Data Communications
Data Communications
Data Communications
Chapter 8 Outline
Switched Network
Circuit-Switched Network
Datagram Networks
Virtual-Circuit Network
2
Introduction
In large networks we need some means to allow
one-to-one communication between any two
nodes.
In LANs this is achieved using one of three
methods:
Direct point-to-point connection (mesh)
Via central controller (star)
Connection to common bus in a multipoint
configuration (bus/hup)
topologies employing multipoint connections, such as a bus, are
ruled out because the distances between devices and the total
number of devices increase beyond the capacities of the media
and equipment
3
Introduction
4
Switched Network
5
Traditionally, three methods of switching have been important:
6
Circuit-Switched Network
8
Circuit-Switched Network
9
Example
Communication is through 4-kHz voice channels. We assume that each
link uses FDM to connect a maximum of two voice channels. The
bandwidth of each link is then 8 kHz. Figure 8.4 shows the situation.
Telephone 1 is connected to telephone 7; 2 to 5; 3 to 8; and 4 to 6. Of
course the situation may change when new connections are made. The
switch controls the connections.
10
Transmission phases
Three Phases
circuit-switched network requires three phases: connection setup, data transfer, and
connection teardown.
Setup phase
A dedicated circuit needs to be established
So create dedicated channel by sending a request
11
Transmission phases
13
delay caused by the setup is the sum of four parts: the
propagation time of the source computer request (slope of the
first gray box), the request signal transfer time (height f
14
Advantages and Disadvantages of
Circuit Switched Services
• The advantages of circuit switched networks are
that they are simple, flexible, and inexpensive
when not used intensively.
• There are two main problems with dialed circuits.
– Each connection goes through the regular telephone
network on a different circuit, which vary in quality.
– Data transmission rates are low, from 28.8 to 56 Kbps.
• An alternative is to use a private dedicated circuit,
which is leased from a common carrier for the
user’s exclusive use 24 hrs/day, 7 days/week.
15
Dedicated Circuit Networks
16
Dedicated Circuit Services (Figure 8-2)
• Dedicated circuits involve leasing circuits from
common carriers to create point to point links
between organizational locations.
• These points are then connected together using
special equipment such as routers and switches.
• Dedicated circuits are billed at a flat fee per month
for which the user has unlimited use of the circuit.
• Dedicated circuits therefore require more care in
network design than dialed circuits.
• The three basic dedicated circuit architectures are
ring, star, and mesh architectures.
17
Figure 8-2 Dedicated Circuit Services 18
Datagram Networks
19
Datagram Networks
20
Routing table & Destination Add.
A switch in a datagram
network uses a routing table
that is based on the
destination address.
The destination address in the
header of a packet in a
datagram network remains
the same during the entire
journey of the packet.
21
Delay
22
Packet Switched Networks
23
Packet Switched Services: Basic
Architecture
• Packet switched services enable multiple connections to
exist simultaneously between computers.
• With packet switching users buy a connection into the
common carrier network, and connect via a packet
assembly/ disassembly device (PAD). See Figure 8-9.
• Packets from separate messages are interleaved with other
packets for transmission (Figure 8-10).
• Organizations usually connect to a packet network by
leasing dedicated circuits from their offices to the packet
switched network’s point-of-presence (POP).
24
Figure 8-9. Packet Switched Services 25
Figure 8-10. Packet Switching 26
Packet Routing Methods
27
Permanent and Switched Virtual Circuits
• Two types of virtual circuits, permanent (PVCs)
and switched (SVC), are available from common
carriers. PVCs are far more common.
• Although established using software, setting up or
taking down a PVC takes days or weeks to do.
• Each PVC has two data rates: a committed
information rate (CIR), which is guaranteed and
a maximum allowable rate (MAR), which sends
data only when the extra capacity is available.
• Packets sent at rates exceeding the CIR are
marked discard eligible (DE), and discarded if the
network becomes overloaded, in which case they
may need to be retransmitted. 28
Packet Switched Service Protocols
29
X.25
• The oldest packet switched service is X.25, a
standard developed by ITU-T. X.25 offers
datagram, switched virtual circuit, and permanent
virtual circuit services.
• X.25 uses the LAPB and PLP protocols at the data
link and network layers, respectively.
• X.25 is a reliable protocol, meaning it performs
error control and retransmits bad packets.
• Although widely used in Europe, X.25 is not in
widespread use in North America. The primary
reason is the low transmission speed, now 2.048
Mbps (up from 64 Kbps).
30
Asynchronous Transfer Mode (ATM)
• Asynchronous transfer mode (ATM) is one of the
fastest growing new WAN technologies, and is
similar to frame relay.
• ATM is an unreliable protocol, meaning no error
control is done by the ATM protocol as data is
moves through the network.
• Instead, error control must be handled by another
network layer (typically the transport layer, which
handles end-to-end communications).
31
Asynchronous Transfer Mode (ATM)
• Three important ATM features are:
– ATM uses fixed length, 53 byte ‘cells’ (5 bytes
of overhead and 48 bytes of user data), which is
more suitable for real time transmissions.
– ATM provides extensive quality of service
information that enables the setting of very
precise priorities among different types of
transmissions (i.e. voice, video & e-mail).
– ATM is scaleable, since basic ATM circuits are
easily multiplexed onto much faster ones.
32
Figure 8-11 33
Figure 8-12 Digital Island’s WAN
34
Frame Relay
• Frame relay is a packet switching technology
that transmits data faster than X.25 but slower
than ATM.
• Like ATM, Frame relay encapsulates packets,
so packets are delivered unchanged through the
network.
• Also like ATM, Frame relay networks are
unreliable (although they are capable of doing
error checking, this is not enough to make
Frame relay reliable).
• Common carriers offer frame relay with
different transmission speeds: 56 Kbps to 45
Mbps.
35
Switched Multimegabit Data Service (SMDS)
• Switched multimegabit data service (SMDS) is
another unreliable packet service like ATM and
frame relay.
• Most, but not all, RBOCs offer SMDS at a variety of
transmission rates, ranging from 56 Kbps up to 45
Mbps.
• SMDS is not standardized and offers no clear
advantages over frame relay.
• For this reason, it is not a widely accepted protocol
and offers no advantages over frame relay. Its future
is uncertain.
36
Ethernet/IP Packet Networks
• Recently, Internet startups began offering
Ethernet/IP services over MAN/WAN networks.
• All other MAN/WAN services; X.25, ATM,
Frame Relay and SMDS use different protocols
from Ethernet, so data must be translated or
encapsulated before it is sent over these networks.
• Companies offering Ethernet/IP have set up their
own gigabit Ethernet fiber optic networks in some
large cities, bypassing common carrier networks.
• Ethernet/IP packet network services currently
offer CIR speeds from 1 Mbps to 1 Gbps at 1/4
the cost of more traditional services.
37
Virtual-Circuit Network
38
Virtual-Circuit Network
39
Addressing
Global addressing
Source and destination needs unique addresses
Virtual-circuit identifier
40
Transmission phases
Setup phase
A switch creates an entry for a virtual circuit.
Request
acknowledgment
41
Setup
42
acknowledgment
43
Data transfer and teardown phases
44
Efficiency
45
Delay
46
Virtual Private Networks
47
Virtual Private Networks
• Virtual Private Networks (VPNs) use PVCs that
run over the Internet but appear to the user as
private networks.
• Packets sent over these PVCs, called tunnels, are
encapsulated using special protocols that also
encrypt the IP packets they enclose.
• The growing popularity of VPNs is based on their
low cost and flexibility.
• There are two important disadvantages of VPNs:
– the unpredictability of Internet traffic
– the lack of standards for Internet-based VPNs, so that
not all vendor equipment and services are compatible.
48
Basic VPN Architecture (Figure 8-13)
• Each location connected to a VPN is first connected to the
ISP providing the VPN service using a leased circuit, such
as T-1 line which connects to the ISP’s PVCs at ISP access
points.
• Outgoing packets from the VPN are sent through specially
designed routers or switches.
• The sending VPN device encapsulates the outgoing packet
with a protocol used to move it through the tunnel to the
VPN device on the other side.
• The VPN device at the receiver, strips off the VPN packet
and delivers the packet to the destination network.
• The VPN is transparent to the users, ISP, and the Internet
as a whole; it appears to be simply a stream of packets
moving across the Internet.
49
ISP
VPN Access
Device Server
Office Telephone
Line
VPN Employee’s
Device Home
Internet
VPN Tunnel
Office
VPN
Device
51
Packet from the client computer
Packet in transmission through the Internet
SMTP
TCP
IP
PPP SMTP
TCP
IP
L2TP PPP
ATM IP
ISP
Telephone
Line VPN
Access Device
Server
Employee’s
Home
Packet from the VPN
SMTP
TCP
IP
PPP
Internet
VPN
Device Access
Server
VPN Tunnel
53
Thanks
54