CN Unit-5
CN Unit-5
CN Unit-5
Unit-5
2
WHAT IS DSL?
• Digital Subscriber Line (DSL) is a technology that provides digital data transmission over
the existing wires of local telephone network.
• DSL service is delivered simultaneously with regular telephone on the same telephone line.
• Digital Subscriber Line (DSL) is a broadband high-speed Internet technology that brings
high-bandwidth information to home and offices over ordinary copper telephone lines.
• Digital data is transmitted directly to the computer, as is, exploiting the maximum bandwidth
and the wide range of unused frequencies available in the existing copper wire of telephone
networks for high-speed broadband communication.
3
Digital Subscriber Line (DSL)
● Uses a newer technology that used the existing telecommunications networks such as the local
loop telephone line.
● Is an asymmetric communication technology designed for residential users; it is not suitable for
business.
● xDSL: where x can be replaced by A, V, H, or S
● The existing local loops can handle bandwidths up to 1.1 MHz
○ but, limitation because of distance between the residence and the switching office, size of
cable
● ADSL is an adaptive technology. The system uses a date rate based on the condition of the local
loop line
4
Key features of DSL:
• Distance- sensitive technology.
• Simultaneous use of the phone line for voice as well as data traffic.
5
6
TYPES OF DSL or Other DSL Technologies
• ADSL(Asymmetric Digital Subscriber Line)
8
Telephone Company Site : DSLAM
A DSLAM, or Digital-Subscriber-Line-Access-Multiplexer, is a network distribution device that aggregates
individual subscriber lines into a high-capacity uplink. They allow for the high-speed transmission of DSL
technology using legacy copper lines
9
High bit/data rate Digital Subscriber Line(HDSL):
HDSL
HDSL was the first DSL technology that used a higher frequency spectrum of copper,
twisted pair cables. It is used as an alternative to T-1 line. Encoding used by T-1 line is
alternate mark inversion which is susceptible to attenuation at high frequencies. Length
limit is 1km and it requires a repeater for a longer distance which results in an increase in
cost
10
SDSL Symmetric Digital Subscriber Line (SDSL):
Does not allows to use the phone at the same time. But internet speed of sending and
receiving data is same. As two twisted cables are used in HDSL, it is the one twisted
cable version of HDSL. It supports 768 kbps in each direction and it provides
full-duplex symmetric communication. As it provides symmetric communication,
so it can also be used as an alternative to ADSL
11
VDSL Very high-bit-rate Digital Subscriber Line(VDSL):
Provides high speed internet connection but works only over a short distance.
It is also used as an alternative approach, i.e. similar to ADSL. It uses a
coaxial, fiber-optic, and twisted-pair cable for short distances. It is
capable of providing bit rate of 25-55 Mbps for upstream and 3.2 Mbps
for downstream
12
Summary: The following is summary table for technologies of DSL. The values in the
following table are approximate and can vary from one implementation to another.
13
Benefits of DSL:
• It helps to meet the need for networks in different scenarios like DSL,
Fiber/Cable, and 3G/4G Dongle.
• It supports ISP service providers, so we can that it is compatible with most of
the service providers.
• It also supports high-quality telephone calls.
• There is an available app to manage the modem.
14
Cable Technology
15
Communication in the traditional cable TV network is unidirectional.
○ video band
■ 54 to 550 MHz
○ Data rate
■ 6 bits for each baud in 64-QAM (quadrature amplitude modulation) (1bit : control bit)
○ Modulation
■ upstream data band uses lower frequencies that are more susceptible to noise and
interference
■ for this reason, using QPSK (Quadrature Phase Shift Keying)instead of QAM (Quadrature
amplitude modulation)
○ Up to 2.7Mbits/s
○ Small deployments in operation (e.g. Manassas, Virginia 10MBits/s for $30.00 a month)
23
Comparison of DSL vs. Cable
24
DSL Connection
● Inside carrier’s POP, a device called a DSL access multiplexer(DSLAM)
aggregates multiple DSL subscriber lines and connects them to larger carrier or to
the Internet backbone
●
Cable Modem
● Cable Modems offer a dedicated service over a shared media.
● Use coaxial cable to connect residences in neighbourhoods to the cable company’s
central office for relay to a distribution hub.
● Provide up to 30Mbps downstream for sharing between 500-2000 users.
● Utilizes Ethernet LAN technology
●
Comparison
Performance Metrics
DSL Cable
29
Introducing Frame Relay
Access circuits
● A Frame Relay network may be privately owned, but it is more commonly provided as a service by a
public carrier.
● It typically consists of many geographically scattered Frame Relay switches interconnected by trunk
lines.
● Frame Relay is often used to interconnect LANs. When this is the case, a router on each LAN will be
the DTE.
● Access Circuit - A serial connection, such as a T1/E1 leased line, will connect the router to a Frame
Relay switch of the carrier at the nearest point-of-presence for the carrier. 31
DTE – Data Terminal Equipment
● DTEs generally are considered to be terminating equipment for a specific network and typically
are located on the premises of the customer.
● The customer may also own this equipment.
● Examples of DTE devices are routers and Frame Relay Access Devices (FRADs).
● A FRAD is a specialized device designed to provide a connection between a LAN and a Frame
Relay WAN.
32
DCE – Data Communications Equipment
UNI NNI
Path may
change. Always same Path.
● The connection through the Frame Relay network between two DTEs is called a virtual circuit (VC).
● Switched Virtual Circuits (SVCs) are Virtual circuits may be established dynamically by sending signaling
messages to the network.
○ However, SVCs are not very common.
● SVCs are temporary connections that are only used when there is sporadic data transfer between DTE
devices across the Frame Relay network.
● Because they are temporary, SVC connections require call setup and termination for each connection
supported by Cisco IOS Release 11.2 or later.
● Before implementing these temporary connections, determine whether the service carrier supports
SVCs since many Frame Relay providers only support PVCs. 35
Access Circuits and Cost Savings
● The FRAD or router connected to the Frame Relay network may have
multiple virtual circuits connecting it to various end points.
● This makes it a very cost-effective replacement for a full mesh of access lines.
● Each end point needs only a single access circuit and interface.
36
DLCI
● A data-link connection identifier (DLCI) identifies the logical VC between the Customer
Premises Equipment(CPE) and the Frame Relay switch.
● The Frame Relay switch maps the DLCIs between each pair of routers to create a PVC.
● DLCIs have local significance, although there some implementations that use global DLCIs.
● DLCIs 0 to 15 and 1008 to 1023 are reserved for special purposes.
● Service providers assign DLCIs in the range of 16 to 1007.
• Inside the cloud, your Frame Relay provider sets up the DLCI numbers to be used
by the routers for establishing PVCs. 38
Frame Relay Packet Format
● Local access rate – This is the clock speed or port speed of the connection or local loop to the Frame Relay
cloud.
○ It is the rate at which data travels into or out of the network, regardless of other settings.
● Committed Information Rate (CIR) – This is the rate, in bits per second, at which the Frame Relay switch
agrees to transfer data.
○ The rate is usually averaged over a period of time, referred to as the committed rate measurement
interval (Tc).
○ In general, the duration of Tc is proportional to the "burstiness" of the traffic.
40
Frame Relay bandwidth and flow control
Tc = 2 seconds
Bc = 64 kbps
CIR = 32 kbps
● Committed burst (Bc) – The maximum number of bits that the switch agrees to transfer during any Tc.
○ The higher the Bc-to-CIR ratio, the longer the switch can handle a sustained burst.
○ The DE (Discard Eligibility) bit is set on the traffic that was received after the CIR was met. (coming)
○ (FYI) For example, if the Tc is 2 seconds and the CIR is 32 kbps, the Bc is 64 kbps.
41
Frame Relay bandwidth and flow control
Bc = 128 kbps
Be = 772 kbps Tc = Bc/CIR
EIR = 1544 Mbps
CIR = 772 kbps
● Excess burst (Be) – This is the maximum number of uncommitted bits that the Frame Relay
switch attempts to transfer beyond the CIR.
○ Excessive Burst (Be) is dependent on the service offerings available from your vendor, but it
is typically limited to the port speed of the local access loop.
● Excess Information Rate (EIR) – This defines the maximum bandwidth available to the
customer, which is the CIR plus the Be.
○ In the event the provider sets the EIR to be lower than the local access rate, all frames
beyond that maximum can be discarded automatically, even if there is no congestion. 42
Frame Relay bandwidth and flow control
• Forward Explicit Congestion Notification (FECN) – When a Frame Relay switch recognizes
congestion in the network, it sends an FECN packet to the destination device.
• This indicates that congestion has occurred.
• Backward Explicit Congestion Notification (BECN) – When a Frame Relay switch recognizes
congestion in the network, it sends a BECN packet to the source router.
• This instructs the router to reduce the rate at which it is sending packets.
• With Cisco IOS Release 11.2 or later, Cisco routers can respond to BECN notifications.
43
Frame Relay bandwidth and flow control
● Discard eligibility (DE) bit – When the router or switch detects network congestion, it
can mark the packet "Discard Eligible".
○ The DE bit is set on the traffic that was received after the CIR was met.
○ However, in periods of congestion, the Frame Relay switch will drop packets with
the DE bit set first. 44
Frame Relay bandwidth
● Several factors determine the rate at which a customer can send data on a Frame Relay network.
○ Foremost in limiting the maximum transmission rate is the capacity of the local loop to the provider.
■ If the local loop is a T1, no more than 1.544 Mbps can be sent.
■ In Frame Relay terminology, the speed of the local loop is called the local access rate.
○ Providers use the CIR parameter to provision network resources and regulate usage.
■ For example, a company with a T1 connection to the packet-switched network (PSN) may agree to a
CIR of 768 Kbps.
■ This means that the provider guarantees 768 Kbps of bandwidth to the customer’s link at all times. 45
Frame Relay bandwidth
● Typically, the higher the CIR, the higher the cost of service.
● Customers can choose the CIR that is most appropriate to their bandwidth needs, as long as the CIR is
less than or equal to the local access rate.
● If the CIR of the customer is less than the local access rate, the customer and provider agree on
whether bursting above the CIR is allowed.
● If the local access rate is T1 or 1.544 Mbps, and the CIR is 768 Kbps, half of the potential bandwidth
(as determined by the local access rate) remains available.
46
Frame Relay bandwidth
● Either a router or a Frame Relay switch tags each frame that is transmitted beyond the
CIR as eligible to be discarded.
● When a frame is tagged DE, a single bit in the Frame Relay frame is set to 1.
● This bit is known as the discard eligible (DE) bit.
● The Frame Relay specification also includes a protocol for congestion notification.
● This mechanism relies on the FECN/ BECN bits in the Q.922 header of the frame.
● The provider’s switches or the customer’s routers can selectively set the DE bit in
frames.
● These frames will be the first to be dropped when congestion occurs.
48
LMI – Local Management Interface
● LMI is a signaling standard between the DTE and the Frame Relay switch.
● LMI is responsible for managing the connection and maintaining the status between devices.
● LMI includes:
○ A multicast mechanism, which provides the network server (router) with its local DLCI.
○ The multicast addressing, which can give DLCIs global rather than local significance in
Frame Relay networks (not common).
○ A status mechanism, which provides an ongoing status on the DLCIs known to the switch 49
LMI
LMI
● In order to deliver the first LMI services to customers as soon as possible, vendors and standards
committees worked separately to develop and deploy LMI in early Frame Relay implementations.
● The result is that there are three types of LMI, none of which is compatible with the others.
● Cisco, StrataCom, Northern Telecom, and Digital Equipment Corporation (Gang of Four)
released one type of LMI, while the ANSI and the ITU-T each released their own versions.
● The LMI type must match between the provider Frame Relay switch and the customer DTE device.
50
LMI
LMI
● In Cisco IOS releases prior to 11.2, the Frame Relay interface must be manually configured to use the
correct LMI type, which is furnished by the service provider.
● If using Cisco IOS Release 11.2 or later, the router attempts to automatically detect the type of LMI
used by the provider switch.
● This automatic detection process is called LMI autosensing.
● No matter which LMI type is used, when LMI autosense is active, it sends out a full status request to
the provider switch.
51
LMI
● The Frame Relay switch uses LMI to report the status of configured PVCs.
● The three possible PVC states are as follows:
○ Active state – Indicates that the connection is active and that routers can exchange data.
○ Inactive state – Indicates that the local connection to the Frame Relay switch is
working, but the remote router connection to the Frame Relay switch is not working.
○ Deleted state – Indicates that no LMI is being received from the Frame Relay switch,
or that there is no service between the CPE router and Frame Relay switch.
52
DLCI Mapping to Network Address
● Manual
○ Inverse Address Resolution Protocol (I-ARP) provides a given DLCI and requests next-hop
protocol addresses for a specific connection.
○ The router then updates its mapping table and uses the information in the table to forward
packets on the correct route. 53
Inverse ARP – Knows DLCI, needs remote IP
2
1
3
My DLCI 16 Your IP?
My IP is 1.1.1.1
4
My IP is 1.1.1.2
● Once the router learns from the switch about available PVCs and their corresponding
DLCIs, the router can send an Inverse ARP request to the other end of the PVC. (unless
statically mapped – later)
● For each supported and configured protocol on the interface, the router sends an Inverse
ARP request for each DLCI. (unless statically mapped)
● In effect, the Inverse ARP request asks the remote station for its Layer 3 address.
● At the same time, it provides the remote system with the Layer 3 address of the local system.
● The return information from the Inverse ARP is then used to build the Frame Relay map.
54
Inverse ARP – Knows DLCI, needs remote IP
● Inverse Address Resolution Protocol (Inverse ARP) was developed to provide a mechanism for dynamic DLCI
to Layer 3 address maps.
● Inverse ARP works much the same way Address Resolution Protocol (ARP) works on a LAN.
● However, with ARP, the device knows the Layer 3 IP address and needs to know the remote data link MAC
address.
● With Inverse ARP, the router knows the Layer 2 address which is the DLCI, but needs to know the remote 55
Configuring Frame Relay maps
Router(config-if)#frame-relay map protocol
protocol-address dlci [broadcast] [ietf | cisco]
● If the environment does not support LMI autosensing and Inverse ARP, a Frame Relay map must be
manually configured.
● Use the frame-relay map command to configure static address mapping.
● Once a static map for a given DLCI is configured, Inverse ARP is disabled on that DLCI.
● The broadcast keyword is commonly used with the frame-relay map command.
● The broadcast keyword:
56
debug frame-relay lmi (continued)
FYI ONLY
● The possible values of the status field are as follows:
● 0x0 – Added/inactive means that the switch has this DLCI programmed but for
some reason it is not usable. The reason could possibly be the other end of the
PVC is down.
● 0x2 – Added/active means the Frame Relay switch has the DLCI and everything
is operational.
● 0x4 – Deleted means that the Frame Relay switch does not have this DLCI
programmed for the router, but that it was programmed at some point in the past.
This could also be caused by the DLCIs being reversed on the router, or by the
PVC being deleted by the service provider in the Frame Relay cloud.
57
Frame Relay Topologies
58
Frame Relay vs. X.25
● Frame Relay does not have the sequencing, windowing, and retransmission mechanisms that are
used by X.25.
● Without the overhead, the streamlined operation of Frame Relay outperforms X.25.
● Typical speeds range from 1.5 Mbps to 12 Mbps, although higher speeds are possible. (Up to 45
Mbps)
● The network providing the Frame Relay service can be either a carrier-provided public network or
a privately owned network.
● Because it was designed to operate on high-quality digital lines, Frame Relay provides no error
recovery mechanism.
● If there is an error in a frame it is discarded without notification. 59
NBMA – Non Broadcast Multiple
Access Frames between two routers are only seen
by those two devices (non broadcast).
Similar to a LAN, multiple computers have
access to the same network and potentially
to each other (multiple access).
● A star topology, also known as a hub and spoke configuration, is the most
popular Frame Relay network topology because it is the most
cost-effective.
● In this topology, remote sites are connected to a central site that generally
provides a service or application.
● This is the least expensive topology because it requires the fewest PVCs.
● In this example, the central router provides a multipoint connection,
because it is typically using a single interface to interconnect multiple
PVCs.
61
Full Mesh
Full Mesh Topology
Number of Number of
Connections PVCs
----------------- --------------
2 1
4 6
6 15
8 28
10 45
● In a full mesh topology, all routers have PVCs to all other destinations.
● This method, although more costly than hub and spoke, provides direct
connections from each site to all other sites and allows for redundancy.
● For example, when one link goes down, a router at site A can reroute traffic
through site C.
● As the number of nodes in the full mesh topology increases, the topology
becomes increasingly more expensive.
● The formula to calculate the total number of PVCs with a fully meshed WAN is
[n(n - 1)]/2, where n is the number of nodes.
62
VPN
63
VPN (Virtual Private Network)
● VPN is a network that is private but virtual.
● It is private because it guarantees privacy inside the organization.
● It is virtual because it does not use real private WANs; the network is physically
public but virtually private.
● Routers R1 and R2 use VPN
technology to guarantee privacy for the organization.
Virtual private network
65
Asynchronous Transfer Mode
ATM
ATM Features
● Cell relay protocol.
67
18CSC302J- School of Computing (Odd sem 2020)
ATM
● Destined to replace most existing WAN technologies
● The standard-sized cells allow switching mechanisms to achieve faster switching rates
● Rates of 155 – 622 Mbps are achieved with theoretical rates up to 1.2 Gbps
Video
A/D … Compression AAL
cells
picture compressed
frames frames
Data AAL
Bursty variable-length cells
packets
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
72
18CSC302J- School of Computing (Odd sem 2020)
Asynchronous Transfer Mode (ATM)
Voice
Data
MUX
packet
s Wasted bandwidth
Image
s
TDM
4 3 2 1 4 3 2 1 4 3 2 1
ATM `
4 3 1 3 2 2 1
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
73
18CSC302J- School of Computing (Odd sem 2020)
ATM
● ATM standard (defined by CCITT) is widely accepted by common carriers as mode of operation for
5 Bytes 48 Bytes
Header Payload
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
74
18CSC302J- School of Computing (Odd sem 2020)
ATM Conceptual Model
Assumptions
1. ATM network will be organized as a hierarchy.
Connections between provided networks are made through NNI (Network-Network Interface).
A connection (an ATM channel) must be established before any cells are sent.
75
18CSC302J- School of Computing (Odd sem 2020)
Private ATM
Private network
UNI
X X
Private
UNI
NNI c Public ATM
X bli
Pu network A
X X
NNI
Public X
UNI B-ICI Public ATM
network B
X
Public
X X UNI
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
76
18CSC302J- School of Computing (Odd sem 2020)
ATM Connections
● two levels of ATM connections:
77
18CSC302J- School of Computing (Odd sem 2020)
ATM Virtual Connections
Virtual Paths
Physical Link
Virtual Channels
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
78
18CSC302J- School of Computing (Odd sem 2020)
ATM Conceptual Model
Assumptions (cont.)
3. Vast majority of ATM networks will run on optical fiber networks with extremely low error rates .
• This decision lead to a significant decision – to prohibit cell reordering in ATM networks.
79
18CSC302J- School of Computing (Odd sem 2020)
UNI Cell Format
GFC (4 bits) VPI (4 bits)
VPI (4 bits) VCI (4 bits)
ATM cell VCI (8 bits)
header VCI (4 bits) PT (3 bits) CLP
(1 bit)
HEC (8 bits)
Payload
(48 bytes)
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
80
18CSC302J- School of Computing (Odd sem 2020)
● GFC(Generic Flow Label):
○ primary function of this header is the physical access control, it is often used to reduce cell jitters in CBR
services, assign fair capacity for VBR services, and tocontrol traffic for VBR flows.
○ VPI/VCI-identification numbers, so that the cells belonging to the same connection can be distinguished
○ PT-Payload TYpe
○ HEC(Header Error Control) is a CRC byte for the cell header field and is used for sensing and correcting cell
errors and in delineating the cell header.
…
61 2 67
…
N video 75 N
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
82
18CSC302J- School of Computing (Odd sem 2020)
VP3 a
VP
a 5
b
c ATM ATM ATM ATM b
Sw DCC Sw Sw
c
d 1 2
e 3
VP
2 VP
1 ATM d
Sw = switch Sw
e
4
Digital Cross Connect
Only switches virtual paths
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
83
18CSC302J- School of Computing (Odd sem 2020)
ATM Protocol Architecture
● ATM Adaptation Layer (AAL) – the protocol for packaging data into cells is collectively referred to as
AAL.
● Must efficiently package higher level data such as voice samples, video frames and datagram packets
84
18CSC302J- School of Computing (Odd sem 2020)
ATM Network Architecture
Plane management
Control plane User plane
Layer management
Higher layers Higher layers
ATM layer
Physical layer
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
86
18CSC302J- School of Computing (Odd sem 2020)
User User
information information
AAL AAL
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
87
18CSC302J- School of Computing (Odd sem 2020)
● AAL-How to break application messages to cells.
○ Transmission/Swiching/Reception
○ Sequential delivery
89
18CSC302J- School of Computing (Odd sem 2020)
ATM Architecture
An AAL is further divided into:
The Convergence Sublayer (CS) manages the flow of data to and from SAR sublayer.
The Segmentation and Reassembly Sublayer (SAR) breaks data into cells at the sender and
reassembles
cells into larger data units at the receiver.
90
18CSC302J- School of Computing (Odd sem 2020)
ATM layer
Transmission
convergence
sublayer
Physical layer
Physical medium
dependent
sublayer
Physical
medium
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
91
18CSC302J- School of Computing (Odd sem 2020)
Original ATM Architecture
● The AAL interface was initially defined as classes A-D with SAP (service access points) for AAL1-4.
● AAL3 and AAL4 were so similar that they were merged into AAL3/4.
● The data communications community concluded that AAL3/4 was not suitable for data communications
applications. They pushed for standardization of AAL5 (also referred to as SEAL – the Simple and
Efficient Adaptation Layer).
92
18CSC302J- School of Computing (Odd sem 2020)
Revised ATM Service Categories
Class Description Example
93
18CSC302J- School of Computing (Odd sem 2020)
QoS, PVC, and SVC
● Quality of Service ( QoS) requirements are handled at connection time and viewed as part of signaling.
set up and released on demand by the end user via signaling procedures.
94
18CSC302J- School of Computing (Odd sem 2020)
AAL 1 Payload
(b) CS PDU with pointer in structured data transfer
47 Bytes
AAL 1
Pointer
1 Byte 46 Bytes
optional
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
95
18CSC302J- School of Computing (Odd sem 2020)
AAL 1
Higher layer User data stream
b1 b2 b3 …
Convergence CS PDUs
sublayer 47 47 47
SAR PDUs
SAR sublayer H H H
1 47 1 47 1 47
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
96
18CSC302J- School of Computing (Odd sem 2020)
AAL 3/4
1 1 2 1 - 65,535 0-3 1 1 2
(bytes) (bytes) (bytes)
(b) SAR PDU format
Header Trailer
(2 bytes) (2 bytes)
ST SN MID SAR - PDU Payload LI CRC
2 4 10 44 6 10
(bits) (bytes) (bits)
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
98
18CSC302J- School of Computing (Odd sem 2020)
AAL 3/4
Higher layer Information User message
Service specific
convergence Assume null
sublayer
Common part H Information PAD T Pad message to
convergence 4 4 multiple of 4 bytes.
sublayer Add header and trailer.
ATM
Head 48 bytes of Data
er 1-bit end-of-datagram field
(PTI)
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
100
18CSC302J- School of Computing (Odd sem 2020)
AAL 5
Information
Higher layer
Service specific
convergence Assume null
sublayer
Common part Information PAD T
convergence
sublayer
SAR sublayer …
48 48 48
(0) (0) (1)
ATM layer …
PTI = 1
PTI = 0 PTI = 0
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies 101
18CSC302J- School of Computing (Odd sem 2020)
PPP
102
PPP- Point to Point Protocol
PPP
The telephone line or cable companies provide a physical link, but to control and manage the transfer of
data, there is a need for a special protocol. The Point-to-Point Protocol (PPP) was designed to respond to
this need.
104
18CSC302J- School of Computing (Odd sem 2020)
PPP – Frame Format
“01111110” 11111111 11000000
1. Flag field. The flag field identifies the boundaries of a PPP frame. Its value is 01111110.
2. Address field. Because PPP is used for a point-to-point connection, it uses the broadcast
address used in most LANs, 11111111, to avoid a data link address in the protocol.
3. Control field. The control field is assigned the value 11000000 to show that, as inmost
LANs, the frame has no sequence number; each frame is independent.
4. Protocol field. The protocol field defines the type of data being carried in the data field:
user data or other information.
5. Data field. This field carries either user data or other information.
6. FCS. The frame check sequence field is simply a 2-byte or 4-byte CRC used for
error detection.
105
18CSC302J- School of Computing (Odd sem 2020)
Link Control Protocol (LCP)
● Purposes ● There are 3 classes of LCP packets:
○ Link monitoring
○ Link quality determination
code-reject, protocol-reject, echo-request,
echo-reply & discard-request
○ Authentication
106
18CSC302J- School of Computing (Odd sem 2020)
Link Control Protocol (LCP)- Packets Format
○ ID – request-response matching ID
107
18CSC302J- School of Computing (Odd sem 2020)
Network Control Protocol(NCP)
● Purpose
Configuring the network layer protocol.
There exists a separate NCP for each network layer protocol
● Negotiation process
Same message formats, code numbers and state machines as LCP
(protocol)
109
18CSC302J- School of Computing (Odd sem 2020)
Tunneling & PPP
● Tunneling - definition
The process of running one network protocol
on top of another.
Common use: VPN (Virtual Private Network)
● Tunneling method
Extending the link between the HDLC driver
and the rest of PPP over a separate network
110
18CSC302J- School of Computing (Odd sem 2020)
HDLC
High-Level Data Link Control
111
18CSC302J- School of Computing
High-level Data link protocol
Defintion
○ Flow control
112
18CSC302J- School of Computing (Odd sem 2020)
HDLC `s ( High level Data link Control) family
HDLC
LAPX
LAPM LAPB LAPD LLC SDLC
(teletex
(v. 42) (x. 25) (ISDN) (LANs) (SNA)
)
LAPF
ESF MTP-2 LAPDm PPP
(frame-relay
(T1) (SS7) (GSM) (many)
)
○ HDLC serves as a baseline from which virtually all other important data link control
● Basic Characteristics
protocols are derived
116
18CSC302J- School of Computing (Odd sem 2020)
HDLC Transfer Mode
● Asynchronous Balanced Mode (ABM)
○ Balanced configuration
○ Either station may initiate transmission without receiving permission
○ Most widely used
○ No polling overhead
● Transmissions in frames
Defines 3 types of
frames (I,S,U frames)
01111110 01111110
118
18CSC302J- School of Computing (Odd sem 2020)
Flag Fields
● Delimit frame at both ends 01111110
● Receiver hunts for flag sequence to synchronize
● Bit stuffing used to avoid confusion with data containing 01111110
○ The transmitter inserts 0 bit after every sequence of five 1s with the exception of
flag fields
○ If receiver detects five 1s it checks next bit
■ If 0, it is deleted
■ If 1 and seventh bit is 0 (i.e., 10), accept as flag
■ If sixth and seventh bits 1 (i.e., 11), sender is indicating abort
Defines 3 types of
01111110 frames (I,S,U frames) 01111110
● Command frame
● Response frame
123
18CSC302J- School of Computing (Odd sem 2020)
I-frame
● Contains the sequence number of transmitted frames and a piggybacked ACK
1 2 3 4 5 6 7 8
•I,0,0
•I,1,0
•I,2,0,P
124
18CSC302J- School of Computing (Odd sem 2020)
S-frame
● Used for flow and error control
1 2 3 4 5 6 7 8
1 0 S P/F N(R)
● Reset (RSET)
● Variable length
Frame Check Sequence Field
● FCS
● Error detection
● 16 bit CRC
127
● Optional 32 bit CRC 18CSC302J- School of Computing (Odd sem 2020)
HDLC Operation
● Exchange of information, supervisory and unnumbered frames
● Three phases
○ Initialization (Set Asynchronous Balanced Mode Extended, Unnumbered Acknowledgment,
Disconnect)
○ Data transfer(receive ready, receive not ready, reject)
○ Disconnect
128
Examples of Operation 18CSC302J- School of Computing (Odd sem 2020)
MPLS
129
MPLS
• MPLS - Multi Protocol Label Switching
IP
Layer 3
MPLS
ATM, Ethernet, FR, PPP
Layer 2
SDH, ODH,WDN,CSMA
Layer 1
Ingress Egres
s
MPLS Characteristics
• It can support the traffic flows of various granularities
Label
• A label is an integer identifying a FEC (a flow)
• Labels are not globally or network - unique label
• Labels are unique only between nodes
• Labels change at each node as a packet traverses a path
• Labels can set manually or we can use label distribution
ATM MPLS Cell Header GFC VPI VCI PTI CLP HEC DATA
Label
Label Distribution:
• MPLS does not specify a single method for label distribution
● BGP has been enhanced to piggyback the label information within the contents of the protocol
• RSVP has also been extended to support piggybacked exchange of labels.
• IETF has also defined a new protocol known as the label Distribution protocol (LDP) for explicit signalling
and management.
• Extensions to the base LDP protocol have also been defined to support explicit routing based on QoS
requirements
Label Edge Router – LER
• Resides at the edge of an MPLS Network and assigns and removes the labels from the packets.
• Supports multiple ports connected to dissimilar networks (such as frame relay, ATM, and
Ethernet)
○ Control plane takes care of the routing information exchange and the label exchange between
adjacent devices
• Data plane—forwards packets based on labels
○ Data plane takes care of forwarding either based on destination addresses or labels
● Control plane contains complex mechanisms to exchange routing information (OSPF, EIGRP, IS-IS,
BGP, etc.) and labels (Tag Distribution protocol [TDP], Label Distribution protocol [LDP], BGP, RSVP,
etc.)
● Data plane has a simple forwarding engine Control plane maintains the contents of the label switching
table (label forwarding information base or LFIB)
● There is a large number of different routing protocols such as OSPF, IGRP, EIGRP, IS-IS, RIP, BGP,
18CSC302J- School of Computing (Odd sem 2021)
etc. that can be used in the control plane.
The control plane also requires protocols to exchange labels, such as:
● ■ Tag Distribution Protocol [TDP] (MPLS)
● ■ Label Distribution Protocol [LDP] (MPLS)
● ■ BGP (MPLS virtual private networks [VPNs])
● ■ Resource-Reservation Protocol [RSVP] (MPLS Traffic Engineering [MPLSTE])
● ■ CR-LDP (MPLS-TE)
The data plane however, is a simple label-based forwarding engine that is independent of
the type of routing protocol or label exchange protocol. A Label Forwarding Information
Base (LFIB) is used to forward packets based on labels. The LFIB table is populated by the
label exchange protocols used in the control plane.
In liberal mode, an LSR can adapt to route changes quickly; while in conservative mode,
there are less label to FEC bindings for an LSR to advertise and keep.
The conservative label retention mode is usually used with the DoD mode on LSRs with
limited label space.
MPLS Applications
- Traffic engineering allows a network administrator to make the path deterministic and
bypass the normal routed hop-by-hop paths.
- An administrator may elect to explicitly define the path between stations to ensure QoS
or have the traffic follow a specified path to reduce traffic loading across certain hops.
- The network administrator can reduce congestion by forcing the frame to travel around
the overloaded segments.
- Hops are configured in the LSRs ahead of time along with the appropriate label values.
151