Chapter 1
Chapter 1
Introduction:
2. Financial Services
3. Manufacturing
4. Electronic Messaging
5. Tele-Conferencing
Video call, audio call etc. this could be helpful in distant learning and
telemedicine.
7. Availability of Data
Networking Models:
Client/Server Model:
3. Server gets the request, performs the requested tasks and sends back a
reply.
Peer-to-Peer Model:
In peer to peer model, computers simply connect with each other in a workgroup
to share files, printers and internet access. Instead of internet information being
held in a few central locations, peer-to-peer computing makes it theoretically
possible to access the files and data residing on every personal computer
connected to the internet.
All computers and users have equal authority and rights. A peer in P2P network
acts as both a client and a server in traditional client/server architecture.
File Sharing applications: require efficient search across wide area networks (e.g.
Napster, Freenet, torrent)
Active Networks:
The OSI model has seven layers. The principles that were applied to arrive at the
seven layers can be briefly summarized as follows:
3. The function of each layer should be chosen with an eye toward defining
internationally standardized protocols.
4.The layer boundaries should be chosen to minimize the information flow across
the interfaces.
Functions:
The physical layer does not perform the detection and correction of errors.
Below the physical layer lies the transmission medium.
Framing: The data link layer divides the stream of bits received from the
network layer into manageable data units called frames.
Physical addressing: Data link layer adds a header to the frames to define
the sender and receiver of the frame. i.e. it adds up MAC address.
Flow control: if the rate at which the data are absorbed by the receiver is
less than the rate at which data are produced in the sender or vice-versa,
the data link layer imposes a flow control mechanism to avoid
overwhelming the receiver.
Network Layer:
Transport layer:
It accepts data from above it, splits it up into smaller units called
segments and passes them to network layer.
It ensures that the pieces all arrive correctly at the other end.
It guarantees the transmission of data from one end to the another.
It also provides the facility of broadcasting the messages to multiple
destinations.
The presentation layer receives the data from the application layer. It
makes sure that the information is delivered in such a form that the
receiving system will understand and use it. i.e. it converts the data into
machine format( binary format).
It also performs the compression and encryption of the data so that there is
integrity in data.
Application Layer:
It contains all the details in the OSI physical and data link layer.
It deals with the issues that an ip packet requires to actually make the
physical link.
It deals with the physical transmission of the data along with the signal
encoding techniques, data rate, bandwidth and physical connector.
Framing, synchronization, flow control and error control.
Protocols such as Ethernet, Token Ring, Frame Relay etc are used
Provides access to the TCP/IP environment for users and also provides
distributed information services.
Handles higher layer protocols
o FTP, HTTP, SMTP, DNS
X.25 is the first popular packet switched network deployed by ITU-T in 1976.
It defines how a packet-mode terminal (DTE) can be interfaced to a packet network (DCE)
used for data communication.
Allowed for the setup of data connections at speeds between 300bps to about 56kbps.
Data packets are simple consisting of 3 byte header and up to 128 bytes of data.
Subscribers were charged based on their use of the network.
It is a 3 layer network architecture
o Physical layer: it deals with the physical interface between station and packet
switching node. It specifies a protocol called x.21.
o Frame layer: it is responsible for reliable transfer of data across the physical layer
by transmitting it as a sequence of frames. It adds header and trailer to the
packet.
o Packet layer: it facilitates end-to-end connection between two DTEs. The data is
integrated with a header to form a packet. It is also responsible for creating
virtual circuits.
X.25 network devices fall into 3 categories:
o Data terminal equipment (DTE)
Terminals, personal computers and network hosts
o Data circuit-terminating equipment (DCE) and
Modems
o Packet switching exchange (PSE)
Switches that make up the carrier network
As like X.25, frame relay is also based on packet-switched technology. However differs
significantly in its functionality and format.
Frame relay is a high-performance WAN protocol that operates at the physical and data
link layers of the OSI reference model.
Frame Relay has the variable data rate while the X.25 has the fixed data rate.
Frame Relay sends information in packets called frames through a shared Frame Relay
network. Each frame contains all the information necessary to route it to the correct
destination.
Devices attached to a Frame Relay WAN fall into two general categories:
o Data Terminal Equipment (DTE)
o Data Circuit-terminating equipment (DCE)
Examples of DTE devices are mainly personal computers or Routers.
DCEs are carrier-owned internetworking devices. The purpose of DCE equipment is to
provide clocking and switching services in a network, which are the devices that actually
transmit data through the WAN. In most cases, these are packet switches.
Frame Relay provides connection-Oriented data link layer communication.
This service is implemented by using a frame relay virtual circuit, which is a logical
connection created between two data terminal equipment (DTE) devices across a frame
relay packet switched network.
Frame Relay Virtual Circuits fall into two categories:
o Switched virtual circuits (SVCs)
o Permanent Virtual Circuits (PVCs)
Switched virtual circuits are temporary connections used in situation requiring data
transfer in irregular time interval between DTE devices across the frame relay network.
Permanent virtual circuits are permanently established connections that are used for
frequent and consistent data transfer between DTE devices.
A data link connection identifier (DLCI) is a Frame Relay 10-bit-wide link-local virtual
circuit identifier used to assign frames to a specific PVC or SVC.
A VoIP system is usually cheaper to operate than an equivalent telephone system with a
PBX (Private Branch Exchange) and conventional telephone network service. There are
several reasons for this. Whereas traditional telephone networks allocate dedicated
circuits for voice communications using circuit switching, VoIP uses packet switching,
allowing the sharing of transmission capacity. Further, packetized voice transmission fits
well in the framework of the TCP/IP protocol suite, enabling the use of application- and
transport-level protocols to support communications.
VoIP readily integrates with other services, such as combining Web access with
telephone features through a single PC or terminal.
With VoIP, the calling user (program or individual) supplies the phone number of a URI
(Universal Resource Indicator, a form of URL), which then triggers a set of protocol
interactions resulting in the placement of the call. The heart of the call placement process
for VoIP is the Session Initiation Protocol (SIP). The Session Initiation Protocol (SIP), defined
in RFC 3261, is an application level control protocol for setting up, modifying, and
terminating real-time sessions between participants over an IP data network.
VOIP Processing:
Once a called party responds, a logical connection is established between the two parties
(or more for a conference call), and voice data may be exchanged in both directions. Figure
below illustrates the basic flow of voice data in one direction in a VoIP system. On the
sending side, the analog voice signal is first converted into a digital bit stream and then
segmented into packets. The packetization is performed, typically, by RTP (Real-time
Transport Protocol ). This protocol includes mechanisms for labeling the packets so that
they can be reassembled in the proper order at the receiving end, plus a buffering function
to smooth out reception and deliver the voice data in a continuous flow. The RTP packets
are then transmitted across the Internet or a private internet using the User Datagram
Protocol and IP protocols.
Ethernet:
IEEE 802.3 standard and commonly known as Ethernet is a dominant scheme for wired local
area network. The first commercially available Ethernet and the first version of IEEE 802.3 were
bus-based systems operating at 10 Mbps. As technology has advanced, Ethernet has moved
from bus-based to switch-based, and the data rate has periodically increased by an order of
magnitude. Currently, Ethernet systems are available at speeds up to 100 Gbps.
Two kinds of Ethernet exist: classic Ethernet, which solves the multiple access problem using
the techniques we have studied in this chapter; and switched Ethernet, in which devices called
switches are used to connect different computers. It is important to note that, while they are
both referred to as Ethernet, they are quite different. Classic Ethernet is the original form and
ran at rates from 3 to 10 Mbps. Switched Ethernet is what Ethernet has become and runs at
100, 1000, and 10,000 Mbps, in forms called fast Ethernet, gigabit Ethernet, and 10 gigabit
Ethernet. In practice, only switched Ethernet is used nowadays.
For classic Ethernet, as the frame of data needs to be sent through same medium,
medium access control (MAC) protocol such as CSMA/CD algorithm is used so that there
is no collision between two data frames. In this method, the station senses the medium
Characteristics:
Unified global networking platform
Packet-based network
Provides Telecommunication services to users
Quality of service enabled transport technologies (Delay, Throughput, and
reliability)
Services are independent of transport technologies
Unfettered access for users to network and services
This is a layer 2.5 networking protocol that provides additional features for the transport of
data across the network. MPLS is a mechanisms is high- performance telecommunications
networks that directs data from one network node to the next based on short path labels
rather than long network addresses, avoiding complex lookups in a routing table. MPLS
supports a range of access technologies, including T1/E1, ATM, Fame Relay and DSL.
A packet enters an MPLS domain through an ingress edge LSR, where it is processed to
determine which network-layer services it requires, defining its QoS. The LSR assigns this
packet to a particular FEC, and therefore a particular LSP; appends the appropriate label
to the packet; and forwards the packet. If no LSP yet exists for this FEC, the edge LSR
must cooperate with the other LSRs in defining a new LSP.
Within the MPLS domain, as each LSR receives a labeled packet, it
a. removes the incoming label and attaches the appropriate outgoing label to the
packet
b. forwards the packet to the next LSR along the LSP
The egress edge LSR strips the label, reads the IP packet header, and forwards the packet
to its final destination.
DSL offers several key advantages over other high speed communication solutions :