Block 3 MLI 101 Unit 12
Block 3 MLI 101 Unit 12
Block 3 MLI 101 Unit 12
INFRASTRUCTURE: NATIONAL
AND GLOBAL
Structure
12.0 Objectives
12.1 Introduction
12.2 Information Society
12.2.1 NEIS Goals
12.2.2 Societal Impact
12.0
OBJECTIVES
After reading this Unit, you will be able to understand and appreciate:
l
293
E-commerce; and
12.1
INTRODUCTION
Quest for new knowledge is the central theme of human existence. All of us,
whether we realise or not, are in the process of acquiring new knowledge all
the time. When we ask a question, we are seeking knowledge. When we answer
to a query, we give information to the person posing the question. When a
person assimilates the given information, we say that the person has acquired
knowledge. Knowledge is spread via information that is communicated from
one person to another in some form, oral, writing etc. Thus, knowledge,
information and information communication are three entities that are closely
inter-related. Research and development on information and its communication
has led to a new branch of study called Information and Communication
Technology (ICT). ICT comprises two major technologies: computers and
communications. In Unit 8, we learnt about digital information and its preeminence in todays society. Computer technology is the tool for storing and
processing information in digital form. Communication technology helps us
transfer and disseminate digital information.
Developments in ICT are bringing about profound changes in our life-style.
The coming together of computers and communications has led to the
emergence of a worldwide computer network, now known as Internet. Internet
is a network of networks. Today, Internet has around 120,000 computer
networks interconnected. With the evolution of such networks, our life-style
is changing. A number of our day-to-day activities are being carried out on the
networks. ICT plays an important role in almost all areas of our activities. The
society is evolving towards a networked community with electronic information
as the central commodity. One might term the society of the 21st century as
the Networked Electronic Information Society (NEIS). It is a society in
which activities are centred around networks and the main commodity on the
networks is electronic information in digital form.
294
12.2
Information Infrastructure:
National and Global
INFORMATION SOCIETY
Advances in ICT are bringing about new perceptions in our ways of living.
The way in which we do our work, the way we produce goods, the way we
trade, the way we manage our wealth, and our entertainment pattern are all
undergoing major changes. In this section, we present a visionary scenario for
various aspects of our life in the context of evolving NEIS. Before that, we
state and discuss a set of goals for NEIS.
Anyone
Anytime
Anywhere
Any information
Any format
295
should be accessible at any place irrespective of where the resources are located
on the planet. To enable persons to access from anywhere, the concept of
location independent access needs to be supported by the network infrastructure.
This calls for a universal identification of individuals, which remains permanent
for the lifetime of the individual. In fact, a child may be assigned a universal
code as soon as he/she is born and is identified by that code throughout his/her
life on the planet.
The modern communication systems are slowly moving towards concept of
location independent access. In 1996, the United States of America introduced
legislation called Local Number Portability (LNP) bill that permits telecom
users to retain their identification numbers irrespective of the network provider
they are attached to. Where there are multiple network operators, they are
identified by a prefix to the telecom identification number (telephone number).
In India, Mahanagar Telephone Nigam Limited (MTNL) or Bharat Sanchar
Nigam Limited (BSNL) is identified by the prefix 2, Reliance Infocomm by
3 and Tata Indicom by 5. If one changes the service provider, the telephone
number changes even though the person has not shifted his/her residence. The
U.S LNP legislation allows the user to retain the same telephone number and
only change the prefix. In about a decade from now, it is expected that a person
may be able to retain the same telecom identification within a city irrespective
of where he/she lives in the city. Readers may appreciate that this is not the
case at present. If a person moves residence from one locality to another that is
within the same city, but not in the same telephone exchange area, then the
telephone number changes. This, however, is not the case with mobile or
wireless access systems. The problem does not exist in the case of generic
Internet domain addresses. As long as your domain name belongs to one of
the generic domains, it remains the same even if you change your country of
residence. For example, .com, .org and .net addresses are location independent.
The goal any information is closely associated with the democratic concept of
right to access of information to every citizen of the planet. Such a right can
only be applicable to public information. What information is considered public
and what is not is for the governments of different nations to decide. Information
policies of different nations address this issue. But the emphasis in NEIS is
that any public domain information should be accessible to anyone in the world.
Access to some information may be priced whereas access to some others may
be free of charge. The emphasis is also to make more and more information
available in the public domain either for priced or free access.
296
The global nature of the information society makes the goal of any format
important. A networked society cuts across transborder barriers of nations, as
the access is worldwide. Considering that many hundreds of languages are in
use throughout the world, access to information is facilitated by a translation
mechanism. In this context, real time machine translation assumes significance.
Ideally, a text stored in one language should be readable in any other language.
Or, what is spoken in one language should be heard in any other language. For
example, a person accessing a Japanese database from USA may see the
information presented in English. Or, a Russian may converse with an Indian,
both using their respective native languages. Of the 5 As, any format
requirement is the most difficult one to be met. Machine translation being
Information Infrastructure:
National and Global
L2
Ln
Intermediate
Language
L1
L2
Ln
L = Language
Fig. 12.1: Intermediate Language Based Translation Model
297
is split into its basic roots the meaning of the word becomes derivable and thus
is self-expressive. In effect, this amounts to saying that the dictionary of Sanskrit
can be limited to 4000 words as long as the rules for combining roots and
splitting words are unambiguous which, in fact, is the case. In contrast, a
dictionary for English language may contain as many as 200,000 words or
more.
Clearly, there is a need to search for or design a suitable intermediate language
for machine translation. English does not appear to be the ideal language. The
structural, grammatical and semantic properties of Sanskrit make it a better
candidate than English for machine communication.
298
The very concept of education as understood today may change. From the
institution-based education, the emphasis may shift to home-based education
with every home connected to a variety of educational resources, libraries and
teachers. In other words, distance education via the network may become a
way of life rather than commuting to colleges and schools. For example, you
may pursue MLIS course via a network from the Indira Gandhi National Open
Information Infrastructure:
National and Global
Let us now turn our attention to environment. The direct impact of less-travel
society is less polluted cities in the world. In major cities of the world, about
two-third of the atmospheric pollution comes from vehicular traffic. If there
were a reduction of 25-30% in vehicular traffic on account of telecommuting,
the people in the major cities of the world would breathe much cleaner air.
Home-centred occupation would leave much time for the people to turn their
attention to plantation, gardening and environment. A natural concern for
environmental protection may re-emerge and the environmental problems
addressed through more efficient use of resources and energies. Sustainable
human development while preserving the Ecosystems may become a way of
life. Telecommuting also opens up the much-desired possibility of women
being able to contribute to national development without having to sacrifice
family responsibilities.
The present society is characterised by community formation based on work
centres. Persons who work in the same office or factory tend to form a bond
such as an association, a union or a club. Social activities are usually centred
on such formations. In a home-centred environment, the communities will
comprise groups from among people pursuing different vocations and
professions in life. Under those circumstances, a true social community is
likely to emerge.
The last few centuries have been characterised by mass production with large
industrial houses being set up. This has led to power brokering between work
force and the management characterised by strikes, lock outs etc. In NEIS,
small community dwellings that are self-contained may emerge. The
community needs may be met locally from products available in its natural
surroundings. The concept of associations and unions may vanish in the
networked society. This would also imply that production would take place
locally with a large number of persons engaged in producing goods that are
required. This is an interesting scenario for large-scale employment and for
overcoming the present problems of unemployment.
There is a variety of other perceptible macro shifts that may be discussed at
length. We, however, list only some of these and leave the discussions to the
readers:
l
Centralised to Distributed
Competition to Co-operation
World as a Corporate
Broadcast to Interactive
Readers are advised to exercise their minds about possible scenario in the
areas listed above.
299
12.3
INFORMATION MANAGEMENT
FUNCTIONS
Generation
2)
Acquisition
3)
Storage
4)
Retrieval
5)
Processing
6)
Transmission
7)
Distribution
12.4
National
Regional
Global
Information Infrastructure:
National and Global
Category
Footpath
Highway
Super Highway
Ultra Highway
Nominal Speed
9.6 kbps
128 kbps
2 Mbps
155 Mbps
Maximum Speed
64 kbps
2 Mbps
155 Mbps
>10 Gbps
301
2)
3)
Mobile Network
4)
PSTN
PSDN
Mobile
ISDN
Application Networks
(Internet)
Transmission
links
Access Networks
Access
links
Mobile
Stations
Cyber
Cafe
Home
Networks
Office
Networks
Corporate
Networks
302
Information Infrastructure:
National and Global
At this point, a few words about Internet are in order. Internet is an applicationoriented network built over the infrastructure of data networks. It is conceived
to be a network of all data networks scattered all around the globe. The rapid
growth of Internet was made possible because of the massive
telecommunication infrastructure that existed when Internet was conceived
and Internet was built over it. Rapid expansion in Internet introduced problems
of scale unanticipated in the original design. In particular, management of
names and unique addresses of all computers connected to the Internet turned
out to be a serious problem. New protocols were developed and a naming
system, known as Domain Name System (DNS) was put in place to enable any
user to resolve the name of a remote machine automatically. DNS runs on
machines called name servers located in various parts of the world. The current
Internet addresses are part of the definition of version 4 of the Internet Protocol
(IPv4) which uses a 32-bit address providing for four billion Internet host
computers. This was considered a large number when IPv4 was defined about
20 years ago. But the way in which address space is structured has resulted in
serious wastage of address space. Today, Internet is running out of address
space. The latest version of IP, Version 6, (IPv6) provides for an address space
of 128 bits. IPv6 is likely to replace IPv4 all over the world in the next one or
two decades.
Mobile communications have emerged in a big way in the 1990s. The first
thing to recognise about mobile communication is that the concept of mobility
is applicable only to the end segments of the telecommunication infrastructure.
Beyond the end segment, the communication takes place via the normal
terrestrial telecommunication infrastructure. Mobile networks are based on
the principle of cellular communication. Here, a geographical region is divided
into smaller areas called cells. Each cell has a radio station called base station
through which users are connected to the telecommunication infrastructure.
Over a period of time, it became clear that management and maintenance of
separate telephone and data networks were turning out to be expensive. Out of
this experience, arose a natural question: Is it possible to design a single
switched network that can carry many services? The current trend in
telecommunications is to design multi services networks. The core idea in
multi services networks is the digital representation of information signals, be
it voice, video or data. If all the signals are in digital form, a network capable
303
304
Information Infrastructure:
National and Global
305
306
Whenever a major development takes place, a number of issues crop up. NEIS
is no exception. The main issues concerning NEIS may be characterised by
five Cs:
Connectivity;
Capacity;
Content;
Culture; and
Cost.
Information Infrastructure:
National and Global
307
may distribute information from the satellite terminal to houses in the village.
Satellite links do not need any landline infrastructure. At present, efforts are
on to develop satellite mobile systems wherein a hand-held device may connect
to a satellite directly without the help of a terminal. This also offers an elegant
solution to rural area connectivity even though the capacity of the hand-held
terminals may be very limited.
Let us now turn our attention to capacity issue. We have seen that satellite
communication provides quick remote area connectivity and short haul radio
instant connectivity in urban areas. But, are these technologies capable of
providing the required bandwidth? A typical present day communication
satellite offers a bandwidth of about 800 - 1000 MHz. Similarly, a commercial
short haul radio link may offer data rates of the order of a few Mbps. The
actual bandwidth required is dependent on the services that are to be supported
on the network. The services envisaged for the NEIS are placed under two
categories: interactive and distributive. They demand transmission and
distribution of high fidelity voice, high quality video and other forms of
information on interactive basis. This calls for a broadband communication
pipe supporting data rates of the order of 100 Mbps or more to be extended to
the customer premises. Only high speed copper cables and optical fibres can
offer such high bandwidths. The bandwidth capacity of optical fibres is, of
course, orders of magnitude higher than that of copper cables.
We now have a paradoxical situation. Short-haul radio and satellite
communication enhance connectivity but have limited bandwidth capabilities.
High speed copper cables and optical fibres can offer very high bandwidth but
have serious connectivity limitations. Hopefully, these technologies are poised
to play complementary roles in shaping the networked information society of
tomorrow. Clearly, the goal of telecommunications in the years to come is to
establish a wide band multi-services network reaching out to as large a
population of the world as possible.
There is no use having a large infrastructure without applications to run on it.
Content, applications and services creation is an area that is receiving wide
attention at present. Standardisation in media coding is an important requirement
for content development. With the likelihood of transborder barriers being
broken in NEIS, serious concern is being expressed about the cultural impact
on the nations. In particular, some nations are worried about their tradition and
culture being swarmed by that of other powerful nations. The cost aspect of
GII has two aspects: capital cost and operating cost. Realisation of GII requires
large capital investment. The cost of services on the GII must be affordable by
a large section of the population.
Self Check Exercise
2)
3)
Note: i)
308
ii) Check your answers with the answers given at the end of the Unit.
...........................................................................................................................
...........................................................................................................................
Information Infrastructure:
National and Global
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
12.4.3 Management
The global and national information infrastructure is being conceived as a
massive network with very high capacity and capability. Evolution of such a
massive infrastructure calls for important managerial processes that must be
set in motion. For ICT based systems, some important components of
management process have been identified:
1)
System availability
2)
3)
Change management
4)
Network management
5)
Configuration management
6)
Capacity planning
7)
Strategic security
8)
Disaster management
9)
Facility management
12.5
NETWORK ACCESS
309
systems and are already being phased out. The most commonly used mobile
communication system today is the second-generation system that follows a
standard called Global System for Mobile communications (GSM). These
systems are inherently digital cellular systems. An integrated system of personal
communication via satellites and mobile networks supporting subscriber access
both via satellites and base stations would result in a truly universal
communication facility. Such systems are categorised as third generation
mobile systems and are currently being studied and standardised.
Connectivity to data network is usually via dedicated lines, as the data switches
operate in store and forward mode and not in connection-oriented mode. There
is nothing like direct dial up access with data switches. If there is a dial-up
access, it goes via a conventional telephone exchange. ISDN, as the name
implies, is a digital network end-to-end. Subscriber end equipments are digital,
access to ISDN exchange is digital, transmission throughout the network is
digital and signalling is also digital. Thus ISDN is an out and out digital network.
Access to any of the above said four-telecommunication networks is via access
links, which we discuss next.
310
1)
2)
Leased lines
3)
4)
5)
6)
Cable modem
Analog lines are used for connecting customer premises with analog telephone
exchanges. Digital transmission via analog lines calls for the use of modems
at both ends. At the subscriber end, digital to analog conversion is done for
transmission and analog to digital conversion for reception. Inverse functions
are performed at the exchange end. Since the cable infrastructure is available
throughout the telecommunication infrastructure a user may obtain on lease
between two end points a dedicated or private line on which point-to-point
information transfer can be organised. These lines are non-exchange lines and
are permanently available for the user. Leased lines can be obtained for different
speeds of operation and charges vary accordingly. A user may also obtain a
leased line between his premises and POP. Such lines are generally used for
connection to data switches that operate in packet switched mode without
establishing source-destination connection.
In the last couple of decades, signal processing techniques have been developed
by which it is now possible to send high speed digital data over voice grade
lines that are normally available between the subscriber premises and POP.
Such lines are called digital subscriber lines (DSL). The standard interface in
the case of ISDN is DSL. In a variety of applications on the GII, the data rate
from the user to the application server is much lower than the data rate between
the server and the user. Taking this fact into account, technology has been
developed to provide an economical solution that offers high download speeds
up to 2 Mbps but limited upload speeds, typically 64 or 128 Kbps. Lines used
for this purpose are known as Asymmetric DSL (ADSL) lines. High Speed
Digital Subscriber Lines (HDSL) are symmetric ones supporting high bit
rate data transmission both ways.
Information Infrastructure:
National and Global
Yet another way of accessing GII is via the television cable infrastructure. A
device called cable modem connects a personal computer to the television
cable. This connectivity offers very high speeds. Once again asymmetrical
configuration can also be obtained on television cables. Such a configuration
typically offers upload speeds up to 256 kbps and download speeds up to 10
Mbps.
12.6
HOME NETWORKS
311
312
1)
2)
Reliability: Once installed, the network and the associated devices must
operate without failure for many years. The level of reliability must be
the same as one gets from general household appliances. Only then, the
concept of networks at home will be acceptable by householders.
3)
4)
5)
6)
Security: People need safe and secure homes. Privacy at home is also
important. It should not be possible for intruders to interfere with the
operation of networked devices. Home networks must be designed taking
these factors into account.
Information Infrastructure:
National and Global
Home networks may be wired or wireless. Wireless networks are less secure
than wired networks. It is fairly easy to jam or to eavesdrop on a wireless
communication. Frequency allocation without interference between adjacent
residential buildings is also a problem of management. As it is, the frequency
band is a scarce resource. While future homes may be wired for networking,
the existing ones may go in for wireless networks.
12.7
OFFICE NETWORKS
Distributed computing
Server environment
Managed devices
E-mail server
313
File server
Database server
Fax server
Directory server
Web server
The functions of the above servers are self-explanatory. Servers are centralised
resources and, in general, are accessible to everyone on the network. Access
to server resources may, however, be restricted under certain access permission
policy put in place by the management. Whenever an expensive resource is
added to the network, a server is associated with it either to make the resource
sharable or to control the access to it. Access to servers is done normally using
client-server architecture. Servers may be implemented using a personal
computer, a workstation or a mainframe. Mainframe based servers are
sometimes called enterprise servers .
12.8
CORPORATE NETWORKS
Intranet
Extranet
All the above three corporate networks are community networks in the sense
they serve a particular user group. Security is an important consideration in all
these networks. As a result the community is often called closed user group.
The word closed implies a secure network that is not open to persons outside
the group.
In Intranet, a corporate uses Internet technology including transmission
standards and applications to interconnect the LANs at different corporate
sites. The corporate sites are geographically far apart. In this case, the corporate
staff and the employees of the company at different locations form the
community. Persons from outside the corporate community cannot access the
Intranet. Intranets may also include a web server. However, for security reasons
the corporate may have a separate web server that is not part of the Intranet.
314
Extranet is an extension of Intranet. Here the community not only includes the
employees of the corporate but also suppliers and distributors of the corporate.
Extranet involves multiple companies that have some business association
under a set of rules or a contract. This network is also secure and serves a
closed user group.
Information Infrastructure:
National and Global
5)
6)
What is tunnelling?
Note: i)
ii) Check your answers with the answers given at the end of the Unit.
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
12.9
GII APPLICATIONS
Entertainment
Information Repository
Information Distribution
315
Advertising
Marketing
Sales
Buying
Delivery
Payment
Business on the GII may deal with tangible products, information products or
services. Tangible products can not be delivered on the network. Similarly,
purchase of certain items may require a visit to the concerned showroom. Taking
such factors into account, the products may be placed under four categories.
Table 12.2 summarises these categories with example products.
Table 12.2: Product Categories on GII
Product Category
Online advertising and marketing
only
Online advertising, marketing,
sales and payments, but physical
delivery
Online advertising, marketing,
sales, payments and delivery
Examples
Cars, Furniture, etc.
Books, CD-ROMs, music & video
CDs, branded items, etc.
Electronic products like music, ejournals, software, etc.
316
Reduced cost;
Increased revenues;
Elimination of intermediaries;
Information Infrastructure:
National and Global
Four types of e-commerce have been identified and each one of them has
some special requirements. The types of e-commerce businesses are
summarised in Table 12.3. B-to-B e-commerce is built around Extranets. The
business details are determined in advance and the business represents an
ongoing relationship involving multiple transactions.
Table 12.3: E-commerce Business Types
Notation
B2B or B-to-B
B2C or B-to-C
C2C or C-to-C
C2B or C-to-B
Business Type
Business to Business
Business to Consumer
Consumer to Consumer
Consumer to Business
12.10
SECURITY ISSUES
User authentication;
Message authentication;
Communication security;
317
Storage security;
Access security;
User authentication is done via information keys like password and personal
questionnaire, physical keys like magnetic cards and smart cards, and
biometric keys like voiceprints and fingerprints. A variety of user
authentication protocols have been developed for this purpose. Some among
them are challenge handshake authentication protocol (CHAP) of Microsoft
and Kerberos of MIT. While CHAP authentication takes place directly from
the server that the user wishes to access, Kerberos authentication takes place
via a central Kerberos server.
Message authentication is done via digital signatures. Digital signature is a
technique for digitally signing a digital document much as the way a
conventional document is affixed with a signature. The contents of the digital
document are in plain text and can be read by anyone. The document contains
an encrypted signature that authenticates the signer, the contents and a proof
of dispatch by the signer.
Communication security deals with protection of data while in transit. Secure
communication systems use cryptology for ensuring confidentiality of messages
transported through them. Cryptology or cryptography involves three aspects:
encryption, decryption and crypt analysis. Encryption is a form of coding
that transforms the original understandable message into a bit string that does
not make any sense. The encrypted bit string is transmitted over the
communication system. Decryption is the inverse process of encryption, which
extracts the original message from the encrypted bit string. Crypt analysis is
used to study the efficacy of the encryption scheme and by intruders to decipher
the encrypted message. Both encryption and decryption processes use a key
along with their respective algorithms. If the encryption and decryption keys
are identical, the cryptosystem is said to be symmetric. If the keys are not the
same, the system is asymmetric. Symmetric crypto systems are also known
as private key cryptography systems, and the asymmetric ones as public key
cryptography systems. A widely used symmetric system is Data Encryption
Standard (DES) and asymmetric system is RSA algorithm. The asymmetric
system is named after its inventors Rivest, Samir and Adleman. Storage security
also uses cryptography. In fact, many encryption/decryption algorithms have
been developed and they are used in a wide variety of applications like secure
e-mail etc.
Access security is applicable to databases and networks. Databases are protected
by access control mechanisms and networks by firewalls. A firewall sits
between a public access network and a private protected network. It examines
the incoming messages, permits legal messages to enter the protected network,
and discards suspicious or illegal ones. Application security is enforced by
using application firewalls that are also known as proxies.
318
Malicious contents enter networks in three forms: viruses, worms and Trojan
horses. Viruses infect programs and files. Worms creep across systems. Trojan
horses are programs that promise to do one thing, like a new game, but actually
execute undesirable functions on the victim system. Finally, there is spam
that arrives as email containing unsolicited commercial information. Malicious
contents are rejected by using suitable inspection and screening programs like
anti-virus and anti-worm programs.
Information Infrastructure:
National and Global
Name any two biometric keys other than fingerprint and voiceprint.
12.11
SUMMARY
This Unit is about the information infrastructure that is required at the national
and global level to support the emerging electronic networked information
society (NEIS). First, the emerging NEIS is placed in perspective. The five
goals of NEIS, viz. anyone, anytime, anywhere, any information and any format
are discussed. Possible impact of NEIS on various societal aspects like
education, work culture and environment are discussed. Different information
management aspects like acquisition, storage, dissemination etc. are
enumerated. The overall architecture of the GII is then presented. The five key
issues of GII like connectivity, capacity, contents etc. are brought out.
Management components of GII are then enumerated. Different components
of GII like access networks, home networks, office networks are discussed.
The three types of corporate networks, viz. Intranet, Extranet and VPN are
placed in perspective. GII applications, in particular e-commerce, are then
discussed. The Unit closes with a discussion on the security aspects of GII.
12.12
1)
Layer 4
Layer 3
Layer 2
Layer 1
User infrastructure
Access infrastructure
Application infrastructure
Telecommunication infrastructure
319
3)
4)
5)
Private networks use leased lines for interconnecting different sites. PVNs
use Internet infrastructure instead of leased lines.
6)
7)
A consumer states his holiday tour requirements and tours & travels
companies respond.
8)
12.13 KEYWORDS
320
Access Devices
Access Infrastructure
Access Links
Cryptography
Intermediate Language
Leased Line
Machine Translation
Malicious Contents
Media Coding
Point-of-Presence (POP)
: The
nearest
point
on
the
telecommunication infrastructure to which
a user is connected.
Remote Sensing
Telecom Infrastructure
Telecommuting
Teledensity
Tunnelling
User Infrastructure
12.14
Information Infrastructure:
National and Global
321