Computer Networks Mis Notes
Computer Networks Mis Notes
Node – any device connected to a network such as a computer, printer, or data storage
device.
Client – a node that requests and uses resources available from other nodes. Typically a
microcomputer.
Server – a node that shares resources with other nodes. May be called a file server, printer
server, communication server, web server, or database server.
Network Operating System (NOS) – the operating system of the network that controls and
coordinates the activities between computers on a network, such as electronic
communication and sharing of information and resources.
Distributed processing – computing power is located and shared at different locations.
Common in decentralized organizations (each office has its own computer system but is
networked to the main computer).
Host computer – a large centralized computer, usually a minicomputer or mainframe.
A LAN is a computer network in which computers and peripheral devices are in close physical
proximity. It is a collection of computers within a single office or building that connect to a
common electronic connection – commonly known as a network backbone. This type of
network typically uses microcomputers in a bus organization linked with telephone, coaxial, or
fibre-optic cable. A LAN allows all users to share hardware, software and data on the network.
Minicomputers, mainframes or optical disk storage devices can be added to the network. A
network bridge device may be used to link a LAN to other networks with the same
configuration. A network gateway device may be used to link a LAN to other networks, even if
their configurations are different.
A MAN is a computer network that may be citywide. This type of network may be used as a
link between office buildings in a city. The use of cellular phone systems expand the flexibility
of a MAN network by linking car phones and portable phones to the network.
Wide Area Networks (WAN)
A WAN is a computer network that may be countrywide or worldwide. It normally connects
networks over a large physical area, such as in different buildings, towns or even countries. A
modem connects a LAN to a WAN when the WAN connection is an analogue line.
For a digital connection a gateway connects one type of LAN to another LAN, or WAN, and a
bridge connects a LAN to similar types of LAN. This type of network typically uses microwave
relays and satellites to reach users over long distances. The widest of all WANs is the Internet,
which spans the entire globe.
WAN technologies
How you get from one computer to the other across the Internet.
3.3 Configurations
A computer network configuration is also called its topology. The topology is the method of
arranging and connecting the nodes of a network. There are four principal network topologies:
a) Star
b) Bus
c) Ring
d) Hierarchical (hybrid)
e) Completely connected (mesh)
Star network
In a star network there are a number of small computers or peripheral devices linked to a
central unit called a main hub. The central unit may be a host computer or a file server. All
communications pass through the central unit and control is maintained by polling. This type
of network can be used to provide a time-sharing system and is common for linking
microcomputers to a mainframe.
Advantages:
It is easy to add new and remove nodes
A node failure does not bring down the entire network
It is easier to diagnose network problems through a central hub
Disadvantages:
If the central hub fails the whole network ceases to function
It costs more to cable a star configuration than other topologies (more cable is required
than for a bus or ring configuration).
Node
Bus network
In a bus network each device handles its communications control. There is no host computer;
however there may be a file server. All communications travel along a common connecting
cable called a bus. It is a common arrangement for sharing data stored on different
microcomputers. It is not as efficient as star network for sharing common resources, but is less
expensive. The distinguishing feature is that all devices (nodes) are linked along one
communication line - with endpoints - called the bus or backbone.
Advantages:
Reliable in very small networks as well as easy to use and understand
Requires the least amount of cable to connect the computers together and therefore is
less expensive than other cabling arrangements.
Is easy to extend. Two cables can be easily joined with a connector, making a longer
cable for more computers to join the network
A repeater can also be used to extend a bus configuration
Disadvantages:
Heavy network traffic can also slow a bus considerably. Because any computer can
transmit at any time, bus networks do not coordinate when information is sent.
Computers interrupting each other can use a lot of bandwidth
Each connection between two cables weakens the electrical signal
The bus configuration can be difficult to troubleshoot. A cable break or malfunctioning
computer can be difficult to find and can cause the whole network to stop functioning.
Ring network
In a ring network each device is connected to two other devices, forming a ring. There is no
central file server or computer. Messages are passed around the ring until they reach their
destination. Often used to link mainframes, especially over wide geographical areas. It is useful
in a decentralized organization called a distributed data processing system.
Advantages:
Ring networks offer high performance for a small number of workstations or for larger
networks where each station has a similar work load
Ring networks can span longer distances than other types of networks
Ring networks are easily extendable
Disadvantages
Relatively expensive and difficult to install
Failure of one component on the network can affect the whole network
Advantages:
Improves sharing of data and programs across the network
Offers reliable communication between nodes
Disadvantages:
Difficult and costly to install and maintain
Difficult to troubleshoot network problems
Advantages:
Yields the greatest amount of redundancy (multiple connections between same nodes)
in the event that one of the nodes fail where network traffic can be redirected to another
node.
Network problems are easier to diagnose
Disadvantages
The cost of installation and maintenance is high (more cable is required than any other
configuration)
In client/server systems, applications no longer are limited to running on one machine. The
applications are split so that processing may take place on different machines. The processing
of data takes place on the server and the desktop computer (client). The application is divided
into pieces or tasks so processing can be done more efficiently.
A client/server network environment is one in which one computer acts as the server and
provides data distribution and security functions to other computers that are independently
running various applications. An example of the simplest client/server model is a LAN
whereby a set of computers is linked to allow individuals to share data. LANs (like other
client/server environments) allow users to maintain individual control over how information
is processed.
Client/server computing differs from mainframe or distributed system processing in that each
processing component is mutually dependent. The ‘client’ is a single PC or workstation
associated with software that provides computer presentation services as an interface to server
computing resources. Presentation is usually provided by visually enhanced processing
software known as a Graphical User Interface (GUI). The ‘server’ is one or more multi-user
computer(s) (these may be mainframes, minicomputers or PCs). Server functions include any
centrally supported role, such as file sharing, printer sharing, database access and
management, communication services, facsimile services, application development and others.
Multiple functions may be supported by a single server.
Numerous protocols are involved in transferring a single file even when two computers are
directly connected. The large task of transferring a piece of data is broken down into distinct
sub tasks. There are multiple ways to accomplish each task (individual protocols). The tasks are
well described so that they can be used interchangeably without affecting the overall system.
Transport Layer
o Makes sure data is exchanged reliably between the two end systems
o Needs to know how to identify the remote system and package the data properly
Application Layer
o User application protocols
Transport Layer
o Transmission control protocol
o Data reliability and sequencing
Internet Layer
o Internet Protocol
o Addressing, routing data across Internet
Network Access Layer
o Data exchange between host and local network
o Packets, flow control
o Network dependent (circuit switching, Ethernet etc)
Physical Layer
o Physical interface, signal type, data rate
Data is passed from top layer of the transmitter to the bottom, then up from the bottom layer to
the top on the recipient. However, each layer on the transmitter communicates directly with
the recipient’s corresponding layer. This creates a virtual data flow between layers. The data
sent can be termed as a data packet or data frame.
Data Data
Virtual Data Flow
Application Application
Presentation Presentation
Session Session
Transport Transport
Network Network
Data Link Data Link
Physical Physical
1. Application Layer
This layer provides network services to application programs such as file transfer and
electronic mail. It offers user level interaction with network programs and provides user
application, process and management functions.
2. Presentation Layer
The presentation layer uses a set of translations that allow the data to be interpreted properly.
It may have to carry out translations between two systems if they use different presentation
standards such as different character sets or different character codes. It can also add data
encryption for security purposes. It basically performs data interpretation, format and control
transformation. It separates what is communicated from data representation.
3. Session Layer
The session layer provides an open communications path to the other system. It involves
setting up, maintaining and closing down a session (a communication time span). The
communications channel and the internetworking should be transparent to the session layer. It
manages (administration and control) sessions between cooperating applications.
4. Transport Layer
If data packets require to go out of a network then the transport layer routes them through the
interconnected networks. Its task may involve splitting up data for transmission and
reassembling it after arrival. It performs the tasks of end-to-end packetization, error control,
flow control, and synchronization. It offers network transparent data transfer and transmission
control.
5. Network Layer
The network layer routes data frames through a network. It performs the tasks of connection
management, routing, switching and flow control over a network.
7. Physical Layer
The physical link layer defines the electrical characteristics of the communications channel and
the transmitted signals. This includes voltage levels, connector types, cabling, data rate etc. It
provides the physical interface.
The main types of cables used in networks are twisted-pair, coaxial and fibre-optic. Twisted-
pair and coaxial cables transmit electric signals, whereas fibre-optic cables transmit light
pulses. Twisted-pair cables are not shielded and thus interfere with nearby cables. Public
telephone lines generally use twisted-pair cables. In LANs they are generally used up to bit
rates of 10 Mbps and with maximum lengths of 100m.
Coaxial cable has a grounded metal sheath around the signal conductor. This limits the amount
of interference between cables and thus allows higher data rates. Typically they are used at bit
rates of 100 Mbps for maximum lengths of 1 km.
The highest specification of the three cables is fibre-optic. This type of cable allows extremely
high bit rates over long distances. Fibre-optic cables do not interfere with nearby cables and
give greater security, more protection from electrical damage by external equipment and
greater resistance to harsh environments; they are also safer in hazardous environments.
Most modern networks have a backbone, which is a common link to all the networks within an
organization. This backbone allows users on different network segments to communicate and
also allows data into and out of the local network.
Networks are partitioned from other networks using a bridge, a gateway or a router. A bridge
links two networks of the same type. A gateway connects two networks of dissimilar type.
Routers operate rather like gateways and can either connect two similar networks or two
dissimilar networks. The key operation of a gateway, bridge or router is that it only allows data
traffic through itself when the data is intended for another network which is outside the
connected network. This filters traffic and stops traffic not intended for the network from
clogging up the backbone. Modern bridges, gateways and routers are intelligent and can
determine the network topology. A spanning-tree bridge allows multiple network segments to
be interconnected. If more than one path exists between individual segments then the bridge
finds alternative routes. This is useful in routing frames away from heavy traffic routes or
around a faulty route.
A repeater is used to increase the maximum interconnection length since for a given cable
specification and bit rate, each has a maximum length of cable.
Shared resources
Online services
Fax machines
Fax machines convert images to signals that can be sent over a telephone line to a receiving
machine. They are extremely popular in offices. They can scan the image of a document and
print the image on paper. Microcomputers use fax/modem circuit boards to send and receive
fax messages.
Shared resources
Shared resources are communication networks that permit microcomputers to share expensive
hardware such as laser printers, chain printers, disk packs and magnetic tape storage. Several
microcomputers linked in a network make shared resources possible. The connectivity
capabilities of shared resources provide the ability to share data located on a computer.
Online services
Online services are business services offered specifically for microcomputer users. Well-known
online service providers are America Online (AOL), AT&T WorldNet, CompuServe, Africa
Online, Kenyaweb, UUNET, Wananchi Online and Microsoft Network. Typical online services
offered by these providers are:
Teleshopping- a database which lists prices and description of products. You place an order,
charge the purchase to a credit card and merchandise is delivered by a delivery service.
Home banking – banks offer this service so you can use your microcomputer to pay bills, make
loan payments, or transfer money between accounts.
Investing – investment firms offer this service so you can access current prices of stocks and
bonds. You can also buy and sell orders.
Travel reservations – travel organizations offer this service so you can get information on
airline schedules and fare, order tickets, and charge to a credit card.
Internet access – you can get access to the World Wide Web.
Internet
The Internet is a giant worldwide network. The Internet started in 1969 when the United States
government funded a major research project on computer networking called ARPANET
(Advanced Research Project Agency NETwork). When on the Internet you move through
cyberspace.
Communicating
o Communicating on the Internet includes e-mail, discussion groups (newsgroups),
and chat groups
o You can use e-mail to send or receive messages to people around the world
o You can join discussion groups or chat groups on various topics
Shopping
You get connected to the Internet through a computer. Connection to the Internet is referred to
as access to the Internet. Using a provider is one of the most common ways users can access the
Internet. A provider is also called a host computer and is already connected to the Internet. A
provider provides a path or connection for individuals to access the Internet.
Connections
There are three types of connections to the Internet through a provider:
o Direct or dedicated
o SLIP and PPP
o Terminal connection
Direct or dedicated
This is the most efficient access method to all functions on the Internet. However it is expensive
and rarely used by individuals. It is used by many organizations such as colleges, universities,
service providers and corporations.
SLIP (Serial Line Internet Protocol) or PPP (Point-to-Point Protocol). With this type of
connection your computer becomes part of a client/server network. It requires special client
software to communicate with server software running on the provider’s computer and other
Internet computers.
Terminal connection
This type of connection also uses a high-speed modem and standard telephone line. Your
computer becomes part of a terminal network with a terminal connection. With this
connection, your computer’s operations are very limited because it only displays
communication that occurs between provider and other computers on the Internet. It is less
expensive than SLIP or PPP but not as fast or convenient.
Internet protocols
TCP/IP
The standard protocol for the Internet is TCP/IP. TCP/IP (Transmission Control
Protocol/Internet Protocol) are the rules for communicating over the Internet. Protocols control
how the messages are broken down, sent and reassembled. With TCP/IP, a message is broken
down into small parts called packets before it is sent over the Internet. Each packet is sent
separately, possibly travelling through different routes to a common destination. The packets
are reassembled into correct order at the receiving computer.
Internet services
Telnet
Telnet allows you to connect to another computer (host) on the Internet
With Telnet you can log on to the computer as if you were a terminal connected to it
There are hundreds of computers on the Internet you can connect to
Some computers allow free access; some charge a fee for their use
Gopher
Gopher allows you to search and retrieve information at a particular computer site
called a gopher site
Gopher is a software application that provides menu-based functions for the site.
It was originally developed at the University of Minnesota in 1991
Gopher sites are computers that provide direct links to available resources, which may
be on other computers
Gopher sites can also handle FTP and Telnet to complete their retrieval functions
The Web
The web is a multimedia interface to resources available on the Internet
It connects computers and resources throughout the world
It should not be confused with the term Internet
Browser
A browser is a special software used on a computer to access the web
The software provides an uncomplicated interface to the Internet and web documents
It can be used to connect you to remote computers using Telnet
It can be used to open and transfer files using FTP
It can be used to display text and images using the web
Two well-known browsers are:
o Netscape communicator
o Microsoft Internet Explorer
Web portals are sites that offer a variety of services typically including e-mail, sports updates,
financial data, news and links to selected websites. They are designed to encourage you to visit
them each time you access the web. They act as your home base and as a gateway to their
resources
Web pages
A web page is a document file sent to your computer when the browser has connected to a
website. The document file may be located on a local computer or halfway around the world.
The document file is formatted and displayed on your screen as a web page through the
interpretation of special command codes embedded in the document called HTML (Hyper Text
Mark-up Language).
Typically the first web page on a website is referred to as the home page. The home page
presents information about the site and may contain references and connections to other
documents or sites called hyperlinks. Hyperlink connections may contain text files, graphic
images, audio and video clips. Hyperlink connections can be accessed by clicking on the
hyperlink.
Applets and Java
Web pages contain links to special programs called applets written in a programming
language called Java.
Java applets are widely used to add interest and activity to a website.
Applets can provide animation, graphics, interactive games and more.
Applets can be downloaded and run by most browsers.
Search tools
Search tools developed for the Internet help users locate precise information. To access a search
tool, you must visit a web site that has a search tool available. There are two basic types of
search tools available:
- Indexes
- Search engines
Indexes
Indexes are also known as web directories
They are organized by major categories e.g. Health, entertainment, education etc
Each category is further organized into sub categories
Users can continue to search of subcategories until a list of relevant documents appear
The best known search index is Yahoo
Search engines
Search engines are also known as web crawlers or web spiders
They are organized like a database
Key words and phrases can be used to search through a database
Databases are maintained by special programs called agents, spiders or bots
Widely used search engines are Google, HotBot and AltaVista.
Web utilities
Web utilities are programs that work with a browser to increase your speed, productivity and
capabilities. These utilities can be included in a browser. Some utilities may be free on the
Internet while others can be charged for a nominal charge. There are two categories of web
utilities:
Plug-ins
Helper applications
Plug-ins
A plug-in is a program that automatically loads and operates as part of your browser.
Many websites require plug-ins for users to fully experience web page contents
Some widely used plug-ins are:
o Shockwave from macromedia – used for web-based games, live concerts and
dynamic animations
o QuickTime from Apple – used to display video and play audio
o Live-3D from Netscape – used to display three-dimensional graphics and virtual
reality
Helper applications
Helper applications are also known as add-ons and helper applications. They are independent
programs that can be executed or launched from your browser. The four most common types
of helper applications are:
sent to your hard disk. The information can be read later without being connected to
the Internet.
Metasearch utilities – offline search utilities are also known as metasearch programs.
They automatically submit search requests to several indices and search engines. They
receive the results, sort them, eliminate duplicates and create an index.
Filters – filters are programs that allow parents or organizations to block out selected
sites e.g. adult sites. They can monitor the usage and generate reports detailing time
spent on activities.
Discussion groups
There are several types of discussion groups on the Internet:
Mailing lists
Newsgroups
Chat groups
Mailing lists
In this type of discussion groups, members communicate by sending messages to a list address.
To join, you send your e-mail request to the mailing list subscription address. To cancel, send
your email request to unsubscribe to the subscription address.
Newsgroups
Newsgroups are the most popular type of discussion group. They use a special type of
computers called UseNet. Each UseNet computer maintains the newsgroup listing. There are
over 10,000 different newsgroups organized into major topic areas. Newsgroup organization
hierarchy system is similar to the domain name system. Contributions to a particular
newsgroup are sent to one of the UseNet computers. UseNet computers save messages and
periodically share them with other UseNet computers. Interested individuals can read
contributions to a newsgroup.
Chat groups
Chat groups are becoming a very popular type of discussion group. They allow direct ‘live’
communication (real time communication). To participate in a chat group, you need to join by
selecting a channel or a topic. You communicate live with others by typing words on your
computer. Other members of your channel immediately see the words on their computers and
they can respond. The most popular chat service is called Internet Relay Chat (IRC), which
requires special chat client software.
Instant messaging
Instant messaging is a tool to communicate and collaborate with others. It allows one or more
people to communicate with direct ‘live’ communication. It is similar to chat groups, but it
provides greater control and flexibility. To use instant messaging, you specify a list of friends
(buddies) and register with an instant messaging server e.g. Yahoo Messenger. Whenever you
connect to the Internet, special software will notify your messaging server that you are online.
It will notify you if any of your friends are online and will also notify your buddies that you
are online.
E-mail addresses
The most important element of an e-mail message is the address of the person who is to receive
the letter. The Internet uses an addressing method known as the Domain Name System (DNS).
The system divides an address into three parts:
(i) User name – identifies a unique person or computer at the listed domain
(ii) Domain name – refers to a particular organization
(iii) Domain code – identifies the geographical or organizational area
Almost all ISPs and online service providers offer e-mail service to their customers.
Electronic mail messages can be sent on the spur of the moment and may be regretted
later on (sending by traditional methods normally allows for a rethink). In extreme
cases messages can be sent to the wrong person (typically when replying to an email
message, where messages is sent to the mailing list rather than the originator).
It may be difficult to send to some remote sites. Many organizations have either no
electronic mail or merely an intranet. Large companies are particularly wary of Internet
connections and limit the amount of external traffic.
Not everyone reads his or her electronic mail on a regular basis (although this is
changing as more organizations adopt email as the standard communication medium).
The main standards that relate to the protocols of email transmission and reception are:
Simple Mail Transfer Protocol (SMTP) – which is used with the TCP/IP suite. It has
traditionally been limited to the text-based electronic messages.
Multipurpose Internet Mail Extension – which allows the transmission and reception
of mail that contains various types of data, such as speech, images and motion video. It
is a newer standard than SMTP and uses much of its basic protocol.
The possible use of the Internet for non-useful applications (by employees).
The possible connection of non-friendly users from the global connection into the
organization’s local network.
For these reasons, many organizations have shied away from connection to the global network
and have set-up intranets and extranets.
Firewalls are often used to protect organizational Internets from external threats.
Intranets
Intranets are in-house, tailor-made networks for use within the organization and provide
limited access (if any) to outside services and also limit the external traffic (if any) into the
intranet. An intranet might have access to the Internet but there will be no access from the
Internet to the organization’s intranet.
Organizations which have a requirement for sharing and distributing electronic information
normally have three choices:
- Use a proprietary groupware package such as Lotus Notes
- Set up an Intranet
Extranets
Extranets (external Intranets) allow two or more companies to share parts of their Intranets
related to joint projects. For example two companies may be working on a common project, an
Extranet would allow them to share files related with the project.
Extranets allow other organizations, such as suppliers, limited access to the
organization’s network.
The purpose of the extranet is to increase efficiency within the business and to reduce
costs
Firewalls
A firewall (or security gateway) is a security system designed to protect organizational
networks. It protects a network against intrusion from outside sources. They may be
categorized as those that block traffic or those that permit traffic.
It consists of hardware and software that control access to a company’s intranet,
extranet and other internal networks.
It includes a special computer called a proxy server, which acts as a gatekeeper.
All communications between the company’s internal networks and outside world must
pass through this special computer.
The proxy server decides whether to allow a particular message or file to pass through.
4. Information superhighway
Information superhighway is a name first used by US Vice President Al Gore for the vision of a
global, high-speed communications network that will carry voice, data, video and other forms
of information all over the world, and that will make it possible for people to send e-mail, get
up-to-the-minute news, and access business, government and educational information. The
Internet is already providing many of these features, via telephone networks, cable TV services,
online service providers and satellites.
5. Terminology
Multiplexors/concentrators
Are the devices that use several communication channels at the same time. A multiplexor
allows a physical circuit to carry more than one signal at one time when the circuit has more
capacity (bandwidth) than individual signals required. It transmits and receives messages and
controls the communication lines to allow multiple users access to the system. It can also link
several low-speed lines to one high-speed line to enhance transmission capabilities.
Cluster controllers
Are the communications terminal control units that control a number of devices such as
terminals, printers and auxiliary storage devices. In such a configuration devices share a
common control unit, which manages input/output operations with a central computer. All
messages are buffered by the terminal control unit and then transmitted to the receivers.
Protocol converters
Are devices used to convert from one protocol to another such as between asynchronous and
synchronous transmission. Asynchronous terminals are attached to host computers or host
communication controllers using protocol converters. Asynchronous communication
techniques do not allow easy identification of transmission errors; therefore, slow transmission
speeds are used to minimize the potential for errors. It is desirable to communicate with the
host computer using synchronous transmission if high transmission speeds or rapid response
is needed.
Multiplexing
Multiplexing is sending multiple signals or streams of information on a carrier at the same time
in the form of a single, complex signal and then recovering the separate signals at the receiving
end. Analog signals are commonly multiplexed using frequency-division multiplexing (FDM),
in which the carrier bandwidth is divided into sub-channels of different frequency widths, each
carrying a signal at the same time in parallel. Digital signals are commonly multiplexed using
time-division multiplexing (TDM), in which the multiple signals are carried over the same
channel in alternating time slots. In some optical fiber networks, multiple signals are carried
together as separate wavelengths of light in a multiplexed signal using dense wavelength
division multiplexing (DWDM).
Circuit-switched
Circuit-switched is a type of network in which a physical path is obtained for and dedicated to
a single connection between two end-points in the network for the duration of the connection.
Ordinary voice phone service is circuit-switched. The telephone company reserves a specific
physical path to the number you are calling for the duration of your call. During that time, no
one else can use the physical lines involved.
Packet-switched
Packet-switched describes the type of network in which relatively small units of data called
packets are routed through a network based on the destination address contained within each
packet. Breaking communication down into packets allows the same data path to be shared
among many users in the network. This type of communication between sender and receiver is
known as connectionless (rather than dedicated). Most traffic over the Internet uses packet
switching and the Internet is basically a connectionless network.
Virtual circuit
A virtual circuit is a circuit or path between points in a network that appears to be a discrete,
physical path but is actually a managed pool of circuit resources from which specific circuits
are allocated as needed to meet traffic requirements.
A permanent virtual circuit (PVC) is a virtual circuit that is permanently available to the user
just as though it were a dedicated or leased line continuously reserved for that user. A
switched virtual circuit (SVC) is a virtual circuit in which a connection session is set up for a
user only for the duration of a connection. PVCs are an important feature of frame relay
networks and SVCs are proposed for later inclusion.
Closed circuit television (CCTV) is a television system in which signals are not publicly
distributed; cameras are connected to television monitors in a limited area such as a store, an
office building, or on a college campus. CCTV is commonly used in surveillance systems.
VSAT
VSAT (Very Small Aperture Terminal) is a satellite communications system that serves home
and business users. A VSAT end user needs a box that interfaces between the user's computer
and an outside antenna with a transceiver. The transceiver receives or sends a signal to a
satellite transponder in the sky. The satellite sends and receives signals from an earth station
computer that acts as a hub for the system. Each end user is interconnected with the hub
station via the satellite in a star topology. For one end user to communicate with another, each
transmission has to first go to the hub station which retransmits it via the satellite to the other
end user's VSAT. VSAT handles data, voice, and video signals.
VSAT offers a number of advantages over terrestrial alternatives. For private applications,
companies can have total control of their own communication system without dependence on
other companies. Business and home users also get higher speed reception than if using
ordinary telephone service or ISDN.