday computing tasks such as word processing.

A non-dedicated server (Figure 7-14) is a workstation that can also act as a server—it can be accessed from other workstations on the network. Windows for Workgroups or Windows 95, 98, or 2000 network services connect non-dedicated servers in what is often called a peer-to-peer network.

A print server forwards files from workstations to a network printer. While waiting to be printed, the print server stores the files in a print queue. Files are forwarded to the network printer from the print queue in the order in which they are received.

An application server (Figure 7-15) is a cross between a dedicated server and a host. Like a host, it stores data and programs that can be accessed by workstations. Like a host, it performs some processing activities. Like a dedicated server, it sends actual data to workstations (unlike a host that only sends a screen image of the data.) Networks with application servers are sometimes called client/server networks.

A host computer provides connectivity to terminals, in which the host provides not only the programs and data files, but also performs all the processing tasks. This system of using a host computer to process the work of terminals is called a timesharing system. As the text points out, timesharing systems are usually distinguished from networks, although they are similar to networks in their function.
 

Software for Networks

Network operating systems include Novell NetWare, Banyan Vines, and LANtastic. Windows 95, 98, or 2000, Windows NT, Windows for Workgroups, UNIX, and OS/2 also offer networking capabilities.

Make sure you understand the relationship between server software and client software. Server software is installed on a server and functions to oversee operations. For example, mail server software manages mailboxes, maintains the master list of user IDs and passwords, and monitors usage. Client software is installed on workstations and provides the functions necessary for that workstation to participate in the activities supervised by the server. For example, a mail client provides a workstation with the means to access and log on to the mail program.  Groupware and workflow software are both examples of applications developing to meet the needs of users.

Issue: How Private Is E-Mail?

Read this section of your text and think about the security issues relating to email, at home or at work.



Related Course Labs

Email lab



Using E-Mail

Overview
Email is considered a basic communication medium today.  It is not hard to learn and learning some basic information can make your use of email more efficient and
productive.  This module presents information about the following areas related to email:
· Reading
· Composing
· Forwarding
· Replying
· Filtering
· Mailing lists
· Risks

Lecture Notes
Email Fundamentals
Email Servers and Clients
The basic client/server concept was explained in the "Networks" module.  This application may make the concept clearer.

Email Addresses
There is no standard format for the user name, other than it must be alphanumeric, and certain symbols and punctuation marks cannot be used.

Domain names may have more than three parts, but the names are limited to alphanumeric characters and periods cannot be used.

Upper- and lowercase letters don't matter generally in electronic mail addresses but can be used for readability.

Email Protocols
If you are using an email account set up for you by your employer or college, you will not be able to choose whether you use the POP3 or IMPA protocol.  If you
are choosing an ISP yourself, you may want to check on which protocol it uses.

Introducing Email Clients
Getting an Account
Many people have several email accounts, such as one for private, home use and one for business use.  There are several advantages to this, including
· being able to send mail even if one account is down.
· providing a way to separate business and personal mail.
· having greater privacy.
· maintaining a permanent personal address, even if you change jobs or leave school.

Setting Up Your Email Client
Of course, you must supply your password when you want to access your email account, but you can do this in two ways:  (1) by storing your password
permanently in memory, or (2) by typing it in each time you access email.  The first option is more convenient because when you access your email you will not be
asked to enter your password each time, but if you share a computer with anyone else, they can also access your email without a password.

The permanent storage option is available when you set up your email.  If you want to change that option, check the "options" menu in your email client program.

Exploring Your Email Client's Window
If you have trouble finding any of the features mentioned on your program, check the Help function.

Composing, Receiving, and Forwarding Mail
If an incorrect address is used, the message will bounce back to the sender in a message sent by the system's software. Reasons for returned mail include no such
user, unable to connect to remote system, and several problems due to either the local or remote system's mail software being configured incorrectly.  If you believe
you have sent your message correctly, try again, perhaps after a brief wait.

Sending mail to the user named "postmaster" at a particular domain name should forward the message to the human user responsible for the mail software on that
computer. Contacting the postmaster at a site can be useful if you have are having trouble with an electronic mail address at that site.

Some programs permit only one attachment per message, which can be inconvenient.

Managing Email
Because other people use filters, too, it is polite to use a descriptive subject line that will help your receivers sort your mail appropriately.

Also remember to delete email you have already read.  If you need a hard copy, print it out and then delete it.  This keeps your email account space on the server or
on your own machine from becoming clogged.

Mailing Lists
If email can be compared to a letter which goes to a specific recipient, mailing lists can be compared to a mass mailing sent to many recipients whose names are on a
mailing list.  An advantage of mailing lists is the ability to contact many people with similar interests at once.  This can be useful if you have a question about a
particular topic but don't know exactly whom to ask; you can ask a large number of people at once!

Information on many mailing lists can be found at various Web sites, including http://www.reference.com and http://www.liszt.com, as well as many others.

Using Email Responsibly
Using Email at Work
Many employers now have user agreements that employees sign which state what rights employees have and do not have with regard to the use of Internet services
at work.  Almost all of these agreements state that email is not private.  Even if your employer does not provide you with a user agreement, you must assume that
email is not private.

Backup Tapes
In addition to backup tapes, some email systems are set up so that email is deleted in two steps.  In the first step, email disappears from your mail received list, but is
still kept in a "recycle" area, like the recycle area on the Windows desktop.  Email in this area can be undeleted by the user, but it will still be available on backup
tapes.

Additional Risks
You can check out email hoaxes on the web, where a search for "email hoax" or "Internet hoax" will provide many sites. Of course, this will not cover all hoaxes but
will warn you of many, and also give you an idea of the type of messages to beware of.

How to Stay Out of Trouble
The most important principle is:  Be aware that email is not anonymous.



Networks

Overview
Computer networks, which link computer to exchange data or share research, achieve a synergy that gives the two computers working together the ability to do
more than the sum of what each of the two computers acting alone can do.  Networks achieve this extra productivity by reducing hardware costs, sharing data and
applications, and facilitating new kinds of collaborations between workers.

Computer networks may be LANs, MANs, or WANs.  Any of these require both physical connections and protocols that regulate the messages sent between each
machine.  Protocols are organized as a stack:  a series of hierarchical layers which pass messages down for processing before they are sent out over the network,
then back up in the receiving machine.  Ethernet is the mostly widely used LAN protocol, usually implemented in star topology using twisted-pair wiring and hubs.

Two kinds of transmission can occur over a network:
· circuit switching-messages are sent over a permanent, continuous, and therefore fast, pathway
· packet switching.-messages follow any of a variety of links to reach their destination

Types of LANs include:
· Peer-to-peer, in which no machine directs the total network
· Client/server, in which a server machine holds shared applications and data

WANs connect LANs, and can be used for transaction acquisition or to implement electronic data interchange (EDI).

Lecture Notes
Introducing Computer Networks:  Synergy at Work
What Is a Computer Network?
Networks are similar to mainframe systems with multiple user terminals in that many people can be working simultaneously.  However, the processing power of a
network is "distributed" among various computers, instead of being located in a single machine.

Hooking separate computers up through networks is also similar to hooking them up through data communications telephone lines; however, networks are usually
connected with greater bandwidth than regular telephone lines can provide.

Types of Computer Networks:  LANs and WANs
The distinction between these various types of networks is not clear-cut; the definitions may fade into each other.

Corporate networks may involve a number of LANs connected together into a WAN. LANs can also be connected directly to the Internet via a server or a
corporate Intranet, thus turning the Internet into the WAN.

Networking Synergies in a Nutshell
The first two advantages mentioned result in savings of money or time or both.  The last two have to do with providing greater access to resources of information or
people.

Network Fundamentals
Physical Media
A communications channel is a physical means of connecting the communicating computers so they can exchange the programs or data.  This means of connection,
or transmission, is commonly wires of one sort or another but may also take just about any form, from satellite and radio signals to infrared beams.

Switching and Routing Techniques
As packet-switched networks use new technologies to increase their speed, they may supplant circuit-switched networks.  One of these techniques, Asynchronous
Transfer Mode, or ATM, may become the next IP network standard carrier. ATM uses a network of links instead of a single end-to-end circuit, but within the
network it establishes a fixed route that reduces latency.  It is fast enough to support data, voice, and video traffic-such as multimedia-at extremely high transfer
rates.

Protocols
Protocols include baud rate and other important details which permit the two computers to exchange data. Most communications software programs have a feature
called a script file that allows you to create and store the settings for each individual system you communicate with, as well as each computer's telephone number and
the information you need to connect on-line.  In most cases where one computer is directly connected to another, their communications protocols must be set to
match.

Synchronizing two communicating computers is called handshaking.  Some communications applications are designed to work on many different brands of
computers to overcome hardware incompatibility and expand communications capabilities.

The concept of open vs. proprietary standards emerges here again, and can be compared to its appearance in earlier topics such as hardware connections and data
storage.

Network Layers
The logic behind dividing the job of preparing and sending messages between various protocol layers is that each layer can focus on one aspect of a complex job.
This makes the software of the layers easier to write, debug, and maintain.  In addition, it means that changes can be made to one layer of the protocol without
affecting the other layers, as long as the interface between them remains the same.

Local Area Networks (LANs):  Limited Reach, Fast Connections
Networking Hardware:  Network Interface Cards (NICs)
Some computers, such as Macintosh, are pre-wired to be able to hook up to a LAN.  If not, a NIC provides the additional circuitry needed.

Networking Software
In a peer-to-peer network, all computers run the same network software.  In a client/server network, all clients run the same network software, but the server runs a
different program because it has additional network responsibilities and capabilities.

Media
The choice of physical media depends on the distance between machines, the budget for the network, the transmission speed required, and other performance
needs.

LAN Topologies
Because only the machine with the token can send a message, and there is only one token in a network, two computers can never attempt to transmit messages at
the same time.  Therefore, no contention access is needed.

Ring topologies are also called "token ring" networks.  When capitalized, Token Ring refers to the specific ring network protocol developed by IBM.

Note that in the topology diagrams, any of the workstations depicted could also be another machine, such as a printer.

LAN Technologies
Lower layer protocols refer to those that actually transmit the message across the network, including verifying the connection between machines and actually sending
the data.  Ethernet is the most popular physical layer because it is relatively easy and inexpensive to implement, but it is still reasonably fast.

LAN Protocols
The TCP/IP protocol, most commonly associated with the Internet, is increasingly being used for other LANs.  This is especially convenient when the LAN will also
be connected to the Internet, as many LANs are.

Wide Area Networks (WANs):  Long-Haul Carriers
How WANs Work
When a business wants to use a WAN, it generally selects a service provider who sells it the right to hook up through a POP to its backbone.  Just as with telephone
service, companies can often choose among a variety of providers who compete for business.  The organization itself provides the physical connection to the POP,
and the quality and speed of that connection often determine the overall quality and speed of the organization's WAN access, since the backbone lines are always
very high speed.

How WANs Are Organized
The physical connections for a WAN (the PDNs) are owned by private, profit-making companies.  Two of the largest are owned by MCI (Tymnet) and Sprint
(Telenet), which use them for their voice telephone long-distance service as well as for WAN connections.

WAN Protocols
The advantage of point-to-point connection over packet switching is speed.

WAN Applications
Companies which use WANs for transaction acquisition can respond more quickly to sales trends by re-ordering inventory or moving it from one location to another
to meet demand.  Analysis of transactions can also be used to identify over- or under-performing stores and to predict income and cash flow.

An open standard for EDI called the X12 makes it easier for companies to ensure that their systems will be compatible.  As more and more large companies ask the
smaller companies that supply them to adopt EDI, the small companies will benefit, too, since it ensures that they will receive payment quickly and automatically.
These financial benefits may outweigh the startup costs associated with EDI.

EDI is being used by healthcare providers and insurers to transmit treatment and payment information, for travel companies and customers to arrange and pay for
bookings, and for automated tax reporting.



Email Acronyms and Emoticons

As you read messages you will probably be puzzled by the abbreviations or
acronyms you'll see.  The following lists some of the more frequently used
acronyms.

FB         Files Busy
Sysop      System Operator; people who manage the forum
BRB        Be right back
BTW        By the way
CP         Copy protection
FUBAR      "Fouled" up beyond all recognition
FWIW       For what it's worth
FYI        For your information
gr&d       Grinning, running, and ducking
IAE        In any event
IMO        In my opinion
IMHO       In my humble opinion
IOW        In other words
OIC        Oh, I see
OTOH       On the other hand
PITA       Pain in the ...
ROTFL      Rolling on the floor, laughing
RSN        Real soon now
RTFM       Read the [fine] manual (or message)
SNAFU      Situation normal, all "fixed" up
TIA        Thanks in advance
WYSIWYG    What you see is what you get
 

Occasionally you'll see little cryptic codes in messages.  There are called
'emoticons', and are used to express the emotions of normal voice
communication -- for example, to indicate that the "snide" comment you just
read was really a joke.  The following list has been compiled from ten
years of reading messages on bulletin boards and CompuServe forums.

     emoticon (noun).  A figure created with the symbols on the keyboard.
Read with the head tilted to the left (the : represents the the eyes and
the - the nose.  Used to convey the spirit in which a line of text is
typed.

Emoticon     Meaning
--------     -------
:-i          Semi-Smiley
:-t          User is cross
:-           User is male
:-?          User is smoking a pipe
:-=)         Older user with mustache ['calendarly advantaged'
- please]
:-\         Undecided user
:-p          User is sticking their tongue out (at you!)
:-D          User talks too much
:-#          User's lips are sealed.
:-s          User after a BIZARRE comment
:-o          User is surprised
:-{         User has a large mustache
:-|          No expression face, 'that comment doesn't phase
me'
:-&          User is tongue-tied
:-(          Sad
:->          Hey hey
:-7          User after a wry statement
:-@          User face screaming
:-)          Humor (or smiley)
:-c          Bummed out Smiley
:-x          "my lips are sealed" Smiley
:-e          Disappointed Smiley
:-<          Real sad Smiley
:-I          Hmm
:-O          Uh oh
::-)         User wears glasses
:<|          User attends an Ivy League school
:>           Midget Smiley
;-)          Winking Smiley
(-:          User is left-handed
(:-)         Smiley big-face
(:-(         unSmiley frowning
,-}         Wry and winking
<:I          Dunce
>-           Female
>:-<         Mad
#-)          User partied all night
|-O          Birth
|-)          Hee hee
|-D          Ho ho
|-)          User is asleep (boredom)
|-P          Yuk
8-|          Suspense
P-)          User is getting fresh
[:-)         User is listening to Walkman radio
[:|]         User is a robot

Also
<g>          Grin
<<g>>        Big grin

Have fun with these and use them regularly.  You will be understood much easier by your fellow classmates and instructors.