1. Trang chủ
  2. » Công Nghệ Thông Tin

the internet encyclopedia volume phần 8 pptx

98 154 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 98
Dung lượng 1,71 MB

Nội dung

VOICE OVER INTERNET PROTOCOL VOIP literally refers to the transmission of a digitizedvoice signal using digital packets, routed using the In-ternet protocol or IP.. On the other hand, us

Trang 1

comes long enough.

All of these deficiencies of a transmission channel have

the effect of reducing the channel capacity, or, throughput,

of a transmission link Channel capacity refers to the

the-oretical upper limit on how much information, in terms

of bits per second, can be transmitted through a channel

(Wozencraft & Jacobs, 1965)

Circuit-Switched Connections of a Call

in a Conventional Telephony Network

VOIP networks must interoperate with conventional

circuit-switched networks, in particular the ubiquitous

public switched telephone network or PSTN A VOIP

network that cannot interoperate with, and therefore

ex-change calls with, the PSTN would be of little value to

most telephone users A network’s value increases as it

can be used to reach more users

Like other networks, the PSTN uses a hub and spoke

architecture of transmission links and switches (Bell

Lab-oratories, 1977, 1983) Each user’s telephone is typically

connected by an individual circuit (usually referred to as

local loop) to a central office switching hub In a small

town, there may be only one central office, whereas in

a large major metropolitan area, there could be several

dozen central offices

In each central office hub, there is usually at least one

switch The switches used in traditional telephony are

called circuit switches A circuit switch will route a call

over a dedicated path from one transmission link to

an-other for at least the duration of the call See Figure 4

As will be described more fully below, this contrasts with

the packet switching used in the Internet, which does

not maintain a dedicated path connecting network links,

but instead passes information along shared paths on a

packet-by-packet demand basis

Dedicated Path Created for Call Duration

Figure 4: Circuit switched connection between

two links

Originating the Call

As Figure 5 shows, when a caller picks up a telephone

to make a call, the local switch in the caller’s local tral office (Node A) provides a dial tone that the callerhears through the telephone That dial tone indicates tothe caller that the local telephone switch has seized his orher local telephone line and is ready to receive the digits

cen-of the telephone number that he or she wishes to dial Theprocesses of seizing the telephone line and returning dialtone are types of supervisory signaling

The caller then enters, or dials, the telephone ber of the called telephone If the calling telephone isenabled with touch-tone signaling, the calling telephonesignals to the local switch the digits dialed by using dif-ferent combination of two touch-tones for each digit di-aled Such transmitting of routing information is calledaddress signaling The caller’s local switch Node A detectsthese tone combinations and, in turn, determines the tele-phone number the caller is trying to call

num-Circuit Switching to the Call’s Destination

Each circuit switch has a routing look-up table for mining how to handle a call based on some or all of thecalling and called numbers If the local switch does nothave adequate information in its routing tables to make arouting decision, most modern switches will hold the call

deter-Link Link

Interoffice Transmission Link

Interoffice Transmission Link

Interoffice Transmission Link

Calling Telephone

Called Telephone Office"

"Central Node A

Node B

"Toll Office"

SS7 Packet Switch

SMS Database

Node C

"Central Office"

Figure 5: Conventional circuit switched telephony network.

Trang 2

V OICE OVER I NTERNET P ROTOCOL 653

and launch a packet data message to an external database

(called a service management system or SMS) That

mes-sage is routed from the switch to the SMS over a

par-allel data network called a Signaling System 7 (or SS7)

packet network The SMS returns routing instructions,

via the SS7 packet network, to the switch that originated

the routing query The SS7 signaling standard came out

of the conventional telephony industry

If the local switch determines that the call needs to beconnected to a local loop attached directly to that local

switch, the switch will ring the local loop of the called

telephone At the same time, the switch returns a ringing

sound signal to the calling party On the other hand, if the

local switch determines that the called party’s telephone

is busy, the local switch returns a slow busy signal to the

calling party

As soon as the called party picks up its phone, the localswitch creates a circuit-switched dedicated audio commu-

nications path between the calling party’s local loop and

the called party’s local loop, thus completing a dedicated

audio transmission path between the calling telephone

and the called telephone For the call’s duration, that

ded-icated audio path is available for the transmission of voice

signals, in both directions, between the calling and called

party’s telephones If one or more of the links used to

co-nstruct that path are digital, a CODEC in the connecting

switch or other connecting device will make the

neces-sary analog-to-digital conversion so that the voice signal

may seamlessly traverse the boundaries between the

ana-log and digital links

If the called telephone’s local loop is not directly nected to the calling telephone’s local switch, the local

con-switch must establish a connection to the called telephone

through another switch or switches For most modern

PSTN switches, this requires that the originating switch

launch an SS7 message, over the SS7 network, to reserve

a path through other switches in the network for

complet-ing the desired communications path to the call’s

destina-tion If the far end switch where the called party is located

determines that the called party’s line is busy, no circuit

connections will be made, the path reservation for the

con-necting links is dropped, and the originating switch will

return a slow busy signal to the calling party However, if

the reason the call cannot be completed is network

con-gestion, the originating switch will return a fast busy to

the calling party

If the called party’s line is not busy and a complete path

to the called party’s line can be established, the called

party’s local switch rings the called party’s telephone

While the called party’s phone is ringing, the calling party’s

local switch is returning an audible ringing signal to the

calling party When and if the called party answers, the

switches instantly circuit-switch together the links along

the reserved path in order to complete a dedicated path

between the calling and called telephones

Finally, it should be noted that some switches nicate interoffice signaling information using non-SS7 in-

commu-teroffice signaling arrangements, such as in-band

signal-ing Regardless of the supervisory and address signaling

arrangement used, the net result of establishing a

commu-nications path between the calling and called telephone

will be the same

VOICE OVER INTERNET PROTOCOL

VOIP literally refers to the transmission of a digitizedvoice signal using digital packets, routed using the In-ternet protocol or IP The driving forces for using VOIPare beliefs in its cost savings, flexibility, and the growingdesire to combine voice and data transmission on one net-work See, e.g., Morris (1998), Cisco VOIP Primer (2002),Matthew (2002)

How VOIP Transmission Works

Because a VOIP call is transmitted digitally, it begins with

a digitization process similar to that used in conventionaltelephony First, the voice signal is sampled at a rategreater than the Nyquist sampling rate, and those sam-ples are digitized Whereas conventional circuit switchedtelephony transmits the digitized samples in a constantstream of synchronized (i.e., equally spaced in time) digi-tal samples, VOIP transmits the digitized voice communi-cations samples in asynchronous (i.e., unequally spaced

in time), sequentially numbered packets of data Eachpacket (which may contain many voice samples) containsits own IP formatted address information, which allows it

to be routed over an IP network Unlike conventional phony, where each sample follows the path of the samplebefore it, each of the IP packets containing several sam-ples of voice data may take an independent path (which

tele-is shared with other data packets) to its destination Witheach packet potentially taking a different route, the pack-ets often can arrive at their destination out of order (orsometimes not at all) At the far end, the IP and other rout-ing information is stripped from the packet, the voice sam-ples are temporarily collected in a buffer and reordered

as required, and then, if all goes well, the original voicesignal is reconstructed, albeit, slightly delayed For VOIPtechnology to have the functionality and flexibility of con-ventional telecommunications, some form of call control,

in the form of supervisory and address signaling, is quired

re-Figure 6 shows the basic VOIP transmission scheme

VOIP Signaling

VOIP signaling refers to signaling that can be used over

an IP network to establish a VOIP call It provides theneeded functionality of supervisory and address signaling.VOIP call signaling comes in two predominant compet-ing schemes: H.323 and Session Initiation Protocol (SIP).Each must satisfy the generic needs of telephonic calling.Specifically, each must provide for the following:

The calling phone to address and signal to the called phone,

tele-The called telephone signaling its availability for receivingcalls,

Establishing a transmission path between the calling andcalled telephone,

The called or calling telephone signaling to the otherphone it has hung up, and

The tearing down the transmission path once the call isover

Trang 3

Figure 6: VOIP network.

Figure 7 shows a generic signaling progression for

es-tablishing a VOIP call that might occur using H.323-type

centralized call control arrangement First, the calling

telephone dials the called telephone’s number (1) The

call-ing phone forwards the dialed telephone number (address

signaling) to a VOIP call controller—which is a special

purpose server That call controller does a lookup (2) in

a database for determining the IP address to reach the

called telephone If the called telephone is on the IP

net-work, a call setup signal is routed to the called telephone

to ring the called telephone (4)

While the called telephone is ringing, a ringing signal

is sent back to the calling telephone (3), which telephone,

in turn, generates a ringing sound in the caller’s earpiece

When and if the called party answers the telephone, a

se-ries of signals to set up the channel path are returned to

the calling and called telephones (5, 6, 7)

A UDP/IP communications path is then set up betweenthe calling and called telephone (8) The digitized voice

is transported using the user datagram protocol (or UDP)

in the transport layer, with two protocols, RTP (real timeprotocol) and RTCP (real time control protocol), ratherthan TCP—which is often used by non-voice data UDP

is connectionless (e.g., packets can take different routes)and can transport data packets without acknowledgingtheir receipt UDP is nonstop with less address informa-tion overhead The tradeoff of using a UDP path is lowerreliability than TCP UDP packets may be dropped or ar-rive out of order, but if they do arrive they do with lessdelay This is a good tradeoff for voice communications,which is highly tolerant to dropped packets, but relativelyintolerant to delay

RTP over UDP provides packet sequence numbering,

so out-of-order and/or missing packets are detectable at

Calling Telephone

Called Telephone

IP Network

IP Router

Call Control

Gateway

1 Dial

2 Look Up Dialed #

3 Generate Audible Ring

4 Ring

5 Hook

Off-7 Open Channel

6 Open Channel

8 RTP (Voice Stream)

IP Packets

Voice Mail

Figure 7: VOIP H.323-type signaling system using central call control.

Trang 4

V OICE OVER I NTERNET P ROTOCOL 655

Calling Telephone

Called Telephone

IP Network

IP Router

Call Control

Gateway

1 Dial

2 Look Up Dialed #

3 Generate

4 Ring

5 Hook

Off-7 Open Channel

6 Open Channel

8 RTP (Voice Stream)

IP Packets

Voice Mail

5 Called Phone Does Not Answer Audible Ring

Figure 8: Called telephone unavailable with reroute to voice mail with H.323-type signaling.

the far end RTCP provides a separate signaling

chan-nel between the end devices (e.g., telephones) to allow

exchange of information about packet loss, packet jitter,

and packet delays, as well as additional information, such

as the source’s name, e-mail, phone, and identification

(Real-Time Transport Protocol [RTP], 2001, August), and

(Streaming Video Over the Internet, 2002)

Additional requirements for a commercial VOIP tem include being able to produce information for billing

sys-and/or accounting for calls Similarly, today’s users

de-mand that it provide other features, such as Caller ID and

voicemail These capabilities may reside in the call

con-troller, IP telephones, and/or other devices in the IP

net-work Figure 8 shows how voicemail can be provided with

H.232

H.323 vs SIP

In addition to H.323, SIP is the major competing standard

for VOIP signaling They have both evolved to offer very

similar feature capabilities

H.323 takes a more telecommunications-oriented proach than SIP SIP takes an Internet-oriented approach

ap-H.323 is the older of the two (Doron, 2001; Paketizer,

2002) It was developed under the International

Telecom-munications Union (ITU), a telecomTelecom-munications

stan-dards group, and has gone through various revisions

(ITU-T, Recommendation H.323, 2000) The latest version

of H.323 standard (H.323 v3) is very robust in that it

cov-ers many possible implementations However, H.323 is

considered more difficult to implement than SIP due to

its use of binary encoded signaling commands

H.323 v.3 can be implemented with or without a callcontrol server Thus, an H.323 v.3 end device (e.g., a tele-

phone) can be designed to either set up a call through a

call control server, or set it up directly with another end

device without using an intervening call control server

An H.323 v.3 call control server can be set up to relay the

communications stream during the call, or the end devicescan directly establish the communications RTP streamingchannel between themselves The call control server can

be either stateless (i.e., not track a transaction or a sessionstate) or stateful (i.e., track a transaction and/or call ses-sion state) The significance of this is that in the statefulconfiguration, H.323 v.3 is not as scalable Finally, H.323v.3 employs signaling protocols that can easily be mappedthrough a gateway for routing calls between the VOIP net-work and the public switched network

SIP is a Web-based architecture that was developedunder the Internet Engineering Task Force (IETF) LikeURLs and Web e-mail, SIP’s messages are in ASCII textformat that follow the HTTP programming model, i.e.,using a grammar similar to that used to create basic Webpages—resulting in slightly lower efficiency in transmit-ting signaling information, as compared to the more ef-ficiently encoded binary H.323 signaling messages Also,SIP is very extensible, leading many vendors to implementvariations that may be somewhat incompatible (IETF, SIP,2003; IETF, SIP RFC2543bis, 2002)

An address used for routing a SIP messages is of theform SIPAddress@xyz.com As shown in Figure 9, when

a phone wishes to originate a call, it transmits an ASCIISIP “INVITE” message (1) addressed to the SIP address ofthe called phone (e.g., sales@xyz.com., where “xyz.com”

is the domain name of the SIP proxy server for the calledphone) Using conventional domain name server (DNS)lookup, the internet routes this e-mail-type message tothe SIP call control server, which may act as either aproxy server or a redirect server for the domain of thedialed called telephone address (here, xyz.com) In order

to determine where the telephone is located, the proxyserver or redirect server will query a location server (2),which will return the routing directions What happensnext depends upon whether the call controller is act-ing as a proxy server or a redirect server for the calledtelephone

Trang 5

Calling Telephone

Called Telephone

6 OK to Caller@SIP.COM

8 ACK to

IP of xyz

9 RTP (Voice Stream)

IP Packets

xyz@195.37.78.173 Caller@SIP.COM

4 RING to Caller@SIP.COM

1 INVITE to abc@xyz.com

3 INVITE to xyz@195.37.78.173

Figure 9: VOIP call routed using SIP signaling.

For a proxy server, the location server will return the

IP address for the called telephone Using that IP address,

the SIP INVITE message will be directed to the called

tele-phone (3) along with the calling teletele-phone’s IP address

The called telephone will then return a “RING” message

to the proxy server (4), which then forwards that RING

message to the originating telephone (5) When the called

phone answers, an OK message is returned (6, 7), which

includes the called telephone’s IP address Finally, the

originating telephone (which now knows the IP address

of the destination phone from the INVITE/OK message

exchange) sends an “ACK” message to the IP address of

the called telephone (8) The originating telephone then

establishes an RTP communications link with the called

telephone (9)

For a redirect server, the location server will

re-turn the redirected (i.e., forwarding) e-mail-style SIP

ad-dress of the called telephone (e.g., sales@home.com, or

joe@home.com) The redirect server will then forward the

INVITE request to the proxy or redirect server associated

with that redirected address, and then the steps

enumer-ated above will take place

Each location server must track the IP address of each

of the telephones in its SIP domain Thus, each SIP

tele-phone must register with its domain’s location server via

a registration server of its telephone service provider An

individual telephone can be registered with any

registra-tion server with which the user has a service arrangement

Registration binds each SIP telephone’s IP address to its

SIP address in its service provider’s domain

Note that a SIP call control server’s primary purpose

is to handle the routing of initial supervisory and

ad-dress signaling information Also note that, after the

ini-tial exchange of supervisory and address information, SIP

end devices establish and maintain the communications

channel without involvement of the SIP call control server.Like H.323 v.3, the SIP packets that carry the signalingmessages almost always follow a different path from thepath taken by the communications data Finally, with SIPmost of the intelligence resides in the end devices, as com-pared to being in the network, as is the case with conven-tional telephone networks and with H.323

Because SIP proxy and redirect servers typically donot track a call’s status after the call is set up, SIP is of-ten viewed as being more scalable than H.323 When acall control server is configured to track call status, its re-sources must bear the added burden of such monitoring.SIP’s ASCII encoding is considered more extensibleand open than the binary encoded signaling of H.323 v.3.SIP uses a very generic syntax for messages, which can

be customized to fit the needs of different applicationsresident on end devices For analysis of the various (andsomewhat controversial) comparisons of SIP and H.323,see Dalgica and Fang (1999)

Integrating VOIP Into Conventional Circuit-Switched Telephony Networks

As previously noted, the value of a telephony network is

a direct function of how many telephones are directly orindirectly connected to it; thus a VOIP network must beable to exchange calls (i.e., internetwork) with the PSTNsuch that a VOIP user can originate telephone calls toand receive telephone calls from a telephone user who isconnected to the PSTN In addition, for conventional tele-phone providers to deploy VOIP technology inside theirnetworks, VOIP technology’s presence must be impercep-tible to their existing base of telephone users

Figure 10 illustrates how a VOIP call can make a nection from a phone connected to an IP network to

Trang 6

con-V OICE OVER I NTERNET P ROTOCOL 657

Calling Telephone

Called Telephone

IP Network

IP Router

or Switch

Call Control

Gateway

2 Look Up Dialed #

4 Generate

4 Call

4b Hook

Off-5 Open

6 Open Channel

8 RTP (Voice Stream)

IP Packets

Voice Mail

* SS7 connection if Gateway

Is Carrier Provided

7.Call Setup

1 Dial

Figure 10: VOIP signaling internetworking with public switched network (PSTN).

a phone on a PSTN network A device, called a

gate-way, is used to translate signaling messages across the

VOIP/PSTN network boundary and to transform the

jit-tery voice packets on the IP side of the gateway into a

synchronous stream of voice data information (if there is

a digital voice circuit on the other PSTN side of the

gate-way) or an analog voice signal (if there is an analog voice

circuit on the PSTN side of the gateway)

On the IP side, the VOIP signaling to the gateway looksmuch the same as the signaling that would be done to

another end device on the IP network

ENUM, the Fully Interoperable

Numbering Plan

ENUM is a new standard for numbering plans that

would allow seamless telephone number addressing

be-tween conventional and VOIP telephony See, e.g., Neustar

(2003) and IETF, Telephone Number Mapping (ENUM)

(2003) It unifies Internet and conventional telephone

ad-dressing schemes by mapping E.164 (i.e., conventional

telephone) numbers to a URL Internet (and SIP)-friendly

format With ENUM, a single global digital identifier

sys-tem can serve equally subscribers attached to the PSTN

or the Internet The same identifier can be used to identify

multiple devices, such as plain telephones, fax, voicemail,

and data services, regardless of whether they are on the

PSTN or public Internet, thus conserving scarce E.164

numbers and domain name resources

As an example, a telephone number 1-305-599-1234would map onto the URL 4.3.2.1.9.9.5.5.0.3.1.E164.arpa

A DNS query on this domain name would return a number

of records, each listing a specific service registered to theowner of the E.164 number Devices and services attachedanywhere on the public Internet or PSTN could be regis-tered to this universal, fully portable, single number iden-tifier of their registered owner, allowing mobility aroundboth the PSTN and the public Internet

The ENUM standards raise new issues of privacy, curity, and administration Also, final agreement betweenInternet and traditional telecom industry represented bythe ITU is still pending

se-Quality of Service Issues

Transmission and routing can introduce effects that grade the quality of VOIP VOIP signals are not immune

de-to the deficiencies of the facilities that transport and routethem These deficiencies can cause packet loss, jitter, anddelay

Packet loss refers to the loss of packets containing some

of the voice samples during transmission The loss might

be caused by high bit error rates in the UDP transmissionchannel, misrouted packets, and/or congestion causingintermediate routing devices to drop packets Becausevoice transmission is very sensitive to delay, the reassem-bly of the voice signal at the receiving end of the callcannot typically wait for the retransmission of erroneous

or misrouted packets However, voice transmission has

a high tolerance for packet loss—mainly because the timate receiver of the signal (the human ear and/or in-tervening CODEC) does a good job of interpolating (i.e.,filling in the gap) where a packet has been lost There is alimit to how much packet loss can be tolerated That limit

Trang 7

ul-out redundancy, some CODECs that use data compression

algorithms are not able to recover from the loss of as few

as two packets in a row

Jitter can also contribute to lower quality With IP

traffic often taking multiple routes and/or mixed in with

bursty IP packet traffic, the interarrival times of the

pack-ets at the receiving end may be irregular and/or the

packets arrive out of order Jitter can be overcome by

buffering the packets—i.e., temporarily storing them long

enough to reorder them before forwarding them to the

de-coder However, buffering has the negative consequence

of adding more delay

Delay in the transmission of voice packets can be

mini-mized in several ways One is overbuilding the IP network,

i.e., ensuring that there is always excess capacity in the IP

network for all traffic, including during peak traffic

peri-ods Alternatively, priority routing can be afforded to voice

traffic, at the expense of lower priority data traffic—which

is more tolerant of delays Separate treatment of voice

from data can be done by virtual segregation or physical

segregation from lower priority traffic The former can be

done at either the network or data link layer For

exam-ple, segregation can be done at the data link layer by using

separate ATM channels for voice and data traffic and then

assigning ATM-based priority treatment to the ATM

chan-nels carrying voice traffic Where voice and data are mixed

on the IP network, identifiers can be used to indicate to the

intermediate network components (such as routers) that

designated traffic (such as voice traffic) should be given

priority

An example of this last method is RSVP, the Resource

Reservation Protocol RSVP allows a VOIP application to

request end-to-end QoS guarantee from a network (Cisco,

VoIP Call Admission Control Using RSVP, 2003) If the

guarantee cannot be provided, the call will not be

al-lowed to go through Where the guarantee cannot be

se-cured, the traffic might be redirected to an alternate

net-work or blocked (resulting in VOIP users receiving an

“equipment busy” signal) At the current time, priority

schemes such RSVP typically do not work over the public

Internet (with a large “I”) This is because, among other

reasons, the economic incentives are not there for

inter-mediate Internet providers to honor any type of

priori-tization routing scheme, given that their reimbursement

is the same for all traffic—regardless of its priority

desig-nation Therefore the current market structure for public

Internet backbone routing prevents the realization of a

higher quality of service for VOIP traffic over the public

Internet

To differentiate themselves, some Internet backbone

providers are introducing prioritization schemes such as

MPLS-based networks, which are ATM-like in their

at-tributes, but operate at a mixture of layer 2 and 3

proto-cols in pure IP environments As competition intensifies,

public networks are expected to become friendlier to

real-time services such as VOIP Quality of service is discussed

in detail elsewhere

However, such efficiencies will tend to be most cant to private networks and/or network providers whosetransmission networks are capacity-constrained

signifi-A second source of VOIP’s cost savings is lower capitalcost per call using lower cost switching devices (i.e., In-ternet routers and switches) Again, networks with sunkinvestments in conventional technology with excess ca-pacity would derive little benefit from such savings

A third source of VOIP’s savings is lower costs of ministration, particularly in enterprise environments Agood deal of administrative cost is incurred in enterprises

ad-to accommodate the movement of telephone users withinthe enterprise Each time a user moves to another office

or enters or leaves the firm, the routing tables and tory of a conventional telephone system must be updated,often manually VOIP’s self-registration feature eliminatesthese administrative costs

direc-A fourth source of VOIP’s savings comes from the

“economies of scope” that VOIP can achieve by its ability

to intermingle with other traffic on data networks, inating the need to segregate voice and data traffic, as isoften done with conventional telephony These savings aremost easily exploited in the LAN and WAN enterprise envi-ronment or by data-centric carriers who wish to combinetheir voice and data traffic Administrative savings alsocome from eliminating the conventional regime of sepa-rate administrative staffs for voice and data

elim-Finally, VOIP traffic on a data network looks like anyother data on that network This allows some carriers andenterprise users to avoid some of the economically dis-torting taxes that local, federal, and foreign regulatoryregimes place on pure voice traffic, but not on data traffic

It is important to remember that the realization of thesesavings are application-specific and may not be realized inevery situation See, e.g., Morris (1998) and “Cisco SeeksBigger Role in Phone Networks” (March 15, 2003)

Security Issues for VOIP

Security is a concern with VOIP, particularly because ofthe distributed nature of the call control, much of which ishandled between end devices (Cisco, SAFE: IP TelephonySecurity in Depth, 2002) Some of the things that makeVOIP attractive, e.g., self-registration of end devices andsoftware-controlled PCs acting as end devices, are alsothe sources of VOIP’s vulnerability Security issues includefour categories: (1) eavesdropping, (2) toll fraud, (3) iden-tity spoofing, and (4) IP spoofing

Eavesdropping refers to an unauthorized party tening” to the packets and, in turn, being able to listen

“lis-to the voice conversation This problem exists with bothVOIP and conventional analog/digital voice communi-cations In both cases, the simplest method of prevent-ing this problem is to encrypt the digital signal at itssource, the originating telephone The problem encryp-tion brings is overhead and computational load, whichcan introduce delay Also, encryption can create problems

Trang 8

R EFERENCES 659

for law enforcement agencies where they have a warrant

to wiretap a telephone conversation

Toll fraud is the problem of unauthorized persons ing telephone calls over the network This can be caused

mak-by unauthorized users originating calls on the IP network

either on legitimate phones or over illegitimate phones As

with conventional telephony, this can be combated with

security codes and other authentication methods

Identity spoofing refers to a hacker tricking a remoteuser into believing he or she are talking to the person he

or she dialed on the IP network, when, in fact, he or she

is talking to the hacker Again, security codes and other

authorization methods are helpful here

IP spoofing refers to theft of IP identity, where one enddevice is able to convince the IP network that its IP ad-

dress is the same as a legitimate device’s IP address This

allows the device with the fraudulent IP address to

inter-cept calls and/or perform toll fraud using that IP address

Spoofing the IP address of a gateway allows

eavesdrop-ping on telephone calls

Some generally accepted recommendations for imizing many of these security problems are to disable

min-self-registration of VOIP end devices after initial network

installation, to segregate voice from data traffic at level 2

or 3, and to use a stateful firewall at the PSTN gateway

As noted above, segregating data from voice services also

provides the added benefit of maintaining different

qual-ity of service for data and voice

CONCLUSION

VOIP holds great promise where the convergence of data

and voice can occur Internetworking and overcoming

QOS issues remain some of the biggest challenges

GLOSSARY

Analog signal A continuous signal that, at any point in

time, can have an infinite number of possible valuesand that is typically analogous in some characteristic

to another signal or physical phenomenon

Asynchronous transfer mode (ATM) A network

trans-fer method, employed at the data link layer (Level 2),for high-speed switched packet routing, which can es-tablish virtual channels with a specified QoS

Channel capacity The theoretical upper rate limit, in

bits per second, at which information can be ted over a transmission channel

transmit-Circuit switch A switch that makes a temporary or

permanent dedicated transmission path between twotransmission links that are attached to that switch,based on signaling information received prior to es-tablishing the dedicated path

Digital encoding Encoding a signal in the form of a

string of 1s and 0s

Digital transmission Transmission of information

en-coded as 1s and 0s

Internet A global public network based on the

“Inter-net protocol,” connecting millions of hosts worldwide,and for which users often pay a flat fee to access, withlittle or no charge for transmitting each packet of in-formation (Outside the U.S., Internet access is often

measured and charged on a usage basis, e.g., minutes

or units of data.)

Internet protocol (small “i”) or IP A packet ing protocol used for routing packets over and betweenand private networks that is “connectionless” (i.e., eachpacket making up the same message may take a differ-ent route to reach the ultimate destination)

switch-Node A point of connection between transmission links,which may contain switches, and/or may contain con-verters to interconnect transmission links with differ-ing modalities (e.g., for connecting wire links to wire-less links, non-digitally encoded links to digitally en-coded links, or fiber links to copper wire links)

Packet router A type of packet switching device thattypically routes based on Level 3 network address in-formation (such as an IP address) and typically has theability to choose optimal routing based on dynamicallychanging criteria and routing tables

Packet switch A type of packet switching device thatroutes packets of data between links based on addressinformation associated with each packet A Level 3switch uses network addresses, such as IP addresses,

to route packets of data Level 2 switches uses data linklayer addresses (which are typically local and/or hard-coded) for routing

Public switched telephone network (PSTN) A switched network that is provided by regulated com-mon carriers who offer their voice telephone services

circuit-to the general public

Quality of Service (QoS) A set of performance eters or criteria, such a bandwidth, jitter, packet loss,and delay, prespecified for a service

param-Transmission The movement of information (whether

or not digitally encoded) from one point to another via

a signal carried over a physical medium, such as wires,fiber, radio, or light

Transducer A device actuated by signal power from onesystem and supplying signal power in another form

to a second system (e.g., a telephone receiver earpieceactuated by electric power of a received transmissionsignal and supplying acoustic signal power to the sur-rounding air, which the telephone user can hear, or atelephone microphone that has a quartz crystal thatproduces electrical signal power for transmission overwires from the mechanical acoustic power originatingfrom the telephone user’s voice)

Transmission link A transmission path connecting twonodes

Voice communication The transmission of tion contained in a voice signal

informa-CROSS REFERENCES

See Circuit, Message, and Packet Switching; Digital

Com-munication; Internet Literacy; Public Networks; TCP/IP Suite; Web Quality of Service; Wide Area and Metropolitan Area Networks.

REFERENCES

ASCII Table Retrieved March 23, 2003, from http://web.cs.mun.ca/∼michael/c/ascii-table.html

Trang 9

Cisco, VoIP call admission control using RSVP (2003).

Retrieved March 25, 2003, from http://www.cisco.com/

univercd/cc/td/doc/product/software/ios121/121newft/

121t/121t5/dt4trsvp.htm

Cisco, VOIP primer (2002) Retrieved March 25, 2003,

from http://www.cisco.com/univercd/cc/td/doc/product/

access/acs mod/1700/1751/1751 swg/intro.htm

Cisco, Understanding codecs: Complexity, hardware

support, MOS, and negotiation (2002) Retrieved

March 25, 2003, from http://www.cisco.com/warp/

public/788/voip/codec complexity.pdf

Cisco, SAFE: IP telephony security in depth (2002)

Re-trieved March 25, 2003, from http://www.cisco.com/

warp/public/cc/so/cuso/epso/sqfr/safip wp.htm

Dalgic, I., & Fang, H (1999) Comparison of H.323

and SIP for IP telephony signaling Retrieved

March 25, 2003, from http://216.239.57.100/cobrand

univ?q=cache:PNnMM0MUWcsC:www.cs.columbia

edu/∼hgs/papers/others/Dalg9909 Comparison.pdf+

dalgic&hl=en&ie=UTF-8

Doron, E (2001) SIP and H.323 for voice/video over

IP—Complement, don’t compete! Internet Telephony.

Retrieved March 25, 2003, from http://www.tmcnet

com/it/0801/0801radv.htm

Internet Engineering Task Force (IETF) SIP (2003)

Retrived March 25, 2003, from http://www.ietf.org/

html.charters/sip-charter.html

Internet Engineering Task Force (IETF) Telephone

num-ber mapping (ENUM) (2003) Retrieved March 25,

2003, from

http://www.ietf.org/html.charters/enum-charter.html

March 25, 2003, from http://www.itu.int/rec/recommendation.asp?type=items&lang=E&parent=T-REC-H.323-200011-I

Morris, R L (1998) Voice over IP telephony: Sizzle orsteak? Retrieved March 25, 2003, from http://members.aol.com/ ht a/roym11/LoopCo/VOIP.html

Neustar (2003) Retrieved March 25, 2003, from http://www enum.org

Newton, H (1998) Newton’s telecom dictionary (14th

ex-panded ed.) New York: Flatiron Publishing

Cisco seeks bigger role in phone networks (2003,

Ma-rch 3) New York Times Retrieved MaMa-rch 25, 2003,

from http://www.nytimes.com/2003/03/03/technology/03CISC.html?tntemail1=&pagewanted=print&position

=topPacketizer, T M (2002) Comparisons between H.323and SIP Retrieved March 25, 2003, from http://www.packetizer.com/iptel/h323 vs sip/complist.htmlReal-Time Transport Protocol (RTP) (2001, August) Re-trieved March 25, 2003, from http://www.cs.columbia.edu/∼hgs/teaching/ais/slides/rtp.pdf

Sanford (1999) Packet voice technology: Cheap talk?Retrieved March 25, 2003, from http://www.applied-research.com/articles/99/ARTicle10Sanford.htm

Truxal, J G (1990) The age of electronic messages.

Cambridge, MA: MIT Press

Streaming video over the Internet (2002) RetrievedMarch 25, 2003, from http://www.streamdemon.co.uk/tranproto.html

Wozencraft, R., & Jacobs, M (1965) Principles of

commu-nications theory New York: Wiley.

Trang 10

W Web-Based Training

Patrick J Fahy, Athabasca University

Web-Based Training (WBT): Background 661

Training Principles and Technological

As part of corporate health, even survival, companies and

training institutions globally have recognized the need

to provide relevant and flexible training Professional

de-velopment (PD) in the form of upgrading, re-training,

and various educational opportunities is seen as

enhanc-ing the skills of valued employees, helpenhanc-ing organizations

maintain their competitive advantage by developing (and

thereby retaining) experienced people

Well-designed Web-based training (WBT) can offervaluable advantages over other types of training deliv-

ery in a wide variety of public and private environments:

training time and travel can be reduced, even eliminated,

lowering costs; materials stored on central servers can be

continually revised and updated, assuring currency and

enhancing quality; training content is more consistent,

supporting higher standards; greater efficiency (chiefly

the result of individualization) can increase trainee

learn-ing and satisfaction, improvlearn-ing motivation; and

produc-tion and delivery of training programs may be more

sys-tematic, improving the cost-effectiveness of development

At the same time, using the World Wide Web (WWW)for training presents some challenges: existing training

materials must usually be redesigned, sometimes

exten-sively; bandwidth limitations (often at the user’s end, in

the “last five feet” of the communications chain) may

re-strict or even prohibit use of multimedia by some trainees;

all participants (trainees and instructors) must learn new

skills to use WBT effectively; and an initial investment

(sometimes substantial) in equipment and expertise may

be needed Other factors in the structure or culture of a

training organization may also need to change to make

WBT feasible Dropout rates (admittedly often a problem

in WBT) may indicate the health of WBT programs: high

rates may mean a mismatch between trainees’

expecta-tions and the instructional design of the training material,

or may reveal a lack of leadership or management support(Frankola, 2001)

In this chapter, WBT will be discussed from theoreticaland practical perspectives: important training principlesare reviewed briefly, including basic concepts now com-mon in WBT; practical problems in WBT are considered,

as well as the strengths and weaknesses of this mode oftraining delivery; and finally the prospects for the future

of WBT, and some of the pedagogic, technical, and nomic assumptions on which the optimistic predictionsdepend, are considered

eco-Training Principles and Technological Developments Supporting WBTPioneering Ideas in Training

In the first half of the 20th century, pioneering researcherssuch as Thorndike (1971), Dewey (1938), Skinner (1971),and Keller (1968) conducted research that began identi-fying fundamental learning principles (While these fig-ures wrote and researched in the fields of psychologyand education, their theories have evolved so that theyare now used in the design of effective teaching andtraining of all kinds, including WBT.) Thorndike’s threefundamental behavioral laws were among the first dis-coveries: (1) repetition strengthens any new behavior;(2) pleasure or reward associated with a particular behav-ior increases the likelihood the behavior will be repeated,while pain or lack of reward may diminish the likelihood;and (3) an individual’s personal readiness is crucial to theperformance of any new skill or behavior (Saettler, 1990).Dewey added that individual trainee differences werecrucial in the success of training Dewey and Piaget(1952) both recognized the importance of each individ-ual learner’s personal background, and advocated thattrainees’ experiences and previous learning be considered

661

Trang 11

1960s By describing the teacher or trainer as “the

manager of the contingencies of reinforcement” in the

learning process, Skinner helped found the fields of

educa-tional technology and information processing psychology

Besides a new role for the instructor, Skinner’s work

illustrated points vital to the subsequent development

of technology-based training, including the value of “the

program over the hardware,” and the critical importance

of the learning materials and the organization of the

lear-ning environment (Saettler, 1990)

Keller’s Individually Programmed Instruction (IPI)

model applied Skinner’s discoveries about the importance

of instructional design The IPI model (often called the

Keller Plan) emphasized individual differences in

instruc-tion and evaluainstruc-tion IPI stressed such principles, later

core to WBT, as self-pacing, mastery before advancement,

high-quality materials, tutoring help, prompt feedback,

and practice testing (Fox, 2002) Experiments in teaching

Morse code to World War II recruits demonstrated

con-vincingly that these principles could dramatically increase

the efficiency of training

Innovations such as IPI were impressive, but they

encountered resistance for several significant reasons

relevant to WBT:

rAs innovations, technology-based training models

of-ten make new demands upon institutions, trainers, and

trainees In particular, technology-based training

deliv-ery increases the responsibility of trainees for their own

learning, while reducing instructors’ “platform

behav-ior,” serious flaws in the eyes of some trainers (and some

trainees)

rTechnological innovations may initially result in a

judg-ment of “no significant difference” in performance when

evaluated Time may be needed to reveal their true value

rTepid managerial support may doom a technological

innovation, especially if time and funds are needed to

prove its actual potential

rIndividualized training models usually require more

ad-vance planning and preparation, while (at least initially)

increasing workloads on instructors and administrators,

and possibly destabilizing programs while adjustments

are occurring Participants must be aware of these, and

must be prepared to work through them

rWhen granted responsibility for managing their own

learning, some trainees may respond with demands for

more individual treatment, including access to records

of personal achievement, and remedial and accelerated

options Overall, in individualized programs trainees

ex-pect their individual performance, needs, and

prefer-ences to be acknowledged

In the 1960s and 1970s, developments in

instruc-tional design, cognitive and behavioral psychology, and

organizational analysis converged to produce new tools

and approaches for the design and delivery of

train-ing, which would quickly impact the emerging field of

Gagne and Leslie Briggs (1979), Leslie Briggs and WalterWager (1981), and Walter Dick and Lou Carey (1978).There were certainly others, but these individuals led theway

The Internet as a Training Platform

The earliest forms of the Internet emerged as training wasbeing transformed by a new understanding of learningitself The fact that the Internet today supports a stag-gering array of commercial and educational enterprisesand utilities (browsers, search engines and indexes, mediaplayers and plug-ins, mark-up languages and authoringtools, etc.) is due in part to the commitment to opennessand accessibility, and recognition of the importance of in-teraction as a learning support, made in the early days

of its development The validity of the vision of the earlydevelopers of the Internet of an infrastructure of open,flexible protocols and common standards can be seen inthe fact that the Internet’s first “killer app” was electronicmail (e-mail), still the most used tool on the Internet today.The early developers’ commitment to cooperation andcollaboration reflected in the modern Web’s friendlinessand durability helps make it a powerful tool for (amongmyriad other things) delivering accessible training (Leiner

de-tially, CBT systems such as PLATO (Programmed Logic

for Automated Teaching Operations) and TICCIT shared, Interactive, Computer-Controlled Information Tele- vision) were costly, experimental, and rudimentary: text

(Time-was the mode of presentation, using only occasional ple line drawings or diagrams, with minimal or no anima-tion, sound, or color

sim-Technical milestones passed quickly in CBT over thenext two decades: IBM mainframes were programmed

to teach binary arithmetic; mainframe PLATO andTICCIT were used in college teaching (TICCIT was lateradopted by the U.S Navy); authoring languages such as

Coursewriter and PILOT permitted instructors to

pro-duce instructional and testing materials for mainframedelivery and, later, for PCs (Rutherford, Patrick, Prindle,

& Donaldson, 1997); and multimedia platforms usinglaserdisc and, later, CD-ROM were perfected for storageand portability

The personal computer revolutionized and gave a hugeboost to CBT Apple, IBM, and IBM “clone” personalcomputers (PCs) became increasingly powerful As pricesdropped, the appeal of desktop technology grew; asauthoring capabilities increased, enthusiastic individualsspent money, time, and energy on CBT programmingprojects (sometimes duplicating the efforts of others, and,

Trang 12

U SING THE W EB FOR T RAINING 663

due to the lack of careful instructional design, frequently

producing materials of marginal training value) The

need was clear for a way to link desktop computers for

delivery of CBT, in order to increase access to quality

information and training resources, reduce needless

duplication and unnecessary competition, and facilitate

the fundamental goals of collaboration and cooperation

among developers and users

Computer-Based Communications

While specialized uses of proprietary CBT systems were

expanding and the lack of effective communications

among users was creating obvious training inefficiencies,

promising first steps toward use of computers in an open,

publicly accessible network were being made, initially, in

1962, with the U.S military’s ARPANET initiative ARPA

(Advanced Research Project Agency) proposed an online

research network to link defense contractors and

aca-demics with the military, and with each other

Attemp-ting to use the computers of the time as interactive

communications devices to promote collaboration was

considered novel, and was questioned technically as well

as practically by those who still saw the computer as only

“an arithmetic engine” (Hauben, 1994) However, in 1972,

by the time the final ARPANET report was produced, the

feasibility and usefulness of computer-based networked

communications was established Legacies of ARPANET,

including tools such as file transfer protocol (FTP) and

TCP/IP (transfer control protocol/Internet protocol, a

re-liable packet-addressing, flow-control, and loss-recovery

tool), were available and were subsequently incorporated

in the first Web browser, Gofer, in the early 1990s, and

in the first true graphical browser, Mosaic, in 1993 Even

more importantly, the principles of free communication

and interaction were also reflected in the open and

unreg-ulated architecture of the early commercial Internet

USING THE WEB FOR TRAINING

Strengths

The early Internet, with its ease of access and openness,

appealed to trainers who were previously forced to rely

upon standalone CBT, or pay high costs to access

pro-prietary online training networks However, previous

ex-perience with CBT had shown that a networked training

system would need to include certain features to be

max-imally effective, such as a common interface and

deliv-ery format, interoperability among different desktop and

server systems, and aids to communication and

collab-oration, to make development and production processes

more efficient, in the form of flexible and robust

inter-active capabilities The Web, because of its

fundamen-tal openness and flexibility, from the beginning proved

impressively capable of accommodating these and many

other functions

A Common Training Platform

The Web had evolved to commercial viability by 1995

(In August of that year, Netscape went public with a

hugely successful IPO on NASDAQ.) It was obvious that

for the Web’s widespread adoption, the PC would be the

key technology: when networked, the computer would

be the critical convergence device for this new means of

communication and collaboration With access to the ternet via a properly equipped computer, anyone, includ-ing training providers and their clients, could share theWeb’s growing “super-network” of services and resources,including training, from virtually anywhere in the world

In-Interoperability

Previously, the costs and complexity of developing onlinematerials were greatly inflated by the need to produce ver-sions meeting the specific requirements of hardware plat-forms, configurations, and operating systems The Web,using cross-platform “mark-up” (as opposed to program-

ming) languages such as HTML (hypertext markup

lan-guage), SGML (standard general markup lanlan-guage), and the

powerful XML (extensible markup language), made

hard-ware and operating system characteristics largely vant to Web access

irrele-Although markup languages and the Web’s erability capabilities eliminated many barriers to accessarising from system differences, issues still persist to-day because the Web grants users great freedom in theirchoices and configurations of software and hardware.Issues arise from, for example, differences in display hard-ware (monitors) and screen resolutions, Internet connec-tion speeds (still considered the greatest limitation toaccess of new, multimedia material), and user settings forfonts, background colors, display resolutions, etc., whichcan dramatically change the appearance and effectiveness

interop-of training materials (Jones & Farquhar, 1997) Problemsmay also arise with new versions or updates of commonbrowsers, plug-ins, and other required software, whichoccasionally fail to perform as well as previous versions,and may even contain fatal bugs To address these poten-tial problems, training programs often publish suggestedstandards for hardware and software (including version

or “build” numbers and any required patches or servicereleases for software), to guide trainees in upgrading theirsystems for full compatibility

Training Efficiency

Though costs of initial development were high, it wassoon clear that properly designed WBT could deliver im-pressive results, especially for the highly motivated andwherever cutbacks threatened to affect the quality offace-to-face programs (due to larger training group sizes,limited modes of content presentation, declining oppor-tunities for remediation or individual tutoring, reducedinteraction generally, etc) Some advantages favoringquality WBT over typical site-based face-to-face deliveryincluded self-pacing and individualization; greater em-phasis on learning, less on instruction (seen in the empha-sis on high-quality materials); learner control and auton-omy in the training process; more flexible and convenientremote access to training opportunities; quicker and morepersonalized feedback; peer-to-peer social interaction;and timely, on-demand access to preparation, remedi-ation, review, and outside resources These advantageswere observed early, and led some observers to claim thatWBT could be superior in quality to even well-designedand properly conducted face-to-face training, especiallywhen training group sizes grew larger (Harapniuk, Mont-gomerie, & Torgerson, 1998; Kaye, 1989; Wagner, 1994)

Trang 13

designed to take full advantage of the Web’s potential

ef-ficiencies and conveniences As bandwidth increased, a

progressively more “media-rich” experience could

poten-tially be delivered to trainees almost anywhere (Ironically,

although asynchronous training provided maximum

con-venience and lower direct delivery costs, the temptation to

use rich multimedia-based synchronous [same-time]

ses-sions, more feasible as bandwidth increased and became

cheaper, created some of the same problems of

inflexi-bility and inconvenience as face-to-face training formerly

did for users who lacked access to high-bandwidth

Inter-net services.)

Weaknesses

Some basic weaknesses were soon evident in Web-based

training, too: unless developers employed instructional

design principles skillfully and conscientiously, the

qual-ity and integrqual-ity of materials were sometimes uneven;

navigation among linked sites could become a nightmare

for the unwary or inexperienced; and users needed to

possess and consistently practice self-discipline to avoid

being side-tracked by online distractions

Quality

Quality continues to be a problem on the Web, because the

public Internet by definition is a loosely coordinated (not

controlled) network of networks No one is accountable

for the quality of what is found anywhere on the Web, or

for maintaining functionality: anyone may post

informa-tion (or misinformainforma-tion), so points of view masquerading

as fact are common (Warren, Brunner, Maier, & Barnett,

1996), and important links may simply fail to connect if

not updated frequently For these reasons, the provenance

of any Internet-based information must always be

ques-tioned, and linking to Internet materials for training is

risky as there is nothing to prevent content from

chang-ing, or links from disappearing altogether Increased

se-curity of access and control over content are arguments

for intranet delivery of training.

Structure and Navigation

Just as no one oversees the quality of materials on the

Web, no one assures that Web pages articulate clearly

Retracing one’s steps can be a challenge, even for

ex-perienced users The Internet is like a library where all

the books have lost their identification codes, and some

their bindings The unwary may quickly become lost in

cyberspace

User Control and Orientation

A strength of the Web—the freedom to explore freely—

can be a major weakness for some The lack of

restric-tions and navigation guides forces users to make their

own choices from a huge number of Web offerings; the

inexperienced, immature, impulsive, easily distracted, or

learning disabled may be challenged, even overwhelmed

At the same time, the opportunity to seek out related but

peripheral information, to pursue an interesting detail,

WBT’S CHALLENGES

Web-based training, as an innovation, presents lenges: different roles and responsibilities for instructorsand trainees; changes in teaching methods; the impor-tance of provision for individual differences; and newfinancial and economic realities

chal-New Roles

Web-based training creates changes in the ways traineesconnect with the trainer, the content, and the learningsystem As described below, because WBT allows shift-ing of place and pace of learning, roles change; the fo-cus is on the trainees’ skill development, and the tutor

or trainer consequently becomes less the “sage on thestage” and more a “guide on the side” (Burge & Roberts,1993) Similarly, if permitted, equipped, and disposed to

do so, trainees may assume more responsibility for theirown learning, including accessing outside materials andcommunicating as needed with the trainer and with othertrainees Overall, successful WBT changes trainees’ expe-riences, providing greater individualization, making fea-sible conveniences such as self-pacing, on-demand review,acceleration, and practice testing, and providing readylinkages to other people and resources

As the early pioneers of technology-based trainingfound, the quality and completeness of the learning mate-rials are critically important, as are the appeal, intuitive-ness, and stability of the delivery system Team develop-ment, combining subject-matter experts (SMEs), graphicsartists, learning specialists, designers, programmers, andmanagers, should make the development process moreefficient and productive This view assumes awareness ofanother lesson taught by the pioneers: that technologyper se does not automatically change the trainees’ experi-ences, but careful instructional design, quality materials,flexible delivery, timely tutor help, and convenient com-munications systems may

Because of these differences, trainers in Web-based vironments may find their duties and priorities changed

en-A study (National Education en-Association, 2000) of U.S.college instructors in a variety of institutions found thefollowing:

rMost reported Web-based teaching was more personally

rewarding than traditional methods: distance methodswere seen as giving trainees better access to informa-tion, better quality materials, more help in masteringthe subject matter, and more allowance for individualneeds

rMost instructors had at least some one-on-one contact

with learners, and those who had reported higher levels

of satisfaction in their teaching

rTeaching at a distance required more instructor time;

unfortunately, most training organizations did not mally recognize this fact

Trang 14

for-WBT’ S C HALLENGES 665

rDespite lack of organizational recognition of the greater

time required, almost three-quarters of the surveyrespondents held positive feelings about distance teac-hing (only 14% reported negative feelings)

The WBT Environment

As noted, if designed to do so, and if the trainer supports

the shifts implied, WBT can change the basic relationship

between the trainee and the tutor, and can alter

funda-mental characteristics of the training environment:

out-side information resources and a wider range of human

contacts can be accessed; there are more choices and

op-tions for trainees (but trainees need greater maturity to

exercise them wisely); and WBT environments can

em-phasize collaboration over competition (Relan & Gillani,

1997) Materials design, instructional methods, and “best”

teaching practices are also affected in WBT

environ-ments

Materials and Instructional Activities

In traditional face-to-face teaching, instructional

mate-rials may be prepared at the last minute, or even

sim-ply dispensed with (trainees being required to take notes

from the comments and often random chalkboard

mus-ings of the instructor) In WBT, materials preparation is

a major stage in program development Complete WBT

materials are self-contained, including organizers and

in-structions, with guidance and feedback provided through

embedded questions and other self-evaluation activities

Support and orientation are available for any technologies

used

In well-designed and -managed WBT, instructional tivities and materials may employ some or all of the fol-

ac-lowing principles:

Typically, a wider range of resources, some from outside

the local environment, is used

Training may incorporate experiential learning and

sim-ulations, accessed via Web links

Collaboration replaces competition

The instructor is more a guide and coach than a dispenser

of information

Problem- or case-based learning is more common,

some-times increasing the training’s realism and ity (Students are permitted, even required, to clarifyand refine questions themselves, without constant re-liance on the trainer.)

authentic-Personal knowledge and experience are valued and

in-cluded in problem-solving activities (Newby, Stepich,Lehman, & Russell, 2000)

“Best Practices” in WBT

Instructors in well-planned WBT adopt specific

ing strategies known to enhance learning One

train-ing model recommends trainers strive for a balance

be-tween interpersonal rapport and intellectual excitement,

requiring the trainer to be interpersonally warm, open,

predictable, and learner-centered, while also being clear

and enthusiastic about the training content (Lowman,

1994)

Another well-respected model of best practices mends these training behaviors (Chickering & Gamson,1989):

recom-Encourage contacts between trainees and instructors.Develop reciprocity and cooperation among trainees.Use active learning techniques

Give proper and timely feedback

Emphasize time-on-task

Communicate high expectations

Respect diverse talents and ways of learning

Bloom’s (1984) classic description of the “alterablevariables” of learning also provides guidance for Web-based trainers Research in mastery learning showedthat the following variables, when emphasized, producedlearning outcomes similar to what could be achieved un-der ideal training conditions (one-to-one tutorial):Provide well-designed tutorial instruction

Give timely reinforcement

Give appropriate and sensitive corrective feedback.Provide cues and explanations, as needed

Encourage learner classroom participation

Assure trainees make effective use of time on task.Help trainees improve reading and study skills, as re-quired

Individual Differences

One of the major differences between Web-based andmore traditional forms of training is WBT’s capacity foraccommodating the individual expectations and prefer-ences of trainees This feature can be particularly valu-able in meeting “special” needs, or those based upon adult

trainees’ personal and situational variables Personal

vari-ables include age, maturity, personal health, time ability (and management skills), motivation, previouslearning, financial circumstances, and life and develop-mental stages Situational variables include factors such

avail-as location (related to the location of any required based training), admission and training program require-ments, availability of counseling and advisement services,and personal issues such as transportation, health, andchild-care (Cross, 1981)

site-WBT’s capacity to accommodate differences effectivelypartially depends upon the trainees’ capacity and will-ingness to exercise independence, autonomy, and self-direction Even if trainees are adults or mature adoles-cents, the presence of the needed skills and maturity forself-directed learning cannot always be assumed Traineesmust be willing to exercise self-direction and indepen-dence in learning

Problems arise in WBT situations when there is a match between the self-direction the learning system per-mits and the expectations of the trainees Mismatches

mis-between teaching or training style and learning style can

result in dissatisfaction with the learning experience, orworse (dropout, failure) Programs are more success-ful if aligned with the developmental stages of individ-ual learners Trainee readiness may range from nearly

Trang 15

align with trainees’ expectations for support, interaction,

or recognition may be one of the principal reasons for

unacceptably high dropout rates in some WBT programs,

a problem which, though hard to describe on a national

basis, has been identified as a serious one for some online

training (Frankola, 2001)

Economic Factors

The economics of WBT, though changing rapidly in the

details, continue to directly impact training providers and

consumers

For Providers

Costs of development of WBT vary dramatically

Text-based WBT, involving conversion of existing material and

using one of the many authoring tools available, may

be economically accomplished by a subject-matter expert

(SME) with basic instructional design skills On the other

hand, development of an hour of computer-assisted

learn-ing (CAL) uslearn-ing high-level authorlearn-ing languages might

re-quire 40 to 150 hours (Szabo, 1998), and one complex 4- to

6-hour multiunit module in weather forecasting,

incorpo-rating multimedia and simulation effects, reportedly

re-quired a year, involved a team of instructional design and

subject matter specialists, and ultimately cost $250,000

(Johnson, 2000) Financial considerations are primary in

most WBT implementations: if an organization cannot

af-ford the attendant costs (especially the often heavy initial

investment in development), it may not be able to make

the transition to WBT, even if the need is clear and the

organization willing

The financial case for WBT depends largely upon the

relation of fixed to variable costs of development and

de-livery Fixed costs are those incurred whether the training

materials serve a handful or thousands of users Fixed

costs include staff salaries, equipment, and other

capi-tal costs directly related to development, including rent

and other overhead costs Variable costs are those that

increase in relation to demand, such as printing,

materi-als reproduction, and shipping; wages of section lecturers

or lab demonstrators hired in response to registrations;

additional clerical assistance; costs for licenses or

copy-right based on usage; and equipment for training delivery,

which might have to be acquired to serve increasing

de-mand In WBT development projects, financial viability

often depends upon fixed costs being kept to a minimum,

and as many costs as possible remaining variable

(depen-dent upon, and thus paid for, by demand)

Providers of WBT must promote their programs and

services without overselling them While WBT offers

the potential for substantial convenience increases and

improvements in efficiency (including reduced training

costs), it is important to acknowledge that WBT results

cannot be guaranteed to be uniformly or automatically

better for all users This is due to interactions among

economic, technical, and organizational factors, and

be-cause of the importance of the design to the quality of

to achieve economic benefits from technology mentations, while others made impressive gains, mainlythrough enhanced performance compared to the compe-tition (Fahy, 1998) Nevertheless, where design convergesadvantageously with needs, opportunities, and a willingcorporate culture, WBT has been proven successful (Vaas,2001; Welsch, 2002)

imple-For Consumers (Trainees)

WBT trainees have come to expect that they will have cess to timely, economical, high-quality, self-paced train-ing, virtually anytime and anywhere (Vaas, 2001) The

ac-keys to meeting these expectations are the cost and

acces-sibility of the WBT technologies used (Bates, 2000), and

relevance of WBT’s interaction capabilities to specific userneeds (Fischer, 1997)

For trainees with “special” learning needs, WBT’s teraction capabilities can provide important advantages.The mobility-handicapped, those with learning disabili-ties (LDs), or attention-deficit disorders (ADDs), includingADDults (Keller, 1999), often find an environment withmore learner controls, such as is typically found in WBT,helpful Two core features of WBT directly applicable tospecial needs trainees include

in-rStructure—Advance organizers; clearly stated

objec-tives, schedules, and timelines; embedded sion checks; integrated media under learner control;multimodal presentations; user-accessible performancerecords and reports; and communication links with thetrainer and other support resources

comprehen-rFlexibility—Any place, any pace access.

For the physically handicapped or mobility impaired,the following features and characteristics of WBT can be

of value:

rDistributed—Available in accessible locations.

rInterruptible—Trainees can take breaks when needed.

rModular—Single or multiple skills can be addressed.

rMultisensory—Sight, sound, and tactile cues can be

in-corporated

rNonlinear—Presentation sequence can be varied.

rPortable—Easily moved or transferred.

rResponsive—Adoption time is relatively short.

rTransferable—Crosses cultural, language, situational,

physical, and geographic barriers (Gerofsky, 1998).Those working with special needs audiences havethe capability to monitor progress regularly (includingadministering testing as needed), communicating withtrainees easily, allowing trainees to communicate witheach other (socialize), and helping coordinate and sup-port training components (including the efforts of helpersand support staff)

Trainees without special needs can benefit from WBT,too; many of the above features can assist most trainees

Trang 16

T HE F UTURE OF WBT 667

to complete their training with more satisfaction or

less stress, by reducing potential conflicts with trainees’

careers and personal lives Experience has shown that

training may precipitate problems among trainees in

gen-eral, which skillful use of WBT’s own communications

capabilities may help solve, such as

rFeelings of inadequacy at the sheer amount of material

to be covered;

rDelays in receiving feedback or answers to questions;

rKeeping up with the variety of discussions and

interac-tion often present in online (computer-mediated munications, CMC) discussions;

com-rAdjusting to the absence of visual clues in group

rela-tions; and

rFatigue and health problems arising from reliance on

unfamiliar technologies (eye-strain or posture problems

at the computer, for example)

THE FUTURE OF WBT

While WBT has proven its potential value for training

delivery, there are barriers that may restrict or slow its

expansion, chiefly bandwidth availability, security and

privacy issues, and user access to required technologies

Bandwidth and Security

Present “POTS” Systems

Today, most home Web users still access the Internet

us-ing POTS (plain old telephone system) dial-up modems

While common, cheap, and reliable, the transfer speeds

available with this technology are a limiting factor in the

evolution of multimedia-based WBT

Typical POTS Internet connections move data ically; actual rates are always lower) at 56 Kbps (kilobits

(theoret-per second); at the higher end of the bandwidth

spec-trum are speeds of 1,000 to 1,500 Kbps (cable, DSL, ISDN,

T-1), and some that exceed 2,500 Kbps (RADSL, T-3) To

compare these speeds with actual requirements of a

com-mon medium, TV graphics (depending upon the screen

resolution of the receiver) require throughput of from

1,800 to over 110,000 kilobits of data per second None of

the current POTS- or cable-based transmission methods

are capable of more than a small percentage of that rate

Considerably less than full TV-quality video could beadequate for many WBT applications However, training

organizations appear to be ignoring this fact: a survey of

the intentions of U.S colleges and universities showed

that, between 1995 and 1998, 2-way video use grew 22%,

while many of those institutions that had not yet

commit-ted to it were planning to do so within 3 years On the other

hand, use of audio-only delivery (in the forms of one-way

audiotapes, or two-way teleconferencing or VOIP [Voice

over Internet Protocol; Internet audio] connections),

po-tentially very powerful and relatively low-cost media,

re-mained virtually unchanged at about 10% of institutions

(U.S Department of Education, 1999) A similar focus on

high-bandwidth applications was found in the private

sec-tor: a 2001 survey showed that “live video” was expected

to grow from 7% to 31% in the next year (“Real-time help,”

2001)

Satellite Systems

Satellites provide a powerful alternative to ground-baseddata transmission in WBT systems: satellite-based signalscan be broadcast over a much wider area than broad-cast tower-based or independent wire/cable transmission.All the usual production costs apply to satellite-based de-livery; in fact, production costs may be higher, since thegreater potential audience may warrant the highest pro-duction values In addition to the costs of developing andlaunching the satellite the potential for equipment failure

is significant, given the inconvenience of service calls

At present, broadcast delivery systems, including lite, are federally regulated in North America, but if dereg-ulation of these services occurs, cable TV and telephonesystems will be able to compete to deliver each other’sservices (as they already do in other parts of the world).The impetus for deregulation is the fact that video andaudio signals, when digitized, are simply data, which can

satel-in prsatel-inciple (if not yet satel-in law) be delivered by anyone withdata transmission capabilities

Wireless Systems

Wireless technologies (other than satellites) are alsochanging rapidly, with direct implications for training.The cost of installing “fixed” wireless capabilities (theshort-range 802.11 protocols) in existing buildings hasfallen below the cost of wiring (or rewiring) Besides costsavings, wireless technologies are quick to install, and arehighly portable, so they can be readily moved as opportu-nities or demands change Portability also permits culti-vation of users by making equipment and services quicklyavailable to those best prepared to make good use of them(McKenzie, 1999) In late 2001, 7% of colleges and uni-versities in the United States had campus-wide wirelessinstallations, and 51% of institutions reported some wire-less capabilities, up from 30% in 2000 (Campus Comput-ing Project, 2001) The cost and availability of other types

of wireless technologies with much wider coverage areas,such as cell phones and IM (instant messaging) devices,are also dropping, though the training capabilities of thesetechnologies have not yet been widely tested

Despite cost reductions, wireless systems in traininghave some major disadvantages: transmission speeds aretypically slower; interference may lead to transmission er-rors, further reducing speed, especially if other electronicsoperate in the same environment; range depends upon thesite layout and configuration of the network; and (as dis-cussed later) wireless systems are much more vulnerable

Trang 17

Income was also associated with Web access: families

with annual incomes over $75,000 were three times

more likely to be online than those with incomes

be-low $24,000

Urban access rates were more than 12% higher than

non-metropolitan rates

The presence of a child in the family increased the

like-lihood of both computer ownership (by almost 22%)

and Internet access (by over 16%)

Age was a major factor: the group most likely to own a

computer and be connected to the Internet was aged

25 to 44 (ownership, 61.0%; Internet, 50.2%), followed

by the cohort aged 45 to 64 (56.9% and 46.7%,

respec-tively); least likely was the 65 and older group (at 24.3%

and 17.7%) In Canada, similar patterns were found

(“Getting connected,” 1999)

Gender has historically been an issue in Web access,

though experience with WBT appears to considerably

re-duce, and may even be reversing, former access patterns

(Wark, e-mail, September 26, 1999) Traditionally, men

have been more engaged generally with all aspects of

com-puter use than women; women have reported finding CMC

less personal and online environments less comfortable

than face-to-face interaction, and have consequently been

more reluctant to enroll in computer courses (Blocher,

1997; Kirkpatrick & Cuban, 1998)

The Internet may be about to change that pattern: since

May 2000, trends have shown that women as a group

ex-ceeded the number of men online, so that by June 2001

women comprised 40.9 of Internet users and men 39.8%

Interestingly, in relation to the question of the

feasibil-ity of the Internet for the training of older workers and

women, the largest increase in usage was among

indi-viduals over age 35, including women in that age group

Even women who were mothers increased their Internet

use: mothers who were online averaged 16 hours 52

min-utes per week, more even than online teens (who averaged

just over 12 hours weekly) Another fact with training

im-plications: mothers who might be expected to have the

least free time (single mothers and those with 3 or more

children) were online the most, averaging about 20 hours

per week, 20% more than the overall average (Saunders,

2002) While women as a group were increasing usage

sig-nificantly, men continued to lead women in frequency and

intensity of Internet use: when online, men averaged 16%

more time online than women, viewed 31% more pages,

and logged-on 11% more often (Pastore, 2001)

Assuring Security and Privacy

WBT systems may be victimized from the outside by

viruses, unauthorized intrusions, sabotage, or fraud It is

sobering that 75% of security breaches in the private

sec-tor (incidents of sabotage, hacking, or data theft) are

com-mitted by the institution’s own personnel (unauthorized

present employees or former staff) Wireless operations

ubiquitous and are expected to grow in number By oneestimate, in 2001 viruses were found in 1 of every 300e-mail messages; at the current rate of proliferation, by

2008 the ratio will be 1 in 10, and by 2013 it will be 1 in

2 (“Outbreak,” 2001) “Virus” is the generic name for allmalicious programs, including worms and Trojan horses;

the term malware has been suggested for all these

mali-cious forms of code (Seltzer, 2002) Worms and Trojansare special forms of malware, in that they programmed tospread by themselves without human intervention (usu-ally by e-mail), while simple viruses require individuals todeliberately share files for the viruses to be able to movefrom machine to machine The magnitude of the threatfrom malware has led most organizations to install pro-tection in the form of virus detectors and firewalls As well

as preventing unauthorized intrusions from the outside,the latter restrict the access of those behind the firewall

to outside people and materials (for example, VOIP may

be impossible, or severely limited) While protecting thesecurity of those behind them, firewalls can constitute amajor barrier to WBT generally

Confirming the identity of trainees is also a potentialproblem in WBT, especially if trainees do not routinelymeet face-to-face with instructors Just as failure of sys-tem security might expose a training organization to em-barrassment, expensive down-time, or even litigation, fail-ure of an organization’s screening and monitoring systemsleading to a fraudulent registration, award of credit, orgranting of a credential might be disastrous for its rep-utation Fortunately, technologies exist and are becom-ing more economical to help with trainee identificationand authentication: biometric devices such as voiceprintand fingerprint identifiers, and remote cameras, have re-cently become available for economically checking iden-tities of trainees and supervising remote testing events(Miller, 2001)

Implementing WBT

In order to produce high-quality WBT results, rating flexibility, efficiency, and individualization, train-ing organizations must assure that certain elements arepresent Among these are a conducive social learning envi-ronment and institutional collaboration to assure efficientprovision of courses and transfer of credit, including priorlearning assessment

incorpo-Cohort Learning and Socialization

All group learning is social WBT technologies provide theoption for interaction and collaboration, which should inturn increase “social presence” (Garrison, 2000) and re-duce “transactional distance” among participants (Moore,1991)

Cohort-based WBT provides a supportive social work, especially for adult trainees who may lack confi-dence or who may face hurdles in returning to formallearning Cohort-based programming uses more active,

Trang 18

net-T HE F UTURE OF WBT 669

cooperative, and collaborative learning strategies than

more traditional methods The cohort structure consists

of a group of trainees who enter and complete the program

together in a predetermined and prescheduled series of

common training experiences Trainees may meet

face-to-face occasionally, even in primarily distance programs, to

initiate social interaction that technology-based

interac-tion can then sustain The resulting training, though

lock-step, appears to be successful in creating trust,

empower-ment, and support, while reducing adjustment problems

and drop-out, especially among older trainees (Saltiel &

Russo, 2001, p vii)

The communications capabilities of WBT technologiescan also reduce isolation, and increase motivation and

social interaction Computer-mediated communications

includes one-on-one interaction (e-mail), one-to-many

connections (conferencing, list-servs), data sharing (file

attachments), and information access (via the Web’s

links) Computer conferencing is a potentially powerful

means of creating community in WBT programs CMC

may increase comprehension of training objectives by

promoting peer-to-peer interaction, but basic

ground-rules enforced by a conscientious moderator are required

to assure that the resulting CMC interaction is effective,

and to help avoid asocial outcomes such as “social

loafing.” (Other forms of asocial interaction, such as

rudeness or “flaming,” are rare in moderated training

interactions, but may occur in public nonmoderated

environments such as list-servs.)

Institutional Collaboration

WBT assists trainers to address the globally recognized

need for more efficient and flexible training delivery,

in-cluding transnational standards, increased quality

assur-ance (based on competency-based curricula), multiskill

training, and the appropriate adoption of electronic

tech-nologies to increase trainee success Driving this is the

fact that employers have historically not been very

satis-fied with what they perceive as the public school system’s

inflexibility, and apparent inability to prepare its young

graduates better for employment

Employers expect graduates to be capable of work, creativity, problem solving, and adaptability To

team-counter the lack of flexibility in institutional training,

some employers advocate training-on-the-job (TOJ)

pro-grams TOJ is seen as providing a better training

experi-ence overall, especially if linked with WBT opportunities

The combination has been regarded as better addressing

employees’ convenience and privacy, while allowing

em-ployers to monitor relevance, and permitting the

involve-ment of experienced employees in the training of novices

(Conference Board of Canada, 2001)

Prior learning assessment (PLA), like transfer credit,benefits trainees who have accumulated credits over time,

perhaps from a variety of sources, without ever

complet-ing a credential PLA recognizes that learncomplet-ing may

ap-pear to be haphazard, while yet equipping the trainee

with skills and knowledge worthy of formal recognition

(especially if accompanied by relevant work experience)

WBT may help a trainee integrate and complete a

pro-gram based on PLA credits, a process sometimes called

Figure 1: Diagram attributed to Coldeway by

Simon-son, Smaldino, Albright, & Zvacek (2000, p 7) A similartypology is also found in Johansen, Martin, Mittman, Saffo,Sibbet, & Benson (1991, p 17.)

Media and the Future

Some technologies require broadband (simulations, motion video, high-quality audio); on the other hand,some technologies are useful only for relatively limitedtraining purposes (text on paper is ideal for informationtransmittal, but lectures and collaborative group sessionsare poor vehicles for this purpose) Research has demon-strated that the impact of technologies on training out-comes depends upon specific media characteristics, andthat technologies differ in respect to their cost, accessibil-ity, teaching implications and impacts, interactivity, user-friendliness and control, organizational impact, novelty tousers, and speed of adoption and adaptation (Bates, 2000).Knowing this, WBT programmers can make betterdecisions about the “right” technology for a particularapplication on the basis of the amount of separation (the

full-“distances”) between trainees and elements of their WBTprograms Figure 1 illustrates how time and place of train-ing can vary in WBT

Differences in the time and place of training can impacttrainees, and affect the flexibility of the training, in severalways:

Quadrant 1 (“same time, same place”) Training in this

quadrant is synchronous (same time) and site-bound

(a classroom or lab is set aside for it) Participants

in the same place at the same time may still ence “distances”—psychological, interpersonal, socio-cultural, linguistic, philosophical, etc.—which maycreate barriers to communication and learning, requir-ing timely trainer intervention

experi-Quadrant 2 (“same place, different time”) Training is based, but permits asynchronous access in the form ofcorrespondence modules or packages at a training orlearning center Regular attendance at the designatedtraining site is often required so progress can be mon-itored

Trang 19

site-“any pace, any place” training Requires the

train-ing institution to provide materials, support,

interac-tion opportunities, and administrative arrangements

at the trainees’ convenience Trainees require

appro-priate remote-access technologies

The Evolution of Present Media

Training media are changing as bandwidth improves, and

as they do, new forms of familiar technologies are

present-ing WBT designers with options and capabilities

previ-ously unavailable or not cost-effective Examples include

the previously mentioned VOIP, and reusable learning

ob-jects, with (for those capable of accessing it) multimedia

VOIP technology permits use of computers for voice

communications, either as person-to-person private

con-versations or in multipoint group sessions Users

com-monly require no more than normal dial-up access to

the Web, plus a sound card, microphone, and

speak-ers For video, VOIP typically provides a 2× 3display,

with a refresh rate dependent upon bandwidth (IP video

is presently not of full-motion quality; its jerkiness and

grainy nature lead some users to switch it off completely,

relying upon audio alone.) The quality of IP audio is

usu-ally adequate to good VOIP services are very cheap or

even free, and the quality and reliability are improving

rapidly

Standards and Reusable Learning Objects (RLOs)

Training materials are increasingly designed to be reused

(“repurposed”), as standards are developed by

organi-zations such as the Aviation Industry CBT Committee

(AICC), the Instructional Management Systems (IMS)

Global Learning Consortium, the Institute of Electrical

and Electronics Engineers (IEEE), and the Advanced

Dis-tributed Learning (ADL) Initiative of the Department of

Defense (developer of the Shareable Courseware Object

Reference Model [SCORM]) (Hodgins & Conner, 2000)

WBT instructional materials developed under RLO

stan-dards are portable, for maximum present and future

(re)use Metadata tagging of RLOs attempts to assure

sev-eral outcomes relevant to potential WBT uses:

rFlexibility—Material is designed to be used in multiple

contexts and to be easily reused in other applications

rEase of update, search, and content management—

Metadata tags allow quick updating, searching, and

management of content through sophisticated filtering

and selecting capabilities

rCustomization—Modular learning objects enable more

rapid program development or revision

rInteroperability—RLOs are designed to operate on a

wide range of training hardware and operating systems

rCompetency-based training—Competency-based

ap-proaches to training are promoted by RLOs; materials

are tagged to competencies, rather than subjects,

disci-plines, or grade levels

(Longmire, 2000) Multimedia RLOs must be used ingly, if at all, in training intended for home use, however:while in late 2001 92% of U.S businesses with 1,000 em-ployees or more reportedly had broadband connections(T1, T3, DSL, cable, ATM, frame-relay or faster), fewerthan 20% of home users had these capacities (Metz, 2001)

spar-The “New” Internets

Worldwide growth in commercial use of the public Webhas resulted in ongoing efforts to replace it with a versionreserved for academic and military use In North America,new Internet developments include the United States’Internet2, the Information Technology Research andDevelopment (ITR&D) Program, and Canada’s CA∗netsystem

Internet2 is a collaborative effort of more than 120 U.S.universities, partnering with industry and government(through the National Science Foundation) to create anenvironment that “is not clogged with music, commercialentities and porn” (Rupley, 2002) As with Canada’s CA∗net

II, CA∗net 3, and CA∗net 4 (launched in mid-2002), search and education are the focus (Networking, 2002b)

re-In mid-2001, the first implementations of re-Internet2 inU.S K–12 schools had commenced (Branigan, 2001), withpublic access available in early 2002

The Information Technology R&D Program ues and broadens the agenda of the NGI (Next Genera-tion Internet; NGI, 2001) project, a multiagency, feder-ally sponsored research and development program that,

contin-by the time it concluded in 2001, had helped achieve jor advances in networking speeds The ITR&D programincludes the collaborations of 12 very high profile agen-cies (for example, the National Science Foundation [NSF],NASA, the Defense Advanced Research Projects Agency[DARPA], the National Institutes of Health [NIH], and theEnvironmental Protection Agency [EPA], among others).The ITR&D program conducts research and development

ma-in various “program component areas” (PCAs), ma-ing cutting-edge projects in high-end computing, scalableinformation infrastructure, large-scale networking R&D,and high-confidence software and systems The commit-ment is significant: the budget requested for 2002 was al-most $2 billion (Furlani, 2002)

includ-The California Institute of Telecommunications andInformation Technology (http://www.calit2.net) consor-

tium plans to build a high-speed wireless network that is

cheap, always on, and accessible through a variety of nologies “Tether-free” online technologies are currentlyrepresented by palm-size computing and cell phone-typecommunications devices The evolutionary potential fortraining applications of these highly portable technolo-gies is seen as tremendous, assuming concurrent advances

tech-in AI (artificial tech-intelligence) systems and voice commandcapabilities Public funding for this project reached $300million in mid-2001 (Chapman, 2001)

CA∗net II, Canada’s first “next generation” Internet tiative, demonstrated that a dedicated, noncommercial

Trang 20

ini-G LOSSARY 671

research Internet was feasible and needed by Canadian

academics Although initially established as a public

en-terprise CA∗net II was privatized in 1993, then coming

under the direction and control of CANARIE (the

Cana-dian Network for the Advancement of Research, Industry

and Education), a consortium of private Canadian

orga-nizations and academic institutions

The purpose of the CA∗net program was to upgradeCanada’s research and development infrastructure, espe-

cially networking and communications capabilities, and

to permit joint ventures and collaborations to promote

the involvement of Canadian business and industry in

the knowledge-based economy Like the United States’

NGI and Internet2 systems, CA∗net uses “special access

points” in each Canadian province to provide access to

the system’s high-capacity, high-speed communications

link called the vBNS (very high-speed Broadband

Net-work Service), which in turn connects to the netNet-work’s

backbone

Canada’s CA∗net II system, the world’s first nation-widenetwork of its sort, was succeeded by CA∗net 3 (“Hooked to

all high-capacity networking systems, CA∗net uses

differ-ent wavelengths (colors) of light and fiber optics to

per-mit dozens of different transmission “channels” (CA∗net

II had only one) CA∗net 3 was some 20 times faster than

CA∗net II, and 50,000 times faster than present

commer-cial Internet services; CA∗net 4 is expected to continue this

evolution in high-speed networking, improving the

poten-tial for quality WBT (Networking, 2002a, 2002b)

CONCLUSION

Predicting the future for WBT is, on one hand, simple: it

will expand, grow, and become central to more forms of

future training worldwide That prediction is safe, both

because so much has already been invested in the

Inter-net delivery infrastructure and because the Web has

al-ready proven to be so effective in reducing direct training

costs, increasing access, and addressing serious skills

defi-ciencies in an increasingly competitive and technological

world

On the other hand, no one can predict, even a shorttime into the future, specific details of the training ad-

vances WBT will help make possible in the future Greater

usage does not imply standard use; more investment may

not result in quality increases; reliance on WBT does not

guarantee enthusiasm or success by specific groups of

trainees Experience with other forms of training

deliv-ery have demonstrated that instructional design, perhaps

even more than the medium, makes training effective, and

trainee support and overall relevance of the content make

it satisfying to users

While WBT cannot guarantee that future training willnot be pedestrian or inefficient, its potential strengths may

suggest how training of all kinds might be improved The

core elements of the Web as a training device—ubiquity,

accessibility, stability, supportiveness, redundancy, and

friendliness—are common to other successful teaching

environments For WBT to expand, developers, trainers,

trainees, and employers must see these aspects of the

Web as potential assets for their training programs If

the inherent features of the Web are seen as important

to training, continued growth and expansion of WBT arecertain to occur

GLOSSARYAsynchronous “Different time” (and often differentplace, i.e., the trainees’ workplace or home) trainingand communications interactions, made possible bytechnologies that collect messages and make themavailable at the convenience of the reader Examplesinclude e-mail, CMC, and list-servs

Attention deficit disorder (ADD) A form of learningdisability that, in children, results in short attentionspan and lack of focus, sometimes accompanied byhyperactivity; ADDults, adults with ADD

Bandwidth The capacity of a channel (for example, atelephone line or a coaxial cable) to carry data Highbandwidth permits multimedia (audio, video, anima-tion), while low bandwidth limits users to text or sim-ple graphics, and may preclude VOIP and other newinteraction tools

Computer-mediated communications (CMC) based, asynchronous communications, usually re-stricted by password to a designated group such as aclass or training cohort, and moderated to assure thatthe discussion stays on topic and is civil

Text-Internet The public network of linked computers sible by anyone with a Web browser

acces-Intranets Private computer networks that may or maynot also provide Web access, providing security andcontrol not available on the public Internet by limitingaccess and controlling the content available to users

Malware Any form of malicious code intended to infect

a computer or a network, including viruses, worms,and Trojan horse programs (Seltzer, 2002)

Metadata The identifying material added to RLOs topermit easy reuse or “repurposing.”

Online Training that includes potential for synchronous

or asynchronous electronic (often Internet-based) teraction between the trainee and the trainer, the train-ing materials, and other trainees

in-Prior learning assessment (PLA) A process intended

to result in the granting of credit toward a credential for

a trainee’s accumulated formal and nonformal ing experiences; recognizes and rewards the learning

learn-of individuals who have not been able to complete acredential at one institution in the normal way, due tocareer or personal reasons

(Reusable) learning objects (RLOs) Materials larized, packaged, and labeled to encourage catalogu-ing, access, and reuse in multiple contexts

modu-Synchronous “Same time” and (often) same place ing or communication interactions, e.g., face-to-facetraining

train-Training Instruction in psychomotor skills and edge primarily for practical purposes and relativelyimmediate application

knowl-Voice over Internet protocol (VOIP) The capability

of Internet-based programs to provide voice to-point or point-to-multipoint connections to any-one with a browser, a sound card, microphone, and

Trang 21

point-pus technical training, and elements of training or

professional development (PD) conducted primarily

face-to-face, but including some online components,

with the Internet or an intranet as the access/delivery

vehicle

CROSS REFERENCES

See Distance Learning (Virtual Learning); Internet Literacy;

Voice over Internet Protocol (IP).

REFERENCES

Bates, A W (2000) Managing Technological Change San

Francisco: Jossey-Bass

Blocher, M (1997) Self-regulation of strategies and

mo-tivation to enhance interaction and social presence

in computer-mediated communication Unpublished

Ph.D dissertation, Arizona State University

Bloom, B S (1984, June–July) The 2 sigma problem: The

search for methods of group instruction as effective as

one-to-one tutoring Educational Researcher, 4–16.

Branigan, C (2001, April 16) Five states are first to

of-fer Internet2 to schools eSchool News Online

Re-trieved June 2001 from http://www.eschoolnews.com/

showstory.cfm?ArticleID=2535

Briggs, L., & Wager, W (1981) Handbook of procedures

for the design of instruction (2nd ed.) Englewood Cliffs,

NJ: Educational Technology

Burge, E J., & Roberts, J M (1993) Classrooms with a

difference: A practical guide to the use of conferencing

technologies Toronto: University of Toronto (OISE),

Distance Learning Office

Campus Computing Project (2001) The 2001 National

Survey of Information Technology in US Higher

Education Retrieved May 2002 from http://www.

campuscomputing.net/summaries/2001

Chapman, G (2001) Consortium sets sights on a “new

Internet.” Digital Nation [online article and column,

Los Angeles Times, April 5] Available by listserv from

chapman@lists.cc.utexas.edu

Chickering, A., & Gamson, Z (1989, March) Seven

prin-ciples for good practice in undergraduate education

AAHE Bulletin, 3–7.

Conference Board of Canada (2001) Performance and

Potential 2001–02 Retrieved May 2002 from http://

Dick, W., & Carey, L (1978) The systematic design of

in-struction Dallas: Scott, Foresman & Co.

Fahy, P J (1998) Reflections on the productivity paradox

and distance education technology Journal of Distance

Education, 13(2), 66–73.

stitute and State University Retrieved May 2002 fromhttp://ei.cs.vt.edu/∼mm/

Frankola, K (2001) Why online learners drop out

Work-force Retrieved July 2002 from http://www.workWork-force.

com/archive/feature/22/26/22/index.phpFurlani, C M (2002) National IT R&D Program Retri-eved May 2002 from http://www.itrd.gov/about/presentations nco/2002/furlani nhpcc 20020403/index.php

Gagne, R., & Briggs, L (1979) Principles of

instruc-tional design (2nd ed.) New York: Holt, Reinhart and

Winston

Garrison, R (2000) Theoretical challenges for distanceeducation in the twenty-first century: a shift from

structural to transactional issues International Review

of Research and Open and Distance Learning (1)1.

Retrieved September 2000 from http://www.icaap.org/iuicode?149.1.1.2

Gerofsky, G (1998, May) An Athabasca challenge: ing for disabled learners at a distance Paper presented

Provid-at the 14th Annual CADE Conference, Banff, Canada

Getting connected, staying unplugged (1999)

In-novation Analysis Bulletin, 1, 4 Statistics Canada–

Catalogue No 88-003-XIE Retrieved March 2000 fromhttp://www.statcan.ca:80/english/freepub/88-003-XIE/free.htm

Glaser, R (Ed.) (1978) Advances in instructional

psychol-ogy Hillsdale, NJ: Lawrence Erlbaum.

Grow, G (1991) Teaching learners to be self-directed

Adult Education Quarterly, 41, 125–149.

Harapniuk, D., Montgomerie, T C., & Torgerson, C.(1998) Costs of developing and delivering a Web-based

instruction course In Proceedings of WebNet 98—World

Conference of the WWW, Internet, and Intranet

Char-lottesville, VA: Association for the Advancement ofComputing in Education Retrieved July 2002 fromhttp://www.quasar.ualberta.ca/IT/research/nethowto/costs/costs.html

Hauben, M (1994) History of ARPANET Retrieved April

2002 from http://www.dei.isep.ipp.pt/docs/arpa.htmlHodgins, W., & Conner, M (2000, Fall) Everythingyou always wanted to know about learning stan-

dards but were afraid to ask LiNE Zine Retrieved

June 2001 from http://www.linezine.com/2.1/features/wheyewtkls.htm

Hooked to CA∗net 3 (2000, March) University Affairs, 27.

Johansen, R., Martin, A., Mittman, R., Saffo, P., Sibbet,

D., & Benson, S (1991) Leading business teams Don

Mills, Ontario, Canada: Addison-Wesley

Johnson, V (2000, June) Using technology to train

weather forecasters T.H.E Journal Online

Re-trieved March 2002 from http://www.thejournal.com/magazine/vault/articleprintversion.cfm?aid=2880Jones, M., & Farquhar, J (1997) User interface design for

web-based instruction In B Khan (Ed.), Web-based

in-struction (pp 239–244) Englewood Cliffs, NJ:

Educa-tional Technology

Trang 22

R EFERENCES 673

Kaye, A (1989) Computer mediated communication

and distance education In R Mason & A Kaye

(Eds.), Mindweave (pp 3–21) Toronto: Pergamon

Press

Keller, F S (1968) Goodbye, teacher! Journal of Applied

Behavioral Analysis, 1(1), 79–89.

Keller, V (1999) Adaptation and application of a

tran-script analysis tool to analyze a computer-mediated communication (CMC) distance education course tran- script Unpublished master’s thesis, Athabasca Univer-

sity, Athabasca, Alberta, Canada

Kirkpatrick, H., & Cuban, L (1998, July–August) Should

we be worried? What the research says about der differences in access, use, attitudes, and achieve-

gen-ment with computers Educational Technology, 56–

61

Leiner, B., Cerf, V., Clark, D., Kahn, R., Kleinrock, L.,

Lynch, D C., Postel, J., Roberts, L G., & Wolf, S (2002)

A brief history of the Internet Retrieved May 2002 from

http://www.isoc.org/internet/history/index.shtmlLongmire, W (2000, March) A primer on learning ob-

jects Learning Circuits Retrieved June 2001 from

http://www.learningcircuits.com/mar2000/primer.htmlLowman, J (1994) What constitutes masterful teaching

In K Feldman and M Paulsen, Teaching and learning in

MA: Simon & Schuster

Mager, R (1975) Preparing instructional objectives (2nd

ed.) Belmont, CA: Fearon

McKenzie, J (1999) Strategic deployment of hardware

to maximize readiness, staff use and student

achieve-ment From Now On, 8(8) Retrieved August 2000 from

Moore, M G (1991) Editorial: Distance education theory

American Journal of Distance Education, 5, 1–6.

National Education Association (2000) A survey of

tradi-tional and distance learning higher education bers Washington, DC Retrieved August 2000 fromhttp://www.nea.org/he/abouthe/distance.html

mem-Networking (2002a) $100 million in federal budget

for CA∗net 4 Networking, 6 (1) Retrieved May 2002

from http://www.thenode.org/networking/january2002/

briefs.html#1Networking (2002b) CA∗net 4 coming down the pipe Net-

working, 6(5) Retrieved July 2002 from http://www.

thenode.org/networking/may2002/briefs.html#1Newby, T., Stepich, D., Lehman, J., & Russell, J (2000)

Instructional technology for teaching and learning (2nd

ed.) Upper Saddle River, NJ: Merrill

NGI (2001) Next Generation Internet (NGI)

Initia-tive Retrieved March 2003 from http://www.ngi.gov/

sc99/fast facts.html

Outbreak (2001) PC Magazine, 20(21), 30.

Pastore, M (2001) Women maintain lead in Internet

use Retrieved July 2002 from http://cyberatlas

internet.com/big picture/demographics/article/0,,5901786791,00.html

Piaget, J (1952) The origins of intelligence in children

(trans.) New York: International Universities Press

Real-time help (2001) PC Magazine, 20(6), 73.

Relan, A., & Gillani, B (1997) Web-based instruction andthe traditional classroom: similarities and differences

In B Khan (Ed.), Web-based instruction (pp 41–46).

Englewood Cliffs, NJ: Educational Technology

Rupley, S (2002) I2, near you PC Magazine, 21(4), 21.

Rutherford, S., Patrick, J., Prindle, L, & Donaldson, S.(1997) Computer-managed learning (CML), an intro-duction Edmonton, Canada: Grant MacEwan Com-munity College and Northern Alberta Institute ofTechnology

Saettler, P (1990) The evolution of American educational

technology Englewood, CO: Libraries Unlimited.

Saltiel, I M., & Russo, C S (2001) Cohort programming

and learning Malabar, FL: Krieger.

Saunders, C (2002) Moms, Hispanics increasingweb use Retrieved July 2002 from http://cyberatlas.internet.com/big picture/demographics/article/0,,59011041581,00.html

Seltzer, L (2002) Personal antivirus PC Magazine,

21(11), 96–103.

Simonson, M., Smaldino, S., Albright, M., & Zvacek, S

(2000) Teaching and learning at a distance Upper

Sad-dle River, NJ: Merrill

Skinner, B F (1971) Beyond freedom and dignity New

York: Bantam Books

Suppes, P (1978) The role of global psychological

mod-els in instructional technology In R Glaser (Ed.),

Ad-vances in instructional technology (Vol 1, pp 229–259).

Hillsdale, NJ: Lawrence Erlbaum

Szabo, M (1998) Survey of educational technology

research The Educational Technology Professional

Development Project (ETPDP) Series Edmonton,Alberta, Canada: Grant MacEwan Community Collegeand Northern Alberta Institute of Technology

Thorndike, R L (Ed.) (1971) Educational measurement.

Washington, DC: American Council on Education

U.S Census Bureau (2001) Home computers and

Inter-net use in the United States: August 2000 Retrieved

July 2002 from http://www.census.gov/prod/2001pubs/p23–207.pdf

U.S Department of Education, Office of Educational

Re-search and Improvement (1999) Distance education

at postsecondary education institutions Retrieved April

2002 from http://nces.ed.gov/pubs2000/2000013.pdf

Vaas, L (2001) The e-training of America PC Magazine,

20 (22), ibiz1–ibiz4.

Wagner, E (1994) In support of a functional definition of

interaction American Journal of Distance Education, 8,

6–29

Warren, A., Brunner, D., Maier, P., & Barnett, L (1996)

Technology in teaching and learning London: Kogan

Page

Welsch, E (2002) Cautious steps ahead Online Learning,

6, 20–24.

Trang 23

Introduction 674

Reasons for Using Webcasting and

Significance of Webcasting to the Internet

Technical Standards and Protocols

State of the Radio Webcasting Industry 682

State of the Television Webcasting Industry 682

Major Players in the Webcasting Industry 683

Problems and Issues in Webcasting 683Cost of Digital Content and Copyright Issues 683Competition for Audience with Offline

Webcasting is the delivery of media contents and any

digi-tal information in various formats such as texts, graphics,

and audio and video files on the World Wide Web to

In-ternet users This definition states the two characteristics

of webcasting:

(1) The recipients of webcasts must have Internet access

to receive the content

(2) The content of webcasts can range from simple text to

rich media files with multimedia capabilities

Webcasting includes unicast (which serves a multimedia

file in real time to a single user) and multicast (which

al-lows many users to receive the Internet data streams at the

same time with special software and hardware installed

at different connections on the Internet)

There are many other terms commonly used to refer

to webcasting as well For example, cybercasting is

synonymous with webcasting Another common term is

Internet radio or Web radio However, Web radio refers

to one type of webcasting that uses a radio station format

and provides primarily audio files Some of the Web radio

stations only broadcast on the Internet, while others

broadcast content from their offline radio station

counter-parts Apart from audio content, Internet radio stations

display texts and visuals such as photos of the show hosts

and the playlist of the show Several sites such as Yahoo!’s

Launch (http://launch.yahoo.com/), flip2it.com (http://

www.flip2it.com/schedule.asp?webcaster), Angelfire

Ra-dio (http://www.angelfireradio.com/search.html), and

Classical Live Online Radio (http://www.classicalwebcast

com/start.htm) provide listings of Internet-only webcasts

Reasons for Using Webcasting and Significance of Webcasting to the Internet and E-commerce World

Webcasting offers many benefits to individuals and nizations that need to disseminate information and con-tent The interactivity of computers allows the personal-ization and customization of information to consumerswith great ease Webcasting can deliver contents to themass audience via the Internet and also to targeted audi-ence via an intranet, an extranet, or on a subscription ba-sis on the Internet In addition, the Internet can transmitcontents instantly to anywhere with Internet access, and

orga-if only nonmultimedia content is being webcast, the cost

of webcasting is generally lower than the cost of a sion or radio broadcast Video webcasting, however, can

televi-be an expensive proposition televi-because of the large serverspace and bandwidth required The program length, au-dience number, and transmission speed determine howmuch server space and bandwidth are needed The cost ofdelivering one 30-minute video webcast to 100,000 peoplecan run from US$12,500 for a live webcast and US$9,500monthly for an on-demand webcast This price does notinclude the costs of overhead, production, promotion, andmarketing involved to make a webcast successful.Mass media, businesses, and individuals who want tohave voices on certain issues and provide electronic mediacontent to a geographically diverse audience use webcast-ing as an alternative content delivery medium To estab-lished media such as broadcast and cable TV networks,webcasting means opening the battlefront to another newmedium against competitors and increasing the value oftheir media content Webcasting also means less reliance

on intermediaries such as cable system operators or localbroadcast TV stations (Ha and Chan-Olmsted, 2001) To

674

Trang 24

E XAMPLES OF W EBCASTING 675

radio stations and broadcast TV stations, which are

ba-sically local operations, webcasting means the

disappear-ance of geographic coverage barriers To newspapers and

other print media, their provision of webcasting

trans-forms their status to a multimedia content provider

To companies, webcasting opens new doors to howtraining is conducted and information is shared Instead

of restricting the training to a particular time at a

partic-ular location, employees can retrieve training materials

such as demonstration videos and conference sessions at

their own office or home at a convenient time Current

and prospective customers can retrieve product

demon-stration videos, virtual company tours, and other

interac-tive multimedia content about a company and its products

or services at their fingertips As more and more

compa-nies use an intranet (internal Web sites) to transmit their

webcasts, the reliability of the service greatly improves

The Yankee Group, a research firm, projected that

com-panies will spend up to $5.9 billion on online videos by

2005 (Vonder Haar, 2002) The primary function of online

videos is for advertising and marketing purposes (53%)

Corporate communications, employee training, and sales

training are other business functions of online videos

Financial services companies also use webcasting tocommunicate with investment advisors For example,

Safeco, a Seattle-based mutual fund, produces 40

web-casts a year for 5,000 investment advisors who

rec-ommend Safeco funds and portfolios to clients These

webcasts feature interviews with portfolio fund managers

every quarter to explain the different Safeco funds’

in-vestment strategies (Vonder Haar, 2002) Webcasts can

become an important customer relation management tool

that will substitute for meetings and conferences that are

complex to arrange and cost much more

Webcasting is also a means for international nonprofitorganizations to disseminate information to developing

countries For example, the World Bank Institute recently

launched B-SPAN, an Internet-based broadcasting

initia-tive B-SPAN will provide regular broadcasts of World

Bank events through webcasts over the Internet The

web-casts feature some of the world’s leading experts and

prac-titioners in the financial, poverty, health, education, legal,

environmental, and energy fields on the latest

develop-ments in their sectors

To individuals who would like to create media contentsand establish their own voices in the society, webcasting is

an ideal medium Not only is there no license requirement

for the content provider, the cost of distribution to a

geo-graphically diverse audience is much lower than any

tra-ditional mass media, making the dissemination of media

content for special interest and small audiences

afford-able In addition, there is no censorship of media content

on the Web (with the exception of some countries such as

China) and the reach of the Internet can be global

Dis-sidents and minorities will find the Web the best place to

broadcast views suppressed by the mainstream media

Webcasters have four strategic business revenuesources:

(1) The subscription and pay per service model, which

provides access to previously aired content or live tent;

con-(2) The broadcast advertising sponsorship broadcastmodel, which offers companion content to supple-ment current on-air programming and displays adver-tising during the webcast;

(3) The e-commerce model, which sells products andcomplementary items on the Web; and

(4) The syndication model, which creates and distributesoriginal digital media content to other webcasters

Webcasters must choose one or a combination of revenuesources above to sustain or make profits from their web-casts

EXAMPLES OF WEBCASTING

American Broadcasting Company (ABC), one of the bigthree U.S broadcast TV networks, is webcasting part of itsnews content on its ABCNEWS.com site ABCNEWS.comdistributes both daily TV news content and past ABC Newscoverage on the Web via Virage’s Internet Video Applica-tion Platform and Syndication Manager It indexes and

publishes searchable video clips from Nightline and World

News Tonight and on ABCNEWS.com Its news clips are

also distributed to affiliates, news agencies, schools, and

any other applicable Web sites (Digital TV, 2001) Its

busi-ness model is primary a subscription model Access to thebasic Web page is free However, additional news videoand interview clips are served as premium content, whichrequires a monthly subscription fee of $4.95 It also part-ners with Real Network’s RealOne SuperPass package asone of the program services offered to the package sub-scribers

Real Network’s RealOne SuperPass (Figure 1) is an ample of a successful webcasting business model usingsubscription as the source of income (Schlender, 2002).According to Lisa Amore, the spokesperson for Real Net-works, it has attracted 750,000 subscribers at the time

ex-of writing (personal communication, August 9, 2002) Itsservice is similar to a cable TV system’s carriage andcharges customers by subscription The basic level sub-scribers pay a monthly subscription fee of $9.95 to re-ceive 15 channels of news, sports, popular culture, andweather; 51 commercial-free radio stations; and an ad-ditional $10 to get legal digital music download service.The RealOne service provides a multimedia user interfacefor the Web In one window, it delivers exclusive stream-ing audio and video content from its content providerssuch as Cable News Network (CNN) and Fox Sports; inadjacent windows, RealOne displays information of com-panion Web sites and other explanatory materials Thecontent providers share the revenue of the subscriptionwith Real Network

A webcasting service based on the broadcast tising sponsorship model is OurMaine.com (Figure 2).This webcasting is a collaborative effort between WPXT-

adver-TV of Portland and WPME-adver-TV Visitors to the site canopen streaming video clips with the news of the day.Some streaming content is picked up from other Fox Net-work affiliates to supplement locally produced materials.The station sends its video via FTP to its Web host Pageviews at the site exceed 500,000 per month and the station

Trang 25

Figure 1: Real One SuperPass.

Figure 2: OurMaine.com.

Trang 26

e-on demand free to users with an e-online store of over

3000 gift items (Figure 3) The shows available to visitors

range from comedy, horror/science-fiction, popular

inter-est, technology, to health Each show has one or more

episodes and visitors can choose to view any version

de-pending on their own connection speed

WebFN is a financial news network that is a jointventure between Chicago-based Weigel Broadcasting and

New York-based Bridge Information systems Its

webcast-ing works on syndication as the primary source of revenue

(although it currently uses the broadcast model while it

builds its syndication business) At the time of writing,

it streams 12 hours of live video and data each business

day over the Web and also on two Midwest TV stations

Programs are produced for use simultaneously on the

Web and on television The WebFN.com Web site also

of-fers around-the-clock video on-demand service (Figure 4)

Its trademarked “Viewcaster” presents a streaming video

window and below it a window with interactive charts and

graphs that are updated according to the in-stream news

content The webcast is presented in a “program wheel”

format, rotating the featured segments at regular

inter-vals during the hour plus five-program sector

reports—-“Markets in a Minute,” “CEO:FYI,” “Ask an Expert,” “Bull

Session,” and “WebFN University.” WebFN is working onsyndicating their content to other financial Web sites such

as Fidelity They are also developing content partners inEurope and Asia in order to eventually offer a 4-hour live

global webcast (Digital TV, 2001).

TYPES OF WEBCASTING

There are three types of webcasting based on the ogy that webcasters use to deliver the content or informa-tion to the Internet audience: (1) push, (2) on-demand,and (3) live streaming (Miles, 1998) Webcasting can bestreamed live or be downloaded and stored on the serverfor later retrieval by the users Table 1 compares the differ-ences between the three types of webcasting technologiesbased on consumers’ effort and revenue sources

technol-Push Technology

Push technologies are computer programs that deliverthe media content or information to the audience’s com-puter screen automatically without specific request eachtime The information may pop up as an alert, wallpa-per, or screensaver on a person’s computer, as electronicprogram guides on a TV screen, or as other displays onmobile devices or cellular phones How the webcasterknows what content to push to the computer screen ofthe consumers is based on some level of intelligence such

as the customer’s needs or interests, previous information

Trang 27

Figure 4: WebFN.

requests, or an affiliation or portal site registration such

as Yahoo!

One of the earliest companies that successfully employ

the push technology on the Internet for webcasting was

PointCast Founded in 1992 to deliver news and other

information over Internet connections, PointCast’s

flag-ship product PointCast Network sent customized news to

users’ desktops PointCast Network was free to consumers

and supported by advertising To use it, one needed to

download the PointCast client program, which was

avail-able from PointCast’s Web site and other affiliated sites

The user provided preferences for customized

informa-tion, which was delivered by Pointcast as screensavers

The company was acquired by EntryPoint in 1999 and

is now defunct, its push service discontinued shortly

af-ter the acquisition The pioneering push technology and

proprietary software that Pointcast used encounteredmany technical difficulties such as slow service to cus-tomers, causing traffic jams on corporate networks OtherWeb sites such as Yahoo! and Excite offered similar cus-tomized information services only when consumers usedthose sites Consumers preferred this model over Point-cast’s push model, leading to the termination of Point-cast’s service (Bicknell, 2000) The failure of Pointcastdoes not mean that push technology is not a success-ful model of webcasting; it underscores the importance

of bandwidth limitation in the use of pushing ogy Electronic mail software companies successfully andwidely use the push technology to disseminate informa-tion to their users Software companies push product up-dates and downloads to the users such as the latest version

technol-of McAfee antivirus programs, Eudora, Internet Explorer,

Table 1 Comparison of Three Types of Webcasting Technologies

Consumers’ effort None/Automatic High (must locate where the content is Moderate (must know the

available and know what content webcast schedule)

to ask for)Business model Advertising and E-commerce, pay per service, and Advertising, pay per service,

Trang 28

T YPES OF W EBCASTING 679

and Netscape Audio, graphics, and Web pages are sent

automatically to the users’ e-mail boxes

The push and pull technologies work together to vide consumers effortless access to information of inter-

pro-est to them Pull technologies use software to pull

infor-mation for the consumer from the Internet Consumers

can set up their own selections, or the intelligent software

agents can search out information that consumers would

be interested in Amazon.com, for example, has pull

tech-nologies that remembers the products consumers have

purchased in the prior visits and pull information of

sim-ilar products to the user on the next visit

The greatest benefits of using the push technologies

is that consumers can download programs, receive news

updates, and interact with the webcaster in different

for-mats such as audio, video, text, and graphics without

ac-tively searching for the information It brings “intelligence

and efficiency to the distribution of all kinds of

informa-tion, giving webcasters more control over what users see

and when” (Miles, 1998, p 24) Push technologies

pro-vide effortless reception of materials with little consumer

knowledge requirement and save consumers the time to

find information on the Internet

The latest development in push technologies is tobecome more interactive and automatic Webcasters in-

creasingly provide information based on users’ past

behaviors and their response to previous information

Editors are seldom used to sort or filter content Some

inherent problems of push technology surround how

much information should be provided to the audience and

the potential invasion of Internet users’ privacy by pulling

intelligence from users’ past choice and preferences

without their explicit consent Users are increasingly

in-tolerant of unsolicited materials that webcasters send

without permission They will tune out these materials

and the effectiveness of pushing materials is thus greatly

diminished

On-Demand

On-demand webcasting refers to the webcasting of

content based on the request of the consumer at the time

of use The webcaster supplies the media contents in a

catalog or playlist for consumers to choose The term

on-demand refers to the ability of the user to control the

scheduling and appearance of the webcast The audience,

instead of the webcaster, chooses when and what to view

In many on-demand webcasts, additional features are

provided, such as instant replay; no waiting for rewind or

fast forward during live events; interactive devices such as

question and answer, chat rooms, product or service order

forms, multiple camera angles, and zooming in and out

the picture On-demand webcasting’s greatest attractions

are the convenience to the consumer and the audience’s

ability to retrieve information or content that has been

missed There are both business and consumer uses of

on-demand webcasting Business and governments are

already making use of on-demand webcasting to provide

training and product information for employees, suppliers,

and customers Intel, for example, frequently uses

web-casts to provide live seminars to prospective customers

On-demand webcasting can be downloadable or showthe content in real time If the webcast is downloadable,

compressed files are downloaded to the user’s computerand a media player is used to play back the files (alsocalled HTTP streaming) On-demand can also use real-time streaming to broadcast the content directly from aserver as selected by the user so that the user can instantlywatch or listen to it No file storage or cache is involved

in streaming (Real Networks, 2002) Users cannot store,copy, or retransmit the content because the stream nevertouched the local drive of the user and the data are dis-carded after playback Hence the content owners can pre-vent piracy of their content In addition, on-demand canextend webcasters’ reach, increase the value of their mediacontents over a long period of time, and save bandwidth

as well because not everyone connects at the same time(Mack, 2002)

Live Streaming

Streaming is an Internet data transfer technique that doesnot need to wait for the whole file to download to a user’scomputer before playback begins (Mack, 2002) It involves

three different types of software: (1) an encoder, which

converts an audio or video signal from an analog format

to a digital format and compresses the digital files for

transmission over the Internet; (2) a server, which ers data streams to audience members; and (3) a player,

deliv-which viewers use to watch or listen to the streaming dia The content of webcasts using streaming technologiescan either be live or on-demand In live streaming web-casts, the broadcast schedule is fixed so that time-sensitivecontents can be delivered instantaneously to users Usersmust follow the schedule to receive the content Live web-casts require multiple streaming servers to reduce the load

me-of each server and to minimize the chance me-of crashing aserver by too many users tuning in at the same time

In a live streaming webcast, users can also interact withthe event as it is happening such as clicking on a picture of

a car to view its details or change its color Although manyrefer “streaming” to the retransmission or repurposing oftraditional broadcast content such as television and radiosignals on the Web, streaming is not limited to retrans-mission It can also be original content transmission withintent to reach the public Webcasting using streamingtechnology can pick up viewers or listeners from areasaround the world

The ability to squeeze the audio and video into a stream

is the basis of streaming technologies These technologiesuse software to compress the signals for transmission anddecompress the signals for display on the viewer’s screen

in the correct order continuously so that the viewer canview the content almost instantly It is very important thatthe signals are reassembled in the correct order during thedecompression process Any gaps in between will makespeech and video incomprehensible For successful web-casting using streaming technology, the webcaster needs

to secure a powerful high-speed server to deliver the nal, and they need enough bandwidth to enable multipleusers to view the program

sig-Multicasting can be a method to save on bandwidthcosts for webcasters It is the ability to take one signal andsend it to lots of people through a network or over the In-ternet The one signal locates a device (e.g., a router) thatsends the signal to a number of computers or television

Trang 29

In U.S Population 80 millions 40 millions 20 millions

sets Multicasting is much cheaper than unicasting, which

assigns one stream to each viewer or listener When

mul-tiple users log on to the site, the unicasting webcaster will

need to send multiple streams that take up large amounts

of bandwidth One drawback of multicasting is that the

webcaster needs to enable multicast in routers and cannot

use automatic rate changing to accommodate the

differ-ent connection speeds of users (Austerberry, 2002)

Among the three technologies, on-demand and live

streaming are currently the most well-known webcasting

mode and most popularly used in consumer webcasting

of entertainment content According to the latest

Arbi-tron/Edison Internet 8 study (Rose & Rosin, 2002), nearly

80 million Americans aged 12 or above have either listened

or watched a webcast online, with about 7.2 million

hav-ing tuned to one in the past week Surprishav-ingly, webcasthav-ing

use is not limited to young people About 44% of webcast

users are older than 35 years of age Table 2 provides a

profile of webcast audiences in the United States

Three Levels of Webcasting

Webcasting can be differentiated into three levels based

on the degree of sophistication in the webcasting

tech-nologies used during the webcast An example of

low-end webcasting is pushing information by e-mails E-mail

campaigns targeted at customers, suppliers, and business

associates that have actually requested information are

a proper use of the low-end webcasting to market

prod-ucts and build customer relations The e-mails can include

Web page links and audio and video files Those

unso-licited mass mailings via e-mail, usually called spams, do

not discriminate the identity of the recipients and are sent

from sources unknown to the audience These spammers

are under the scrutiny of state antispam laws and subject

to prosecution

The mid-range webcasting is the placing of video or

audio content on a Web site and providing customers and

associates with 24 hour access to current events and

infor-mation about a company’s products or services The

web-casting can be accompanied with features that enhance

the video and audio experience These features range from

search engines or directories that help visitors to find

spe-cific information, to captioned and cued slides or

dia-grams that can be displayed along with the audio or video

High-end webcasting applications may be either push

or streaming, or a combination of the two High-end

webcasting is similar to traditional broadcasting because

of its expected large audience Nonetheless, it differs fromtraditional broadcasting by its video library accessible ondemand, 24 hr a day Businesses use high-end webcast-ing to disseminate information to remote office locations

or to reach prospective customers or investors The tertainment industry is also using high-end webcasting toenhance the viewing experience with the so-called “en-hanced TV” and to generate additional revenue sourcewith file downloading services for a fee and purchase ofvideo content online Webcasters need to lease high-speedtelephone lines, satellite delivery, and other ways of trans-mitting the live webcast signal to the Internet connection.They also need to purchase sufficient bandwidth that willmeet the demand of the large number of people loggingonto the server at the same time

en-TECHNICAL STANDARDS AND PROTOCOLS OF WEBCASTING

The Internet is a collection of computer networks that areinterconnected and communicate with each other based

on a common protocol called TCP/IP (transmission trol protocol/Internet protocol) Protocols define the way

con-in which one hardware or software component con-interactswith another with respect to specific functionality As web-casts are shown to different people with different comput-ers and Web display devices, protocols and standards areneeded to enable communication across networks Proto-cols become standards when every webcaster uses them.Several agencies set the standards for the webcasting in-dustry The governing standards agency for the Internet isthe IETF (Internet Engineering Task Force) Other orga-nizations such as the ITU (International Telecommunica-tion Union), MPEG (Motion Pictures Expert Group), andW3C (World Wide Web Consortium) also create standardsand their standards have become more important for theindustry (Miles, 1998) Figure 5 illustrates the relation-ships among the webcasting protocols that work collabo-ratively to send a transmission to a user

IETF (Internet Engineering Task Force) Standards

The IETF is an international association of network signers, operators, vendors, and researchers concerned

Trang 30

de-T ECHNICAL S TANDARDS AND P ROTOCOLS OF W EBCASTING 681

Webcaster,s Server

RSVP defines minimum quality

RTP enables synchronization and defines encodings

MPEG set standards compressing digital video and audio files

SMIL allows easy mixing of

media objects

Protocols

Multicast-Enabled Router

Local Area Network

Figure 5: Webcasting protocols in multicasting.

with the evolution of the Internet Four webcasting

stan-dards have been adopted by IETF:

IP multicast;

Reservation protocol (RSVP);

Real-time transport protocol (RTP) and real-time control

protocol (RTCP); andReliable multicast protocols

IP Multicast

IETF identified three ways to transmit from a source to

multiple recipients on the Internet:

(1) unicasting—point-to-point transmission;

(2) broadcasting—one-to-all transmission; and

(3) IP multicasting—one copy is sent to a group address

Unlike unicasting, IP multicasting allows small or large

amounts of digital information to be sent to large

audi-ences Only group members that should receive the

web-casts will actually receive the programs and only one copy

of the information is needed to first reach a group address,

then routed to individual recipients to allow efficient

de-livery of digital information

Reservation Protocol (RSVP)

To ensure the quality of the webcast, which includes

in-tegrity, end-to-end predictability, and efficient bandwidth

utilization of data transmission, it is necessary to specify

the minimum quality standard RSVP, the reservation

pro-tocol, is one kind of quality standards that enhances the

current Internet architecture with support requests for a

specific quality of service from the network for particular

data streams or flows This protocol is designed to allocate

network resources appropriately for the requirements of

the data being sent To optimize transmission for

partic-ular types of data such as audio and video, RSVP defines

the network traffic class and is used to control both

qual-ity of service and resource management for unicast andmulticast sessions

Real-Time Transport Protocol (RTP) and Real-Time Control Protocol (RTCP)

Because audio and video webcasts transmitted over theInternet can be lost or experience variable delays, RTP is aprotocol intended to enable synchronization and recoveryfrom loss or delays RTP also defines a format for differ-ent audio and video encodings to promote interoperabilityamong different computer platforms, operating systems,and application software products By having specific datafields that contain timestamp and sequence information,the receiving computer can use these fields to reconstructthe time-specific properties of the RTP data streams A re-lated protocol is RTCP, which checks the status of a web-cast from time to time Using the RTCP, sender and re-ceiver reports are transmitted from time to time so thatapplications using RTP can get RTCP reports on how wellRTP data are being delivered

Reliable Multicast Protocols

Reliable multicast protocols aim to offer 100% data tegrity over a network when needed Sometimes we don’tneed complete data integrity such as when watching amovie because human eyes and ears can tolerate and com-pensate for minor loss or interference in sound and pic-tures However, for transmitting databases or software,

in-no loss can be allowed, and it is necessary to use softwarethat is built in with a reliable multicast protocol

ISO (International Standards Organization) Standards

The International Standards Organization (ISO) is aworldwide organization of national standards organiza-tions from over 100 countries to promote the development

of standardization and related activities in the world Itsgoals are to facilitate the exchange of goods and servicesand to develop international cooperation in intellectual,scientific, technological, and economic activities MPEG

is a group of people who met at ISO to generate dards for digital video and audio compression MPEG-1audio compression standards is composed of three codinglevels: Layer-1 (MP1), Layer-2 (MP2), and Layer-3 (MP3).Each layer level is a higher compression ratio at equalaudio quality To reproduce CD quality audio, Layer-1 re-quires 384 Kbps, while Layer-3 only requires 112 Kbps.MP3 has now become the most popular standard fordigital encoding and transmission of audio and video.MPEG-4 is the latest standard initiated by the ISO Dif-ferent types of multimedia can be combined for differentpresentations using MPEG-4 (Mack, 2002)

stan-ITU (International Telecommunications Union) Standards

ITU (International Telecommunications Union) is an ternational organization where government and the pri-vate sector work together to coordinate global telecom-munications network and services Headquartered inGeneva, Switzerland, the ITU has played an importantrole in standardizing the videoconference industry with

Trang 31

in-standards for electronic program guides (EPG) that will

affect webcasting and the listing of webcast events on

the Internet and television The T120 standard contains

a series of communication and application protocols that

provide support for real-time, multipoint data

communi-cations Over 100 webcast and streaming media suppliers

such as Microsoft and Cisco Systems have already

com-mitted to implementing T120-based products

World Wide Web Consortium (W3C)

Standards

The World Wide Web Consortium (W3C) is an

interna-tional industry consortium founded in 1994 to develop

common protocols for the Web’s evolution The

consor-tium’s current efforts on synchronized multimedia and

extensible markup language (XML) are the most

signifi-cant to the webcasting industry

The synchronized multimedia project is to establish

standards that enable synchronization of different

me-dia (text, graphics, audio, video) so that the presentation

can be shown in a coordinated way As a result of the

project, W3C proposed a new markup language for use on

the Web called synchronized multimedia integration

lan-guage (SMIL) This lanlan-guage was designed to allow the

easy mixing of simple media objects in different formats

The coding would use simple tags to designate elements

on a Web page It will make it easier for people to design

and add webcasting elements to their Web pages The use

of the language will increase the accessibility of the sites

through standardization of media objects display and it

will also increase the accessibility of audio-enabled Web

sites for the visually impaired

XML is an advancement from HTML (hypertext

markup language), which has been the basis for

build-ing Web pages It is a much more flexible language than

HTML and allows designers to define their own

cus-tomized markup language, enabling the use of standard

generalized markup language (SGML) on the Web, which

can define, identify, and use the structure, style, and

con-tent of documents

Proprietary Protocols

Apart from the standards-setting agencies, several

web-casting protocols are proprietary to a software vendor,

but they are eventually submitted to the standards-setting

agencies for consideration to become a common standard

for the entire industry Two such protocols are real-time

streaming protocol (RTSP) and advanced streaming

for-mat (ASF)

Real Networks, Netscape Communications, and

Columbia University developed the real-time streaming

protocol jointly RTSP is an application-level protocol for

control over the delivery of data with real-time properties

The protocol is designed so that delivery of both live data

feeds and stored content can be brought under the control

servers, and clients of multimedia vendors store, stream,and present multimedia content in the same file, instead of

as separate audio, text, graphic, and video files Microsofthas submitted ASF for standards consideration with theISO and IETF

STATE OF THE RADIO WEBCASTING INDUSTRY

Radio is the most common form of webcast tuned in byU.S Internet users mostly during work hours (Measure-cast, 2002) The latest Arbitron/Edison Internet 8 study(Rose & Rosin, 2002) shows that 25% of Americans aged

12 or above have listened to a radio station on the net, although weekly listening was composed of only 4%

Inter-of online radio listeners Only 45% Inter-of the online radio teners listened to local radio stations most often The restmost often listened to stations from other parts of (41%)

lis-or outside the United States (9%)

The audience size of individual radio webcast is stillsmall Among the top 10 radio webcasts, none of themhave a monthly cumulative measured audience (CUME)

of more than 400,000 listeners, according to cast, Inc., the company that provides next-day audi-ence reports for advertisers and Internet broadcasters(http://www.measurecast.com) MusicMatch, which pro-vides an Internet-only radio webcast, charging a subscrip-tion of $3.33 a month, topped with a CUME radio webcastaudience of 365,783 in September 2002 Virgin Radio ofLondon, which has the highest CUME, only had a CUME

Measure-of 264,788 in September 2002 The U.S.-based radio tion that had the highest CUME during that same periodwas WQXR-FM, a New York-based classical music sta-tion Its monthly CUME is only 83,550

sta-According to BRS Media’s study in April 2000, 9,321radio stations had Web sites, of which 5,945 wereU.S./Canadian radio stations The top 10 features of radioWeb sites, according to Arbitron/Edison Media Research,are DJ info/pictures, community events, links to advertis-ers, cool links, station information, contest entry forms,program schedules, concert information, e-mail contact,and station listening link (Gunzerath, 2000)

Levi’s (2000) white paper presented to the NAB dio show reported that 37% of all radio stations of-fer streamed audio, and there are a growing number ofInternet radio stations that only operate exclusively onthe Web for Internet audiences Because most Web radiooriginates from terrestrial broadcast radio stations, theresulting Web radio stations base much of their content

ra-on their terrestrial broadcast radio statira-on counterparts

STATE OF THE TELEVISION WEBCASTING INDUSTRY

Compared to the radio webcasting industry, the TV bcasting industry received much less attention from the

Trang 32

we-P ROBLEMS AND I SSUES IN W EBCASTING 683

press Nitschke (1999) conducted a survey regarding TV

stations’ Internet operations, which found about 70%

maintain their own Internet operations with an in-house

staff Among those 37 stations who answered the survey,

about 30% have streaming media services providing audio

and video files Only 14% have chat rooms and 27% have a

listserv for e-mail broadcast Some TV companies, such as

NBC and the Hearst-Argyle television station group,

sub-contract the webcasting operation to special webcasting

service companies such as the Internet Broadcasting

Sys-tems (IBS) IBS develops and hosts the sites, hires and

manages the Web editorial staff, and builds revenues for

the stations All its sites serve archived and streaming

videos and have a similar design to that of members of

the IBS network Chan-Olmsted and Ha’s (in press)

re-cent survey of TV station managers show that customer

relation management and collection of audience

intelli-gence are the main goals for TV stations to establish their

online presence The revenue stream that most broadcast

stations expect from their webcast is advertising (76%)

Barter (24%) and e-commerce (19%) are a distant second

and third

Transferring their domination on television, the jor national TV networks’ webcasts are the most popular

ma-among TV webcasts CNN, MSNBC, and CBS News are

the forerunners in TV webcasts, according to the DFC

Intelligence Research Study (Miles & Sakai, 2001) With

the high demand of bandwidth for video streaming, it

is not surprising that TV webcasting is used much less

than radio webcasting Arbitron/Edison’s Internet 8 study

(Rose & Rosin, 2002) revealed that only 7% of Internet

users watch a video webcast, which is three and a half

times less than radio webcast numbers The major

obsta-cle of video webcast is the requirement of a high-speed

Internet connection for Internet users to watch a video

webcast

MAJOR PLAYERS IN THE

WEBCASTING INDUSTRY

Seattle-based software companies such as Microsoft and

Real Networks are important players in the webcasting

in-dustry According to the Arbitron/Edison’s Internet 8 study

(Rose & Rosin, 2002), the top four streaming media

ser-vice providers to consumers are Real Network’s Real.com,

Yahoo Radio, MSN Music, and Radio@AOL Microsoft’s

Windows Media Player and Real Network’s RealPlayer are

the most frequently downloaded streaming video players

According to the January 2002 Nielsen/Netratings, Real

Player is used by 32.9 million U.S households while

Win-dows Media Player is used by 14.2 million households

Apple Quicktime, as a latecomer to the webcasting

indus-try, is now a popular multimedia player among people

un-der 21 with 8.1 million home users (Miles & Sakai, 2001;

Olsen, 2002) Real Networks recently launched the

Univer-sal RealOne Player, a multiplatform media player that can

play and cache all media types including Apple Quicktime

and Windows Media

The International Webcasting Association (IWA) isthe largest worldwide nonprofit trade organization rep-

resenting companies, organizations, and individuals

active or interested in the delivery of multimedia (http://www.webcasters.org) The IWA is headquartered in Wash-ington, DC, and serves members throughout the UnitedStates, Europe, Asia, Canada, and Australia

PROBLEMS AND ISSUES

IN WEBCASTING

The webcasting industry is facing several problems Thefirst problem is the cost of the digital content and copy-right issues They have to protect the content from be-ing stolen or reproduced by other webcasters and userswhile securing contents with reasonable fees Secondly,webcasters compete for audiences with offline mediasuch as television and radio Thirdly, webcasting qualityand delivery efficiency depend on the degree of broad-band Internet access penetration of the market Fourthly,webcasting content development needs to take into ac-count the bandwidth requirement and downloading time

to users Lastly, the regulations of the Internet and

on the freedom of speech can greatly affect webcastcontents

Cost of Digital Content and Copyright Issues

The cost of digital content and copyright protection arecurrently the larger issues concerning webcasters espe-cially Web radio, which broadcasts music on the In-ternet The report of the Copyright Arbitration RoyaltyPanel (CARP) recognizes the sound recording and musicalwork performance rights of the sound recording industryand recommends that webcasters pay the high royaltiescharged by the sound recording companies Specifically,webcasters must pay for each performance by the num-ber of listeners After the Library of Congress revised theroyalty rates, webcasting companies with or without anoffline radio station will pay the same rate of $0.07 perperson This rate is nearly 10 times higher than the ratesuggested by webcasters and approximately 35% of theroyalty fee requested by the Recording Industry Associa-tion of America (RIAA) Both the National Association ofBroadcasters and the International Webcasting Associa-tion protested against the CARP recommendations (IWA).Many Web radio stations have shut down to protest thedecision and avoid being fined In a survey of readers

of Streaming Magazine, who mostly are webcasters and

streaming technology suppliers, 80% think that the suggested royalty rates will kill the Internet radio business(Jeffrey, 2002)

CARP-The Small Webcaster Settlement Act (HR5469) wasintroduced and passed in the U.S Congress recently inNovember 2002 to help small webcasters The bill offers alower royalty rate to small commercial webcasters by onlycharging 8% of the gross revenue or 5% of the webcasters’expenses for the royalty fee for the retroactive periodbefore December 2002 Now webcasters with less thanUS$50,000 in gross revenue will pay a minimum annualfee of $2,000 Other webcasters will pay a 10% royalty feeout of the gross revenue for the first $250,000 and 12%

of the gross revenue when the revenue exceeds $250,000;

or 7% of the operating expenses, whichever is greater.However, the bill does not apply to college webcasters so

Trang 33

as the original and to retrieve and store digital content

on the Web, webcasters must protect their own copyright

for original content The U.S Congress enacted the

Digi-tal Performance Right in Sound Recordings Act of 1995

This act only applies to digital audio retransmission and

requires webcasters to obtain a performance license from

the owners of the sound recording rights In addition,

the Digital Millennium Copyright Act (DMCA), written

in 1998 under the treaties by the United Nation’s agency

World Intellectual Property Organization, provides for a

simplified but statutory licensing system for digital

per-formance of sound recordings on the Internet and via

satellite Its provisions include a programming restriction

called the “Sound Recording Performance Complement”

(SRPC) The restriction includes no more than three songs

from a particular album, no more than four songs by a

par-ticular artist, and no more than three consecutively in a

three-hour period and no advance song or artist playlist

announcement may be published The current

contro-versy over the Copyright Arbitration Royalty Panel’s

re-port and recommendation is a result of that Act

Competition for Audience

with Offline Media

Although some have argued that webcasting serves a

to-tally different type of audience from other traditional or

offline media such as television and radio with its

inter-active capabilities and niche programming, it is still a

medium that competes with offline media for both

adver-tising dollars and audiences The growth of webcasting

will result in more audience fragmentation, as thousands

of webcasts are available on the Internet Nevertheless,

webcasting also brings in new audiences—audiences at

work and audiences not served by niche programming or

limited by local programming in the past In order to win

the competition for audiences, both webcast media and

other offline media must work even harder to understand

and discover an audience’s unmet needs and provide the

service that meets those needs

On-demand webcasters may have a tough time in

com-peting with digital cable TV’s videos-on-demand service,

which offers consumers the choice to watch programs on

TV in digital quality whenever they want The interactive

services provided on digital cable can be comparable to

the interactive devices in a webcast In addition, the

in-creasing penetration of personal video recorders (PVRs)

that allow live recording and skipping of commercials on

television is another potential competitor to on-demand

webcasting to consumers Consumers can shift their TV

viewing schedule and select the content they want easily

with PVRs, making webcasting a less appealing viewing

option The advent of satellite radio may reduce the

attrac-tiveness of Web radio because satellite radio can provide

radio service with digital sound quality on the road on a

national basis without commercial interruptions The

ma-jor selling point of webcasting is its transcendence of

ge-for the growth in the use of webcasting because theconnection speed of dial-up modems is too slow to pro-vide acceptable audio and video quality for entertainmentuse Currently, about 30% of Internet users in the UnitedStates are broadband users (i.e., 33.6 million) according

to Nielsen/Netratings (January 2003) To users withoutbroadband access, viewing video is not only inefficient but

a frustrating experience because the gaps between ing data transmission created garbled and incomprehen-sible images and audio sounds The increase in broadbanduse results in an increase in webcasting usage Nielsenestimated that about 12.7 million broadband Internetsurfers consumed streaming media content at home Thebandwidth requirement for a large number of audiences

stream-in webcaststream-ing is also a big hurdle for many webcasterswhen the public Internet system is used For example,when Madonna’s live concert in London was webcasted

in November 2000, nine million streams were served tothe Internet audience MSN produced the show to gen-erate publicity However, the webcast cost MSN so muchthat MSN could not afford to pay Madonna the concertrights

Development of Webcasting Content

The development of webcasting content must take intoconsideration the bandwidth requirement and transmis-sion quality Videos, for example, take up a large amount

of bandwidth, and should therefore be used very tively Short video clips and interactive features are muchmore effective than full-length video in webcasting Ani-mation and showing images in a sequence ensure the re-ception quality to the user because the loading time forimages and visuals is much less than a video They can be

selec-as effective selec-as a video in many instances

Navigation design is another important issue in oping webcasting content Webcasters need to organizethe content offering into separate categories and displaythe approximate playing time by the modem speed of theuser A user-friendly menu will enable the user to quicklylocate the webcast content to be played and control thepace of the webcast If the contents have been used inother offline media, a reference to the original aired dateswill be of high reference value to the users Digital copy-right management is another important aspect in webcastcontent development

devel-Regulatory Issues in Webcasting

Apart from copyright protection, there are several latory issues pertinent to webcasting: (1) extension of theright of publicity online (state laws prohibiting the unau-thorized taking of an individual’s name, likeness, voice

regu-or other elements and using them fregu-or commercial poses); (2) invasion of privacy by the Internet’s ability tocollect data and customize information; (3) libels in bul-letin boards and chat rooms; and (4) freedom of speech

Trang 34

pur-G LOSSARY 685

on the Internet and censorship issues The

Communica-tion Decency Act of 1996 was ruled unconstituCommunica-tional by

the Supreme Court, which established that the Internet

enjoys the same First Amendment rights as other print

media formats Essentially, the access and cost to use

In-ternet services determine how many will be able to use

webcast

WEBCASTING AROUND THE GLOBE

The United States is taking the lead in the webcasting

market development by promoting private investment for

universal Internet access Europe is lagging behind in

we-bcasting market development because of the charge per

use rate structure of local phone service and the high price

of leased lines and dedicated circuits Asia is also

gener-ally underdeveloped in consumer webcasting because of

limited press freedom in most Asian countries

Neverthe-less, the high broadband adoption rate in the Four Little

Dragons in Asia (Hong Kong, Singapore, South Korea,

and Taiwan) and the vibrant business environment

fos-ter a fertile ground for business-to-business webcasting

B2BCast is a webcasting company based in Asia

provid-ing business-to-business webcastprovid-ing It focuses on

pro-viding business executives on-demand access to business

events and conferences 24 hr a day, such as the Asian

Cor-porate Branding Symposium The Hong Kong Trade

De-velopment Council’s web site features business webcasts

with eight different channels (http://www.tdctrade.com).

Consumer webcasting is blossoming in Taiwan with the

encouragement of the government on broadband

devel-opment For instance, HiNet, a Taiwan broadband

In-ternet service provider (http://www.hichannel.hinet.net),

provides its subscribers live webcasts of swimsuit model

shows every evening and celebrity interviews Latin

Amer-ica’s webcasting industry is hampered by its low Internet

usage rate Brazil, Argentina, Chile, and Mexico are the

most highly developed Internet markets in Latin America

However, less than 5% of their population uses the

Inter-net (Cyberatlas, 2002)

CONCLUSION

Webcasting is still an infant industry with many small

entrepreneurs and large enterprises experimenting their

way A liberal regulatory climate and broadband Internet

access adoption are key environmental factors to foster

the growth of this industry Either willingly or

unwill-ingly, traditional broadcast media such as radio and

tele-vision have participated in the brave new world of

we-bcasting Does webcasting pose a threat to traditional

broadcast media or will its presence further strengthen

the value of the traditional media? Media history

repeat-edly shows that each medium will modify itself to adapt

to the changes in the environment, find its own niche, and

survive the threat of new media, unless the new media can

completely substitute for the functions of the traditional

medium such as the replacement of vinyl records by

com-pact discs and cassettes Just as television was unable to

displace radio, and radio was unable to displace

newspa-pers, the Web will not displace television or radio Instead,

audiences are given more choices with webcasting

De-livering of multimedia content is much easier now thanbefore with the different webcasting technologies and ad-vancement in webcasting protocols By integrating the lat-est technology on the Web and the traditional media con-tent, broadcasters may find higher value in their mediacontent and a much larger audience in the workplace andhome and around the world The interactive capability ofthe Web opens the door for a variety of revenue streamsfor the most creative broadcasters/webcasters who bestserve the needs of consumers and know how to maximizethe value of their content

GLOSSARYCUME (cumulative measured audience) The num-ber of different or unduplicated homes/people exposed

to a program at least once across a stated period oftime

Extranet An external Web site created by an tion to provide information and support services withrestricted access, such as passwords or security codes,

organiza-to its cusorganiza-tomers, clients, suppliers, or members

FTP (file transfer protocol) The Internet application

of moving files across the Internet using the TCP/IPprotocol by either uploading a file to a computer server

or downloading a file to a user’s local computer drive

Intranet An internal Web site created by an tion to provide information and communication for itsemployees, its purpose being primarily for business us-age but also to be used as an internal corporate com-munication tool

organiza-NAB (National Association of Broadcasters) A cast industry association representing the interests offree, over-the-air radio and television broadcasters

broad-Pull The process of using software to find information

on the Web for the consumer to view through a browser

or e-mail; can be initiated by the consumer or ically processed by the Web site server

automat-Push The delivery of information by a company to auser’s computer on a regular basis, ranging from sim-ply sending regular e-mails to providing customizedinformation in multimedia format based on either theuser’s request or automatic intelligence agents that de-termine the user’s tastes and preferences

Real time The delivery of media content, data, audio, orvideo at almost the same moment it originates on theWeb; equivalent to a “live” broadcast on the computerscreen

Repurpose The media content management strategy ofusing the same text, audio, or graphics content again

in other media channels by the copyright owner of thecontent, the term originating from content created forone purpose (a TV newscast) being used for another(a webcast), which can be longer or shorter than theoriginal content or exactly identical Also the mediacontent is still considered the same and under the pro-tection of copyright law even though the distributionmedia have changed

RTP (real-time transport protocol) An Internet col that provides a timestamp and sequence number tofacilitate the data transport timing and to control themedia server so that the video stream is served at the

Trang 35

proto-Currently, service providers such as XM and Sirius

provide satellite radio services in the United States on

a subscription basis

Streaming The technology of sending a continuous

data signal through the Internet with special software;

enables the user’s computer to decode a signal as soon

as it is received and play it almost immediately in

the correct order Unlike downloading, which requires

the storage of the data in the user’s local hard drive

be-fore playback, streaming data are not cached (stored)

in the user’s local computer drive and play back the

data at almost the same time as they are transmitted

CROSS REFERENCES

See Copyright Law; Extranets; Intranets; Video Streaming.

REFERENCES

Austerberry, D (2002) The technology of video and audio

streaming Woburn, MA: Focal Press.

Bicknell, C (2000, May 29) Pointcast coffin about to shut

Wired Retrieved October 31, 2002, from http://www.

wired.com/news/business/0,1367,35208,00.html

Chan-Olmsted, S., & Ha, L (in press) Internet business

models of broadcasters Journal of Broadcasting and

Electronic Media.

Cyberatlas (2002) The world’s online population

Re-trieved November 20, 2002, from http://cyberatlas

internet.com/big picture/geographics/article/0,1323,

5911 151151,00.html

Digital TV (2001, February) Webcasting 45–50.

Gunzerath, D (2000) Radio and the Internet

Retri-eved May 13, 2002, from http://www.nab.org/Research/

topic.asp#INTERNET

Ha, L., & Chan-Olmsted, S (2001) Enhanced TV as brand

extension: TV viewers’ perception of enhanced TV

fea-tures and TV commerce on broadcast networks’ Web

Mack, S (2002) Streaming media bible New York: Wiley.

Measurecast, Inc (2002) Measurecast reports tian music format popular with Internet radio lis-teners Retrieved August 28, 2002, from http://www.measurecast.com/news/pr/2002/pr20020827.html

Chris-Miles, P (1998) Internet World guide to webcasting: The

complete guide to broadcasting on the Web New York:

Wiley

Miles, P., & Sakai, D (2001) Internet age broadcaster (2nd

ed.) Washington, DC: National Association of casters

Broad-Nielsen NetRatings (2003, January) Broadband accessgrows 59 percent, while narrowband use declines, ac-cording to Nielsen/Netratings Retrieved April 14, 2003,from http://netratings.com/pr/pr 030115.pdf

Nitschke, A (1999) Station Internet activities report.Retrieved May 10, 2002, from http://www.nab.org/Research/Reports/TvstationInternetActivity.aspOlsen, S (2002, June 19) Apple: We told you QuickTime

was #1! CNET News.com Retrieved April 14, 2003,

from http://zdnet.com.com/2100-1105-937379.html.Real Networks (2002) Streaming media F.A.Q Re-trieved August 5, 2002, from http://www.realnetworks.com/resources/startingout/get started faq.htmlRose, B., & Robin, L (2002) Internet 8: Advertising

vs subscription—Which streaming model will win?Arbitron Inc and Edison Media Research RetrievedAugust 7, 2002, from http://www.arbitron.com/home/content.stm

Schlender, B (2002, March 4) The real deal Fortune,

215–220

Vonder Haar, S V (2002, July) Streaming media gets

se-rious Baseline, 83.

Trang 36

Web Content Management

Jian Qin, Syracuse University

Version Control and Collaborative Authoring 689

Content Representation and Organization 690

Web content management is a process in which

con-tent management solutions are used to create, store,

pub-lish, update, and repurpose content to be communicated

through an organization’s Web site The content may

ap-pear in the form of HTML, XML, image, audio/video,

plain text, or database The management of these assets

is achieved through using templates, workflow tracking

features, publishing systems, and storage of content

ob-jects in database or file indexing systems Web content

is rapidly becoming one of the primary components of

the competitive advantage for all types of organizations

Whether an organization’s Web site can attract and retain

users plays an important role in an organization’s

suc-cess, especially for e-businesses The increasing

impor-tance of Web content demands better and more

respon-sive methods and technologies that produce and provide

access to it

Web pages of the early days were created mainlythrough manual HTML coding and the content contained

in these pages was static As the number and types of files

composing a Web site grew rapidly, manual coding and

linking became time-consuming and error-prone The

sit-uation could worsen when more than one person worked

on the same Web project The need for effective and

dy-namic publication of data and link creation on the Web

prompted a new generation of the Web The early dynamic

generations of Web content primarily used programming

interfaces and languages such as the common gateway

interface (CGI) and Perl Later, other programming

lan-guages, e.g VBScript, JavaScript, and JavaServer Pages

(JSP), became popular By using computer programs and

stylesheets, data stored in databases could be browsed or

retrieved and displayed on the fly in a predefined style

Although dynamic presentation of data on the Web was

accomplished by utilizing information technology, new

challenges emerged One such challenge was version

con-trol In the case of a large team working on a Web site

that contains hundreds or thousands of files, poor

coor-dination and lack of version control can cause

unneces-sary damages to the work being done Another problem is

the workflow management As maintaining a Web site comes part of the daily life of an organization, tasks such

be-as creating, editing, testing, approving, and publishingwill involve many people at different levels and in differentspecialization areas A lack of rules and procedures cancreate bottlenecks or blockages of the workflow These twoexample problems demonstrate that creating and main-taining a Web site, particularly a large one, is no longer

a simple matter of assembling a group of HTML pagesand programs More sophisticated systems are requiredfor the production and delivery of Web content Thesesystems are expected to solve problems such as contentcreation, representation and organization, asset manage-ment, access management, production content delivery,version control, and scheduling

Web content management becomes the term referring

to a system that performs all these tasks, as well as thepractice that uses the system to produce, deliver, and man-age Web content It is therefore used to mean both pro-cesses and the technology involved This chapter will dis-cuss Web content management primarily following theprocesses from content creation to delivery Key technolo-gies will be mentioned when necessary, but vendors forparticular products will not since they are not the focus

of this chapter

WEB CONTENT LIFE CYCLE

Components in a Web content life cycle are given ferent names depending on how developers view andbuild the content management system Latham (2002)proposes a six-phase life cycle for more general contentmanagement They are creation/acquisition, review, ag-gregation/management, distribution, archiving, and de-struction, all in the context of workflow and integration.IBM defines a Web content life cycle as having four majorelements: content creation, content management, con-tent access management, and production content deliv-ery (IBM, 2002a) Content-wire.com (http://www.content-wire.com) includes 11 columns in a content life cycle:accessibility and usability, audiovisual, billing, content

dif-687

Trang 37

Content deployment

Browse Search Create new content

Export Publish Transformation

Web WAP Email Catalog Portals

Figure 1: Web content life cycle.

delivery, content management, creation, digital copyright,

syndication, taxonomies, unwired, and vertical content

No matter how content management systems and

prac-tices vary, Web content must go through the processes of

creation, management, and deployment (Figure 1)

Con-tent creation includes new conCon-tent creation and existing

content conversion such as data from databases and/or

legacy content Content management embraces many

as-pects such as

(1) asset management, i.e., managing all pictures and files

to avoid data redundancies and easily handle media

files;

(2) access management, which integrates user

manage-ment and the permission systems;

(3) template management, which involves using dynamic

page rendering mechanisms to allow a uniform

pre-sentation of content; and

(4) content representation and organization, which

gen-erates metadata and structured content

Content deployment is the transfer of Web assets from

the staging server to the production server Current

tech-nology allows content on the production server to be

broadcast not only to an organization’s Web site, but

also on other application devices Because Web content

is structured and organized in a way that can be reused,

the system can render the same content into a variety of

formats such as Web pages, wireless hand-held devices,

e-mails, and catalogs, besides desktop browsers Such

content should also provide easier but more powerful

browse and search capabilities for the front-end users

CONTENT CREATION

AND AUTHORING

Web content results from business processes such as

plan-ning, design, and implementation and falls into a

num-ber of large categories—depending on which criterion is

used to categorize the content For example, commonly

seen content types include information on products,

pro-cedures and guidelines, reports from research or

devel-opment projects or business transactions, presentations,

and white papers to the public While these content types

serve different purposes in business processes, their

cre-ators may work at various positions (e.g., managers,

pro-creation and authoring includes design, version control,collaborative authoring, and document management.These components work together to provide an infrastruc-ture on which Web site functions and services are built

Content Design

The general principles for content creation are to keepdocuments small, to build a modular system, to reuse con-tent and definitions as much as possible, and to createpowerful metadata (Gabriel, 2001) The size of display ar-eas is limited on computer screens and smaller devices.Keeping documents small increases the displaying flexi-bility, but more importantly, smaller documents and doc-ument components increase the chance for them to berestructured and reused It also makes it easier to framethe smaller documents into new technologies such as theextensible markup language (XML) (W3C, 2000) The sec-ond principle of modularization has been used success-fully in building business and information systems Forlarge Web sites, modularizing means dividing Web con-tent into modular systems based on certain criteria, e.g.,

by functional unit A large site may have modules for search and development, customer service, and sales andmarketing Although different types of documents andcontent often bear different elements and structure, it isalso quite common that some of them share the same def-initions An example would be news releases—each func-tional unit’s Web site has a news section Therefore, thedocument definition for news articles can be defined onceand reused in all units’ Web sites Content and documentdefinition reuse can save not only time and effort butalso keep similar content in a consistent format Meta-data is information about data and documents Title, au-thor, key words, abstract, and content category are themost common elements for document type of content Fordatabase content, metadata includes, among other things,table name, field name, and data type Metadata containselements underpinning the functions of browsing, search-ing, and displaying

re-When designing Web content, one needs to considerboth its internal and external structures The internalstructure refers to the organization and arrangement ofcontent components For example, an online technicalmanual may be structured as chapters, sections, and para-graphs; within each of the paragraphs there may be still

or interactive illustrations with text annotation An tant design feature for such an online manual would bethat no matter where users are inside the manual, therewould be navigational indictors for them to move backand forth or up and down, even jump from one place

impor-to another Another example is the navigation systemwithin a Web site, which enables “relational” browsingand searching; i.e., similar products, technical support,and promotional plans pertaining to a particular productare related to that product’s description The role of in-ternal structure design is to define Web content types and

Trang 38

C ONTENT C REATION AND A UTHORING 689

structures and map out relationships among components

of Web content

The external structure of Web content refers to the waythat Web content is presented to the front-end users It

defines which data components make up a Web page and

how they will be arranged on the screen: dynamic posting,

JavaScript-enabled interaction, or a drop-down menu

Ex-ternal structure design should also be compliant with the

accessibility guidelines proposed by the World Wide Web

Consortium (W3C) Nonetheless, these guidelines can also

be applied to general external structure design W3C

rec-ommends to

rSeparate (internal) structure from presentation;

rProvide text so that text can be rendered in ways that are

available to almost all browsing devices and accessible

to almost all users;

rCreate documents that work even if the user cannot see

and/or hear; and

rCreate documents that do not rely on one type of

hard-ware (W3C, 1999a)

High-quality content requires planning and decisions

on the sources, formats, and versions of content before it

is created Generally, Web content can be divided into four

broad categories based on its source: internally created

and owned, owned outright (e.g., commissioned artwork),

acquired externally through leasing or subscription, or

linked to external sources but not owned nor leased The

internally created and owned content includes a wide

variety of documents as results of planning, analysis,

designing, briefing, and many other organizational

activ-ities These documents may be in the form of memos,

re-ports, press releases, product catalogs, online transaction

logs, white papers, or technical specifications and created

as HTML or files in other formats (e.g., sound and

im-ages captured in audio/videos, or recorded as data sets)

Some of them are currently active, i.e., being written or

revised, while others may be inactive and eventually

re-moved from the system Some content such as planning

and technical documents often involve collaborative

cre-ation and reviewing; hence the content may be privileged

and need version and access control to ensure the

effi-ciency, consistency, and confidentiality of the content

un-der development Both types of content—internally

cre-ated and owned outright—are assets of an organization,

though the organization does not have the right to revise

or change the commissioned content Content acquired

externally usually comes in a package such as a database

with its own user interfaces, whereas linked content can

be anything and beyond the control of the Web content

management system

Version Control and Collaborative Authoring

The term “version control” has long existed before the

Web It was originally used to manage versions of source

code in programming projects (Fogel, 2001) Version

con-trol software allows a developer or a group of developers

to keep track of versions of program files that

modifica-tions have been made to If a bug emerged after the new

version was implemented, the developer can reinstate theearlier version into the system If several developers areworking on the same source code, the system can detectthe changes and differences and automatically merge dif-ferent versions into one copy Version control in Web con-tent creation and authoring essentially works the sameway as a version control system It records the history in-formation about a file or directory, including things such

as creation date, who created it, and the version number orlabel The version control system allows authorized users

to check out or check in files or directories While a file

or directory is checked out of the system, the user canlock it to prevent other users from accessing the same file

or directory After the updates are done, the user unlocksthe file or directory by checking it back into the system

If a piece of content needs to be removed or added forany reason—or simply an earlier version of the Web site

is preferred—the version control system can be used torestore the entire site to any previous state, rolling backmultiple variations and edits by all authors until a satis-factory site can be put back in place (Dreilinger, 1999).The concurrent versions system was implemented in

a UNIX environment and intended for computer sionals In the Web development environment, versioncontrol is as important as it is in software development.However, Web authors often are not computer profession-als and come with various levels of computer skill Be-sides, the content that Web authors create does not al-ways fall into the category of program source code Theversion control system must be compatible with variousplatforms and authoring tools If a large team of Web de-velopers works on the same Web project, “[t]he assets thatcompose a Web site must be factored in a way that allowsmany members of the Web team to make changes concur-rently” (Nakano, 2002) The nature of Web content cre-ation and authoring calls for user-friendlier version con-trol and authoring tools

profes-Collaborative authoring is so tightly intertwined withconcurrent version control that it is difficult to discussone without mentioning the other The concept of collab-orative authoring encompasses a larger domain than ver-sion control In addition to varied skill levels, Web contentauthors in a distributed environment often use differentauthoring tools on various platforms When they work onthe same project and need to share the same documents,the version control system needs to be interoperable be-sides accommodating different skill levels To support col-laborative authoring, the system needs to meet the re-quirements of equal support for all content types, concur-rency control support, support for metadata, support forcontent-type independent links, retrieval of unprocessedsource for editing, namespace manipulation, and supportfor collections (Whitehead, & Goland, 1999) In address-ing these challenges, the Web Distributed Authoring andVersioning (WebDAV) working group of the Internet En-gineering Task Force (IETF) developed the WebDAV pro-tocol in support of the remote collaborative authoring

on the Web (Goland, Whitehead, Faizi, Carter, & Jensen,1999) Figure 2 demonstrates how authors in different lo-cations using different authoring tools can edit the sameset of documents with WebDAV server’s version controlfunctions

Trang 39

WebDAV protocol

WebDAV protocol

WebDAV server

PhotoShop 7

Concurrent versions control

Project Web site /project

(shared documents)

/html /images WebDAV protocol

Figure 2: Collaborative authoring in three different locations

and each Web author uses a different set of authoring tools

Content authoring with concurrency control can make

content creation efficient and ensure its consistency and

quality Authoring tools allow content creators to set

tem-plates and create consistent content structures for easy

deployment There is a wide variety of authoring tools

available on the market, ranging from HTML to XML

editors, many of which have capabilities of facilitating

collaborative authoring

Document Management Systems

Managing documents—e-mail messages, spreadsheets,

image files, media files, or textual material—traditionally

uses file systems in which documents are organized by

location in hierarchies The hierarchical structure of

fold-ers maps out the semantic structure of the file system

However, the hierarchical file system is not without a

problem For instance, documents can appear only in one

place in the structure, even though they may play different

roles and be relevant to other activities As Dourish et al

(2000) described, the ideal document management system

is the kind that provides a logical structure for document

storage (meeting the needs of the system) while

support-ing document interaction (meetsupport-ing the needs of users)

Many commercial document management systems are

built based on document properties, rather than

docu-ment locations, because docudocu-ment properties are “the

primary, uniform means for organizing, grouping,

man-aging, controlling, and retrieving documents” (Dourish

et al., 2000, p 142)

A document management system may be a collection

of roughly related systems that perform one or more of

several functions, or a system consisting of a number

of functional modules Typical document management

systems perform the following functions, though no one

system performs them all:

rFile naming: allowing long, descriptive file names;

rIndexing: assigning or extracting keywords and

compil-ing them into lists;

rMultifile document control: presenting an electronic

document consisting of multiple files in various formats

to users as if it were a single entity;

ural or human disasters;

rWorkflow management: coordinating tasks, data, and

content creators and developers to make the processmore efficient and effective; and

rPresentation/distribution services: deciding the form

and manner in which users view and interact with thecontent (Cleveland, 1997)

Increasingly, content developers use conceptual ing methods to design the structure and relationships for

model-a dommodel-ain, in which dmodel-atmodel-a, documents, model-and model-applicmodel-ations model-areplanned together in a systematic manner These concep-tual models sometimes are called “ontologies.” Content-encoding schemas and application programs are then de-veloped based on the conceptual models Such schemasapply XML syntax and in some cases, the resource de-scription framework (RDF) syntax (W3C, 1999b), whichpermits some inference or reasoning to allow intelligentagent applications

CONTENT REPRESENTATION AND ORGANIZATION

Many Web sites today use representation and tion schemes of some sort Yahoo! has its own categorylist that lets users browse its collection of Web sites hi-erarchically Amazon.com uses a patented algorithm torecommend books or other goods based on the query auser entered for searching Without a proper represen-tation and organization of data and documents, it wouldhave been impossible to provide these functions Thus, thepurpose of managing Web content is not simply to createsome data and documents and make them available on the

organiza-Web; more importantly, it is to create organized content

so users can interact with it more effectively tion and organization needs to begin with content designand creation and follow through to the presentation (in-terface) on the Web As Web content becomes increasinglycomplex and large in scope, several research communitiessuch as library and information science and computer sci-ence have been actively studying how to represent andorganize content to make it “machine-understandable”(W3C, 1999b) “Semantic Web” is a term describing theactivities in this area, which includes a series of stan-

Representa-dards under development such as Resource Description

Framework (RDF) Schema Language (W3C, 1999b) and Requirements for a Web Ontology Language (W3C, 2002a).

Semantic Web is the abstract representation of data onthe World Wide Web, based on the RDF standards andother standards to be defined According to Berners-Lee

et al (2001), Semantic Web is “an extension of the currentweb in which information is given well-defined meaning,better enabling computers and people to work in coop-eration.” It is being developed by the W3C, in collabora-tion with a large number of researchers and industrialpartners

Trang 40

C ONTENT R EPRESENTATION AND O RGANIZATION 691

Content representation and organization refers to theprocess in which data and document models are created

and relationships are mapped out as the architecture for

templates and interfaces Subsequently, such models are

converted into logic designs and implemented into the

sys-tem Creation of representation and organization schemes

and vocabularies requires methodologies from computer

science, linguistics, library and information science, and

other allied disciplines There are two kinds of tools in

content representation and organization: (1) metadata

schemes that contain data elements describing various

types of data sets and documents and (2) controlled

vo-cabularies that are used to assign subject categories and

indexing terms to documents

Metadata Schemes

A metadata scheme defines a set of properties about data

or documents In the digital library community, there

have been several proposals: the Dublin Core metadata

sets (Weibel, Kunze, Logoze, & Wolf, 1998), the

War-wick Framework (Lagoze, 1996), and the IEEE LOM/IMS

metadata set for learning objects (IEEE/LTSC, 2002; IMS,

2002) The main purpose of metadata schemes is to

pro-vide a consistent way to record data about data sets

or documents and to encode such data in a

computer-understandable manner The most common metadata

elements include authors, titles, dates of creation/

publication, owner/publisher, description, and category/

subject terms Some metadata schemes provide

coarse-grained metadata elements to allow quick generation or

creation of a metadata repository Dublin Core is an

exam-ple of this kind With a structure containing three

pack-ages of content, intellectual property, and instantiation,

it includes 15 elements and their subelements (Table 1)

This set enumerates the very general yet essential data

el-ements necessary for identifying and locating documents

Metadata schemes may also include finer-grained dataelements to describe documents in greater detail For ex-

ample, Dublin Core’s educational extension, DC-ED,

em-ploys a set of elements designed specifically for describing

the grade level, audience, pedagogy, and other details for

a learning resource on the Web In this sense, metadata

schemes are the data models for collecting information

about documents on the Web Such information is used

to search, browse, and locate documents on a topic over

the Web Another use of metadata schemes is to design

them as templates to capture content directly from the

Table 1 Elements in Dublin Core Content Intellectual property Instantiation

Description Contributor Format

LanguageRelationCoverage

Web An example is Web-based forms, which have beenwidely used to capture customer data, survey data, salesorders, and best practices, to name a few

Sometimes no standard metadata scheme is suitablefor representing the types of data and documents beingcreated In such circumstances, a customized metadatascheme(s) is needed The customized scheme may be cre-ated based on a standard such as Dublin Core, with a set

of extended elements It may also be created from scratchwithout using any existing standard However, for inter-operability, a metadata standard should be adopted when-ever possible Since metadata schemes are the data mod-els for collecting information about data and documents,they often need to be embedded in content authoring tools

so that content authors can create metadata while theyare creating documents In either case, i.e., creating an ex-tended metadata scheme or a scheme for capturing data in

a distributed environment, careful design is necessary toguarantee a sound representation of the data to allow easyretrieval and browsing of the content Designing metadataschemes usually involves a data modeling process.Modeling is a process of synthetic analysis and abstrac-tion, in which system developers “construct an abstractdescription of a system in order to explain or predict cer-tain system properties or phenomena” (Schreiber, Akker-mans, Anjewierden, Hoog, Shadbolt, & Wielinga, 2000, p.128) The result of this process is a model in which classes

of objects in the real world are specified as having a parent and one-to-one correspondence to an object in themodel Figure 3 is an example of the data model for an ex-perience factory in the domain of workforce development.The model in Figure 3 provides a high-level view ofmain classes and the relations among the classes In thedomain of workforce development, participating classesinclude the government who sponsors workforce pro-grams such as “Welfare-to-work” and “Study-to-career,”workforce organizations that initiate projects to executeprograms, people in organizations who prepare docu-ments describing and disseminating project informationand results, and knowledge captured for sharing promis-ing practices and lessons learned A data model such asthis serves as a communication tool for users of the Webcontent It shows what kinds of content there will be onthe Web site and how each class is related to one another.Before a data model reaches its acceptable version, discus-sions are often held with constituents to solicit feedback

trans-As with any system development process, this discussion–revision process is iterative

Cases that worked

Lessons learned

Workforce programs Projects

Document

refers-to describes

example-of

is-related-to includes

Figure 3: A sample conceptual model for the workforce

ser-vices domain

Ngày đăng: 14/08/2014, 09:22

w