A WAN is a network that covers a broad geographic area using multiple interconnected networks. The largest WAN is the Internet, which many organizations use to connect distributed sites. WANs transmit data over various technologies including telephone networks, wireless networks, fiber optic networks and protocols like Frame Relay and ATM. Error correction is important in WANs to ensure reliable data transmission over long distances between sites.
Chapter 3 networking and internetworkingAbDul ThaYyal
This document discusses principles of computer networking and different types of networks. It covers the following key points:
- Networking principles include using packet switching for communication between nodes, employing layered network architectures with protocols at each layer, and selecting routes and streaming data packets.
- Different network types include local area networks (LANs), metropolitan area networks (MANs), wide area networks (WANs), wireless networks, and internetworks that connect multiple physical networks using protocols like TCP/IP.
- LANs connect nodes within a small area like a building using technologies like Ethernet. MANs and WANs operate over larger regions and connect multiple LANs, but have higher latency. The Internet is an
A computer network connects computers and devices together through communication devices and transmission media. It allows sharing of resources like printers, files, data and information. There are three main types of networks - local area networks (LANs) within a small geographical area, metropolitan area networks (MANs) within a city, and wide area networks (WANs) across large areas like countries. Network architecture refers to the overall design of a computer network and describes how it is configured and what strategies are used. The two main architectures are client/server, where a server provides services to clients, and peer-to-peer where all computers have equal capabilities without a central server.
This document provides an introduction to computer networks. It defines a computer network as two or more interconnected computers that allow sharing of resources. Computer networks enable communication and collaboration between individuals and organizations. They allow users to share hardware, software, data and perform centralized administration. Networks can be classified based on their scope, ownership, topology, transmission medium, connection management and transmission technology. Key network components include hardware like computers, cables and devices, as well as software like operating systems, applications, protocols and standards.
This document provides an overview of computer networks. It discusses the agenda and definitions of networks, advantages of networking, common network topologies including bus, star, ring and mesh. It also describes fundamental network classifications like LAN, MAN and WAN. The document outlines applications of networks and defines key components like links, nodes, switches, routers and hubs. It concludes with a discussion of cloud computing and modes of data transfer in networks.
This document discusses the key components that make up a computer network. It describes both hardware components like PCs, switches, routers, and cables as well as software components like email services. It focuses on the equipment used in a lab network, including workstations equipped with network interface cards, intermediary devices like routers and switches that direct traffic, and various transmission cables like twisted pair, coaxial, and fiber optic cables. It provides details on the functions of routers, switches, and hubs and describes common cable types and connectors used in setting up a local area network.
This document provides an introduction to computer networking. It defines a computer network as a group of two or more computers linked together and connected using various mediums like cables and wireless adapters. It then discusses the types of networks including local area networks (LANs) within limited areas like homes and schools, and wide area networks (WANs) which are combinations of multiple LANs, with the best example being the Internet. Finally, it outlines some key network components and terminology such as nodes, network interface controllers, media access control addresses, servers, clients, and networking devices like repeaters, hubs, switches, routers, firewalls, and CSU/DSUs.
Computer networks allow computing devices to communicate and share resources. Connections are usually made via physical wires or cables, but some use wireless radio or infrared signals. The Internet is a global wide-area network comprised of many smaller interconnected networks that are owned and managed by various organizations. It allows for the efficient transfer of data packets between networks via protocols like TCP/IP.
A wide area network (WAN) connects multiple local area networks (LANs) over a large geographical area like a country or continent. The hosts on the LANs are connected through communication lines and routers that make up the WAN subnet. The subnet carries messages between hosts, allowing computers in different locations to communicate. The objectives of building a WAN include consolidating data, voice and video services, reducing network costs, and improving performance through optimization. However, WANs are difficult for businesses to manage as traffic increases with cloud computing and emerging technologies. Cost effectiveness and reliability can also be challenges with WAN upgrades.
Chapter 3 networking and internetworkingAbDul ThaYyal
This document discusses principles of computer networking and different types of networks. It covers the following key points:
- Networking principles include using packet switching for communication between nodes, employing layered network architectures with protocols at each layer, and selecting routes and streaming data packets.
- Different network types include local area networks (LANs), metropolitan area networks (MANs), wide area networks (WANs), wireless networks, and internetworks that connect multiple physical networks using protocols like TCP/IP.
- LANs connect nodes within a small area like a building using technologies like Ethernet. MANs and WANs operate over larger regions and connect multiple LANs, but have higher latency. The Internet is an
A computer network connects computers and devices together through communication devices and transmission media. It allows sharing of resources like printers, files, data and information. There are three main types of networks - local area networks (LANs) within a small geographical area, metropolitan area networks (MANs) within a city, and wide area networks (WANs) across large areas like countries. Network architecture refers to the overall design of a computer network and describes how it is configured and what strategies are used. The two main architectures are client/server, where a server provides services to clients, and peer-to-peer where all computers have equal capabilities without a central server.
This document provides an introduction to computer networks. It defines a computer network as two or more interconnected computers that allow sharing of resources. Computer networks enable communication and collaboration between individuals and organizations. They allow users to share hardware, software, data and perform centralized administration. Networks can be classified based on their scope, ownership, topology, transmission medium, connection management and transmission technology. Key network components include hardware like computers, cables and devices, as well as software like operating systems, applications, protocols and standards.
This document provides an overview of computer networks. It discusses the agenda and definitions of networks, advantages of networking, common network topologies including bus, star, ring and mesh. It also describes fundamental network classifications like LAN, MAN and WAN. The document outlines applications of networks and defines key components like links, nodes, switches, routers and hubs. It concludes with a discussion of cloud computing and modes of data transfer in networks.
This document discusses the key components that make up a computer network. It describes both hardware components like PCs, switches, routers, and cables as well as software components like email services. It focuses on the equipment used in a lab network, including workstations equipped with network interface cards, intermediary devices like routers and switches that direct traffic, and various transmission cables like twisted pair, coaxial, and fiber optic cables. It provides details on the functions of routers, switches, and hubs and describes common cable types and connectors used in setting up a local area network.
This document provides an introduction to computer networking. It defines a computer network as a group of two or more computers linked together and connected using various mediums like cables and wireless adapters. It then discusses the types of networks including local area networks (LANs) within limited areas like homes and schools, and wide area networks (WANs) which are combinations of multiple LANs, with the best example being the Internet. Finally, it outlines some key network components and terminology such as nodes, network interface controllers, media access control addresses, servers, clients, and networking devices like repeaters, hubs, switches, routers, firewalls, and CSU/DSUs.
Computer networks allow computing devices to communicate and share resources. Connections are usually made via physical wires or cables, but some use wireless radio or infrared signals. The Internet is a global wide-area network comprised of many smaller interconnected networks that are owned and managed by various organizations. It allows for the efficient transfer of data packets between networks via protocols like TCP/IP.
A wide area network (WAN) connects multiple local area networks (LANs) over a large geographical area like a country or continent. The hosts on the LANs are connected through communication lines and routers that make up the WAN subnet. The subnet carries messages between hosts, allowing computers in different locations to communicate. The objectives of building a WAN include consolidating data, voice and video services, reducing network costs, and improving performance through optimization. However, WANs are difficult for businesses to manage as traffic increases with cloud computing and emerging technologies. Cost effectiveness and reliability can also be challenges with WAN upgrades.
This document discusses various WAN technologies and protocols. It covers circuit switching, message switching, packet switching, connection-oriented and connectionless services. Specific technologies covered include X.25, Frame Relay, ATM, ISDN, broadband ISDN, FDDI, satellite communication, polling, and ALOHA.
This document provides an overview of various networking components and devices, including hubs, switches, bridges, routers, gateways, and more. It describes the purpose and basic functions of each device. Hubs broadcast data to all ports, while switches only send data to the destination port, providing better performance. Switches can also operate in full-duplex mode for double the data throughput of half-duplex connections. The document provides details on ports, cables, speeds, and considerations for working with hubs and switches.
Here are short notes on X.25, ATM, and Frame Relay:
a. X.25 - X.25 is a protocol suite for packet switched WANs. It establishes switched virtual circuits between DTE devices using X.121 addressing. X.25 uses LAPB for data link layer and PLP for network layer. It provides reliable data transfer over public networks.
b. ATM - Asynchronous Transfer Mode is a cell switching and multiplexing technology designed for B-ISDN. It uses fixed size 53 byte cells and establishes permanent virtual circuits between endpoints. ATM supports real-time multimedia traffic using constant bit rate, variable bit rate and available bit rate.
c. Frame Relay -
This document discusses various networking devices and topologies. It describes physical topologies like bus, star, ring, and mesh. It also discusses logical topologies like broadcast and token passing. The document explains how devices like repeaters, hubs, bridges, and switches operate at different layers and work to extend networks and reduce collisions. Routers are also introduced as layer 3 devices that can connect different networks.
A computer network connects two or more computers through wired or wireless communication mediums in order to share computer resources and information. The key components of a computer network include sending devices that transmit information, receiving devices that accept transmitted data, communication devices like modems that enable communication between computers and other devices, and transmission mediums like cables and wireless technologies that carry communication signals from one place to another.
This document discusses network architecture and design. It covers component architectures, addressing and routing architectures, network management architecture, performance architecture, and security architecture. Some key points include:
- Component architecture describes how network functions are applied using hardware and software mechanisms.
- Addressing involves applying identifiers to network devices, while routing learns connectivity and forwards packets. Common addressing mechanisms include subnetting, super-netting, dynamic addressing, and private/public addressing.
- Network management architecture provides functions for controlling, planning, and monitoring network resources using mechanisms like monitoring, instrumentation, and configuration.
- Performance architecture allocates network resources to users and applications using mechanisms like quality of service, resource control, service level agreements, and policies.
This document discusses basic networking components. It introduces networking and its purposes like sharing resources and communication. It describes common networking devices like hubs, switches, routers, modems, network interface cards, and repeaters. It provides an overview of their functions and compares switches and hubs. The document also outlines common network platforms of client-server and peer-to-peer.
This document provides an introduction to the internet. It defines the internet as a global network connecting millions of computers. It describes some common uses of the internet like communication, research, education, and financial transactions. It also explains some key components of the internet like email, search engines, URLs, and how to connect to the internet using an internet service, modem, and web browser. Finally, it provides definitions and explanations of important internet-related terms like IP addresses and domain names.
Introduction to the Network Layer: Network layer services, packet switching, network layer performance, IPv4 addressing, forwarding of IP packets, Internet Protocol, ICMPv4, Mobile IP Unicast Routing: Introduction, routing algorithms, unicast routing protocols. Next generation IP: IPv6 addressing, IPv6 protocol, ICMPv6 protocol, transition from IPv4 to IPv6. Introduction to the Transport Layer: Introduction, Transport layer protocols (Simple protocol, Stop-and-wait protocol, Go-Back-n protocol, Selective repeat protocol, Bidirectional protocols), Transport layer services, User datagram protocol, Transmission control protocol
Computer networks connect computing devices to allow communication and sharing of resources. Connections are usually made with physical wires or cables, but some use wireless radio or infrared signals. The Internet is a global network made up of many smaller networks owned by different organizations. It uses protocols like TCP/IP to break messages into packets that are routed between networks to their destination, where they are reassembled. Domain Name System (DNS) servers translate between hostnames and numeric IP addresses to route traffic on the Internet.
A network allows nodes such as computers and devices to be connected so they can communicate. It has a topology that determines how the nodes are arranged and linked. It also uses transmission media like wires or wireless to transmit data between nodes. The purpose of networks is to facilitate communication both within and outside an organization by allowing sharing of resources like hardware, data, and applications.
This document provides an overview of computer networking concepts and terminology. It introduces the key components of a computer including the processor, memory, and input/output devices. It also covers communication devices and how they can be synchronous or asynchronous. The document discusses how networks are connected including different types of buses and hierarchies. It provides an overview of different operating systems from various developers. It also covers network structure, topologies, media, reliability, flow control, congestion, and the layered protocol architecture of the OSI model.
This document discusses factors to consider when designing a local area network (LAN), including network scale, networking technologies, and physical cables. It provides guidelines for determining the appropriate network scale based on the number of users, physical layout, software needs, and budget. Network scales discussed include peer networks for 2-10 users, single-server networks for 10-50 users, multiserver networks for 50-250 users, high-speed backbone networks for 250-1000 users, and enterprise networks for 1000+ users. Various networking technologies are also outlined such as Ethernet, Fast Ethernet, Token Ring, FDDI, Fiber Channel, ATM, and wireless options. Finally, physical cable types like twisted pair, coax, fiber,
Topic 1.1 basic concepts of computer networkAtika Zaimi
This document provides an overview of computer networks, including their components, characteristics, and classifications. It defines peer-to-peer and client-server networks, describing their advantages and disadvantages. Various network topologies such as bus, star, ring, and mesh are explained. The document also outlines the key standards organizations that set networking guidelines and lists common network hardware functions. Learners will gain an understanding of fundamental network concepts.
The document discusses various types of network components and transmission media. It provides details on:
1. Digital signals and how binary data is encoded into signal elements.
2. Several common encoding schemes for digital signals including unipolar, polar, and Manchester encoding.
3. Types of transmission media including guided media like twisted pair cable, coaxial cable, and fiber optic cable, and wireless media like radio waves, microwave signals, infrared light, and Bluetooth.
4. Key factors and tradeoffs in choosing different transmission media like cost, bandwidth capacity, attenuation levels, and vulnerability to electromagnetic interference.
- FDDI (Fiber Distributed Data Interface) is a ring-based fiber optic network standard from 1992 that provides up to 100 Mbps bandwidth. It uses a primary and secondary fiber optic ring topology with token passing to avoid collisions. ISDN (Integrated Services Digital Network) provides digital transmission of voice and data over telephone lines, offering up to 128 Kbps bandwidth through B channels for data and a D channel for signaling. Both FDDI and ISDN offer higher speeds than traditional networks but also have some disadvantages like higher costs and specialized hardware requirements.
This document discusses various WAN technologies and protocols. It covers circuit switching, message switching, packet switching, connection-oriented and connectionless services. Specific technologies covered include X.25, Frame Relay, ATM, ISDN, broadband ISDN, FDDI, satellite communication, polling, and ALOHA.
This document provides an overview of various networking components and devices, including hubs, switches, bridges, routers, gateways, and more. It describes the purpose and basic functions of each device. Hubs broadcast data to all ports, while switches only send data to the destination port, providing better performance. Switches can also operate in full-duplex mode for double the data throughput of half-duplex connections. The document provides details on ports, cables, speeds, and considerations for working with hubs and switches.
Here are short notes on X.25, ATM, and Frame Relay:
a. X.25 - X.25 is a protocol suite for packet switched WANs. It establishes switched virtual circuits between DTE devices using X.121 addressing. X.25 uses LAPB for data link layer and PLP for network layer. It provides reliable data transfer over public networks.
b. ATM - Asynchronous Transfer Mode is a cell switching and multiplexing technology designed for B-ISDN. It uses fixed size 53 byte cells and establishes permanent virtual circuits between endpoints. ATM supports real-time multimedia traffic using constant bit rate, variable bit rate and available bit rate.
c. Frame Relay -
This document discusses various networking devices and topologies. It describes physical topologies like bus, star, ring, and mesh. It also discusses logical topologies like broadcast and token passing. The document explains how devices like repeaters, hubs, bridges, and switches operate at different layers and work to extend networks and reduce collisions. Routers are also introduced as layer 3 devices that can connect different networks.
A computer network connects two or more computers through wired or wireless communication mediums in order to share computer resources and information. The key components of a computer network include sending devices that transmit information, receiving devices that accept transmitted data, communication devices like modems that enable communication between computers and other devices, and transmission mediums like cables and wireless technologies that carry communication signals from one place to another.
This document discusses network architecture and design. It covers component architectures, addressing and routing architectures, network management architecture, performance architecture, and security architecture. Some key points include:
- Component architecture describes how network functions are applied using hardware and software mechanisms.
- Addressing involves applying identifiers to network devices, while routing learns connectivity and forwards packets. Common addressing mechanisms include subnetting, super-netting, dynamic addressing, and private/public addressing.
- Network management architecture provides functions for controlling, planning, and monitoring network resources using mechanisms like monitoring, instrumentation, and configuration.
- Performance architecture allocates network resources to users and applications using mechanisms like quality of service, resource control, service level agreements, and policies.
This document discusses basic networking components. It introduces networking and its purposes like sharing resources and communication. It describes common networking devices like hubs, switches, routers, modems, network interface cards, and repeaters. It provides an overview of their functions and compares switches and hubs. The document also outlines common network platforms of client-server and peer-to-peer.
This document provides an introduction to the internet. It defines the internet as a global network connecting millions of computers. It describes some common uses of the internet like communication, research, education, and financial transactions. It also explains some key components of the internet like email, search engines, URLs, and how to connect to the internet using an internet service, modem, and web browser. Finally, it provides definitions and explanations of important internet-related terms like IP addresses and domain names.
Introduction to the Network Layer: Network layer services, packet switching, network layer performance, IPv4 addressing, forwarding of IP packets, Internet Protocol, ICMPv4, Mobile IP Unicast Routing: Introduction, routing algorithms, unicast routing protocols. Next generation IP: IPv6 addressing, IPv6 protocol, ICMPv6 protocol, transition from IPv4 to IPv6. Introduction to the Transport Layer: Introduction, Transport layer protocols (Simple protocol, Stop-and-wait protocol, Go-Back-n protocol, Selective repeat protocol, Bidirectional protocols), Transport layer services, User datagram protocol, Transmission control protocol
Computer networks connect computing devices to allow communication and sharing of resources. Connections are usually made with physical wires or cables, but some use wireless radio or infrared signals. The Internet is a global network made up of many smaller networks owned by different organizations. It uses protocols like TCP/IP to break messages into packets that are routed between networks to their destination, where they are reassembled. Domain Name System (DNS) servers translate between hostnames and numeric IP addresses to route traffic on the Internet.
A network allows nodes such as computers and devices to be connected so they can communicate. It has a topology that determines how the nodes are arranged and linked. It also uses transmission media like wires or wireless to transmit data between nodes. The purpose of networks is to facilitate communication both within and outside an organization by allowing sharing of resources like hardware, data, and applications.
This document provides an overview of computer networking concepts and terminology. It introduces the key components of a computer including the processor, memory, and input/output devices. It also covers communication devices and how they can be synchronous or asynchronous. The document discusses how networks are connected including different types of buses and hierarchies. It provides an overview of different operating systems from various developers. It also covers network structure, topologies, media, reliability, flow control, congestion, and the layered protocol architecture of the OSI model.
This document discusses factors to consider when designing a local area network (LAN), including network scale, networking technologies, and physical cables. It provides guidelines for determining the appropriate network scale based on the number of users, physical layout, software needs, and budget. Network scales discussed include peer networks for 2-10 users, single-server networks for 10-50 users, multiserver networks for 50-250 users, high-speed backbone networks for 250-1000 users, and enterprise networks for 1000+ users. Various networking technologies are also outlined such as Ethernet, Fast Ethernet, Token Ring, FDDI, Fiber Channel, ATM, and wireless options. Finally, physical cable types like twisted pair, coax, fiber,
Topic 1.1 basic concepts of computer networkAtika Zaimi
This document provides an overview of computer networks, including their components, characteristics, and classifications. It defines peer-to-peer and client-server networks, describing their advantages and disadvantages. Various network topologies such as bus, star, ring, and mesh are explained. The document also outlines the key standards organizations that set networking guidelines and lists common network hardware functions. Learners will gain an understanding of fundamental network concepts.
The document discusses various types of network components and transmission media. It provides details on:
1. Digital signals and how binary data is encoded into signal elements.
2. Several common encoding schemes for digital signals including unipolar, polar, and Manchester encoding.
3. Types of transmission media including guided media like twisted pair cable, coaxial cable, and fiber optic cable, and wireless media like radio waves, microwave signals, infrared light, and Bluetooth.
4. Key factors and tradeoffs in choosing different transmission media like cost, bandwidth capacity, attenuation levels, and vulnerability to electromagnetic interference.
- FDDI (Fiber Distributed Data Interface) is a ring-based fiber optic network standard from 1992 that provides up to 100 Mbps bandwidth. It uses a primary and secondary fiber optic ring topology with token passing to avoid collisions. ISDN (Integrated Services Digital Network) provides digital transmission of voice and data over telephone lines, offering up to 128 Kbps bandwidth through B channels for data and a D channel for signaling. Both FDDI and ISDN offer higher speeds than traditional networks but also have some disadvantages like higher costs and specialized hardware requirements.
This document discusses MPLS VPN technology. It provides an overview of MPLS VPN concepts including how MPLS VPN works, key terminology, the connection model, forwarding mechanisms, and configuration. The connection model section describes how VPNs are implemented using MPLS, with PE routers maintaining separate routing instances (VRFs) for each VPN and exchanging routing information between VPN sites using MP-BGP. Core P routers are unaware of VPNs and switch packets using MPLS labels.
This document discusses various data communication techniques including packetization, multiplexing, and switching. It describes how data is divided into packets with header information added. It explains different types of multiplexing including frequency division, time division, and statistical time division. It also covers circuit switching versus packet switching and different error control techniques such as parity checks, checksums, and cyclic redundancy checks used to detect errors.
Voice over MPLS (VoMPLS) allows multiple voice calls to be transported efficiently over a single MPLS label switched path (LSP) by reducing header overhead. There are three modes of carrying voice in MPLS networks, depending on requirements. VoMPLS uses LSPs to provide predictable quality of service for voice packets by multiplexing multiple calls into primary and control subframes that are transmitted together within an MPLS frame. This provides an efficient mechanism for voice transport that reduces costs compared to traditional circuit-switched networks.
Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...P1Security
This document discusses the history of telecommunications security and exploring signaling networks. It begins with the origins of "phreaking" in the 1960s and blue boxes. It then covers more modern threats like SIP account hacking and SS7/SIGTRAN hacking. The document reviews digital telephony concepts and how SS7 networks are organized. It explains how SIGTRAN moved SS7 to TCP/IP using SCTP. It discusses discovering SS7 networks through SCTP scanning and fingerprinting SCTP stacks. The presentation demonstrates SCTPscan and analyzing higher layer protocols with Ethereal.
This document summarizes different techniques for encoding digital data into an analog signal for transmission, including: non-return to zero (NRZ) encoding, Manchester encoding, biphase encoding, scrambling, and modulation techniques like amplitude shift keying (ASK), frequency shift keying (FSK), and phase shift keying (PSK). It discusses the pros and cons of different encoding schemes in terms of synchronization, error detection, bandwidth usage, and noise immunity. The document is from a textbook on data and computer communications.
Circuit switching and packet switching are the two main switching technologies used in communications networks. Circuit switching establishes a dedicated communication path between two stations for the duration of the connection. Packet switching breaks messages into packets that are transmitted individually over a network and reassembled at the destination. It provides more efficient use of network bandwidth than circuit switching.
Cellular technology has evolved rapidly over the past decade. 4G LTE provides significantly higher data speeds compared to previous generations and is enabling new applications requiring high-bandwidth. This presentation provided an overview of cellular network components, IP technologies used in cellular networks, and how data flows differently in 2G, 3G, and 4G LTE networks.
The document provides information about a training event on Deploy MPLS Traffic Engineering taking place from 20 February to 2 March 2017 in Ho Chi Minh City, Vietnam. It includes details about two presenters - Nurul Islam Roman, Manager of Training & Technical Assistance at APNIC, and Jessica Wei, Training Officer at APNIC. It also acknowledges Cisco Systems and provides an agenda with topics on why MPLS Traffic Engineering is used and how it works.
For enterprise network engineers, implementing BGP can be an intimidating task. This presentation was given to address common architectures for internet and MPLS BGP usage, along with best practices.
This document describes a presentation on designing MPLS Layer 3 VPN networks, covering MPLS VPN technology overview, configuration, services such as multihoming and hub-and-spoke, and best practices. The presentation discusses how MPLS VPNs use VRFs, MP-BGP, and label switching to provide scalable VPN services to enterprises by separating routing and forwarding tables for each customer VPN. Sample MPLS VPN configurations for PE, P, and route reflector routers are also provided.
The document provides an introduction to MPLS (Multi-Protocol Label Switching) technology. It discusses the goals of MPLS including understanding the business drivers, market segments, problems addressed, benefits, and major components. The key components of MPLS technology are explained, including MPLS forwarding and signaling, label distribution protocols, MPLS network services like VPNs, QoS, and traffic engineering. An overview of typical MPLS applications is also provided.
This document describes the evolution of 2G and 3G mobile network architectures. It shows:
1) The separation of the control plane and user plane in 3GPP Release 4, with the MSC Server handling signaling and Media Gateways handling transmission.
2) How the MSC Server system provides operational expenditure savings by moving voice and signaling transmission to IP networks and separating equipment for more flexible siting.
3) How the MSC Server system allows investment protection by supporting existing services on GSM, EDGE, 3G and TDM, IP, and ATM transmission networks.
Overview of VPN protocols.
VPNs (Virtual Private Networks) are often viewed from the perspective of security with the goal of providing authentication and confidentiality.
However, the primary purpose of VPNs is to connect 2 topologically separated private networks over a public network (typically the Internet).
VPNs basically hook a network logically into another network so that both appear as one private local network.
Security is a possible add-on to VPNs. In many cases it makes perfectly sense to secure the VPNs communication over the unsecure public network.
VPN protocols typically employ a tunnel where data packets of the local network are encapsulated in an outer protocol for transmission over the public network.
The most important VPN protocols are IPSec, PPTP and L2TP. In recent years SSL/TLS based VPNs such as OpenVPN have gained widespread adoption.
The document provides an overview of LTE (Long Term Evolution) network architecture and transmission schemes. It describes the simplified LTE network elements including eNB, MME, S-GW and P-GW. It explains the downlink transmission scheme using OFDMA and reference signal structure. It also covers uplink transmission using SC-FDMA, control and data channels as well as frame structure in both FDD and TDD modes.
Frame Relay is a packet-switching protocol used to transmit data over wide area networks in an efficient manner. It segments data into variable length frames and leaves error correction to end points, allowing for faster transmission. Frame Relay provides permanent virtual circuits to make connections appear dedicated while allowing dynamic routing of frames.
A WAN is a network that connects devices over a broad geographic area using common carrier transmission facilities. Components of a WAN include nodes, routers, hosts, and physical links. There are different switching techniques used in WANs, including circuit switching which establishes a dedicated connection for the duration of communication, and packet switching which divides data into packets that can take different paths to the destination. Packet switching includes datagram and virtual circuit approaches, with virtual circuits pre-establishing logical connections between sender and receiver. Frame relay is a virtual circuit WAN technology that uses permanent and switched virtual circuits.
This document discusses wide area network (WAN) technologies. It begins by defining WAN characteristics such as interconnecting computers over long distances using various media. It then describes different WAN technologies including circuit-switched networks, packet-switched networks, and virtual circuit networks. Specific routing protocols and concepts are explained like distance vector routing, link state routing, static versus dynamic routing. The document concludes by listing various WAN technology options for connecting sites like dial-up, leased lines, frame relay, ATM, microwave links and satellite.
X.25 is a protocol standard developed in the 1970s for wide area network communications. It defines how connections are established and maintained between user devices and network devices. X.25 operates at the physical, data link, and network layers of the OSI model. It uses LAPB at the data link layer and PLP at the network layer to transfer data and establish virtual circuits between DTE devices across a packet switched network. Frame Relay was developed later to provide higher speeds and efficiency compared to X.25.
Packet switching is a digital networking method that groups transmitted data into blocks called packets. It began in the 1960s and was first developed by Paul Baran. There are two main types: datagram packet switching treats each packet independently while virtual circuit packet switching establishes a logical connection before sending packets along the same path. X.25 is a standard protocol for packet switched networks that provides reliable data transfer and error control. It defines the connection between a terminal and a packet switched network using three device types: DTE, DCE, and PSE.
This document provides an overview of wide area network (WAN) physical layer concepts, including terminology, standards, and technologies. It discusses customer premises equipment, data terminal equipment, data communication equipment, local loops, demarcation points, central offices, and WAN devices like modems, CSU/DSUs, access servers, switches, and routers. Common WAN physical layer standards like EIA/TIA-232, EIA/TIA-449/530, EIA/TIA-612/613, V.35, and X.21 are described. The document also covers WAN data link protocols, encapsulation, circuit switching versus packet switching, virtual circuits, and examples of packet-sw
Frame Relay is a high-performance WAN protocol that operates at the physical and data link layers of
the OSI reference model. Frame Relay originally was designed for use across Integrated Services Digital
Network (ISDN) interfaces. Today, it is used over a variety of other network interfaces as well.
Frame relay is a type of WAN connection use to connect one site to many remote sites through a single
physical circuit; this operation makes it easy to construct reliable and inexpensive networks.
Frame Relay is a high-performance WAN protocol that operates at the physical and data link layers of the OSI reference model. It is a simplified form of packet switching similar to X.25 but switches packets faster with no guarantee of data integrity. Frame Relay uses virtual circuits identified by DLCIs to transmit variable-length frames between DTE devices. It provides both permanent and switched virtual circuits. While Frame Relay allows for more efficient bandwidth usage, its variable frame delays make it unsuitable for real-time applications.
- A switch is a multi-input, multi-output device that transfers packets from an input to one or more outputs, allowing links to be interconnected to form a larger network.
- There are two main types of switching: circuit switching establishes a dedicated end-to-end path before information transfer, while packet switching involves intermediate nodes storing incoming data blocks and retransmitting them along the path to the destination.
- X.25 is a widely used packet switching protocol that defines how a terminal connects to a packet network and how packets are exchanged over that network using devices like modems and packet switches.
This document summarizes circuit switching and packet switching approaches in computer networks. It discusses how circuit switching establishes a dedicated path but can waste bandwidth if no data is being sent. Packet switching breaks messages into packets that are transmitted independently and can make more efficient use of bandwidth. The document also describes protocols like X.25 and Frame Relay, noting how Frame Relay simplified X.25 by removing flow and error control to reduce overhead.
This document summarizes circuit switching and packet switching approaches in computer networks. It discusses how circuit switching establishes a dedicated path but wastes bandwidth when no data is being sent. Packet switching breaks messages into packets that are transmitted independently and can make more efficient use of bandwidth. The document also describes protocols like X.25 that were used for packet switched networks and Frame Relay, which was designed to reduce overhead and improve performance compared to X.25.
Introduction to TCP/IP: Issues in IPV4, IPV6 protocol
Mature Packet Switching Protocols:ITU Recommendation X.25, User Connectivity, Theory of Operations, Network Layer Functions, X.75 Internetworking Protocol, Advantages and
Drawbacks
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Pradnya Saval
Introduction to TCP/IP: Issues in IPV4, IPV6 protocol, Mature Packet Switching Protocols: ITU Recommendation X.25, User Connectivity, Theory of Operations, Network Layer Functions, X.75 Internetworking Protocol, Advantages and Drawbacks
Packet switching is a data transmission technique that divides data into small packets before transmission. Each packet contains a header with source and destination addresses, a payload with the original data, and a trailer with a checksum. Packets are transmitted hop-by-hop through a packet switched network and reassembled at the destination. X.25 was an early protocol for packet switched networks that established virtual circuits to provide reliable connections over unreliable transmission links. It defined physical, link, and packet layer protocols to assemble and transmit packets through public data networks. Frame Relay and ATM are later protocols that also use virtual circuits to transmit packets through packet switched networks.
Packet switching is a data transmission technique where data is divided into small packets before being transmitted over a network. Each packet contains a header with addressing information and the data. Packet switching networks allow for efficient use of bandwidth and transmission of data from many sources simultaneously. The X.25 protocol was an early standard that used packet switching and virtual circuits to transmit data reliably over public packet switched networks. It defined protocols for call setup, data transfer, and flow control between network nodes.
This chapter discusses network connectivity and operating systems. It explains networking basics such as topologies, hardware, protocols, and how devices connect to networks. It describes client and server operating systems and their roles. It also covers common network protocols like TCP/IP, Ethernet, wireless technologies, and how they are configured in operating systems. Network devices, addressing, and automatic configuration using DHCP are also summarized.
This document provides information on various intranet, extranet, and wide area network (WAN) technologies. It discusses unified threat management (UTM), content distribution networks (CDN), software-defined networking (SDN), metropolitan area networks (MAN), and common WAN concepts and technologies including CSU/DSU, switching, frame relay, X.25, and asynchronous transfer mode (ATM).
Wide area networks connect local area networks over long distances using transmission technologies and devices. Common WAN connection methods include circuit-switched networks like ISDN, leased lines using T-carrier or SONET technologies, packet-switched networks like Frame Relay and ATM, and VPNs over the public Internet. Remote access allows connections from outside the LAN using dial-up, VPNs, or remote desktop applications. Cloud computing provides hosted applications, platforms, and infrastructure over the Internet on a pay-as-you-go basis.
The document discusses different network switching techniques including circuit switching, packet switching, datagram switching, virtual circuit networks, and message switching. It provides details on how each technique works, including setup/teardown phases for circuit switching, treating each packet independently for datagram networks, and storing entire messages at intermediate nodes for message switching. Key aspects like bandwidth efficiency and reliability are compared between the different techniques.
This document provides an overview of wide area networks (WANs) including what they are, how they have evolved, common connection technologies and options. A WAN connects devices over a broader geographic area than a local area network (LAN) using carriers. As networks grow, hierarchical designs must also grow to aggregate WAN traffic and provide scalability, availability and user access. Common WAN connection technologies include dedicated leased lines, circuit-switched options like ISDN, and packet-switched options like Frame Relay, ATM, DSL, cable broadband and wireless. Virtual private networks (VPNs) provide secure, encrypted connections between private networks over public networks like the Internet.
The document discusses various topics related to network troubleshooting including:
- Common causes of problems in the physical environment like temperature, air quality, and magnetism.
- Electrical problems such as crosstalk, noise, static, and transients; and their solutions like properly grounding equipment and using shielding.
- Types of malware like viruses, worms, Trojan horses, and how anti-virus software works to detect them.
- The importance of network management and planning through documentation, policies, backups, standards, and change management to prevent problems.
- Methods for monitoring network performance and troubleshooting issues using tools like SNMP, protocol analyzers, cable testers and more.
This document discusses various types of networking devices that can be used to expand and connect networks, including hubs, switches, bridges, routers, and multiplexers. Hubs are multiport repeaters that interconnect devices on a network. Switches subdivide networks into smaller logical segments. Bridges and routers can connect different networks, with routers operating at the network layer. Multiplexers allow multiple signals to share a single communication link.
This document summarizes different types of remote access connections and technologies. It discusses dial-up modem connections, DSL, cable modems, and wireless connections as common ways for consumers and businesses to access the internet. It also describes leased lines and remote access software. Leased lines provide dedicated high-speed connections between two locations, while remote access software like Windows Remote Access Service allows remote dial-up connections to a server. The document provides an overview of remote access technologies and infrastructure.
The document discusses key aspects of network administration including:
1. The network administrator is responsible for creating, protecting, and managing the network environment. This includes setting up user accounts, groups, software, and security measures.
2. Creating the network environment involves setting up user accounts, groups, network software, and external connectivity. User accounts need to be properly configured and managed.
3. Protecting the network requires implementing security, virus protection, backups, and disaster recovery plans. These help ensure the network runs smoothly and is protected from threats.
The document discusses configuring network clients. It covers six common client operating systems: Windows 95, Windows NT Workstation, OS/2, MS-DOS, Macintosh, and Unix. It also discusses installing and configuring network adapters, including installing hardware and drivers. Additionally, it covers selecting network protocols like IPX/SPX, NetBEUI, and TCP/IP and connecting clients to network services.
This document discusses network server hardware, software, and applications. It describes the typical components of a client and server, including the server requiring more processing power, memory, and storage. It explains that a network operating system runs on the server to allow sharing of resources, while client software provides access to those shared resources. Common network applications like email, file sharing, and group scheduling are also outlined.
LAN architecture includes hardware, software, topology, and MAC protocols. There are two types of topologies - physical regarding physical connections and logical regarding message passing. Ethernet uses CSMA/CD while token ring uses token passing as the MAC protocol. Factors to consider when choosing a LAN include costs, performance, standards, and manageability.
The document discusses the OSI model and TCP/IP protocols. It describes the seven layers of the OSI model including the physical, data link, network, transport, session, presentation and application layers. It explains how data is passed between layers and segmented for transmission. The document also discusses common network protocol stacks like TCP/IP, compares the OSI model to the TCP/IP model, and describes some common TCP/IP protocols like HTTP, FTP, SMTP and DNS.
Introduction to Networks & Networking Conceptszaisahil
The document provides an overview of computer networks and networking concepts. It defines what a computer network is, discusses the key components of networks including hardware, software, media and design. It also covers different types of networks like LANs, WANs and MANs. The document discusses peer-to-peer and client-server network models and the roles of clients, servers and network services. It provides examples of specialized servers like file servers, mail servers and web servers. Finally, it discusses factors to consider when selecting the right type of network.
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
This presentation was provided by Racquel Jemison, Ph.D., Christina MacLaughlin, Ph.D., and Paulomi Majumder. Ph.D., all of the American Chemical Society, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
2. What is a WAN?
• A wide area network (WAN) is one of the oldest kinds of data
communication networks
• A WAN is a distributed network that covers a broad geographic area;
a WAN typically consists of multiple networks at geographically
distributed locations that are interconnected
• Relative to LANs or MANs (see Figure 10-2) a WAN typically covers
a wider geographic area (see Figure 10-1) and operates at lower speeds
• The Internet is the largest WAN that has been created
– Many organizations leverage the Internet backbone to connect
geographically distributed sites
– Some links in the Internet backbone have transmission speeds higher than
those found in LANs and WANs
5. Public Swathed telephone Network (PSTN)
• PSTNs were originally design exclusively for
telephone but have become highly sophisticated,
able to handle different kinds of data transmission,
including digital data transmission.
• PSTN consists following components:
– Subscriber wiring and equipment
– Demarcation point
– Local loops
– Central offices
– Switching offices
– Long-distance carriers
– Points of presence
– Data transmission services
6. Public Swathed telephone Network (PSTN)
• PSTN provides a number of options for data
communications, including services that routs
packets between different sites. Some available
services and transmission rates are given below:
Service Transmission Rate
– Switched 56 56Kpbs
– X.25 56Kpbs
– T1 1.544Mbps
– T3 44.736Mbps
– Frame Relay 1.544Mbps
– SMDS 1.544Mbps
– ISDN 1.544Mbps
– ATM 44.736Mbps
7. The Internet
• SLIP and PPP : Serial Line Protocol (SLIP) and Point-to-
Point Protocol (PPP) are two very common protocols used
to transmit IP packets over serial line and telephone
connections, most often as part of a dial-up Internet
connection.
• The TCP/IP protocol suite runs over a variety of network
media: IEEE802.3 (Ethernet), and 802.5 (Token Ring)
LAN X.25 line satellite links and serial lines.
• PPP is a multiprotocol transport mechanism. While SLIP is
design to handle one type of traffic (TCP/IP traffic) at a
time, PPP can transport TCP/IP traffic as well as IPX,
Apple Talk and other types of traffic simultaneously on the
same connection.
8. WAN Services Fundamentals
• There are two major categories of WAN
connections:
– Circuit-switched networks
– Packet-switched networks
• Switching is fundamental to both approaches
– Switching technologies establish paths across networks
from senders to receivers
– Switching allows connections to be established and
maintained between senders and receivers so that they
can exchange messages and information
9. Circuit-Switched Networks
• In circuit-switched networks, a switched dedicated circuit is created to
connect two (or more) parties
– To users, it is as if a direct physical point-to-point path is established
between sender and receiver
– Multiple-switches may be involved is establishing a switched connection
(see Figure 12-1)
• There are three phases to circuit-switched communications:
– Creation of the temporary circuit
– Information transmission
– Circuit termination
• Because there is a limit to the number of switched connections that can
be established at a particular point in time, circuit-switched network
users may not be able to initiate communication sessions during peak
usage times
11. Packet-Switched Networks
• In packet-switched networks (see Figure 12-2), data is
packetized prior to transmission
– Each packet is a group of bits organized in a predetermined
structure
– Each packet contains data bits as well as additional overhead
information to ensure error-free transmission to intended
recipients
– Packets may be called blocks, cells, datagrams, data units, or
frames
• Packet assembler/disassemblers (PADs) are responsible for
assembling outgoing data into packets for transmission over the
packet-switching network as well as for unpacking incoming
packets so that data can be delivered to intended recipients
13. Packet Formats
• Figure 12-3 illustrates the format of HDLC
packets used in X.25 packet-switching networks
Major overhead fields include:
– Flag: used to delimit the beginning and end of a packet
– Address: specifies the address of the intended packet
recipient
– Control: transports packet sequence numbers and
retransmission requests
– Frame check: used for error checking. CRC-16 or a 16-
bit checksum may be used with HDLC frames
15. Packet-Switching Advantages
and Disadvantages
• Relative to circuit-switching, packet-switching has a number of advantages
and disadvantages. Advantages include:
– A single-link between packet-switching nodes can be simultaneously
shared by multiple senders and receivers; senders are not denied access to
the network during peak usage periods
– Packet-priority systems can be established
– Subscribers to packet-switching services are often charged on the volume
of data (number of packets) transmitted rather than connection time
• Disadvantages include:
– Variable transmission delays caused by packet processing and packet
queues at packet switches
– Some packet-switching networks support variable packet sizes; this
contributes to longer packet processing times at packet switches
– The inclusion of overhead data in packets means that data transmission
efficiency and throughput is lower than that in circuit-switched networks
16. Switching Alternatives in Packet-
Switched Networks
• Two fundamental approaches are used to route packets from senders to
receivers:
– Datagram approach: individual packets, even those associated with a
single file, are routed independently
• Two packets (datagrams) from the same source can have two
different temporary circuits established to the same recipient
• This type of circuit allocation is called connectionless because a
dedicated connection is not established and because the packets that
make up a single file do not follow each other over the same circuit
from sender to receiver
– Virtual circuit approach: this is similar to establishing a dedicated circuit
in a circuit-switched network. Packets that comprise a single file (or
message) follow the same route in sequence from sender to receiver.
• This type of packet-switching is called connection-oriented
• It is not identical to circuit-switched connections because the route
segments in virtual circuits are shared, not dedicated
17. Virtual Circuits
• Call setup packets are used to establish virtual circuits; these are used
to identify the best path to the destination across the network.
• Virtual circuit details are stored in virtual circuit tables at packet
switches
• The paths followed by packets in virtual circuits are called logical
channels; each packet includes a logical channel number when created
by the PAD
• There are two major types of virtual circuits:
– Switched virtual circuits (SVCs): which are similar to temporary circuit-
switched connections
– Permanent virtual circuits (PVCs): which is similar to a leased, circuit-
switched connection
• Once a PVC is allocated, no call setup or call clearing is needed; the logical
circuit is permanently stored in virtual circuit tables
18. Packet Switching Protocol
• Packet-switching concepts
• A PDN is sometimes called an X.25 network or public data network.
– The X.25 designation stems from ITU’s recommendation X.25 which
defines the interface between DTE and DCE for public data networks (see
Figure 12-4)
– The term value-added network (VAN) is often used in conjunction with
PDNs because network proprietors offer additional services beyond mere
data transmission including virtual circuits, error recovery, network
management, message priorities, and store-and-forward capabilities
• X.25 PDNs are more widely available outside the U.S.
– In the U.S., frame relay services are more common than X.25
20. PDN Error Correction Processes
• PDNs employ node-to-node (aka hop-to-hop or point-to-
point) error detection and correction (see Figure 12-8)
• Each packet is checked for errors at each packet switch
before being forwarded to the next hop on its path
• If no errors are detected, an ACK is sent to the previous
hop
• If errors are detected, a NAK is sent to the previous hop
which triggers retransmission of the packet
• This process means that PDNs are store-and-forward
networks; packets are stored at switching nodes until
positive acknowledgements are received
22. Frame Relay Technologies
• Key technologies in frame relay networks are illustrated in
Figure 12-9. These include:
– Frame assembler/dissembler devices (FRADs) which like X.25
PADs are responsible for building outgoing frames and unpacking
incoming frames
– Frame relay switches which are responsible for accepting frames,
checking them for errors, and transmitting them to their next hops
in the network
• Both switched and permanent virtual circuits are supported in frame
relay networks
– Frame relay circuits. Frame relay switches are typcially connected
by DS-1 (T-1) or DS-3 (T-3) circuits. The Frame Relay Form
(FRF) has addressed connections up to 622 mbps (OC-12)
24. Frame Formats
• Frames are formatted by FRAD devices or software
• Variable length frames may be supported; some may
include up to 8,000 characters
• Figure 12-11 shows a LAPD (Link access Procedure—D
channel) frame relay
• The address field carries the recipient’s network address as
well as a data link connection identifier (DLCI) that serves
the same purpose as a virtual circuit identifier in X.25 (see
Figure 12-12)
• The BCEN, FCEN, and DE fields are used to address
network congestion during peak usage periods
26. Asynchronous Transfer Mode (ATM)
• ATM is a high-bandwidth, low-delay, packet-switching and multiplexing
technology that can handle many types of network traffic and WAN services
• ATM represents a step in the evolution of frame relay by using frames (called
cells) that do not vary in size
– The use of small fixed-size packets translates into easier switching and
faster transmission rates.
– By 2002, ATM transfer rates of 38.813 gbps had been achieved over OC-
768 circuits
• Virtual channels are used in ATM to establish logical connections between
senders and receivers (see Figure 12-13)
– Once setup up, full-duplex variable-rate transmission is possible over the
connections
• Virtual paths are also supported. These are bundles of virtual channels with
the same end-points that are switched as a set. Each channel can carry a
different type of data
28. ATM Cell Formats
• Two cell formats have been specified for
ATM (see Figure 12-14):
– User-network interface (UNI): UNI cells carry
data between the user and the ATM network
– Network-network interface (NNI): NNI cells
carry network control information between
ATM switches
• NNI also enables network control information to be
exchanged between different ATM networks
30. T- Carrier
T-carrier Bandwidth No. Of T1 Channels used
• T1 1.544Mbps 1
• T2 6.312Mbps 4
• T3 44.736Mbps 28
• T4 274.176Mbps 168
31. T-1 Service Access Technologies
• Businesses use a variety of services to
access T-1 services (see Figure 12-18).
These include:
– T-1 CSU/DSUs
– T-1 multiplexers
– T-1 channel banks
– T-1 switches
33. SONET Services
• Synchronous optical network (SONET) is an optical transmission
interface/specification for high-speed digital transmission over optical
fiber
• SONET specifications define a hierarchy of standardized data transfer
rates over optical media. An abbreviated set is provided in Table 12-2
– Each level is capable of carrying multiple lower-speed signals. An STS-1
channel, for example, is capable of carrying multiple DS-1 (T-1) signals
• STS-1 frames are the fundamental data transmission format in SONET
(see Figure 12-19)
– Each consists of 810 octets that can logically be depicted as a matrix of 9
rows with 90 octets in each row
– 87 octets in each row carry data and can be flexibly allocated to lower
bandwidth channels such as DS-0, DS-1, and DS-2
• SONET service access technologies include add-drop multiplexors,
cross-connect switches, and broadband bandwidth managers
35. ISDN
• Integrated Services Digital Network (ISDN) is widely used by
business to provide digital WAN services among geographically
dispersed operating locations
• ISDN switches are the core of the ISDN network (see Figure 12-20)
• Two major categories of ISDN are:
– Narrowband ISDN. This is essentially a circuit-switched digital network
service that allows temporary connections to be dynamically created and
terminated among ISDN subscribers. Two narrowband service levels
exist:
• Basic rate interface (BRI) that supports two 64 kbps bearer channels and one
16 kbps data channel (2B+D)
• Primary rate interface (PRI) with 23 64 bps bearer channels and a 64 bps data
channel (23B+D)
– Broadband ISDN (B-ISDN) which may be described as ATM over
SONET
37. Wireless WAN Services
• Increasingly, organizations are turning to wireless WAN
services to satisfy their data communication needs
including:
– Circuit-switched cellular systems (see Figure 12-21)
– Cellular digital packet data (CDPD)
– ARDIS (Advanced Radio Data Information Service)
– Mobitex
– Metricom (see Figure 12-22)
– Personal communication services (PCS)
– Broadband wireless services (such as wireless T-1 service)
40. Fiber Distributed Data Interface (FDDI)
• FDDI (standardized as ANSI X3T9.5) backbone
protocol was developed in the 1980s and popular
during the 80s and 90s.
• FDDI operates at 100 Mbps over a fiber optic
cable.
• Copper Distributed Data Interface (CDDI) is a
related protocol using cat 5 twisted wire pairs.
• FDDI’s future looks limited, as it is now losing
market share to Gigabit Ethernet and ATM.
41. FDDI Topology (Figure 7-15)
• FDDI uses both a physical and logical ring
topology capable of attaching a maximum
of 1000 stations over a maximum path of
200 km. A repeater is need every 2 km.
• FDDI uses dual counter-rotating rings
(called the primary and secondary). Data
normally travels on the primary ring.
• Stations can be attached to the primary ring
as single attachment stations (SAS) or both
rings as dual attachment stations (DAS).
43. FDDI’s Self Healing Rings
• One important feature of FDDI is its ability
to handle a break in the ring to form a
temporary ring out of the pieces of the two
rings.
• Figure 7-16, show an example of a cable
break between two dual-attachment
stations.
• After the cable break is detected, a single
ring is formed out of the primary and
secondary rings until the cable break can be
repaired.
45. FDDI Media Access Control
• FDDI uses a token passing system. Computers wanting to
send packets wait to receive a token before transmitting.
• Multiple packets can be attached to the token as it moves
around the network.
• When a station receives the token, it looks for attached
packets addressed to it and removes them from the incoming
packet.
• If the station wants to send a packet it attaches it to the token
and sends the token with its attached packets to the next
station.
• This controlled access technique provides a higher
performance level at high traffic levels compared to a
contention-based technique like Ethernet.
46. Advantages and Disadvantages of
FDDI: Advantages
• High bandwidth
• Security
• Physical durability
• Resistance to EMI
• Cable distance
• Weight
• Use of multiple token
• Ability to prioritize workstation
• System fault tolerance
47. Advantages and Disadvantages of
FDDI: Disadvantages
• Complex technology
• Installation and maintenance require a great
deal of expertise
• Cost
48. Asynchronous Transfer Mode (ATM)
• Asynchronous Transfer Mode (ATM) (also
called cell relay) is a technology originally
designed for use in wide area networks that
is now often used in backbone networks.
• ATM backbone switches typically provide
point-to-point full duplex circuits at 155
Mbps (total of 310 Mbps).
49. ATM vs. Switched Ethernet
• ATM is a switched network, but differs from
switched Ethernet in four ways:
1. ATM uses small, fixed-length packets of 53 bytes
(called cells). Ethernet frames are variable and can
be up to about 1 kilobyte in length.
2. ATM provides no error correction on the user
data. Switched Ethernet does error correction.
3. ATM uses virtual channels instead of the fixed
addresses used by traditional data link layer
protocols such as switched Ethernet (see Fig. 7-17).
4. ATM prioritizes transmissions based on Quality of
Service (QoS), while switched Ethernet does not.
51. ATM’s Virtual Circuits
• ATM is connection-oriented, meaning all
packets travel in order through the same
virtual circuit.
• There are two types of ATM virtual
circuits:
– Permanent Virtual Circuits (PVCs) - defined
when the network is established or modified.
– Switched Virtual Circuits (SVCs) - defined
temporarily for one transmission and deleted
when the transmission is completed.
52. LAN Encapsulation
• The first step in LAN Encapsulation is to create an
ATM virtual circuit identifier for the virtual circuit
that will connect the “gateway” ATM edge switch
to the ATM edge switch nearest the frame’s
destination (see Figure 7-18)
• Once the virtual circuit is ready, the Ethernet
frame is broken up into a series of ATM cells and
sent over the ATM backbone using the ATM
virtual circuit identifier.
• At the receiving edge switch the frame is
reassembled. Unfortunately LAN has very high
overhead and so network performance suffers as a
consequence.
54. ATM to the Desktop
• ATM-25 is a low-speed option that provides
point-to-point full duplex circuits at 25.6 Mbps in
each direction. It is an adaptation of token ring
that runs over cat 3 cable and can even use token
ring hardware if modified.
• ATM-51 is designed for the desktop allowing
51.84 Mbps from computers to the switch.
• Both these ATMs appear to be good choices for
desktop connections when ATM backbone
networks are used. However, industry has been
very slow to accept either and have instead moved
to Fast Ethernet which is both cheaper and faster.