hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n....

40
UNIT V LAN AND ISDN LAN A l ocal- a rea n etwork ( LAN ) is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves. There are many different types of LANs, with Ethernets being the most common for PCs. Most Apple Macintosh networks are based on Apple's AppleTalk network system, which is built into Macintosh computers. The following characteristics differentiate one LAN from another: Topology: The geometric arrangement of devices on the network. For example, devices can be arranged in a ring or in a straight line. Protocols: The rules and encoding specifications for sending data. The protocols also determine whether the network uses a peer-to-peer or client/server architecture. Media: Devices can be connected by twisted-pair wire, coaxial cables, or fiber optic cables. Some networks do without connecting media altogether, communicating instead via radio waves. Wireless networks are relatively easy to implement these days, especially when compared to the prospect of having to route wires when deploying a new wired network or overhauling an existing

Transcript of hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n....

Page 1: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

UNIT V

LAN AND ISDN

LAN

A local-area network (LAN) is a computer network that spans a relatively small area. Most

often, a LAN is confined to a single room, building or group of buildings, however, one LAN

can be connected to other LANs over any distance via telephone lines and radio waves.

There are many different types of LANs, with Ethernets being the most common for PCs. Most

Apple Macintosh networks are based on Apple's AppleTalk network system, which is built into

Macintosh computers. The following characteristics differentiate one LAN from another:

Topology: The geometric arrangement of devices on the network. For example, devices can be

arranged in a ring or in a straight line.

Protocols: The rules and encoding specifications for sending data. The protocols also determine

whether the network uses a peer-to-peer or client/server architecture.

Media: Devices can be connected by twisted-pair wire, coaxial cables, or fiber optic cables.

Some networks do without connecting media altogether, communicating instead via radio waves.

Wireless networks are relatively easy to implement these days, especially when compared to the

prospect of having to route wires when deploying a new wired network or overhauling an

existing one. The first step in planning a wireless LAN deployment should be to decide on your

wireless networking technology standard. Keep in mind that the standard you need to

accommodate your network access points and routers as well as the entire collection of

wireless network interface cards (NICs) for your computers and other network resources.

A wireless local area network (WLAN) links two or more devices using some wireless

distribution method (typically spread-spectrum or OFDM radio), and usually providing a

connection through an access point to the wider Internet. This gives users the ability to move

around within a local coverage area and still be connected to the network. Most modern WLANs

are based on IEEE 802.11 standards, marketed under the Wi-Fi brand name.

Wireless LANs have become popular in the home due to ease of installation, and in commercial

complexes offering wireless access to their customers; often for free. New, for instance, has

begun a pilot program to provide city workers in all five boroughs of the city with wireless.

LAN STANDARDS AND PROTOCOLS

Each network has its own rules and standards. Therefore, protocols are use in network

technology to govern the communication between network and network. There are many

Page 2: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

different kinds of protocols, the most common protocol used in the OSI data link layer in LAN

are Ethernet and Token Ring.

Ethernet

Ethernet is the most well-known type of local area network that most widely installed in offices,

home offices and companies. The standard of an Ethernet is IEEE 802.3. Ethernet normally are

used coaxial cable and sometimes different grades of twisted-pair cable as the transmission

medium.

Token Ring

Token Ring is a network that connects computers in a star or ring topology. It is originally

developed by IBM Company. There will have a token ring that passed through the network to

allow computers to access the network. The standard for Token Ring network is IEEE 802.5. A

token bit will move around the ring from computer to another computer. If the computer wants to

transmit a data, the data will attach to the token and pass to the next computer. It has to keep

passing through computers in the network until it comes to the destination. If the computer

doesn’t want to transmit any data, the token ring will just pass to the next computer.

IEEE 802 STANDARDS

IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for

implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6, 5

and 60 GHz frequency bands. They are created and maintained by

the IEEE LAN/MAN Standards Committee (IEEE 802). The base version of the standard was

released in 1997 and has had subsequent amendments. The standard and amendments provide the

basis for wireless network products using the Wi-Fi brand. While each amendment is officially

revoked when it is incorporated in the latest version of the standard, the corporate world tends to

market to the revisions because they concisely denote capabilities of their products. As a result,

in the market place, each revision tends to become its own standard.

The 802.11 family consists of a series of half-duplex over-the-air modulation techniques

that use the same basic protocol. 802.11-1997 was the first wireless networking standard in the

family, but 802.11b was the first widely accepted one, followed by 802.11a, 802.11g, 802.11n

and 802.11ac. Other standards in the family (c–f, h, j) are service amendments and extensions or

corrections to the previous specifications.

802.11b and 802.11g use the 2.4 GHz ISM band, operating in the United States

under Part 15 of the U.S. Federal Communications Commission Rules and Regulations. Because

of this choice of frequency band, 802.11b and g equipment may occasionally

suffer interference from microwave ovens, cordless telephones and Bluetooth devices. 802.11b

and 802.11g control their interference and susceptibility to interference by using direct-sequence

Page 3: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

spread spectrum (DSSS) and orthogonal frequency-division multiplexing (OFDM) signaling

methods, respectively. 802.11a uses the 5 GHz U-NII band, which, for much of the world, offers

at least 23 non-overlapping channels rather than the 2.4 GHz ISM frequency band, where

adjacent channels overlap - see list of WLAN channels. Better or worse performance with higher

or lower frequencies (channels) may be realized, depending on the environment.

The segment of the radio frequency spectrum used by 802.11 varies between countries. In the

US, 802.11a and 802.11g devices may be operated without a license, as allowed in Part 15 of the

FCC Rules and Regulations. Frequencies used by channels one through six of 802.11b and

802.11g fall within the 2.4 GHz amateur radio band. Licensed amateur radio operators may

operate 802.11b/g devices under Part 97 of the FCC Rules and Regulations, allowing increased

power output but not commercial content or encryption.

IEEE 802.11 ARCHITECTURE AND SERVICES

IEEE 802.11s is an IEEE 802.11 amendment for mesh networking, defining how wireless

devices can interconnect to create a WLAN mesh network, which may be used for static

topologies and ad hoc networks.

802.11 is a set of IEEE standards that govern wireless networking transmission methods.

They are commonly used today in their 802.11a, 802.11b, 802.11g, and 802.11n versions to

provide wireless connectivity in the home, office and some commercial establishments.

802.11s inherently depends on one of 802.11a, 802.11b, 802.11g or 802.11n carrying the actual

traffic. One or more routing protocols suitable to the actual network physical topology are

required. 802.11s requires Hybrid Wireless Mesh Protocol, or HWMP,[1] be supported as a

default. However, other mesh, ad hoc or dynamically link-state routed (OLSR,B.A.T.M.A.N.)

may be supported or even static routing (WDS, OSPF). See the more detailed description below

comparing these routing protocols.

A mesh often consists of many small nodes. When mobile users or heavy loads are

concerned, there will often be a handoff from one base station to another, and not only from

802.11 but from other (GSM, Bluetooth, PCS and other cordless phone) networks.

Accordingly IEEE 802.21, which specifies this handoff between nodes both obeying 802.11s and

otherwise, may be required. This is especially likely if a longer-range lower-bandwidth service is

deployed to minimize mesh dead zones, e.g. GSM routing based on Open BTS.

Mesh networking often involves network access by previously unknown parties, especially when

a transient visitor population is being served. Thus the accompanying IEEE 802.11u standard

will be required by most mesh networks to authenticate these users without pre-registration or

any prior offline communication. Pre-standard captive portal approaches are also common. See

the more detailed description below of mesh security.

Page 4: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

Between peers, 802.11s defines a secure password-based authentication and key

establishment protocol called "Simultaneous Authentication of Equals" (SAE). SAE is based

on Diffie–Hellman key exchange using finity cyclic groups which can be a primary cyclic

group or an elliptic curve. The problem on using Diffie–Hellman key exchange is that it does not

have an authentication mechanism. So the resulting key is influenced by a pre-shared key and

the MAC addresses of both peers to solve the authentication problem.

When peers discover each other (and security is enabled) they take part in an SAE

exchange. If SAE completes successfully, each peer knows the other party possesses the mesh

password and, as a by-product of the SAE exchange, the two peers establish a cryptographically

strong key. This key is used with the "Authenticated Mesh Peering Exchange" (AMPE) to

establish a secure peering and derive a session key to protect mesh traffic, including routing

traffic.

ETHERNET

Ethernet is most widely used LAN Technology, which is defined under IEEE standards 802.3.

The reason behind its wide usability is Ethernet is easy to understand, implement, maintain and

allows low-cost network implementation. Also, Ethernet offers flexibility in terms of topologies

which are allowed.Ethernet generally uses Bus Topology. Ethernet operates in two layers of the

OSI model, Physical Layer, and Data Link Layer. For Ethernet, the protocol data unit is Frame

since we mainly deal with DLL. In order to handle collision, the Access control mechanism used

in Ethernet is CSMA/CD. Manchester Encoding Technique is used in Ethernet.

Page 5: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

In IEEE 802.3 standard Ethernet, 0 is expressed by a high-to-low transition, a 1 by the low-to-

high transition. In both Manchester Encoding and Differential Manchester, Encoding Baud rate

is double of bit rate.

Baud rate = 2* Bit rate

Ethernet LANs consist of network nodes and interconnecting media or link. The network nodes

can be of two types:

LLC: LOGICAL LINK CONTROL

This Data Link Layer is divided into two sublayers:

Logical Link Control (LLC). This sublayer is responsible for the data transmission

between computers or devices on a network.

Media Access Control (MAC). On a network, the network interface card (NIC) has an

unique hardware address which identifies a computer or device. The physical address is

utilized for the MAC sublayer addressing.

The function of the Logical Link Control (LLC) is to manage and ensure the integrity of data

transmissions. The LLC provides Data Link Layer links to services for the Network Layer

protocols. This is accomplished by the LLC Service Access Points (SAPs) for the services

residing on network computers. Also, there is a LLC Control field for delivery requests or

services.

The Logical Link Control (LLC) has several service types:

Service type 1, is a connectionless service with no establishment of a connection, and an

unacknowledged delivery.

Service type 2, is a connection logical service with an acknowledgement of delivery.

Page 6: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

Service type 3, is a connectionless service with an acknowledgement of delivery.

Service classes furthermore support sundry permutations of these LLC service types:

Class I supports only service type 1.

Class II supports both service type 1 and type 2.

Class III support both service type 1 and type 3.

Class IV support all three service types.

The SubNetwork Access Protocol (SNAP) is an augmentation of the IEEE 802.2 LLC header.

SNAP provides a method by which to utilize non-IEEE protocols on IEEE 802 networks.

MEDIUM ACCESS CONTROL

In the seven-layer OSI model of computer networking, media access control(MAC) data

communication protocol is a sub layer of the data link layer, which itself is layer 2. The MAC

sub layer provides addressing and channel access control mechanisms that make it possible for

several terminals or network nodes to communicate within a multiple access network that

incorporates a shared medium, e.g. Ethernet. The hardware that implements the MAC is referred

to as a medium access controller.

The MAC sub layer acts as an interface between the logical link control (LLC) sub layer and the

network's physical layer. The MAC layer emulates a full-duplex logical communication channel

in a multi-point network. This channel may provide uni

cast, multicast or broadcast communication service.

The local network addresses used in IEEE 802 networks and FDDI networks are

called MAC addresses; they are based on the addressing scheme used in

early Ethernet implementations. A MAC address is a unique serial number. Once a MAC address

has been assigned to a particular network interface (typically at time of manufacture), that device

should be uniquely identifiable amongst all other network devices in the world. This guarantees

that each device in a network will have a different MAC address (analogous to a street address).

This makes it possible for data packets to be delivered to a destination within a sub network,

i.e. hosts interconnected by some combination of repeaters, hubs, bridges and switches, but not

by network layer routers. Thus, for example, when an IP packet reaches its destination

(sub)network, the destination IP address (a layer 3 or network layer concept) is resolved with

the Address Resolution Protocol for IPv4, or by Neighbor Discovery Protocol (IPv6) into the

MAC address (a layer 2 concept) of the destination host.

Examples of physical networks are Ethernet networks and Wi-Fi networks, both of which

IEEE 802 are networks and use IEEE 802 48-bit MAC addresses.

A MAC layer is not required in full-duplex point-to-point communication, but address

fields are included in some point-to-point protocols for compatibility reasons.

Page 7: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

The data link layer is divided into two sublayers: The Media Access Control (MAC) layer and

the Logical Link Control (LLC) layer. The MAC sublayer controls how a computer on the

network gains access to the data and permission to transmit it. The LLC layer controls frame

synchronization, flow control and error checking.

MAC Layer is one of the sublayers that makeup the datalink layer of the OSI reference

Model. MAC layer is responsible for moving packets from one Network Interface card NIC to

another across the shared channel. The MAC sublayer uses MAC protocols to ensure that signals

sent from different stations across the same channel don't collide. Different protocols are used for

different shared networks, such as Ethernets, Token Rings, Token Buses, and WANs.

CARRIER SENSE MULTIPLE ACCESS PROTOCOLS (CSMA)

With slotted ALOHA, the best channel utilization that can be achieved is 1/e. Several protocols

are developed for improving the performance.

Protocols that listen for a carrier and act accordingly are called carrier sense protocols. Carrier

sensing allows the station to detect whether the medium is currently being used. Schemes that

use a carrier sense circuits are classed together as carrier sense multiple access or CSMA

schemes. There are two variants of CSMA. CSMA/CD and CSMA/CA

The simplest CSMA scheme is for a station to sense the medium, sending packets immediately if

the medium is idle. If the station waits for the medium to become idle it is called persistent

otherwise it is called non persistent.

a. Persistent

When a station has the data to send, it first listens the channel to check if anyone else is

transmitting data or not. If it senses the channel idle, station starts transmitting the data. If it

senses the channel busy it waits until the channel is idle. When a station detects a channel idle, it

transmits its frame with probability P. That’s why this protocol is called p-persistent CSMA.

This protocol applies to slotted channels. When a station finds the channel idle, if it transmits the

fame with probability 1, that this protocol is known as 1 -persistent. 1 -persistent protocol is the

most aggressive protocol.

b. Non-Persistent

Non persistent CSMA is less aggressive compared to P persistent protocol. In this protocol,

before sending the data, the station senses the channel and if the channel is idle it starts

transmitting the data. But if the channel is busy, the station does not continuously sense it but

Page 8: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

instead of that it waits for random amount of time and repeats the algorithm. Here the algorithm

leads to better channel utilization but also results in longer delay compared to 1 –persistent.

CSMA/CD

Carrier Sense Multiple Access/Collision Detection a technique for multiple access protocols. If

no transmission is taking place at the time, the particular station can transmit. If two stations

attempt to transmit simultaneously, this causes a collision, which is detected by all participating

stations. After a random time interval, the stations that collided attempt to transmit again. If

another collision occurs, the time intervals from which the random waiting time is selected are

increased step by step. This is known as exponential back off.

Exponential back off Algorithm

1. Adaptor gets datagram and creates frame

2. If adapter senses channel idle (9.6 microsecond), it starts to transmit frame. If it senses

channel busy, waits until channel idle and then transmits

3. If adapter transmits entire frame without detecting another transmission, the adapter is

done with frame!

4. If adapter detects another transmission while transmitting, aborts and sends jam signal

5. After aborting, adapter enters exponential backoff: after the mth collision, adapter

chooses a K at random from {0,1,2,…,2m-1}. Adapter waits K*512 bit times (i.e. slot)

and returns to Step 2

6. After 10th retry, random number stops at 1023. After 16th retry, system stops retry.

TOKEN RING

Token ring (IEEE 802.5) is a communication protocol in a local area network (LAN) where all

stations are connected in a ring topology and pass one or more tokens for channel acquisition. A

token is a special frame of 3 bytes that circulates along the ring of stations. A station can send

data frames only if it holds a token. The tokens are released on successful receipt of the data

frame.

Token Passing Mechanism in Token Ring

If a station has a frame to transmit when it receives a token, it sends the frame and then passes

the token to the next station; otherwise it simply passes the token to the next station. Passing the

token means receiving the token from the preceding station and transmitting to the successor

station. The data flow is unidirectional in the direction of the token passing. In order that tokens

are not circulated infinitely, they are removed from the network once their purpose is completed.

Page 9: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

TOKEN BUS

Token Bus (IEEE 802.4) is a standard for implementing token ring over virtual ring in LANs.

The physical media has a bus or a tree topology and uses coaxial cables. A virtual ring is created

with the nodes/stations and the token is passed from one node to the next in a sequence along this

virtual ring. Each node knows the address of its preceding station and its succeeding station. A

station can only transmit data when it has the token. The working principle of token bus is

similar to Token Ring.

Token Passing Mechanism in Token Bus

A token is a small message that circulates among the stations of a computer network providing

permission to the stations for transmission. If a station has data to transmit when it receives a

token, it sends the data and then passes the token to the next station; otherwise, it simply passes

the token to the next station. 

Page 10: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

Differences between Token Ring and Token Bus

Token Ring Token Bus

The token is passed over the physical ring formed

by the stations and the coaxial cable network.

The token is passed along the virtual ring of stations

connected to a LAN.

The stations are connected by ring topology, or

sometimes star topology.

The underlying topology that connects the stations

is either bus or tree topology.

It is defined by IEEE 802.5 standard. It is defined by IEEE 802.4 standard.

The maximum time for a token to reach a station

can be calculated here.

It is not feasible to calculate the time for token

transfer.

FDDI

Fiber Distributed Data Interface (FDDI) is a set of ANSI and ISO standards for transmission of

data in local area network (LAN) over fiber optic cables. It is applicable in large LANs that can

extend up to 200 kilometers in diameter.

Features

FDDI uses optical fiber as its physical medium.

Page 11: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

It operates in the physical and medium access control (MAC layer) of the Open Systems

Interconnection (OSI) network model.

It provides high data rate of 100 Mbps and can support thousands of users.

It is used in LANs up to 200 kilometers for long distance voice and multimedia

communication.

It uses ring based token passing mechanism and is derived from IEEE 802.4 token bus

standard.

It contains two token rings, a primary ring for data and token transmission and a

secondary ring that provides backup if the primary ring fails.

FDDI technology can also be used as a backbone for a wide area network (WAN).

The following diagram shows FDDI −

Frame Format

The frame format of FDDI is similar to that of token bus as shown in the following diagram −

Page 12: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

The fields of an FDDI frame are −

Preamble: 1 byte for synchronization.

Start Delimiter: 1 byte that marks the beginning of the frame.

Frame Control: 1 byte that specifies whether this is a data frame or control frame.

Destination Address: 2-6 bytes that specifies address of destination station.

Source Address: 2-6 bytes that specifies address of source station.

Payload: A variable length field that carries the data from the network layer.

Checksum: 4 bytes frame check sequence for error detection.

End Delimiter: 1 byte that marks the end of the frame.

ALOHA

ALOHA is a simple communication scheme in which each source in a network sends its data

whenever there is a frame to send without checking to see if any other station is active. After

sending the frame each station waits for implicit or explicit acknowledgment. If the frame

successfully reaches the destination, next frame is sent. And if the frame fails to be received at

the destination it is sent again.

Pure ALOHA ALOHA is the simplest technique in multiple accesses. Basic idea of this

mechanism is a user can transmit the data whenever they want. If data is successfully transmitted

then there isn’t any problem. But if collision occurs than the station will transmit again. Sender

can detect the collision if it doesn’t receive the acknowledgment from the receiver.

Page 13: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

In ALOHA Collision probability is quite high. ALOHA is suitable for the network where there is

a less traffic. Theoretically it is proved that maximum throughput for ALOHA is 18%.

P (success by given node) = P(node transmits) . P(no other node transmits in [t0-

1,t0] . P(no other node transmits in [t0,t0 +1]

= p . (1-p)N-1 . (1-p)N-1

P (success by any of N nodes) = N . p . (1-p) N-1 . (1-p)N-1

… Choosing optimum p as N --> infinity...

= 1 / (2e) = .18

=18%

Slotted ALOHA

In ALOHA a newly emitted packet can collide with a packet in progress. If all packets are of the

same length and take L time units to transmit, then it is easy to see that a packet collides with any

other packet transmitted in a time window of length 2L. If this time window is decreased

somehow, than number of collisions decreases and the throughput increase. This mechanism is

used in slotted ALOHA or S-ALOHA. Time is divided into equal slots of Length L. When a

station wants to send a packet it will wait till the beginning of the next time slot.

Advantages of slotted ALOHA:

single active node can continuously transmit at full rate of channel

highly decentralized: only slots in nodes need to be in sync

simple

Disadvantages of slotted ALOHA:

Page 14: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

collisions, wasting slots

idle slots

clock synchronization

Efficiency of Slotted ALOHA:

Suppose there are N nodes with many frames to send. The probability of sending frames of

each node into the slot is p.

Probability that node 1 has a success in getting the slot is p.(1-p)N-1

Probability that every node has a success is N.p.(1-p)N-1

For max efficiency with N nodes, find p* that maximizes Np(1-p)N-1

For many nodes, take limit of Np*(1-p*)N-1 as N goes to infinity, gives 1/e = .37

The clear advantage of slotted ALOHA is higher throughput. But introduces complexity in the

stations and bandwidth overhead because of the need for time synchronization.

SONET

Synchronous optical networking (SONET) is a standardized digital communication protocol that

synchronously transfers multiple data streams over long distances through fiber optic cables. It is

a physical layer specification that allows simultaneous transmission of voice, data, and video at

speeds as high as 1Gbps through a single fiber. In telephone networks, it is used for transmission

of a huge amount of telephone calls and data streams through fiber.

SONET was standardized by the American National Standards Institute (ANSI). It is equivalent

to Synchronous Digital Hierarchy (SDH) standardized by the International Telecommunication

Union (ITU).

SONET Frames

The basic SONET frame comprises of a block of 810 bytes. The frames are transmitted at the

rate of 8000 frames/bytes, which is the sampling rate of the telephone networks.

A SONET frame is represented as a rectangular block of bytes with 9 rows and 90 columns as

shown in the following diagram.

Page 15: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

The first three columns of the SONET frame contains the system information and is generally

termed as system overhead, while the rest (marked in blue) contains the payload, i.e. the data to

be transmitted. In this frame, the first three rows of the system overhead (marked in yellow)

contain section overhead, and the nest six rows (marked in orange) contain line overhead.

ISDN

These are a set of communication standards for simultaneous digital transmission of

voice, video, data, and other network services over the traditional circuits of the public switched

telephone network. Before Integrated Services Digital Network (ISDN), the telephone system

was seen as a way to transmit voice, with some special services available for data. The main

feature of ISDN is that it can integrate speech and data on the same lines, which were not

available in the classic telephone system.

ISDN is a circuit-switched telephone network system, but it also provides access to

packet switched networks that allows digital transmission of voice and data. This results in

potentially better voice or data quality than an analog phone can provide. It provides a packet-

switched connection for data in increments of 64 kilobit/s. It provided a maximum of 128 kbit/s

bandwidth in both upstream and downstream directions.

ISDN Channels

A greater data rate was achieved through channel bonding. Generally ISDN B-channels

of three or four BRIs (six to eight 64 kbit/s channels) are bonded.

In the context of the OSI model, ISDN is employed as the network in data-link and

physical layers but commonly ISDN is often limited to usage to Q.931 and related protocols.

These protocols introduced in 1986 are a set of signaling protocols establishing and breaking

circuit-switched connections, and for advanced calling features for the user. ISDN provides

simultaneous voice, video, and text transmission between individual desktop videoconferencing

systems and group videoconferencing systems.

Page 16: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

The ISDN works based on the standards defined by ITU-T (formerly CCITT). The

Telecommunication Standardization Sector (ITU-T) coordinates standards for

telecommunications on behalf of the International Telecommunication Union (ITU) and is based

in Geneva, Switzerland. The various principles of ISDN as per ITU-T recommendation are:

To support switched and non-switched applications

To support voice and non-voice applications

Reliance on 64-kbps connections

Intelligence in the network

Layered protocol architecture

Variety of configurations

USER INTERFACE

The following are the interfaces of ISDN:

1. Basic Rate Interface (BRI)

There are two data-bearing channels (‘B’ channels) and one signaling channel (‘D’ channel) in

BRI to initiate connections. The B channels operate at a maximum of 64 Kbps while the D

channel operates at a maximum of 16 Kbps. The two channels are independent of each other. For

example, one channel is used as a TCP/IP connection to a location while the other channel is

used to send a fax to a remote location. In iSeries ISDN supports basic rate interface (BRl).

The basic rate interface (BRl) specifies a digital pipe consisting two B channels of 64 Kbps each

and one D channel of 16 Kbps. This equals a speed of 144 Kbps. In addition, the BRl service

itself requires an operating overhead of 48 Kbps. Therefore a digital pipe of 192 Kbps is

required.

2. Primary Rate Interface (PRI)

Primary Rate Interface service consists of a D channel and either 23 or 30 B channels depending

on the country you are in. PRI is not supported on the iSeries. A digital pipe with 23 B channels

and one 64 Kbps D channel is present in the usual Primary Rate Interface (PRI). Twenty-three B

channels of 64 Kbps each and one D channel of 64 Kbps equals 1.536 Mbps. The PRI service

uses 8 Kbps of overhead also. Therefore PRI requires a digital pipe of 1.544 Mbps.

3. Broadband-ISDN (B-ISDN)

Narrowband ISDN has been designed to operate over the current communications infrastructure,

which is heavily dependent on the copper cable however B-ISDN relies mainly on the evolution

of fiber optics. According to CCITT B-ISDN is best described as ‘a service requiring

transmission channels capable of supporting rates greater than the primary rate.

Page 17: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

ISDN LAYERS

ISDN uses circuit-switching to establish a physical permanent point-to-point connection

from the source to the destination. ISDN has standards defined by the ITU that encompass the

OSI bottom three layers of which are Physical, Data Link and Network.

It is difficult to apply the simple seven-layer architecture specified by the OSI to the

ISDN. One reason is that the ISDN specifies two different channels (B and D) with different

functionalities. As we saw earlier in this chapter, B channels are for user-to-user communication

(information exchange). D channels are predominantly for user-to-network signaling. The

subscriber uses the D channel to connect to the network then the B channel to send information

to another user. These two functions require different protocols from each other at many of

the OSI layers. The ISDN also differs from the OSI standard in its management needs. A primary

consideration of the ISDN is global integration. Maintaining the flexibility required to keep the

network truly integrated using public services requires a great deal of management.

For these reasons, the ITU-T has devised an expanded model for the ISDN layers. Instead

of a single seven-layer architecture like the OSI, the ISDN is defined in three separate planes: the

user plan, the control plane, and the management plane. The user plane defines the functionality

of the B channel and H channel: the user-to-user connection. The control plane defines the

functionality of the D channel when used for signaling. (When used for subscriber data, the D

channel is defined on the user plane.) The management plane encompasses both the user and

control planes and is used for managing the whole network.

ISDN layers

All three planes are divided into seven layers that correspond to the OSI model. The discussion

of the management plane is beyond the scope of this book; the other two planes are discussed

below.

The simplified version of the ISDN architecture for the user and control planes (B and D

channels) is given. In this figure we make a number of assumptions that enable us to simplify the

model for the purposes of discussion. First of all, we assume that the subscriber uses the D

channel only for signaling. When a D channel is used for data, it behaves like a B channel.

Page 18: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

Eventually D channels will be used for services like telemetry, but the protocols that will make

those services possible are still under study. For our purposes, then, the D channel is a signaling

channel. Further, the D channel is used primarily for user-to-network signaling. Its functions are

therefore confined to the first three layers. Layers 4 to 7, which are concerned with end-to-end

user signaling, use other ISDN protocols (such as SS7).

ISDN layers for B and D channels

At the physical layer, the B and D channels are alike. They use either the BRI or PRI

interfaces and devices discussed earlier in this chapter. At the data link layer, the B channel uses

link access procedure, balanced (LAPB, a simplified subset of HDLC used only for connecting a

station to a network) or some version of it. At the network layer, the B channel has many

options. B channels (and D channels acting like B channels) can connect to circuit-switched

networks, packet-switched networks (X.25), frame relay networks, and ATM networks, among

others. The user-plane options for layers 4 to 7 are left to the user and are not defined specifically

in the ISDN. In summary, we need only discuss the physical layer shared by the B and D

channels, and the second and third layers of the D channel standard.

BROAD BAND ISDN

Broadband Integrated Service Digital Network (B-ISDN) is a standard for transmitting

voice data and video at the same time over fiber optic telephone lines. Broadband ISDN can

support data rates up to 2 Mbps which is an improvement on the original ISDN bandwidth rate of

64Kbps or 128Kbps when using both connections. The B-ISDN was envisaged to run over ATM

carrying both the synchronous voice and the asynchronous data on the same transport bearer.

One of the underlying motives to develop ISDN was to provide subscribers with a wide variety

of services direct to their home. These included video telephony, video surveillance, high speed

Internet, High Definition TV, and these services would require delivery at different bit rates and

with different time constraints. For example video and TV have greater time constraints’ than

data. B-ISDN over ATM was considered a good fit as ATM could handle various contracts based

on the service required. The only problem was that ATM had a small payload size of only 48KB

Page 19: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

and an overhead of 5 Bytes making it an extensive transport protocol. I.E. 5/53 x 100/1 = 9.9%

overhead. There were plans to use B-ISDN over fiber optic cables in a Fiber in the loop scenario

whereby the fiber replaced the aging copper loop. This would have mitigated the high overhead

due to the vast increases in speeds that could be leveraged from a fiber implementation.

Frame Relay

Frame Relay is a standardized wide area network technology that specifies

the physical and data link layers of digital telecommunications channels using a packet

switching methodology. Originally designed for transport across Integrated Services Digital

Network (ISDN) infrastructure, it may be used today in the context of many other network

interfaces.

Network providers commonly implement Frame Relay for voice (VoFR) and data as

an encapsulation technique used between local area networks (LANs) over a wide area

network (WAN). Each end-user gets a private line (or leased line) to a Frame Relay node. The

Frame Relay network handles the transmission over a frequently changing path transparent to all

end-user extensively used WAN protocols. It is less expensive than leased lines and that is one

reason for its popularity. The extreme simplicity of configuring user equipment in a Frame Relay

network offers another reason for Frame Relay's popularity.

Frame Relay has its technical base in the older X.25 packet-switching technology,

designed for transmitting data on analog voice lines. Unlike X.25, whose designers

expected analog signals with a relatively high chance of transmission errors, Frame Relay is

a fast packet switching technology operating over links with a low chance of transmission errors

(usually practically lossless like PDH), which means that the protocol does not attempt to correct

errors. When a Frame Relay network detects an error in a frame, it simply drops that frame. The

end points have the responsibility for detecting and retransmitting dropped frames.

Page 20: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

(However, digital networks offer an incidence of error extraordinarily small relative to that of

analog networks.)

Frame Relay often serves to connect local area networks (LANs) with major backbones,

as well as on public wide-area networks (WANs) and also in private network environments with

leased lines over T-1 lines. It requires a dedicated connection during the transmission period.

Frame Relay does not provide an ideal path for voice or video transmission, both of which

require a steady flow of transmissions. However, under certain circumstances, voice and video

transmission do use Frame Relay.

Frame Relay originated as an extension of integrated services digital network (ISDN). Its

designers aimed to enable a packet-switched network to transport over circuit-switched

technology. The technology has become a stand-alone and cost-effective means of creating a

WAN.

Frame Relay switches create virtual circuits to connect remote LANs to a WAN. The

Frame Relay network exists between a LAN border device, usually a router, and the carrier

switch. The technology used by the carrier to transport data between the switches is variable and

may differ among carriers (i.e., to function, a practical Frame Relay implementation need not

rely solely on its own transportation mechanism).

ATM CONCEPT AND ARCHITECTURE

The Asynchronous Transfer Mode (ATM) protocols and architecture have managed to gather an

impressive amount of market and media attention over the last several years. Intended as a

technique to achieve a working compromise between the rigidity of the telecommunication

synchronous architecture and packet network's unpredictable load behavior, ATM products are

appearing for everything from high-speed switching to local area networking. ATM has caught

the interest of both the telecommunications community as a broadband carrier for Integrated

Services Digital Network (ISDN) networks as well as the computer industry, who view ATM as

a strong candidate for high-speed Local Area Networking. This article covers the basic concepts

involved in the ATM architecture.

At the core of the ATM architecture is a fixed length "cell." An ATM cell is a short, fixed length

block of data that contains a short header with addressing information, followed by the upper

layer traffic, or "payload." The cell structure, shown in Figure 1, is 53 octets long, with a 5 octet

header, followed by 48 bytes of payload. While the short packet may seem to be somewhat

inefficient in its ratio of overhead to actual data, it does have some distinct advantages over the

alternatives. By fixing the length of each cell, the timing characteristics of the links and the

corresponding network are regular and relatively easy to predict; predicting the dynamics of

Page 21: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

variable length packet switched networks isn't always easy. By using short cells, hardware based

switching can be accomplished. Finally, the use of short cells provides an ability to transfer

isochronous information with a short delay.

The information contained in the header of each cell is used to identify the circuit (in the context)

of the local link, carries local flow control information, and includes error detection to prevent

cells from being mis-routed. The remaining 48 octets are routed through the network to the

destination using the circuit.

ATM has evolved over the last 5-10 years to include a wide range of support protocols.

Routing and congestion management, have been particular areas of research. The early concepts

of cell transfer networks revolved around the thought that users could "reserve" a pre-specified

amount of traffic through a circuit on the network. Some amount of guaranteed throughput

would be provided with an additional amount only as needed. Then, through this contract, traffic

in excess of the pre-allocated bandwidth could be arbitrarily dropped if congestion problems

occurred. However, the complexities of implementation have proven these techniques to be far

too difficult. Several vendors have proposed flow control architectures that involve more active

windowing protocols between the switches for data traffic.

ATM ARCHITECTURE

As in the case of many large systems, there are a range of components and connections involved

in the ATM networks. All connections in the ATM network are point-to-point, with traffic being

switched through the network by the switching nodes. Two types of networks are included in the

ATM architecture, Public Networks and Private Networks. Private Networks, often referred to as

Customer Premises Networks, are typically concerned with end-user connections, or bridging

services to other types of networks including circuit switched services, frame relay, and voice

subsystems. The interface between the components in the Private Networks is referred to as the

Page 22: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

Private User Network Interface (UNI). ATM also extends into the wider area Public Networks.

Interfaces between the Public and Private network switches conform to the Public UNI.

Interfaces between the switches within the Public network are the Network Node Interface

(NNI). Specifications for both the Public and Private UNI can be found in the ATM Forum's

publication "ATM User-Network Interface (UNI) Specification." The private networks often

permit the use of lower speed short haul interconnects that are useful in LAN environments, but

not of great use in wider area public networks. Three types of NNI have been developed, NNI-

ISSI that connects switches in the same Local Area Transport Area (LATA), the NNI-ICI, that

connects ATM networks of different carriers (InterCarrier), and finally, a Private NNI that

permits the connection of different switches in a private network.

ATM Cell Format

As information is transmitted in ATM in the form of fixed size units called cells. As known

already each cell is 53 bytes long which consists of 5 bytes header and 48 bytes payload.

Asynchronous Transfer Mode can be of two format types which are as follows:

1. UNI Header: which is used within private networks of ATM for communication between

ATM endpoints and ATM switches. It includes the Generic Flow Control (GFC) field.

Page 23: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

2. NNI Header: is used for communication between ATM switches, and it does not include

the Generic Flow Control(GFC) instead it includes a Virtual Path Identifier (VPI) which

occupies the first 12 bits.

Working of ATM

ATM standard uses two types of connections. i.e., Virtual path connections (VPCs) which

consists of Virtual channel connections (VCCs) bundled together which is a basic unit carrying

single stream of cells from user to user. A virtual path can be created end-to-end across an ATM

network, as it does not routs the cells to a particular virtual circuit. In case of major failure all

cells belonging to a particular virtual path are routed the same way through ATM network, thus

helping in faster recovery.

Switches connected to subscribers uses both VPIs and VCIs to switch the cells which are Virtual

Path and Virtual Connection switches that can have different virtual channel connections

between them, serving the purpose of creating a virtual trunk between the switches which can be

handled as a single entity. It’s basic operation is straightforward by looking up the connection

value in the local translation table determining the outgoing port of the connection and the new

VPI/VCI value of connection on that link.

ISDN PROTOCOL

ISDN standards specify several reference points that functionally separate the ISDN

network. The ISDN devices need to comply with applicable reference point specifications. For

example, a TE1 device such as an ISDN phone or a computer need to comply with reference

point 'S' specifications. Various reference points specified in ISDN are given in the figure below:

R: This is the reference point between non-ISDN equipment and a Terminal Adapter (TA).

S: This is the reference point between user terminals and Network Termination Type2 (NT2).

T: This is the reference point between NT1 and NT2 devices.

U: This is the reference point between NT1 devices and line termination equipment of the Telco

Page 24: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

PHYSICAL LAYER PROTOCOL

At the physical layer the ITU has defined the user network interface standard as I.430 for

Basic Rate Access and I.431 for Primary Rate Access. ANSI has defined the user network

interface standard as T1.601. As already stated above, the physical layer uses the normal

telephone cabling as its physical cabling structure.

ISDN physical layer: For users, the ISDN physical layer is on S reference point or T

reference point. This layer has the following major functions: coding, full-duplex transmission,

channel multiplexing, port activation and depolarization, feeding, and termination identification.

This layer can multiplex multiple links at the data link layer and use AMI, 4B3T and 2B1Q for

coding.

D-CHANNEL DATALINK LAYER

ISDN data link layer: ISDN does not define Layer 2 protocols dedicated to B channels.

Any Layer 2 protocols can be used between two communicating devices after negotiation as long

as they can transparently transmit data on B channels. The link access procedure on the D

channel (LAPD) protocol defined in Q.921 (a reliable transport protocol) is used for D channels,

which is mainly used to carry messages and data generated by Layer 3 entities.

The ISDN D channel will utilise different signalling protocols at Layer 3 and Layer 2 of

the OSI Model. Typically at Layer 2, LAP-D (Link Access Procedure – D Channel) is the Q.921

signalling used and DSS1 (Digital Subscriber Signalling System No.1) is the Q.931 signalling

that is used at Layer 3. It is easy to remember which one is used at which layer by simply

remembering that the middle number corresponds to the layer it operates at.

LAYER 3 PROTOCOLS

ISDN does not define Layer 3 protocols dedicated to B channels. Layer 3 protocol Q.931 for

D channels is mainly used to control and manage connection setup and release on B channels.

Page 25: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

Mapping relationship between the ISDN protocol stack model and OSI model

The ISDN B channels will typically utilise a Point-to-Point protocol such as HDLC (High-Level

Data Link Control) or PPP frames at Layer 2 however you can sometimes see other

encapsulation such as Frame relay. As you would expect, at layer 3 you typically see IP packets.

ISDN operates in Full-Duplex which means that traffic can be received and transmitted at the

same time.

NETWORK SIGNALING SYSTEMS

Network Signaling System is a set of telephony signaling protocols developed in 1975,

which is used to set up and tear down telephone calls in most parts of the world-wide public

switched telephone network (PSTN). The protocol also performs number translation, local

number portability, prepaid billing, Short Message Service (SMS), and other services.

In North America SS7 is often referred to as Common Channel Signaling System

7 (CCSS7). In the United Kingdom, it is called C7 (CCITT number 7), number 7 and Common

Channel Interoffice Signaling 7 (CCIS7). In Germany, it is often called Zentraler

Zeichengabekanal Nummer 7 (ZZK-7).

The SS7 protocol is defined for international use by the Q.700-series recommendations of

1988 by the ITU-T.[1] Of the many national variants of the SS7 protocols, most are based on

variants standardized by the American National Standards Institute (ANSI) and the European

Telecommunications Standards Institute (ETSI). National variants with striking characteristics

are the Chinese and Japanese Telecommunication Technology Committee (TTC) national

variants.

The Internet Engineering Task Force (IETF) has defined the SIGTRAN protocol suite

that implements levels 2, 3, and 4 protocols compatible with SS7. Sometimes also called Pseudo

Page 26: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

SS7, it is layered on the Stream Control Transmission Protocol (SCTP) transport mechanism for

use on Internet Protocol networks, such as the Internet.

SS7 PROTOCOL

The SS7 protocol stack may be partially mapped to the OSI Model of a packetized digital

protocol stack. OSI layers 1 to 3 are provided by the Message Transfer Part (MTP) and

the Signalling Connection Control Part (SCCP) of the SS7 protocol (together referred to as the

Network Service Part (NSP)); for circuit related signaling, such as the BT IUP, Telephone User

Part (TUP), or the ISDN User Part (ISUP), the User Part provides layer 7. Currently there are no

protocol components that provide OSI layers 4 through 6. The Transaction Capabilities

Application Part (TCAP) is the primary SCCP User in the Core Network, using SCCP in

connectionless mode. SCCP in connection oriented mode provides transport layer for air

interface protocols such as BSSAP and RANAP. TCAP provides transaction capabilities to its

Users (TC-Users), such as the Mobile Application Part, the Intelligent Network Application

Part and the CAMEL Application Part.

The Message Transfer Part (MTP) covers a portion of the functions of the OSI network

layer including: network interface, information transfer, message handling and routing to the

higher levels. Signaling Connection Control Part (SCCP) is at functional Level 4. Together with

MTP Level 3 it is called the Network Service Part (NSP). SCCP completes the functions of the

OSI network layer: end-to-end addressing and routing, connectionless messages (UDTs), and

management services for users of the Network Service Part (NSP). Telephone User Part (TUP) is

a link-by-link signaling system used to connect calls. ISUP is the key user part, providing a

circuit-based protocol to establish, maintain, and end the connections for calls. Transaction

Capabilities Application Part (TCAP) is used to create database queries and invoke advanced

network functionality, or links to Intelligent Network Application Part (INAP) for intelligent

networks, or Mobile Application Part (MAP) for mobile services.

Page 27: hicaselectronics.files.wordpress.com  · Web viewUNIT V. LAN AND ISDN. LAN. A l. ocal-a. rea n. etwork (LAN) is a computer network that spans a relatively small area. Most often,

SS7 consists of a set of reserved or dedicated channels known as signaling links. There

are three kinds of network points signaling points: Service Switching Points (SSPs), Signal

Transfer Points (STPs), and Service Control Points (SCPs). SSPs originate or terminate a call

and communicate on the SS7 network with SCPs to determine how to route a call or set up and

manage some special feature. Traffic on the SS7 network is routed by packet switches called

STPs. SCPs and STPs are usually mated so that service can continue if one network point fails.

SS7 uses out-of-band signaling, which means that signaling (control) information travels

on a separate, dedicated 56 or 64 Kbps channel rather than within the same channel as the

telephone call. Historically, the signaling for a telephone call has used the same voice circuit that

the telephone call traveled on (this is known as in-band signaling). Using SS7, telephone calls

can be set up more efficiently and special services such as call forwarding and wireless roaming

service are easier to add and manage.

SS7 is used for these and other services:

Setting up and managing the connection for a call

Tearing down the connection when the call is complete

Billing

Managing call forwarding, calling party name and number display, three-way calling, and

other Intelligent Network (IN) services

Toll-free (800 and 888) and toll (900) calls

Wireless as well as wireline call service including mobile telephone subscriber

authentication, personal communication service (PCS), and roaming.