Beruflich Dokumente
Kultur Dokumente
What is Data Communications? Communications Channels Serial Communications Asynchronous vs. Synchronous Transmission The ASCII Character Set
transmission systems. The transmission of data from one point to another over communication channels
The distance over which data moves within a computer may vary from a few thousandths of an inch, as is the case within a single IC chip, to as much as several feet along the backplane of the main circuit board. Over such small distances, digital data may be transmitted as direct, two-level electrical signals over simple copper conductors. Except for the fastest computers, circuit designers are not very concerned about the shape of the conductor or the analog characteristics of signal transmission. Frequently, however, data must be sent beyond the local circuitry that constitutes a computer. In many cases, the distances involved may be enormous. Unfortunately, as the distance between the source of a message and its destination increases, accurate transmission becomes increasingly difficult. This results from the electrical distortion of signals traveling through long conductors, and from noise added to the signal as it propagates through a transmission medium. Although some precautions must be taken for data exchange within a computer, the biggest problems occur when data is transferred to devices outside the computer's circuitry. In this case, distortion and noise can become so severe that information is lost.
Data Communications concerns the transmission of digital messages to devices external to the
message source. "External" devices are generally thought of as being independently powered circuitry that exists beyond the chassis of a computer or other digital message source. As a rule, the maximum permissible transmission rate of a message is directly proportional to signal power, and inversely proportional to channel noise. It is the aim of any communications system to provide the highest possible transmission rate at the lowest possible power and with the least possible noise.
125
Communications Channels
A communications channel is a pathway over which information can be conveyed. It may be defined by a physical wire that connects communicating devices, or by a radio, laser, or other radiated energy source that has no obvious physical presence. Information sent through a communications channel has a source from which the information originates, and a destination to which the information is delivered. Although information originates from a single source, there may be more than one destination, depending upon how many receive stations are linked to the channel and how much energy the transmitted signal possesses. In a digital communications channel, the information is represented by individual data bits, which may be encapsulated into multibit message units. A byte, which consists of eight bits, is an example of a message unit that may be conveyed through a digital communications channel. A collection of bytes may itself be grouped into a frame or other higher-level message unit. Such multiple levels of encapsulation facilitate the handling of messages in a complex data communications network.
The message source is the transmitter, and the destination is the receiver. A channel whose direction of transmission is unchanging is referred to as a simplex channel. For example, a radio station is a simplex channel because it always transmits the signal to its listeners and never allows them to transmit back. A half-duplex channel is a single physical channel in which the direction may be reversed. Messages may flow in two directions, but never at the same time, in a half-duplex system. In a telephone call, one party speaks while the other listens. After a pause, the other party speaks and the first party listens. Speaking simultaneously results in garbled sound that cannot be understood. A full-duplex channel allows simultaneous message exchange in both directions. It really consists of two simplex channels, a forward channel and a reverse channel, linking the same points. The transmission rate of the reverse channel may be slower if it is used only for flow control of the forward channel.
Serial Communications
Most digital messages are vastly longer than just a few bits. Because it is neither practical nor economic to transfer all bits of a long message simultaneously, the message is broken into smaller parts and transmitted sequentially. Bit-serial transmission conveys a message one bit at a time through a channel. Each bit represents a part of the message. The individual bits are then reassembled at the destination to compose the message. In general, one channel will pass only one bit at a time. Thus, bit-serial transmission is necessary in data communications if only a single channel is available. Bit-serial transmission is normally just called serial transmission and is the chosen communications method in many computer peripherals. Byte-serial transmission conveys eight bits at a time through eight parallel channels. Although the raw transfer rate is eight times faster than in bit-serial transmission, eight channels are needed, and the cost may be as much as eight times higher to transmit the message. When distances are short, it may nonetheless be both feasible and economic to use parallel channels in return for high data rates. The popular Centronics printer interface is a case where byte-serial transmission is used. As another example, it is common practice to use a 16-bit-wide data bus to transfer data between a microprocessor and memory chips; this provides the equivalent of 16 parallel channels. On the other
126
hand, when communicating with a timesharing system over a modem, only a single channel is available, and bit-serial transmission is required. This figure illustrates these ideas:
The baud rate refers to the signalling rate at which data is sent through a channel and is measured in electrical transitions per second. In the EIA232 serial interface standard, one signal transition, at most, occurs per bit, and the baud rate and bit rate are identical. In this case, a rate of 9600 baud corresponds to a transfer of 9,600 data bits per second with a bit period of 104 microseconds (1/9600 sec.). If two electrical transitions were required for each bit, as is the case in non-return-tozero coding, then at a rate of 9600 baud, only 4800 bits per second could be conveyed. The channel efficiency is the number of bits of useful information passed through the channel per second. It does not include framing, formatting, and error detecting bits that may be added to the information bits before a message is transmitted, and will always be less than one.
The data rate of a channel is often specified by its bit rate (often thought erroneously to be the same as baud rate). However, an equivalent measure channel capacity is bandwidth. In general, the maximum data rate a channel can support is directly proportional to the channel's bandwidth and inversely proportional to the channel's noise level. A communications protocol is an agreed-upon convention that defines the order and meaning of bits in a serial transmission. It may also specify a procedure for exchanging messages. A protocol will define how many data bits compose a message unit, the framing and formatting bits, any errordetecting bits that may be added, and other information that governs control of the communications hardware. Channel efficiency is determined by the protocol design rather than by digital hardware considerations. Note that there is a tradeoff between channel efficiency and reliability - protocols that provide greater immunity to noise by adding error-detecting and -correcting codes must necessarily become less efficient. Asynchronous
Serialized data is not generally sent at a uniform rate through a channel. Instead, there is usually a burst of regularly spaced binary data bits followed by a pause, after which the data flow resumes. Packets of binary data are sent in this manner, possibly with variable-length pauses between packets, until the message has been fully transmitted. In order for the receiving end to know the proper moment to read individual binary bits from the channel, it must know exactly when a packet begins and how
127
much time elapses between bits. When this timing information is known, the receiver is said to be synchronized with the transmitter, and accurate data transfer becomes possible. Failure to remain synchronized throughout a transmission will cause data to be corrupted or lost. Two basic techniques are employed to ensure correct synchronization. In synchronous systems, separate channels are used to transmit data and timing information. The timing channel transmits clock pulses to the receiver. Upon receipt of a clock pulse, the receiver reads the data channel and latches the bit value found on the channel at that moment. The data channel is not read again until the next clock pulse arrives. Because the transmitter originates both the data and the timing pulses, the receiver will read the data channel only when told to do so by the transmitter (via the clock pulse), and synchronization is guaranteed. Techniques exist to merge the timing signal with the data so that only a single channel is required. This is especially useful when synchronous transmissions are to be sent through a modem. Two methods in which a data signal is self-timed are nonreturn-to-zero and biphase Manchester coding. These both refer to methods for encoding a data stream into an electrical waveform for transmission. In asynchronous systems, a separate timing channel is not used. The transmitter and
receiver must be preset in advance to an agreed-upon baud rate. A very accurate local oscillator within the receiver will then generate an internal clock signal that is equal to the transmitter's within a fraction of a percent. For the most common serial protocol, data is sent in small packets of 10 or 11 bits, eight of which constitute message information. When the channel is idle, the signal voltage corresponds to a continuous logic '1'. A data
packet always begins with a logic '0' (the start bit) to signal the receiver that a transmission is starting. The start bit triggers an internal timer in the receiver that generates the needed clock pulses. Following the start bit, eight bits of message data are sent bit by bit at the agreed upon baud rate. The packet is concluded with a parity bit and stop bit. One complete packet is illustrated below:
128
This standard relates binary codes to printable characters and control codes. Fully 25 percent of the ASCII character set represents nonprintable control codes, such as carriage return (CR) and line feed (LF). Most modern character-oriented peripheral equipment abides by the ASCII standard, and thus may be used interchangeably with different computers.
Another approach to error detection involves the computation of a checksum. In this case, the packets that constitute a message are added arithmetically. A checksum number is appended to the packet sequence so that the sum of data plus checksum is zero. When received, the packet sequence may be added, along with the checksum, by a local microprocessor. If the sum is nonzero, an error has occurred. As long as the sum is zero, it is highly unlikely (but not impossible) that any data has been corrupted during transmission.
129
Errors may not only be detected, but also corrected if additional code is added to a packet sequence. If the error probability is high or if it is not possible to request retransmission, this may be worth doing. However, including error-correcting code in a transmission lowers channel efficiency, and results in a noticeable drop in channel throughput.
Data Compression
If a typical message were statistically analyzed, it would be found that certain characters are used much more frequently than others. By analyzing a message before it is transmitted, short binary codes may be assigned to frequently used characters and longer codes to rarely used characters. In doing so, it is possible to reduce the total number of characters sent without altering the information in the message. Appropriate decoding at the receiver will restore the message to its original form. This procedure, known as data compression, may result in a 50 percent or greater savings in the amount of data transmitted. Even though time is necessary to analyze the message before it is transmitted, the savings may be great enough so that the total time for compression, transmission, and decompression will still be lower than it would be when sending an uncompressed message. Some kinds of data will compress much more than others. Data that represents images, for example, will usually compress significantly, perhaps by as much as 80 percent over its original size. Data representing a computer program, on the other hand, may be reduced only by 15 or 20 percent. A compression method called Huffman coding is frequently used in data communications, and particularly in fax transmission. Clearly, most of the image data for a typical business letter represents white paper, and only about 5 percent of the surface represents black ink. It is possible to send a single code that, for example, represents a consecutive string of 1000 white pixels rather than a separate code for each white pixel. Consequently, data compression will significantly reduce the total message length for a faxed business letter. Were the letter made up of randomly distributed black ink covering 50 percent of the white paper surface, data compression would hold no advantages.
Data Encryption
Privacy is a great concern in data communications. Faxed business letters can be intercepted at will through tapped phone lines or intercepted microwave transmissions without the knowledge of the sender or receiver. To increase the security of this and other data communications, including digitized telephone conversations, the binary codes representing data may be scrambled in such a way that unauthorized interception will produce an indecipherable sequence of characters. Authorized receive stations will be equipped with a decoder that enables the message to be restored. The process of scrambling, transmitting, and descrambling is known as encryption. Custom integrated circuits have been designed to perform this task and are available at low cost. In some cases, they will be incorporated into the main circuitry of a data communications device and function without operator knowledge. In other cases, an external circuit is used so that the device, and its encrypting/decrypting technique, may be transported easily.
130
Normally, we think of communications science as dealing with the contemporaneous exchange of information between distant parties. However, many of the same techniques employed in data communications are also applied to data storage to ensure that the retrieval of information from a storage medium is accurate. We find, for example, that similar kinds of error-correcting codes used to protect digital telephone transmissions from noise are also used to guarantee correct readback of digital data from compact audio disks, CD-ROMs, and tape backup systems.
Following a data transaction, the content of the source register is reproduced in the destination register. It is important to note that after any digital data transfer, the source and destination registers are equal; the source register is not erased when the data is sent. The transmit and receive switches shown above are electronic and operate in response to commands from a central control unit. It is possible that two or more destination registers will be switched on to receive data from a single source. However, only one source may transmit data onto the bus at any time. If multiple sources were to attempt transmission simultaneously, an electrical conflict would occur when bits of opposite value are driven onto a single bus conductor. Such a condition is referred to as a bus contention. Not only will a bus contention result in the loss of information, but it also may damage the electronic circuitry. As long as all registers in a system are linked to one central control unit, bus contentions should never occur if the circuit has been designed properly. Note that the data buses within a typical microprocessor are funda-mentally half-duplex channels.
When the source and destination registers are part of an integrated circuit (within a microprocessor chip, for example), they are extremely close (thousandths of an inch). Consequently, the bus signals are at very low power levels, may traverse a distance in very little time, and are not very susceptible to external noise and distortion. This is the ideal environment for digital communications. However, it is not yet possible to integrate all the necessary circuitry for a computer (i.e., CPU, memory, disk control, video and display drivers, etc.) on a single chip. When data is sent off-chip to another integrated circuit, the bus signals must be amplified and conductors extended out of the chip through external pins. Amplifiers may be added to the source register:
131
Bus signals that exit microprocessor chips and other VLSI circuitry are electrically capable of traversing about one foot of conductor on a printed circuit board, or less if many devices are connected to it. Special buffer circuits may be added to boost the bus signals sufficiently for transmission over several additional feet of conductor length, or for distribution to many other chips (such as memory chips).
Such noise becomes progressively worse as the length increases, and may eventually impose an unacceptable error rate on the bus signals. Just a single bit error in transferring an instruction code from memory to a microprocessor chip may cause an invalid instruction to be introduced into the instruction stream, in turn causing the computer to totally cease operation. A second problem involves the distortion of electrical signals as they pass through metallic conductors. Signals that start at the source as clean, rectangular pulses may be received as rounded pulses with ringing at the rising and falling edges:
132
These effects are properties of transmission through metallic conductors, and become more pronounced as the conductor length increases. To compensate for distortion, signal power must be increased or the transmission rate decreased. Special amplifier circuits are designed for transmitting direct (unmodulated) digital signals through cables. For the relatively short distances between components on a printed circuit board or along a computer backplane, the amplifiers are in simple IC chips that operate from standard +5v power. The normal output voltage from the amplifier for logic '1' is slightly higher than the minimum needed to pass the logic '1' threshold. Correspondingly for logic '0', it is slightly lower. The difference between the actual output voltage and the threshold value is referred to as the noise margin, and represents the amount of noise voltage that can be added to the signal without creating an error:
Transmission over Medium Distances (< 20 feet) Computer peripherals such as a printer or scanner generally include mechanisms that cannot be situated within the computer itself. Our first thought might be just to extend the computer's internal buses with a cable of sufficient length to reach the peripheral. Doing so, however, would expose all bus transactions to external noise and distortion even though only a very small percentage of these transactions concern the distant peripheral to which the bus is connected.
If a peripheral can be located within 20 feet of the computer, however, relatively simple electronics may be added to make data transfer through a cable efficient and reliable. To accomplish this, a bus interface circuit is installed in the computer:
It consists of a holding register for peripheral data, timing and formatting circuitry for external data transmission, and signal amplifiers to boost the signal sufficiently for transmission through a cable. When communication with the peripheral is necessary, data is first deposited in the holding register by the microprocessor. This data will then be reformatted, sent with error-detecting codes, and
133
transmitted at a relatively slow rate by digital hardware in the bus interface circuit. In addition, the signal power is greatly boosted before transmission through the cable. These steps ensure that the data will not be corrupted by noise or distortion during its passage through the cable. In addition, because only data destined for the peripheral is sent, the party-line transactions taking place on the computer's buses are not unnecessarily exposed to noise. Data sent in this manner may be transmitted in byte-serial format if the cable has eight parallel channels (at least 10 conductors for half-duplex operation), or in bit-serial format if only a single channel is available.
This is the only change needed if a single peripheral is used. However, if many peripherals are connected, or if other computer stations are to be linked, a local area network (LAN) is required, and it becomes necessary to drastically change both the electrical drivers and the protocol to send messages through the cable. Because multiconductor cable is expensive, bit-serial transmission is almost always used when the distance exceeds 20 feet. In either a simple extension cable or a LAN, a balanced electrical system is used for transmitting digital data through the channel. This type of system involves at least two wires per channel, neither of which is a ground. Note that a common ground return cannot be shared by multiple channels in the same cable as would be possible in an unbalanced system. The basic idea behind a balanced circuit is that a digital signal is sent on two wires simultaneously, one wire expressing a positive voltage image of the signal and the other a negative voltage image. When both wires reach the destination, the signals are subtracted by a summing amplifier, producing a signal swing of twice the value found on either incoming line. If the cable is exposed to radiated electrical noise, a small voltage of the same polarity is added to both wires in the cable. When the signals are subtracted by the summing amplifier, the noise cancels and the signal emerges from the cable without noise:
A great deal of technology has been developed for LAN systems to minimize the amount of cable required and maximize the throughput. The costs of a LAN have been concentrated in the electrical interface card that would be installed in PCs or peripherals to drive the cable, and in the
134
communications software, not in the cable itself (whose cost has been minimized). Thus, the cost and complexity of a LAN are not particularly affected by the distance between stations.
Transmission of data from your personal computer to a timesharing service over phone lines
requires that data signals be converted to audible tones by a modem. An audio sine wave carrier is used, and, depending on the baud rate and protocol, will encode data by varying the frequency, phase, or amplitude of the carrier. The receiver's modem accepts the modulated sine wave and extracts the digital data from it. Several modulation techniques typically used in encoding digital data for analog transmission are shown below:
Similar techniques may be used in digital storage devices such as hard disk drives to encode data for storage using an analog medium. END
135
Transmision Media
This section cover the cables and how they are connected. TRANSMISSION MEDIA
Print Page
In order to carry the data packets from one node to another on a network some sort of media must be employed. The most common types of media are:
Twisted Pair Copper Cable Coaxial Copper Cable Fibre Optic Cable
Copper cables have been used to carry electricity and electrical signals from one place to another for many years. Since the 1960's Fibre Optic cables have been used to carry digital signals from A to B in the form of light. Which type of cable is used for a specific situation will depend on several factors:
There are many variations of cable in existence but only the more popular types used on LANs will be covered here. TWISTED PAIR CABLE Twisted pair cables have been used for connecting telephones to Local Exchanges ever since telephones were invented, the size and thickness have changed but they are basically the same as they were in the early twentieth century. A twisted pair cable consists of two insulated wires which are twisted round each other to form the twisted pair. The frequency of the twist down the cable coincides with the frequency of the electrical signals which will try to invade the cable from outside. The twist will introduce a cancelling effect at the frequency of these signals thus reducing Radio Frequency Interference (RFI) and Electro-Magnetic Interference (EMI). RFI and EMI are introduced on the cable because the copper wire would act as an efficient aerial at certain frequencies if it were two straight cables. The baseband signals being carried by the cable have sharp edges which can be severely distorted by the RFI, EMI, capacitance, resistance and inductance. Rounding the edges causes the receiving circuitry to think a "1" is a "0" and vice versa.
Two main types of twisted pair cable exist -Unshielded Twisted Pair (UTP) and Shielded Twisted
Pair (STP).
Orange and white with a orange tracer Blue and white with a blue tracer Green and white with a green tracer Brown and white with a Brown tracer
136
Sometimes the white and colour tracer are reversed, i.e Orange with a white tracer. Some cables have one colour and either plain white or black. BT have a standard colour coding for their cables, and they are used in the order of the colours specified. Originally twisted pair cabling was only used for applications which ran at less than 1Mbps, generally used for voice and RS232 or RS422 serial communication.Improving technological techniques, such as Ethernet Hubs and Switches, have allowed frequencies of between 10Mbps and 100Mbps to transmitted by twisted pair cables. Twisted Pair cables are divided into different categories which vary in the number of twists per foot and quality, allowing the higher categories to transmit data at higher speeds, e.g.Category 3 cables have 2 twists per foot whereas Category 5 has 12. Different categories are used for different applications: Category 1 2 3 4 5 Use Less than 1Mbps. Voice and RS232 Up to 4Mbps. Token Ring and ISDN Up to 10Mbps. Ethernet and Wang Up to 10Mbps. 16Mbps Token Ring and ARCnet Up to 100Mbps Twisted Pair Distributed Data Interface (Tpddi
The only one currently recommended for data is Category 5 (CAT5), which is used for integration of Telephone and LAN wiring (Voice and Data). It is used in a structured[1] manner which means that the wiring has to comply with standards such as the following: Length of cable; How many cables in a bundle; No more than 0.5" of twist must be unravelled when making a connection; The radius of the curve if the cable is bent. The full specifications for Category 5 would fill a large A4 manual and are really required only by those employed in installing the Structured cabling. [1] Structured - A structured cabling system is one which can be pre-installed into a new building, or retrofitted to an existing building, and provide a flexible means of connecting devices. The structured nature of CAT5 wiring utilises an RJ45 connection,shown on the right, which is a smaller version of the normal plug and socket used for connecting a BT phone. The wiring is connected to a Wall Plate or floor box at the users station and to a Patch Panel[1] in a Wiring Cabinet[2]. In a new building the wires from all the outlets on a single floor may be brought to a wiring cabinet on the individual floors. Inter-floor connections will also be made via cables between the cabinets on each floor. In this way an individual cable can be connected as either a data (network) or a voice (telephone) connection. The use of patch cables (small cables with an RJ45 plug on each end) can be used to provide the connections.
[2] Patch Panel - A unit which has a connection to accept the twisted pair cable and make the output an RJ45 Socket.
[3] Wiring Cabinet - Wiring Cabinets are large 6' cabinets which usually accept 19" wide units which screw to a vertical rack at each side. Most network equipment is made to fit into the standard 19" rack or have brackets supplied to do so. Cables are brought to the cabinet and connected to the patch panels. Smaller cabinets can be purchased if a small number of units are being purchased, the width is still the same.
137
[1] EIA - Electronic Industries Association [2] TIA - Telecommunications Industries Association
COAXIAL CABLE
The first networks to be designed were cabled with Coaxial cable. It has two wires like Twisted pair but the design with an inner conductor and outer braid conductor enable it to have a higher Bandwidth and be capable of higher data rates. Coaxial cables have three types which are suitable for data networks: 50 ohm- suitable for Ethernet Bus Networks. 75 ohm- Suitable for transferring baseband and broadband analogue signals such as Video 93 ohm- suitable for ARCnet networks.
Baseband Coaxial Cable Coaxial cable is made up of a central inner core, which may be solid or consist of several thin wires, surrounded by an insulating material. Wrapped around this is a cylindrical conductor, which can be solid or a braided mesh outer conductor which is then wrapped in a plastic sheath. With this type of Coaxial Cable a data rate of 1to 2Gbps can be achieved over lengths of 100Km. Coaxial cable was used extensively to connect telephone exchanges but is now gradually being replaced by fibre optic cables.
138
The thicker a coaxial cable is, the farther it can carry high frequency electrical signals. There are two thicknesses used in Ethernet bus networks and the different cables are called Thick and Thin Ethernet cable. Although different thicknesses they both have the same 50ohmimpedance. The thick Ethernet cable was used in the original Ethernet bus networks and was sometimes referred to as "Yellow Wire" because of its base colour. The thin coaxial cables are used with BNC connectors and creates networks which are referred to as "Thinnet" or "Cheapernet". Each cable has a "T" piece connecting to the Network Interface Card and the last cable each end has a Terminating resistor.
ARCnet[1] uses a 93ohm coaxial cable but still uses BNC connectors even though ARCnet utilises a star topology. [1] ARCNET - A technology which is not used very often today and is not discussed in this course.
The thickness varies from 5 to 10m for Single mode to 50 to 100m for Multimode cables.
The cables can be purchased with just one single fibre optic strand inside, the top one in the diagram on the left, or with multiple strands, the bottom two. Using Fibre Optic cable is very expensive due its handling and the precision needed to attach the connector. Special tools, costing a lot of money, are used to attach the connector to the fibre strand. Two types of connector are shown on the right. The top one has a protective sleeve over the Fibre Optic Cable connection.
Fibre Optic cables can be joined together, spliced, in three ways but all three will introduce reflections at the join which can interfere with the signal:
139
by using connectors - this loses approximately 10 to 20% of the light but it easy to reconfigure the systems.
by splicing mechanically - the fibre is very carefully cut, the two ends are then laid into a special sleeve and
permanently clamped into place. Light is passed through the junction and adjustments made for minimum light loss. This method has about 10% light loss.
by fusing - melting the two ends together to form a solid connection. This method has very low attenuation.
When using Fibre optic cables there must be units to transfer electrical signals to light signals and vice versa. Two types of interface are used - Passive and Active. The Passive interface consists of two taps directly fused onto the fibre optic cable, one will contain a photodiode for reception and the other an LED or Laser diode for transmission. This system is extremely reliable as the light path is not broken even if one of the electrical components become faulty, the computer just goes off line. The Active interface has an electrical regenerator and will break the path if an electrical fault occurs. As most Fibre optic systems run on ring topology this will bring the ring down. The Active optical interface is shown below. Fibre Optic cables have replaced a lot of the twisted pair cables being used to carry voice conversations because it is thin and light, e.g. two fibre optic cables will carry more capacity than one thousand twisted pair cables. if the cables are 1Km long the twisted pair will also weigh 8000Kg. Because photons (particles of light) are not charged they do not bump into each other thereby losing energy. EMI does not affect the signals running in a fibre optic cable as they are not electrical and they are more secure as the signals do not leak out either and cannot be picked up by an outside source. Light source, transmission and reception Two types of light source are used to generate the light used for transmission - LED and semiconductor laser. Although very low power DO NOT to look down the fibre optic cable, as damage to the eye could result. In recent years Fibre Optic Cables have been used increasingly as a Transmission media for data.
140
Semiconductor Laser High Single or Multimode Long Short Life Substantial Expensive
They can be tuned using either a Fabry-Perot or Mach-Zehnder interferometer. These are inserted between the fibre and the source. The Fabry-Perot interferometer has a resonant cavity which consists of two parallel mirrors. The light is perpendicular to the mirrors. The Mach-Zehnder interferometer separates the light into two beams, which travel slightly different distances, when recombined only certain wavelengths are in phase. The system operates on pulses of light that are received by a photodiode, which transfers the light into pulses of electrical energy. Typically 1 pulse of light is equal to a "1" bit and the absence of light equals a "0" bit. The system would be useless if the light leaked out, but the principle that when light passes from one medium to another, e.g. fused silica to air, the ray is refracted (bent) at the boundary. The amount of refraction depends on the medium being used. if the angle at which it is refracted back is correct then none of the light escapes and it continues along the fibre bouncing back and forth from the boundary.
Types of fibre optic cable There are two types of fibre optic cable - Single mode and Multimode
recent years Fibre Optic Cables have been used increasingly as a Transmission media for data. Each ray of light which travels through a fibre is called a Mode. By altering the diameter of the fibre two different transmission operating modes can be achieved - Single mode and Multimode. The Multimode cable is thicker than the single and as such allows room for more than one light ray to pass through. Each ray that passes through will have a different angle of incidence1 and reflection as they are reflected off the cladding and therefore each ray will travel different distances, some will travel straight through the core. Because the ray travels at the same speed but each one can travel a different distance, the signal will spread over time and introduce data errors over long distances. This problem is known as dispersion. To reduce this problem there are two different types of fibre optic cable:
Step-index - This is a single fibre and cladding which does nothing to reduce dispersion. Graded-index - This type of cable has a single fibre but several layers of transparent cladding. This causes the rays of light to reach the other end in a more consistent manner. Modes travelling down the centre of the core travel more slowly than those bouncing off the cladding thus this tends to equalise the time taken for each mode to go from one end to the other, thus the modes reach the other end more uniformly.
The most common Multimode fibre optic cable is 62.5/125 graded-index. The first figure is the core diameter and the second is the cladding diameter The Single mode fibre optic cable utilises Step-index with only the core and the cladding. This makes the cable much thinner and more expensive to install. These fibres have their diameters sized to the wavelength they need to carry. A diameter of 8 may carry, for example, a wavelength of 1.3. As there is only one wavelength and a more coherent light source greater lengths of cable can be used. Currently available Single Mode cables can transmit data at several Gbps over distances of 30Km. In the laboratory even higher speeds have been achieved over shorter distances.
TRANSMISSION MEDIA
141
Data is transmitted over copper wires, fiber optic cable, radio and microwaves. The term 'media' is used to generically refer to the physical connectors, wires or devices used to plug things together.
COPPER
COAXIAL CABLING Coaxial cabling is used in bus-style Ethernet networks. Coaxial cable consists of a copper wire core surrounded by a plastic cladding sheathed in a wire mesh. Coaxial cable comes in two sizes which are called thinnet and thicknet.
FIBER OPTIC
SINGLE MODE Single mode fiber refers to the fact that only a single wavelength (one color of light) is transmitted over the physical medium. Typically, single mode fiber is true doped fiberglass fibers wrapped in a plastic cladding. Single mode typically has much longer reach, but a larger bend radius than multi-mode.
o o o
MULTI-MODE
142
Multi-mode fiber can carry multiple wavelengths, is made of special clear plastic materials and has a much smaller bend radius than single mode fiber. Multi-mode does not have as long a reach as single mode fiber.
o o o
INFRA-RED
There are many systems today using infra-red communications. This is usually a directional infrared light signal transmitted into the air and received by nearby devices. Such systems came into use in the early 90's for use with laptops, printers and later in the 90's with cameras and handhelds.
R ADIO
AND
M ICROWAVE
Last of all, but certainly not least are radio and microwave signals. These are the signals we think of as being radio, television and satellite, but they are now being put to use in wireless Ethernet and Bluetooth communications technologies.
TRANSMISSION MEDIA
The three main types of transmission medium used in LANs are twisted pair, coaxial cable and optic
fiber.
Twisted pair is mostly used in connections of star and hub networks. It is easier to install twisted pair than coaxial or optic fiber because it is more flexible and does not require new cable ducts. Generally, twisted pair is used to connect DTEs to hubs and coaxial cable or optic fiber is used to link the hub to the others. There are some limitations on the length of twisted pair cable according to the bit rate used. Normally at 1Mbps, the length limit is 100m. With additional circuits, 100m cable can be used at 10Mbps also. Coaxial cable is one of the most important kinds of transmission medium used in LANS. It is used mainly in bus networks with baseband or broadband transmission.
Baseband Transmission:
Two kinds of coaxial cables are used in baseband transmission: thin wire and thick wire. Thin wire, also known as 10 Base 2, is of 0.25" diameter and 10Mbps bit rate where thick wire, also known as 10 base 5, is of 0.5" diameter and 10Mbps bit rate. The length limit of thin wire is 200m between repeaters. Thick wire has greater signal attenuation and the length limit is 500m for thick wire. Thin wire is usually used for interconnecting DTEs which are close to each other. Physically, thin wire is directly connected to the DTEs with connectors. As an example, the computers in the same lab can be interconnected with thin wire. Thick wire is not useful for DTEs that are close to each other because it is not as flexible as thin wire. It can be installed as a main line in a corridor and the DTEs can be connected to it with drop cables and transceivers that are used as transmit and receive devices, but this is rather expensive. Other than that, thick wire is used between different offices and for interconnecting thin wires in baseband transmission.
143
Broadband Transmission:
In broadband transmission, with the help of rf modems, the whole frequency width of the cables are used for transmission. Length limits are very high in broadband transmission. One of the most well-known applications of broadband transmission is the community antenna television(CATV). Using broadband transmission, lots of TV channels are transmitted on a single cable. TV users tune their TV to the appropriate frequency to select the channel from the ones transmitted on the cable. Optic fiber is the fastest transmission medium among the ones listed. Unlike the others, the data is not transferred using electric pulses but it is transferred using beams of light. This requires us to use special converter electronics are used at the ends of optic fiber to convert electrical pulse to optical and vice versa. Despite being a fast transmission medium, optic fibers are expensive. The cable itself, the converter and tapping electronics cost much more than other solutions. That is why optic fibers are used in hub configurations, high speed rings and fast point-to-point transmissions. . Related Questions 1. The two types of transmission media are _________ and _______ Skill/Topic: Networking BasicsA) guided and unguided. Explanation: Transmission media can be guided or unguided. The principal guided media are twisted 2. What are the types of Transmission media? Signals are usually transmitted over some transmission media that are broadly classified in to two categories. Guided Media:These are those that provid 3. Difference between the communication and transmission. Transmission is a physical movement of information and concern issues like bit polarity, synchro 4. An application must a connection-oriented protocol to transfer data. Which statement about this method of data transfer is true? A. Transmission of Answer: D 5. Why logical address required is in OSI model? State the difference between guide media and unguide media. 6. What is difference between baseband and broadband transmission? In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband transmission, signals are sent on multiple 7. Please Guys I need help in this case project. Arctic University is opening a new satellite location and it has been decided that it will use a combinat 8. What are the two types of transmission technology available? (i) Broadcast and (ii) point-to-point 9. What are the data units at different layers of the TCP / IP protocol suite? The data unit created at the application layer is called a message, at the transport layer the data unit created is called either a segment or an user 10. To send a data packet using datagram, connection will be establisheda) before data transmission. b) Connection is not established before data transmiss (c)
144
145
Types of Protocols
Networking protocols can be characterized as connectionless or connection-oriented, and as transactionless or transaction-based. A connectionless protocol is one in which a node that wants to communicate with another simply sends a message without first establishing that the receiving node is prepared to receive it. Each message sent must include addressing information so that it can be delivered to its destination. A connection-oriented protocol is one in which two nodes on the network that want to communicate must go through a connection-establishment process called a handshake. This involves the exchange of predetermined signals between the nodes in which each end identifies itself to the other. Once a connection is established, the communicating applications or processes on the nodes at either end can send and receive data without having to add addresses to the messages or repeat the handshake process. Connection-oriented protocols provide support for sessions. A session is a logical (as opposed to physical) connection between two entities on a network or internet. A session must be set up at the beginning, maintained by the periodic exchange of information, and broken down at the end. All of these services entail overhead compared to a connectionless protocol, for which no connection setup or breakdown is required and for which no session must be maintained. A connection-oriented session is analogous to a telephone call. The party who initiates the call knows whether the connection is made because someone at the other end of the line either answers or not. As long as the connection is maintained, neither party needs to dial the other telephone number again. A connectionless protocol is analogous to mail. A person sends a letter expecting it will be delivered to its destination. Although the mail usually arrives safely, the sender doesn't know this unless the recipient initiates a response affirming it. Each letter sent by either party requires a complete address. -A transactionless protocol defines how the data is to be organized and delivered from one node to another. -A connection-oriented transactionless protocol is used to maintain a symmetrical connection; that is, one in which both ends have equal control over the communication. Both ends can send and receive data and initiate or terminate the session. In this case, the connection is referred to as full duplex. If the two sides have to take turns transmitting and receiving, the connection is referred to as half duplex. A connectionless transactionless protocol sends data in discrete datagrams. A datagram, also referred to as a packet, is a unit of data that includes a header portion that holds the destination address (and may contain other information, such as a checksum value) and a data portion that holds the message text. A connection-oriented transactionless protocol can send data as a continuous stream of data or, in some cases, as packets. -Low-level connectionless protocols such as DDP and IP usually provide best-effort delivery of data. Best-effort delivery means that the protocol attempts to deliver any packets that meet certain requirements, such as containing a valid destination address, but the protocol does not inform the sender when it is unable to deliver the data, nor does it attempt to recover from error conditions and data loss. Higher-level protocols, on the other hand, can provide reliable delivery of data. Reliable delivery includes error checking and recovery from error or loss of data.
-A transaction-based protocol specifies the sequence and some of the content of messages passed between nodes. When using a transaction-based protocol, the application on one
node, known as the requester, sends a request to the other application, known as the responder, to perform a task. The responder completes the task and returns a response that reports the outcome of the task. Once one node has issued a request, the receiving node is constrained to respond in a predefined way. A transaction-based connection is sometimes referred to as an asymmetrical connection. Table 1-1 shows where some Open Transport protocols fit in the protocol-type matrix. A protocol of one type can be a client of a different type. For example, the connection-oriented transactionless AppleTalk Printer Access Protocol (PAP) is a client of the connectionless transaction-based AppleTalk Transaction Protocol (ATP), which is in turn a client of the connectionless transactionless Datagram Delivery Protocol (DDP).
HANDSHAKING
146
Negotiations between the originating and receiving terminals on the nature of information to be exchanged In addition to these mandatory features, the Q.931 protocol must support the wide range of OPTIONAL features offered by all possible vendors of ISDN terminal and switching equipment. While ISDN provides a standard architecture and common interfaces, it necessarily leaves much room for invention, innovation, and just plain market differentiation among the products and services that implement the standard. No single device supports the whole range of possible Q.931 messages. The ITU Q.931 standard provides only a minimally functional subset that allows different manufacturers and ISDN carriers to provide a rich variety of features and services. To support this variety of features and functions, the Q.931 has several features of its own that make it a uniquely complex protocol:
OPTIONAL FIELDS Most protocols offer some options in the structure of a message to allow for efficiency in ordinary operation (i.e., short packets for common functions). The Q.931 protocol provides a broad hierarchy of OPTIONAL fields whose appearance in a given message depends on the nature of the service requested, the nature of the terminal device, and sometimes even the specific application being served. VARIABLE-LENGTH FIELDS Most optional fields in Q.931 messages can vary in length. A Q.931 message can contain a large amount of information designed simply to allow terminal equipment to find specific fields in the message. CODESET SHIFTING Different national ISDNs, equipment vendors, and private carriers require special ways of encoding signalling information. The Q.931 protocol allows for shifting among several CODESETS to accommodate this variation. PROTOCOL SHIFTING Because the ISDN standards require that the D channel be able to carry packet-switched data as well as signalling information, the Q.931 protocol contains features that allow shifting into an entirely different protocol from message to message. These features take the form of a shift indicator that states that the rest of the current message should be interpreted as X.25 (or another alternative protocol). Q.931 AND SS#7 The Q.931 protocol operates only on the D channel of the ISDN interface between the customer's terminal equipment and the ISDN carrier's Exchange Termination (ET). It does not provide end-to-end signalling over the public telephone network, although certain features of the protocol (such as terminal handshaking) do have end-to-end significance. The carrier's ET locates those Q.931 messages that have end- to-end significance and translates them onto the carrier's own common-channel signalling network, which uses ITU Common Channel Signalling System Number 7 (SS#7) for signalling among end-office and central-office switches. At a call's destination end office, the ET retranslates end-to-end signalling information and adds it to the local signalling in the Q.931 data stream between the ET and the terminal equipment on the receiving end of the call.
NETWORK CATEGORIES
There are two main types of network categories which are:
In a server based network, there are computers set up to be primary providers of services such as file service or mail service. The computers providing the service are are called servers and the computers that request and use the service are called client computers.
147
In a peer-to-peer network, various computers on the network can act both as clients and servers. For instance, many Microsoft Windows based computers will allow file and print sharing. These computers can act both as a client and a server and are also referred to as peers. Many networks are combination peer-to-peer and server based networks. The network operating system uses a network data protocol to communicate on the network to other computers. The network operating system supports the applications on that computer. A Network Operating System (NOS) includes Windows NT, Novell Netware, Linux, Unix and others.
148
1. 2.
Bus - Both ends of the network must be terminated with a terminator. A barrel connector can be used to extend it. Star - All devices revolve around a central hub, which is what controls the network communications, and can communicate with other hubs. Range limits are about 100 meters from the hub.
3.
Ring - Devices are connected from one to another, as in a ring. A data token is used to grant permission for each computer to communicate.
There are also hybrid networks including a star-bus hybrid, star-ring network, and mesh networks with connections between various computers on the network. Mesh networks ideally allow each computer to have a direct connection to each of the other computers. The topology this documentation deals with most is star topology since that is what Ethernet networks use.
OSI MODELS:
The standard model for networking protocols and distributed applications is the International Standard Organization's Open System Interconnect (ISO/OSI) model. It defines seven network layers. Layer 1 Physical: This layer defines the cable or physical medium itself, e.g. unshielded twisted pairs (UTP). All media of transmission are functionally equivalent in this layer and the main difference is in convenience and cost of installation and maintenance. Layer 2 - Data Link: Data Link layer defines the format of data on the network ( a network data frame, packet and destination address). The Maximum Transmission Unit (MTU) is defined by the largest packet that can be sent through a data link layer. Layer 3 - Network : This layer defines the protocols that are responsible for data delivery at the required destination, and requires.
149
Layer 4 Transport: This layer subdivides user-buffer into network-buffer sized datagrams and enforces desired transmission control. Two transport protocols, Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), sits at the transport layer. Reliability and speed are the primary difference between these two protocols. Layer 5 Session: This layer defines the format of the data sent over the connections. Layer 6 - Presentation This layer converts local representation of data to its canonical form and vice versa. The canonical uses a standard byte ordering and structure packing convention, independent of the host. Layer 7 - Application Provides network services to the end-users. e.g Mail. OSI Model gives; Increased evolution, Modular engineering, Interoperable technology, Reduced complexity Simplified teaching and learning, Standardised interfaces.
(i) (ii)
DTE-(Data Terminal Equipment) is an end-user device such as a terminal or computer. This is equipment that only receives information (ie, no transmission), such as a printer.
A device transmitting data to, and/or receiving data from, a DCE (for example, a terminal or printer).
"Data Communications Equipment" Any type of device, such as a modem, that connects a DTE to a communications line. -DTE means Distributed Computing Environment.
Explain the following types of line impairment with respect to data transmission. i. Impulse
1.
Jitter
150
Computing Dictionary Definition Random variation in the timing of a signal, especially a clock of Jitter:
POINT-TO-POINT PROTOCOL
Introduction PPP Components General Operation Physical Layer Requirements PPP Link Layer PPP Link-Control Protocol Summary Review Questions
Chapter Goals
Describe the development of PPP. Describe the components of PPP and how they operate. Provide a summary of the basic protocol elements and operations of PPP.
Stop-and-Wait Protocol
Consider sending frames from a fast machine to a slow machine. What happens if the slow machine is reading the data at half of the rate that the fast machine is sending it? Eventually the sent data will be lost, never to be received. For this reason it is important to provide some kind of flow control. The Stop-and-Wait protocol requires the receiver to send an acknowledgment PDU in return for every frame received. Such a PDU is often called an ACK. The sender will wait for the before sending the next frame.
151
2. STOP-AND-WAIT PROTOCOL
Protocol Features A stop-and-wait protocol is one of the simplest protocols in which both the sender and receiver participate. There are a number of stop-and wait protocols. We will be discussing only one in detail. In its simplest form, this protocol is based on one sender and one receiver. The sender establishes the connection and sends data in packets. Each data packet is acknowledged by the receiver with an acknowledgement packet. When the data has all been sent, the sender disconnects. Packet Exchange for a Simple Stop-and-wait Protocol
This protocol: o is usually used with point-to-point topology although it may also be used with
other topologies if station identifiers (addresses) are included as part of the packet control information.
o o o o o o
may be used with both half- and full-duplex communication. can be modeled after the ISO OSI Reference model with a physical, data link, transport and session layer. has a mechanism for error recovery and flow control. has a mechanism for ordering the packets to keep them in proper sequence and to prevent duplicate and lost packets. may have a mechanism for recovering from unexpected link failure. is one of the least efficient protocols because the sender is idle while it waits for a receiver acknowledgement.
152
Basic FAQ 1.What is layer-2 switch ? 2.What is the difference between Intelligent Switch and dummy switch ? 3.What is VLAN ? Does NETSYS' Intelligent Switch support overlapped VLAN ? 4.What is the difference between In-Band Management and Out-Band Management ? 5.Does NETSYS' Intelligent Switch support QoS function ? 6.What is Spanning Tree Protocol ? Does NETSYS' Intelligent Switch support it ? 7.What is packet buffer ? Will it affect the performance of a switch ? HomePNA FAQ 1.Is 1 Mbps fast enough ? 2.What are the technical aspects of the 1 Mbps HomePNA physical layer technology ? 3.Has NETSYS' tested this technology to ensure it works in homes ? 4.What is the Home Phoneline Networking Alliance ? 5.Why is phoneline important ? 6.Does this new technology interfere with standard telephone services ? 7.How does home phoneline networking work? Will it require any special equipment ? 8.What is RMON and do NETSYS' switches support RMON ? 9.What is the difference between "cut-through" and "store-and-forward" ? 10.What is collision domain ? 11.What is Flow Control regarding of all switches ?
1. What is layer-2 switch ?TOP A. If the switching process is carried out based on MAC address in Ethernet packets, the switch is called a layer-2 switch. 2. What is the difference between Intelligent Switch and dummy switch ?TOP A. Dummy switch is a simple switch. It just transfers packets between connections. It can not control and monitor traffic in the switch. Intelligent Switch is a switch with lots of software function. It can help the network administrator to configure and manage network. 3.What is VLAN ? Does NETSYS' Intelligent Switch support overlapped VLAN ?TOP A. VLAN is Virtual LAN. A Virtual LAN is a collection of network nodes that share the same collision domain regardless of their physical location or connection point in the network. A VLAN serves as a logical workgroup with no physical barriers, allowing users to share information and resources as though located on the same LAN. Because there is a PVID number to assign the VLAN action of each connection port, NETSYS' Intelligent Switch supports overlapped VLAN. 4. What is the difference between In-Band Management and Out-Band Management ?TOP A. If the management of the network is from a station attached directly to the network, it is InBand Management. Telnet and Web- Browser management interface are In-Band Management. If the management of the network is from a station not attached to the network, it is Out-Band Management. Console management interface is Out-Band Management. 5. Does NETSYS' Intelligent Switch support QoS function ?TOP . If there is priority information in the tag of Ethernet packet, NETSYS' Intelligent Switch will read the priority information and put the packet to some queue according to the priority. There are 4 queues for every port. The QoS (Quality of Service) function is carried out with this function. 6. What is Spanning Tree Protocol ? Does NETSYS' Intelligent Switch support it ?TOP A. Spanning Tree Protocol is a technology that checks your network for any loop. A loop can often occur in complicated or back up linked network systems. Spanning-tree detects and directs data along the shortest path, maximizing the performance and efficiency of the network. NETSYS' Intelligent Switch supports this function.
153
7. What is packet buffer ? Will it affect the performance of a switch ?TOP . Because NETSYS' switches are designed with store-and-forward algorithm, these switches need a buffer to store the incoming packet and the buffer is called packet buffer. If the operation of the switching controller is very high efficient. 1. Is 1 Mbps fast enough ?TOP A. 1 Mbps data transfer rate is nearly 18 times faster than standard 56k modem connections, and provides ample bandwidth for nearly all of the current user requirements for a home networking solution. As next-generation applications begin to be deployed that take advantage of home networking capabilities, additional bandwidth will be required to support the real-time transfer of audio, video and data. 2. What are the technical aspects of the 1 Mbps HomePNA physical layer technology ?TOP
. The HomePNA has chosen to standardize on a technology available now from Tut Systems, allowing consumers to link devices at speeds up to 1 Mbps over existing home phonelines. The technology supports the complex, random-tree type of wiring typically found in the home and does not require any hubs or new Category 5 wiring. The HomePNA network requires no special terminations, filters or splitters. It uses only the single pair of existing phone wires to make its connection, and operates concurrently with any normal telephone service that might be using those same wires. The technology also coexists with the new splitterless Universal ADSL standard. It is fully compatible with the Ethernet MAC layer standard (IEEE 802.3 CSMA/CD with a new physical layer) and meets applicable FCC regulatory requirements. 3. Has NETSYS' tested this technology to ensure it works in homes ?TOP . NETSYS' device is fully compliant with the initial 1 Mbps technology specification adopted by the HomePNA. The HomePNA data technology has undergone two rounds of significant testing in hundreds of homes located throughout the United States. The latest indicates that 99% of the tested homes can accommodate Phoneline-networking solutions 4. What is the Home Phoneline Networking Alliance ?TOP A. The Home Phoneline Networking Alliance (HomePNA) is an association of industry-leading companies working together to ensure adoption of a single, unified phoneline networking standard. Founding companies include AMD, Compaq, IBM, Hewlett Packard, Tut Systems, 3Com, and Epigram among others. 5. Why is phoneline important ?TOP . Any home networking solution must fulfill three key requirements. It should not require the installation of new wiring, and must be both inexpensive and easy-to-use. Very few end-users are willing to run new wiring throughout their home to network multiple devices. Phone wiring provides a near ubiquitous solution for this no new wires requirement, providing distributed network access points at key locations throughout a home. Phone wiring is also a very secure transfer medium since internal wiring is connected back directly through the local loop to a central office. 6. Does this new technology interfere with standard telephone services ?TOP A. No. All Home Phoneline Networking Alliance (HomePNA) devices use a technology called Frequency Division Multiplexing (FDM) that enables multiple services to use the same set of wires simultaneously without impacting one another. The HomePNA technology can also operate simultaneously with the new UADSL technology that delivers over 1 Mbps of bandwidth to the home via telephone wires. 7. How does home phoneline networking work? Will it require any special equipment ?TOP A. The HomePNA is committed to the concept of a "no new wires" networking technology that is simple to install and maintain. NETSYS has develop a Ethernet-compatible control that enables a LAN over the complex, random-tree wiring found in nearly all homes. The technology does not require any hubs, routers, splitters, filters, terminations or any other special equipment.
154
8.What is RMON and do NETSYS' switches support RMON ?TOP A. The Remote Monitoring (RMON) is a tool used by network managers to monitor remote devices. An RMON implementation consists of a software agent that continually collects statistics about a LAN and a management station that communicates with the agent.The agent transfers information to the management station on request or when a predefined threshold is crossed. RMON is a standard for traffic analysis and troubleshooting, especially for switched networks. It defines specifications for monitoring network traffic above the MAC layer. Network administrators can deploy standards-based diagnostic solutions for enterprise-wide traffic and support mission-critical, server-based applications. We have support this standard. 9.What is the difference between "cut-through" and "store-and-forward" ?TOP A. Cut-Through: The switch will begin forwarding data after it receives the DA (destination address) of the frame, the difference between this and store-and-forward is that store-and-forward receives the whole frame before forwarding. Since frame errors cannot be detected by reading only the DA, cut-through may impact network performance by forwarding corrupted or truncated frames. These "bad" frames can create broadcast storms wherein several devices on the network respond to the corrupted frames simultaneously.
Advantages of Cut-Through:
+ Cut-Through is faster because the packet is sent as soon as the first eight bytes are received. + Cut-Through requires less memory since the switch only reads the address but does not store the entire message. Disadvantages of Cut-Through: + Bad packets are perpetuated, taking up bandwidth. + Benefits diminish in the high traffic networks .+ Cut-Through cannot be used on networks that use both Ethernet and Fast Ethernet. The network must be one or the other. Store-and-Forward: The switch will wait until the entire frame has arrived prior to forwarding it. This process ensures that the destination network is not affected by corrupted or truncated frames, but is a slower method than cut-through. Advantages of Store-andForward: + Store-and-forward only sends out valid data packets. Bad packets created by collisions on the network or other problems are not sent.
+ Use Store-and-Forward when some devices on the network run at 10Mbps and other run at 100Mbps.
Disadvantages of Store-and-Forward:
+ Store-and-Forward requires more time because it receives the whole packet before sending it
out. Every byte buffered is an additional 8 micro-seconds of delay. + More memory is required to store the data packet before sending it out. 10.What is collision domain ?TOP A. Defined by IEEE 802.3 Standard: A single CSMA/CD network. If two or more MACs are within the same collision domain and both transmit at the same time, a collision will occur. MACs separated by a repeater are within the same collision domain. MACs separated by a bridge are within different collision domains.
155
flow control. The method of flow control depends on whether the ports are set to full- or half-duplex. A non-standard but popular scheme called Back-pressure was used in half-duplex links. The IEEE 802.3 committee established a standard called 802.3x flow control was used in full-duplex links. 12.What kind of security of switches provide or support ?TOP A. There are two ways to use a switch to improve network security: VLAN: A network administrator can define several VLANs and block access to each VLAN to prevent users from accessing servers for which they don't have access permission. Mac address filtering: A network administrator can define a DA (Destination Address) so that packets can only be received from port A (a hub) and only allow those same packets to be forwarded to port B(a server connection, for example).Using MAC address filtering, only users that are connected to port A can access the server connected to port B, other packets from other ports, even those whose DA is for the server on port B, will be dropped
Table Of Contents
Chapter Goals
Point-to-Point Protocol Introduction PPP Components General Operation Physical Layer Requirements PPP Link Layer PPP Link-Control Protocol Summary Review Questions
Chapter Goals
Describe the development of PPP. Describe the components of PPP and how they operate. Provide a summary of the basic protocol elements and operations of PPP.
Point-to-Point Protocol
Introduction In computing, the Point-to-Point Protocol, or PPP, is commonly used to establish a direct connection between two nodes. It can connect computers using serial cable, phone line, trunk line, cellular telephone, specialized radio links, or fiber optic links. Most Internet service providers use PPP for customers' dial-up access to the Internet.
156
Two common encapsulated forms of PPP are used in a similar role with Digital Subscriber Line (DSL) Internet service. These are:
a) b)
Point-to-Point Protocol over Ethernet (PPPoE), and Point-to-Point Protocol over ATM (PPPoA)
PPP is commonly used to act as a data link layer (layer two of the OSI model) protocol for connection over synchronous and asynchronous circuits, where it has largely superseded the older, non-standard Serial Line Internet Protocol (SLIP), and telephone company mandated standards (such as Link Access Protocol, Balanced (LAPB) in the X.25 protocol suite). PPP was designed to work with numerous network layer protocols, including Internet Protocol (IP), Novell's Internetwork Packet Exchange (IPX), NetBEUI and AppleTalk.
transporting IP traffic over point-to-point links. PPP also established a standard for the assignment and management of IP addresses, asynchronous (start/stop) and bit-oriented synchronous encapsulation, network protocol multiplexing, link configuration, link quality testing, error detection, and option negotiation for such capabilities as network layer address negotiation and data-compression negotiation. PPP supports these functions by providing an extensible Link Control Protocol (LCP) and a family of Network Control Protocols (NCPs) to negotiate optional configuration parameters and facilities. In addition to IP, PPP supports other protocols, including Novell's Internetwork Packet Exchange (IPX) and DECnet.
PPP Components
PPP provides a method for transmitting datagrams over serial point-to-point links. PPP contains three main components: A method for encapsulating datagrams over serial links. PPP uses the High-Level Data Link Control (HDLC) protocol as a basis for encapsulating datagrams over point-to-point links. (See Chapter 16, "Synchronous Data Link Control and Derivatives," for more information on HDLC.) An extensible LCP to establish, configure, and test the data link connection.
A family of NCPs for establishing and configuring different network layer protocols. PPP is designed to allow the simultaneous use of multiple network layer protocols.
General Operation
To establish communications over a point-to-point link, the originating PPP first sends LCP frames to configure and (optionally) test the data link. After the link has been established and optional facilities have been negotiated as needed by the LCP, the originating PPP sends NCP frames to choose and configure one or more network layer protocols. When each of the chosen network layer protocols has been configured, packets from each network layer protocol can be sent over the link. The link will remain configured for communications until explicit LCP or NCP frames close the link, or until some external event occurs (for example, an inactivity timer expires or a user intervenes).
157
The following descriptions summarize the PPP frame fields illustrated in Figure 13-1: FlagA single byte that indicates the beginning or end of a frame. The flag field consists of the binary sequence 01111110. AddressA single byte that contains the binary sequence 11111111, the standard broadcast address. PPP does not assign individual station addresses. ControlA single byte that contains the binary sequence 00000011, which calls for transmission of user data in an unsequenced frame. A connectionless link service similar to that of Logical Link Control (LLC) Type 1 is provided. (For more information about LLC types and frame types, refer to Chapter 16.) ProtocolTwo bytes that identify the protocol encapsulated in the information field of the frame. The most up-to-date values of the protocol field are specified in the most recent Assigned Numbers Request For Comments (RFC). DataZero or more bytes that contain the datagram for the protocol specified in the protocol field. The end of the information field is found by locating the closing flag sequence and allowing 2 bytes for the FCS field. The default maximum length of the information field is 1,500 bytes. By prior agreement, consenting PPP implementations can use other values for the maximum information field length.
Frame check sequence (FCS)Normally 16 bits (2 bytes). By prior agreement, consenting PPP implementations can use a 32-bit (4-byte) FCS for improved error detection.
The LCP can negotiate modifications to the standard PPP frame structure. Modified frames, however, always will be clearly distinguishable from standard frames.
158
is tested to determine whether the link quality is sufficient to bring up network layer protocols. This phase is optional. LCP can delay transmission of network layer protocol information until this phase is complete. At this point, network layer protocol configuration negotiation occurs. After LCP has finished the link quality determination phase, network layer protocols can be configured separately by the appropriate NCP and can be brought up and taken down at any time. If LCP closes the link, it informs the network layer protocols so that they can take appropriate action. Finally, link termination occurs. LCP can terminate the link at any time. This usually is done at the request of a user but can happen because of a physical event, such as the loss of carrier or the expiration of an idle-period timer.
a) b) c)
Link-establishment frames are used to establish and configure a link. Link-termination frames are used to terminate a link, and link-maintenance frames are used to manage and debug a link.
These frames are used to accomplish the work of each of the LCP phases.
Summary
The Point-to-Point Protocol (PPP) originally emerged as an encapsulation protocol for transporting IP traffic over point-to-point links. PPP also established a standard for assigning and managing IP addresses, asynchronous and bit-oriented synchronous encapsulation, network protocol multiplexing, link configuration, link quality testing, error detection, and option negotiation for added networking capabilities. PPP provides a method for transmitting datagrams over serial point-to-point links, which include the following THREE COMPONENTS: A method for encapsulating datagrams over serial links An extensible LCP to establish, configure, and test the connection A family of NCPs for establishing and configuring different network layer protocols
PPP is capable of operating across any DTE/DCE interface. PPP does not impose any restriction regarding transmission rate other than those imposed by the particular DTE/DCE interface in use. Six fields make up the PPP frame. The PPP LCP provides a method of establishing, configuring, maintaining,
point-to-point connection.
Review Questions
QWhat are the main components of PPP? AEncapsulation of datagrams, LCP, and NCP. QWhat is the only absolute physical layer requirement imposed by PPP? AThe provision of a duplex circuit, either dedicated or switched, that can operate in either an asynchronous or synchronous bit-serial mode, transparent to PPP link layer frames.
159
QHow many fields make up the PPP frame, and what are they? ASix: Flag, Address, Control, Protocol, Data, and Frame Check Sequence. QHow many phases does the PPP LCP go through, and what are they?
Overview
By 'X.25' we mean a protocol recommended by CCITT (International Telegraph and Telephone Consultative Committee), part of the ITU (International Telecommunication Union). X.25 describes an interface between a DTE (Date Termination Equipment) and a DCE (Data Communication Equipment) and by implication a set of DTEs communicating with each other via their respective DCEs which have some unspecified primative capability to communicate. Q. Define Bit-serial transmission
160
This project was written by: Levi Ehud, Hadad Eli and Epstein Amir as part of the course : Protocols and Computer Networks given by Dr.Debby Koren at the Tel-Aviv University, Israel. References
Introduction
In the early 1970's there were many data communication networks(also known as Public Networks), which were owned by private companies, organizations and governments agencies. Since those public networks were quite different internally, and the interconnection of networks was growing very fast, there was a need for a common network interface protocol. In 1976 X.25 was recommended as the desired protocol by the International Consultative Committee for Telegraphy and Telephony (CCITT) called the International Telecommunication Union (ITU) since 1993. X.25 is a packet switched data network protocol which defines an international recommendation for the exchange of data as well as control information between a user device (host), called Data Terminal Equipment (DTE) and a network node, called Data Circuit Terminating Equipment (DCE). X.25 utilizes a Connection-Oriented service which insures that packets are transmitted in order. X.25 comes with three levels based on the first three layers of the Open Systems Interconnection(OSI) seven layers architecture as defined by the International Standard Organization(ISO).
161
X.25 was originally approved in 1976 and subsequently revised in 1977, 1980, 1984, 1988 and 1992. It is currently (1996) one of the most widely used interfaces for data communication networks.
X.21 is a CCITT recommendation for operation of digital circuits. The X.21 interface operates over eight interchange circuits(i.e. signal ground, DTE common return, transmit, receive, control, indication, signal element timing and byte timing) their functions is defined in recommendation X.24 and their electrical characteristics in recommendation X.27. X.21-bis is a CCITT recommendation that defines the analogue interface to allow access to the digital circuit switched network using an analogue circuit. X.21-bis provides procedures for sending and receiving addressing information which enable a DTE to establish switched circuits with other DTEs which have access to the digital network. V.24 is also a CCITT recommendation, it provides procedures which enable the DTE to operate over a leased analogue circuit connecting it to a packet switching node or concentrator.
Now we will discuss in more detail the X.21 interface since it is the most commonly used one. X.21 Digital Interface. In 1976 CCITT recommended a digital signaling interface called X.21. The recommendation specifies how the DTE can setup and clear calls by exchanging signals with the DCE.
162
The physical connector has 15 pins, but not all of them are used. The DTE uses the T and C circuits to transmit data and control information. The DCE uses the R and I circuits for data and control. The S circuit contains a signal stream emitted by the DCE to provide timing information so the DTE knows when each bit interval starts and stops. The B circuit may also provide to group the bits into byte frames. If this option is not provided the DCE and DTE must begin every control sequence with at least two SYN characters to enable each other to deduce the implied frame boundary.
The link level uses data link control procedures which are compatible with the High Level Data Link (HDLC) standardized by ISO, and with the Advanced Data Communications Control Procedures (ADCCP) standardized by the U.S.American National Standards Institute (ANSI).
There are several protocols which can be used in the link level:
Link Access Protocol,Balanced (LAPB) is derived from HDLC and is the most commonly used. It enables to form a logical link connection besides all the other characteristics of HDLC. Link Access Protocol (LAP) is an earlier version of LAPB and is seldom used today. Link Access Procedure,D Channel (LAPD) is derived from LAPB and it is used for Integrated Services Digital Networks (ISDN) i.e. it enables data transmission between DTEs through D channel, especially between a DTE and an ISDN node.
Logical Link Control (LLC) is an IEEE 802 Local Area Network (LAN) protocol which enables X.25 packets to be transmitted through a LAN channel.
We now discuss LAPB in more detail since,as we mentioned before,it is the most commonly used. LAPB-Link Access Protocol, Balanced. The LAPB protocol uses the following frame structure:
163
The Flag fields indicate the start and end of the frame. The Address field contain the address of the DTE/DCE, it is most important in multidrop lines, where it is used to identify one of the terminals. The Control field contains sequence numbers, commands and responses for controlling the data flow between the DTE and the DCE. The Checksum field indicates whether or not errors occur in the transmission. It is a variation of the Cyclic Redundancy Code (CRC).
1. 2.
Information: This kind of frame contains the actual information being transfered. The control field in these frames contains the frame sequence number. Supervisory: There are various types of supervisory frames. o RECEIVE READY-Acknowledgment frame indicating the next frame expected.
o o
REJECT-Negative acknowledgment frame used to indicate transmission error detection. RECEIVE NOT READY(RNR)-Just as RECEIVE READY but tells the sender to stop sending due to temporary problems.
3.
Unnumbered: This kind of frames is used only for control purposes. LAPB also provides the following commands:
o o o
DISC (DISConnect)- Allows the machine to announce that it is going down. SNRT (Set Normal Response Time)- Allows a machine that has just come back on line to announce its presence. FRMR (FRaMe Reject)- Used to indicate that a frame with correct checksum but impossible semantics arrived.
The packet level provides procedures for handling the following services:
o
Virtual Circuit(VC) is a temporary association between two DTEs, it is initiated by a DTE signaling a CALL REQUEST to the network. This service ensures orderly(sequenced) delivery of packets in either direction between two DTEs.Virtual Circuit is established whenever two DTEs want to communicate.This service is the most frequently used by the X.25 protocol.
Permanent Virtual Circuit is a permanent association existing between two DTEs, which does not require call setup(connect) or call clearing (disconnect) action by the DTE.
Datagrams(DG) is a self contained user data unit, containing sufficient information to be routed to the destination DTE(independently of all other data units) without a
164
need of a call to be established. The data units are transmitted one at a time with no guarantee of final delivery,and no guarantee of orderly delivery. Each datagram must contain complete address and control information to enable it to be delivered to the proper destination DTE.
o o
Fast Select is a service which enables the control packet that sets up the VC to carry data as well. Other Services:the packet level also provides the call setup and call clearing procedures required for the VC service. The packet level deals with flow control to ensure that a user(DTE) does not overwhelm the other user with packets, and to maintain timely and efficient delivery of packets. The packet level also handles errors at packet level to abort or restart VCs if necessary.
Call Setup
When DTE A wants to communicate with DTE B, it must set up a connection by building a CALL REQUEST packet, and passing it to it's DCE. DTE B gets the packet through the subnet and it's DCE. If DTE B wishes to accept the call, it sends a CALL ACCEPTED packet back. When DTE A receives the CALL ACCEPTED packet the Virtual Circuit is established. At this point the two DTEs may use a full-duplex connection to exchange data packets. When either side wants to finish the call, it sends a CLEAR REQUEST packet to the other side, which then sends a CLEAR CONFIRMATION packet back as an acknowledgment.
The DTE determines the circuit number on outgoing calls and the DCE determines the circuit number on incoming calls If both simultaneously choose the same number then Call Collision occurs. X.25 specifies that in this case, the outgoing call is put through and the incoming one is cancelled.
Packets Format
We will examine now the format of the packets in X.25 protocol. THE CONTROL PACKET
165
The control packet as well as all X.25 packets begins with a 3-byte header. Bytes 1,2 contain the Group and the Channel fields that together form a 12 bit virtual circuit number. Number 0 is reserved for future use, so a DTE may have up to 4095 virtual circuits at a time.
The Length Of Calling Address and Length Of Called Address fields tell how long the calling and called addresses are, respectively. The next two fields are the addresses, both addresses are encoded as decimal digits, 4 bits for digit. The addressing system used in X.25 is defined in CCITT recommendation X.121. This system is similar to the public switched telephone network, with each host identified by a decimal number consisting of country code, a network code, and an address within the specified network. The full address may contain up to 14 digits, of which the first three indicate the country , and the next one indicates the network number(for countries with many public networks multiple country codes exist). The division of the remaining 10 digits is not specified by X.121, permitting each network to allocate the 10 billion addresses itself. The Facilities Length field tells how many bytes of facilities field follow. The Facilities field itself is used to request special features for this connection. The specific features may vary from network to network. Possible features are reverse charging(collect calls), simplex instead of full-duplex virtual circuit, maximum packet length and a window size rather than using the defaults of 128 bytes and 2 packets. The last field is The User Data field which allows the DTE to send up to 16 bytes of data together with the CALL REQUEST packet. Other Control Packets are:
The CALL ACCEPTED packet is sent by the callee DTE if it accepts the call.
166
The CLEAR REQUEST is sent due to various reasons,the fourth byte of the packet tells why the connection is being cleared. It is acknowledged by a CLEAR REQUEST CONFIRMATION packet.
The INTERRUPT packet allows a short (32 bytes) signal to be sent out of sequence. It is acknowledged by INTERRUPT CONFIRMATION packet. The RECEIVE READY (RR) packet is used to send separate acknowledgments where there is no reverse traffic. The ppp field (three first bits of the type field) tells which packet is expected next.
The RECEIVE NOT READY (RNR) packet allows a DTE to tell the other side to stop sending packets to it for a while. The REJECT packet allows a DTE to request retransmission of a series of packets. The ppp field gives the first sequence number desired. The RESET and RESTART packets are used to recover from varying degrees of trouble. Both are acknowledged by RESET CONFIRMATION and RESTART CONFIRMATION respectively.
The DIAGNOSTIC packet is also provided, to allow the network to inform the user of problems.
The Q bit indicates qualified data, the intention is to allow protocols in the higher layers to set this bit to 1, to separate their control packets from their data packets. The control field is always 0 for data packets. The Sequence and Piggyback fields are used for flow control, using a sliding window. The sequence numbers are modulo 8 if Modulo is 01, and modulo 128 if Modulo is 10 (00 and 11 are illegal). If modulo 128 sequence numbers are used, the header is extended with an extra byte to accommodate longer Sequence and Piggyback fields. The D bit determines the meaning of the Piggyback field. D=0, means that the local DCE has received the packet, but not that the remote DTE has received it. D=1, means that the packet has been successfully delivered to the remote DTE. The More field allows a DTE to indicate that a group of packets belong together. The standard is that carriers are required to support a maximum packet length of 128 data bytes. However it also allows carriers to provide optional maximum lengths from 16 up to 4096 bytes (in powers of 2).
167
Initially, the interface is in state P1.A CALL REQUEST or INCOMING CALL changes the state to P2 or P3, respectively. From these states the data transfer state, P4, can be reached, either directly, or via P5. Similar diagrams are provided for Call Clearing, Resetting, and Restarting.
References
Computer Networks / Andrew S.Tanenbaum Data and Computer Communication / William Stallings Telecommunication Networks: Protocols, Modeling and Analysis / Mischa Schwartz Interconnections: Bridges and Routers / Radia Perelman Computer Networks and Their Protocols / D.W. Davies, D.L.A. Barber, W.L. Prince and C.M. Solomonides 6. Computer Networks Architecture and Protocols / Paul E.Green
1. 2. 3. 4. 5.
168
DATA COMMUNICATION BASICS This tutorial describes introductory concepts in data communications. Go to the tutorial that describes the TCP/IP. To learn about DATA COMMUNICATIONS read on! This section covers some introductory information on the following:
What a protocol is What a packet is What a gateway ( or router ) and routing are The concept of a layered protocol architecture Layer services Data encapsulation Data fragmentation and reassembly Why standards are needed The concept of an open system Overview of the OSI 7-layer model and the TCP/IP model
What Is a Packet?
The term packet is used often in data communications, sometimes incorrectly. To transfer data effectively, it is usually better to transfer uniform chunks of data than to send characters singly or in widely varying sized groups. Usually these chunks of data have some information ahead of them ( called the header ) and sometimes an indicator at the end (called the trailer). These chunks of data are loosely called packets. In some data communications systems, "packets" refer to the units of data passed between two specific layers in a protocol hierarchy e.g. the Data Link Layer and the Network Layer of the OSI 7 layer model. The amount of data in a packet and the composition of the header or trailer may vary depending on the communications protocol as well as some system parameters, but the concept of a packet always refers to the entire chunk of data (including header and trailer).
What Is a Host?
A host typically refers to a computer providing an information or communications service.
169
originates, except when the packets are destined for another network. The gateway has the responsibility of acting as the switch that allows such packets to go from one network to another. The process by which the paths that packets travel across a network or internetwork are chosen is known as routing. Protocol Layering A wide range of problems may arise in packet-based data communication. These include the following.
Host failure: A host or gateway may fail due to a hardware or software crash. Link failure: A transmission link may be damaged or disconnected. Network congestion: Networks have finite capacity which cannot be exceeded. Packet delay or loss: Packets are sometimes lost during transmission or may experience excessive delays. Data corruption: Transmission errors can corrupt the data being transmitted. Data duplication or packets out-of-sequence: Where more than one route exists in a network connection, it is possible for transmitted packets to arrive out of sequence. Also, packets that traverse a long route may be retransmitted, having been presumed lost. This results in the presence of duplicate frames if the original and retransmitted packets arrive at the destination.
It is impractical to write a single protocol to handle all of these issues. The early methods were often based on a single protocol with many interacting components. The resulting software was difficult to test, debug and modify. Complex data communication schemes therefore require a family of cooperative protocols to handle all transmission tasks ( Ref. 1 ). The modules of protocol software on each machine can be organised into what may be thought of as layers. Each layer handles a communication sub-problem. This is illustrated in Figure 1.
170
171
Say an application process on one host has some data it wishes to send. It passes the data to the transport layer, which ( possibly ) modifies the data then attaches the transport header, T, to it and passes the resulting item to the Internet layer. The Internet layer treats the entire message received as data, may make some modifications, and attaches its own header, I, to the message. This message is then passed to the network access layer and the process is repeated. Here, the message from the Internet layer is enclosed in a physical network frame, the header from this layer being represented as N. The data are then transmitted over the medium. Note that, in each layer (below the application layer), depending on the protocol, a trailer may be appended to the message in addition to the header as is mentioned here. On the receiving end the various headers are successively stripped off as the message moves up the layers until it reaches the receiving process. Data are reassembled ( i.e. the segmentation sub-process is reversed ) if they had been fragmented during their downward path in the transmitting system. At each layer the data at the receiving end ( after reassembly, if performed ) match data at the sending end ( before segmentation, if performed ) ( Ref. 4 ). Data segmentation and reassembly are illustrated in Figure 3.
172
architecture has been published or is readily available to anyone who wants to build products for a hardware or software platform. This definition of an open system may be applied to both hardware and software. Open systems are in contrast to vendor-owned or proprietary systems. In such systems the vendor developes an architecture which he keeps a secret from the general population. Consequently, only persons the vendor authorizes can build products that will work with the vendor's products. Years ago, open systems were virtually nonexistent. It was customary for hardware manufacturers to have product lines which bound clients to that manufacturer for all software and hardware needs. Some companies took advantage of the captive market, charging outrageous prices or forcing unwanted configurations on their customers. The equipment from one manufacturer that adheres to an open system standard can be used interchangeably with the equipment from any other manufacturer that adheres to that particular standard. This is so regardless of the other specifics of the vendors' respective equipment ( e.g. operating system, if this is not itself a part of the protocol ). The customer therefore has choices. Established Data Communication Standards Some vendors have established data communication models based on the layered approach previously described. The vendors base their systems or products ( such as network operating systems ) on their own model. An example of this is Novells IPX/SPX protocol architecture, upon which Novell Netware, a popular network operating system, is based. As stated before, in such cases, to develop applications for a particular vendors products, one must adhere to that vendors model. This tends to lead to considerable complication when products or systems from a number of different vendors are to be integrated in some way. To address this problem, two groups concerned with the interconnection of independent systems, the ISO and DARPA, have defined commonly-used models for systems interconnection. The International Standards Organization ( ISO ) developed a model for the connection of open systems ( systems that are open for communication with other systems ) known as the Open Systems Interconnection ( OSI ) reference model. The OSI model has seven layers : Physical, Data Link, Network, Transport, Session, Presentation, Application. The OSI model is not a network architecture in that it does not specify the actual protocols to be used in each layer ( Ref. 2 ). Rather, the model clearly defines the functions to be performed by each layer and the boundaries between each layer. The OSI model is illustrated in Figure 4.
Prior to, and concurrently with the development of the ISOs OSI model, the US Department of Defense Advanced Research Projects Agency (DARPA) was heavily involved in internetworking activity. It was such activity that resulted in the creation of the Internet. As a result of this activity, DARPA created a four layered model of data communication known as the TCP/IP suite, which has become the de facto standard for interconnection, despite the official status of the OSI model. The TCP/IP model is illustrated in Figure 5.
173
The TCP/IP and OSI standards are the two major open system, vendor-independent, standards in use ( Ref. 5 ). REFERENCES
174
Table Of Contents Chapter Goals X.25 Introduction X.25 Devices and Protocol Operation
Packet Assembler/Disassembler X.25 Session Establishment X.25 Virtual Circuits
LAPB Frame Format X.121 Address Format Summary Review Questions Chapter Goals Discuss the history and development of the X.25 protocol.
Describe the basic functions and components of X.25. Describe the frame formats of X.25.
X.25 Introduction
X.25 is an International Telecommunication Union-Telecommunication Standardization Sector (ITU-T) protocol standard for WAN communications that defines how connections between user devices and network devices are established and maintained. X.25 is designed to operate effectively regardless of the type of systems connected to the network. It is typically used in the packet-switched networks (PSNs) of common carriers, such as the telephone companies. Subscribers are charged based on their use of the network. The development of the X.25 standard was initiated by the common carriers in the 1970s. At that time, there was a need for WAN protocols capable of providing 175
connectivity across public data networks (PDNs). X.25 is now administered as an international standard by the ITU-T.
X.25 Devices and Protocol Operation
X.25 network devices fall into three general categories: data terminal equipment (DTE), data circuit-terminating equipment (DCE), and packetswitching exchange (PSE). Data terminal equipment devices are end systems that communicate across the X.25 network. They are usually terminals, personal computers, or network hosts, and are located on the premises of individual subscribers. DCE devices are communications devices, such as modems and packet switches, that provide the interface between DTE devices and a PSE, and are generally located in the carrier's facilities. PSEs are switches that compose the bulk of the carrier's network. They transfer data from one DTE device to another through the X.25 PSN. Figure 17-1 illustrates the relationships among the three types of X.25 network devices. Figure 17-1 DTEs, DCEs, and PSEs Make Up an X.25 Network
PACKET ASSEMBLER/DISASSEMBLER
The packet assembler/disassembler (PAD) is a device commonly found in X.25 networks. PADs are used when a DTE device, such as a character-mode terminal, is too simple to implement the full X.25 functionality. The PAD is located between a DTE device and a DCE device, and it performs three primary functions: buffering (storing data until a device is ready to process it), packet assembly, and packet disassembly. The PAD buffers data sent to or from the DTE device. It also assembles outgoing data into packets and forwards them to the DCE device. (This includes adding an X.25 header.) Finally, the PAD disassembles incoming packets before forwarding the data to the DTE. (This includes removing the X.25 header.) Figure 17-2 illustrates the basic operation of the PAD when receiving packets from the X.25 WAN. Figure 17-2 The PAD Buffers, Assembles, and Disassembles Data Packets
176
X.25 sessions are established when one DTE device contacts another to request a communication session. The DTE device that receives the request can either accept or refuse the connection. If the request is accepted, the two systems begin full-duplex information transfer. Either DTE device can terminate the connection. After the session is terminated, any further communication requires the establishment of a new session.
X.25 VIRTUAL CIRCUITS
A virtual circuit is a logical connection created to ensure reliable communication between two network devices. A virtual circuit denotes the existence of a logical, bidirectional path from one DTE device to another across an X.25 network. Physically, the connection can pass through any number of intermediate nodes, such as DCE devices and PSEs. Multiple virtual circuits (logical connections) can be multiplexed onto a single physical circuit (a physical connection). Virtual circuits are demultiplexed at the remote end, and data is sent to the appropriate destinations. Figure 17-3 illustrates four separate virtual circuits being multiplexed onto a single physical circuit. Figure 17-3 Virtual Circuits Can Be Multiplexed onto a Single Physical Circuit
Two types of X.25 virtual circuits exist: switched and permanent. Switched virtual circuits (SVCs) are temporary connections used for sporadic data
177
transfers. They require that two DTE devices establish, maintain, and terminate a session each time the devices need to communicate. Permanent virtual circuits (PVCs) are permanently established connections used for frequent and consistent data transfers. PVCs do not require that sessions be established and terminated. Therefore, DTEs can begin transferring data whenever necessary because the session is always active. The basic operation of an X.25 virtual circuit begins when the source DTE device specifies the virtual circuit to be used (in the packet headers) and then sends the packets to a locally connected DCE device. At this point, the local DCE device examines the packet headers to determine which virtual circuit to use and then sends the packets to the closest PSE in the path of that virtual circuit. PSEs (switches) pass the traffic to the next intermediate node in the path, which may be another switch or the remote DCE device. When the traffic arrives at the remote DCE device, the packet headers are examined and the destination address is determined. The packets are then sent to the destination DTE device. If communication occurs over an SVC and neither device has additional data to transfer, the virtual circuit is terminated.
The X.25 Protocol Suite
The X.25 protocol suite maps to the lowest three layers of the OSI reference model. The following protocols are typically used in X.25 implementations: Packet-Layer Protocol (PLP), Link Access Procedure, Balanced (LAPB), and those among other physical-layer serial interfaces (such as EIA/TIA-232, EIA/TIA-449, EIA-530, and G.703). Figure 17-4 maps the key X.25 protocols to the layers of the OSI reference model. Figure 17-4 Key X.25 Protocols Map to the Three Lower Layers of the OSI Reference Model
PACKET-LAYER PROTOCOL
178
PLP is the X.25 network layer protocol. PLP manages packet exchanges between DTE devices across virtual circuits. PLPs also can run over Logical Link Control 2 (LLC2) implementations on LANs and over Integrated Services Digital Network (ISDN) interfaces running Link Access Procedure on the D channel (LAPD). The PLP operates in five distinct modes: call setup, data transfer, idle, call clearing, and restarting. Call setup mode is used to establish SVCs between DTE devices. A PLP uses the X.121 addressing scheme to set up the virtual circuit. The call setup mode is executed on a per-virtual-circuit basis, which means that one virtual circuit can be in call setup mode while another is in data transfer mode. This mode is used only with SVCs, not with PVCs. Data transfer mode is used for transferring data between two DTE devices across a virtual circuit. In this mode, PLP handles segmentation and reassembly, bit padding, and error and flow control. This mode is executed on a per-virtual-circuit basis and is used with both PVCs and SVCs. Idle mode is used when a virtual circuit is established but data transfer is not occurring. It is executed on a per-virtual-circuit basis and is used only with SVCs. Call clearing mode is used to end communication sessions between DTE devices and to terminate SVCs. This mode is executed on a per-virtual-circuit basis and is used only with SVCs. Restarting mode is used to synchronize transmission between a DTE device and a locally connected DCE device. This mode is not executed on a pervirtual-circuit basis. It affects all the DTE device's established virtual circuits. Four types of PLP packet fields exist: General Format Identifier (GFI)Identifies packet parameters, such as whether the packet carries user data or control information, what kind of windowing is being used, and whether delivery confirmation is required. Logical Channel Identifier (LCI)Identifies the virtual circuit across the local DTE/DCE interface. Packet Type Identifier (PTI)Identifies the packet as one of 17 different PLP packet types. User DataContains encapsulated upper-layer information. This field is present only in data packets. Otherwise, additional fields containing control information are added.
LINK ACCESS PROCEDURE, BALANCED
LAPB is a data link layer protocol that manages communication and packet framing between DTE and DCE devices. LAPB is a bit-oriented protocol that ensures that frames are correctly ordered and error-free. 179
Three types of LAPB frames exist: information, supervisory, and unnumbered. The information frame (I-frame) carries upper-layer information and some control information. I-frame functions include sequencing, flow control, and error detection and recovery. I-frames carry send- and receive-sequence numbers. The supervisory frame (S-frame) carries control information. Sframe functions include requesting and suspending transmissions, reporting on status, and acknowledging the receipt of I-frames. S-frames carry only receive-sequence numbers. The unnumbered frame (U frame) carries control information. U-frame functions include link setup and disconnection, as well as error reporting. U frames carry no sequence numbers.
THE X.21BIS PROTOCOL
X.21bis is a physical layer protocol used in X.25 that defines the electrical and mechanical procedures for using the physical medium. X.21bis handles the activation and deactivation of the physical medium connecting DTE and DCE devices. It supports point-to-point connections, speeds up to 19.2 kbps, and synchronous, full-duplex transmission over four-wire media. Figure 17-5 shows the format of the PLP packet and its relationship to the LAPB frame and the X.21bis frame. Figure 17-5 The PLP Packet Is Encapsulated Within the LAPB Frame and the X.21bis Frame
LAPB frames include a header, encapsulated data, and a trailer. Figure 17-6 illustrates the format of the LAPB frame and its relationship to the PLP packet and the X.21bis frame. The following descriptions summarize the fields illustrated in Figure 17-6:
180
FlagDelimits the beginning and end of the LAPB frame. Bit stuffing is used to ensure that the flag pattern does not occur within the body of the frame. AddressIndicates whether the frame carries a command or a response. ControlQualifies command and response frames and indicates whether the frame is an I-frame, an S-frame, or a U-frame. In addition, this field contains the frame's sequence number and its function (for example, whether receiver-ready or disconnect). Control frames vary in length depending on the frame type. DataContains upper-layer data in the form of an encapsulated PLP packet. FCSHandles error checking and ensures the integrity of the transmitted data. Figure 17-6 An LAPB Frame Includes a Header, a Trailer, and Encapsulated Data
X.121 addresses are used by the X.25 PLP in call setup mode to establish SVCs. Figure 17-7 illustrates the format of an X.121 address.
181
The X.121 Address field includes the International Data Number (IDN), which consists of two fields: the Data Network Identification Code (DNIC) and the National Terminal Number (NTN). DNIC is an optional field that identifies the exact PSN in which the destination DTE device is located. This field is sometimes omitted in calls within the same PSN. The DNIC has two subfields: Country and PSN. The Country subfield specifies the country in which the destination PSN is located. The PSN field specifies the exact PSN in which the destination DTE device is located. The NTN identifies the exact DTE device in the PSN for which a packet is destined. This field varies in length. Figure 17-7 The X.121 Address Includes an IDN Field
Summary
X.25 is an ITU-T standard protocol that defines how connections between user devices and network devices are established and maintained, and that operates effectively regardless of the type of systems connected to the network. X.25 devices include DTEs, DCEs, and PSNs. X.25 connections contain both SVCs and PVCs within the physical circuit. X.25 uses the following three protocols, which map to the bottom three layers of the OSI reference model: PLP, which maps to the network layer LAPB, which maps to the data link layer
X.21bis, EIA/TIA-232, EIA/TIA-449, EIA-530, and G.703, which map to the physical layer
182
Review Questions
QIn what kind of networks does X.25 generally operate? AIt is typically used in packet-switched networks of common carriers, such as the telephone companies. QName the three general categories into which X.25 devices fall. ADTEs, DCEs, and PSEs. QWhat are the three main functions of the PAD? ABuffering, packet assembly, and packet disassembly. QName the X.25 protocol suite and the layers in the OSI reference model to which they map. APLP: network layer; LAPB: data link layer; X.21bis, EIA/TIA-232, EIA/TIA-449, EIA-530, and G.703: physical layer.
Posted: Fri Oct 13 14:38:11 PDT 2006 All contents are Copyright 1992--2006 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.
X.25
FROM WIKIPEDIA, THE FREE ENCYCLOPEDIA Jump to: navigation, search X.25 is an ITU-T standard protocol suite for wide area networks using the phone or ISDN system as the networking hardware. It defines one of many standards implemented for the Physical, Data Link, and Network layers of the OSI network Reference Model or the equivalent Network Access Layer of the DOD protocol model. Packet switched network was the common name given to the international collection of X.25 providers, typically the various national telephone companies. Their combined network had large global coverage during the 1980s and into the '90s, and it is still in use mainly in transaction systems.
183
Contents
1 History
2 Architecture 3 Addressing
and Virtual Circuits 4 X.25 (or OSI) protocol suite 5 Obsolescence 6 X.25 Today 7 X.25 packet types 8 X.25 details 9 Related Technologies 10 External links
11 Bibliography
History
X.25 was developed in the ITU Study Group VII based upon a number of emerging data network projects. Various updates and additions were worked into the standard, eventually recorded in the ITU series of technical books describing the telecoms systems. These books were published every fourth year with different colored covers.
Architecture
A Televideo terminal model 925 made around 1982 The general concept of X.25 was to create a universal and global packet-switched network on what was then the bit-error prone analog phone system. Much of the X.25 system is a description of the rigorous error correction needed to achieve this, a system known as LAP-B. The X.25 model was based on the concept of establishing "virtual calls" through the network, with "data terminal equipment" (DTE) providing endpoints to users, which looked like point-to-point connections. X.25 was developed in the era of dumb terminals connecting to host computers. Instead of dialing directly into the host computer which would require the host to have its own pool of modems and phone lines, and require non-local callers to make long-distance calls the host could have an X.25 connection to a network service provider. Now dumb-terminal users could dial into the network's local PAD (Packet Assembly/Disassembly facility), a gateway device connecting modems and serial lines to the X.25 link as defined by the ITU-T X.29 and X.3 standards. Having connected to the PAD, the dumb-terminal user tells the PAD which host to connect to, by giving a phone-number-like address in the X.121 address format (or by giving a host name, if the service provider allows for names that map to X.121 addresses). The PAD then places an X.25 call to the host, establishing a virtual circuit. Note that X.25 provides for virtual circuits, so appears to be a circuit switched network, even though in fact the data itself is packet switched internally, similar to the way TCP provides virtual circuits even though the underlying data is packet switched. Two X.25 hosts could, of course, call one another directly; no PAD is involved in this case. In theory, it doesn't matter whether the X.25 caller and X.25 destination are both connected to the same carrier, but in practice it was not always possible to make calls from one carrier to another. For the purpose of flow-control, a sliding window protocol is used with the default window size of 2. The acknowledgements may have either local or end to end significance. When D=0, it means that
184
the acknowledge took place between the DTE and the network. When D=1, it means that the acknowledgement took place from the remote DTE.
An X.25 Modem once used to connect to the German Datex-P network. The X.121 address consists of a three-digit Data Country Code (DCC) plus a network digit, together forming the four-digit Data Network Identification Code (DNIC), followed by the National Terminal Number (NTN) of at most ten digits. Note the use of a single network digit, seemingly allowing for only 10 network carriers per country, but some countries are assigned more than one DCC to avoid this limitation. For much of its history X.25 was used for permanent virtual circuits (PVCs) to connect two host computers in a dedicated link. This was common for applications such as banking, where distant branch offices could be connected to central hosts for a cost that was considerably lower than a permanent long distance telephone call. X.25 was typically billed as a flat monthly service fee, and then a priceper-packet on top of this. Speeds increased during the years, typically up to 48 or 96 kbit/s. Publicly-accessible X.25 networks (Compuserve, Tymnet, Euronet, and Telenet) were set up in most countries during the 1970s and 80s, to lower the cost of accessing various online services, in which the user would first interact with the network interface to set up the connection. Known as switched virtual circuits (SVC) or "virtual calls" in public data networks (PDN), this use of X.25 disappeared from most places fairly rapidly as long distance charges fell in the 1990s and today's Internet started to emerge. A data Terminal Equipment is allowed to establish up to 4095 virtual circuits, which can be both permanent and virtual. For this purpose each packet has 12 bit virtual circuit number
6. Presentation layer: ISO 8823, X.226 5. Session layer: ISO 8327, X.225 4. Transport layer: TP0, TP1, TP2, TP3, TP4 3. Network layer: X.25 PLP, CLNP 2. Data link layer: LAPB, IEEE802.2 - IEEE802.5
185
Obsolescence
With the widespread introduction of "perfect" quality digital phone services and error correction in modems, the overhead of X.25 was no longer worthwhile. The result was called Frame relay, essentially the X.25 protocol with the error correction systems removed, and somewhat better throughput as a result. The concept of virtual circuits is still used within ATM to allow for traffic engineering and network multiplexing.
X.25 Today
X.25 networks are still in use throughout the world, although in dramatic decline, being largely supplanted by newer layer 2 technologies such as frame relay, ISDN, ATM, ADSL, POS, and the ubiquitous layer 3 Internet Protocol. X.25 however remains one of the only available reliable links in many portions of the developing world, where access to a PDN may be the most reliable and low cost way to access the Internet. A variant called AX.25 is also used widely by amateur packet radio, though there has been some movement in recent years to replace it with TCP/IP. RACAL Paknet or Widanet as it is otherwise branded is still in operation in many regions of the world, running on an X.25 protocol base. Used as a secure wireless low rate data transfer platform, Paknet is commonly used for GPS Tracking and POS solutions currently.
Call Request
Call Connected
Call Accepted
Clear Indication
Clear Request
Clear Confirmation
Clear Confirmation
Data
Data
Interrupt
Interrupt
Interrupt Confirmation
Interrupt Confirmation
RR
RNR
RNR
186
REJ
Reset Indication
Reset Request
Reset Confirmation
Reset Confirmation
Restart
Restart Indication
Restart Request
Restart
Restart Confirmation
Restart Confirmation
Diagnostic
Diagnostic
Registration
X.25 details
The maximal field length the network can support is 128 octets. However the network may allow the selection of the maximal length in range 16 to 4096 octets. The length may vary on two ends of the circuit.
Data terminal equipment constructs control packets which are encapsulated into data packets. The packets are sent to the data center equipment, using LAPB Protocol. Data center equipment strips the layer-2 headers in order to encapsulate packets to the internal network protocol.
bit A bit (short for binary digit) is the smallest unit of data in a computer. A bit has a single binary value, either 0 or 1. Although computers usually provide instructions that can test and manipulate bits, they generally are designed to store data and execute instructions in bit multiples called bytes. In most computer systems, there are eight bits in a byte. The value of a bit is usually stored as either above or below a designated level of electrical charge in a single capacitor within a memory device. Half a byte (four bits) is called a nibble. In some systems, the term octet is used for an eight-bit unit instead of byte. In many systems, four eight-bit bytes or octets form a 32-bit word. In such systems, instruction lengths are sometimes expressed as full-word (32 bits in length) or half-word (16 bits in length). In telecommunication, the bit rate is the number of bits that are transmitted in a given time period, usually a second.
187
Each CAD file is converted to an STL format. The STL file is read into the software called QuickSlice. QuickSlice breaks the model into individual slices. With each slice representing one layer of material. QuickSlice then generates tool paths to fill the slices. These tool paths form the Stratasys Modeling Language (SML) file. After slicing an STL file and creating a SML file, the SML file is downloaded to the FDM hardware for modeling.
188
In the FDM Hardware, the FDM head moves in two horizontal axes across a foundation and deposits a layer of material for each slice. The material filament is pulled into the FDM head by the drive wheels. It is heated inside the liquidfier in the FDM head so it comes out in a semi-liquid state. The successive layers fuse together and solidify to build up an accurate, three-dimensional model of the design. The modeling envelope temperature is regulated to aid in the bonding process. The FDM head deposits material as it follows the part geometry for each curve. It starts from the bottom curve and build up the model to the top curve.
Conceptual Models
The speed and accuracy of the FDM hardware allows engineers to produce a new part each time the product undergoes a revision. In addition, a full-scale prototype of a proposed part has strong appeal for prospective client.
The Modeler
The hardware mainly consists of two parts the modeler and the printer server. The modeler with control panel and the working envelop access at the front. Inside the working envelope are the head and the foam foundation which support the part when it is build. The material stock is position on the right side of the modeler.
The printer server, a computer with NT platform, is used to download the required file to the
modeler.
189
Materials
The FDM is capable of using a variety of inert, nontoxic materials such as wax, ABS plastic and elastomer. Each material comes wound on a spool in the form of a filament approximately 0.07" in diameter, so it is both easy to load and easy to store. The materials may be stored at normal room temperature. Humidity must be eliminated when using ABS plastics. Exposing the filament material to temperatures outside normal office temperatures may cause the filament to fracture. It is recommended to store ABS plastic spools in dry boxes. These materials also can be stored inside two plastic bags. Enclosed a bag of desiccant with the spool. Place the plastic bags in a closed cabinet or sealed environment. This is to protect them from dust and moisture. Handle the spools of material with care. Sudden or abrupt impacts to material spools may cause the filament to fracture.
190
Stratasys investment casting wax allows the operator to take an STL file from a CAD model through the Stratasys modeling process and create a wax pattern. Forming and dewaxing a shell mould is done rapidly using normal investment casting procedures. No special burnout is required. The low ash content and low viscosity level of the wax leave a residue-free cavity. ABS and wax have specific release material associated with them. Stratasys recommends making the entire support from the release material.
QuickSlice
QuickSlice software is an integral part of the FDM system. It serves as a bridge between your 3-D STL files and the FDM hardware. QuickSlice works with any STL file. It allows you to specify the physical attributes of that STL file and create a Stratasys Modeling Language (SML) file that can be sent directly to the FDM hardware. The SML file provides the instructions necessary for the FDM hardware to build the physical model. It is important to know some basic function of the mouse. The left mouse button is used for clicking buttons, selecting curves, and typing values into fields. The middle mouse button is used for stepping up or down Z levels after slicing an STL file. The right mouse button is used for selecting items from field pop-up lists and repeating edit commands. It also repeats the "Add Curve to Set" command. QuickSlice cuts the STL file model into horizontal slices. Each slice is extruded as a single layer of material by the FDM hardware to create a physical model. QuickSlice can read an STL file in compressed or uncompressed form. The STL file can be in either ASCII or binary file format. Once in QuickSlice, the STL file can be repositioned, rotated, and scaled. It is important for STL files to be relatively free of defects before reading them into QuickSlice. A defective STL file can make the FDM system operators job unnecessarily complicated. QuickSlice operation involves the following steps:
191
Modems
Overview
Modems convert between digital serial signal from a computer and analog signal suitable for transmission over standard phone lines. There are generally three ways to configure a modem:
Dial out only: Use the modem to connect from the local machine to remote machines. Dial in only: Allow others to connect from their machines to the local system through the modem. Bidirectional: Use the modem for both purposes.
There are a wide variety of applications that make use of modems, such as SLIP, PPP, and UUCP. This section will not cover specific applications in depth , but rather give a broad understanding of connecting and configuring modems. There are a multitude of modems on the market for a very large price range. Choosing one can often be a difficult undertaking. Generally, you get what you pay for. Cheap modems are often just that ... cheap. Money saved by buying a cheap modem, is often spent in the extra time it takes to get it working. One factor that increases price is the vendor. The more respected and established the modem vendor, the higher the price. However, these vendors have earned their reputations. Don't skimp! One of the best ways to judge a modem is through experience. Ask colleagues about their experiences with different modems and vendors, how long it took them to get their modem running and how difficult a time they had. Testimonials from other people are a very good tool in choosing a modem. Also, it is a good idea to check your system for compatibility. Many Unix vendors support specific modems for specific duties. Very often many other modems will work, but the vendor may not offer any support for those other modems. Look through the system's manuals for mention of supported modems, or contact the vendor directly.
When evaluating and purchasing a modem, there are four background areas to understand:
Modulation protocol Error correction protocol Data compression protocol Hardware flow control
MODULATION PROTOCOLS
The modulation protocol determines the transmission rate, or speed, of the modem. When talking about transmission rates, it is important to be clear about the measurement of those rates. There are two terms that have long been incorrectly used interchangeably.
BAUD
VS.
BPS
The baud rate of a modem is the measure of how many times per second a modem's signal changes. Because of limitations in standard phone lines, it is hard to get baud rates higher than 2,400. Most high speed modems run at 2,400 baud. The bps rate of a modem is the measure of how many bits per second the modem transmits. Current modems can sometimes transmit up to 115,200 bits per second.
192
It is the bits per second that matter most when talking about modem speeds. Unfortunately, people (including vendors!) often incorrectly use the term baud instead of bps, saying for instance that their modem transmits at 28,800 baud, when they mean 28,800 bps. This confusion stems from the fact that older modem's baud rates and bps rates were the same: they encoded one bit per baud. However, today's modems encode more than one bit per baud, thus achieving bps rates greater than their baud rates. For example, a modem transmitting at 28,800 bps sends 12 bits per baud. When purchasing a modem, buy the fastest one possible. Today's high speed modems rapidly become tomorrow's low speed modems. Also, look for a modem that can run at split speeds. The modem should be able to work at a fixed speed between the Unix system and the modem, but at a negotiated speed between modems, independent of the computer to modem speed.
ERROR CORRECTION PROTOCOLS Line noise can cause significant errors in modem connections. The high speeds of modern modems
exacerbate this problem. While a moment of line noise at 300 bps can create several junk characters, that same moment of noise at 28,800 bps can fill the screen with garbage. Error correction protocols combat the line noise problem by packetizing the data and providing checksums to help determine if the data has been corrupted in transmission. Several protocols have been developed, the two most popular being MNP-4 and CCITT V.42 LAP-M. Which error correction protocol a modem uses is typically determined by the data compression protocol used.
193
/dev/ttydXpN representing the port. Used for incoming connections, e.g. dialing in on a
X is the number representing the card instance and N is the number representing the port. Used for outgoing connections, e.g. dialing out on a modem. X is the number representing the card instance and N is the number representing the port. Used for direct connections, e.g. when debugging a modem connection. N is the number representing the port. Used for low speed modems. N is the number representing the port. Used for high speed modems, hardware flow control is enabled. The N is the number representing the port. Used for incoming connections, e.g. dialing in on a modem. The N is the number representing the port. Used for outgoing connections, e.g. dialing out on a modem. A is the letter representing the port. Used for incoming connections, e.g. dialing in on a modem. The A is the number representing the port. Used for outgoing connections, e.g. dialing out on a modem.
HP-UX /dev/culXpN
/dev/cuaXpN /dev/ttymN IRIX /dev/ttyfN /dev/ttySN Linux /dev/cuaN /dev/term/A Solaris /dev/cua/A
For operating system specific configuration information see the following essential pages:
HP-UX IRIX Linux Solaris
194
This modem tutorial explains what a modem is and how they are typically used for enabling remote devices to communicate with central locations.
10% off Modem starter kits when purchased from our online shop With the advent of the Internet, modems are becoming more intelligent. Find out more about inteligent TCP/IP modems through our IP modem tutorial. MODEMS FOR
MACHINES
Modems are traditionally associated with PC's in the form of box/PC modems, however this technology is not suited to non-PC equipment or "machines", which have specialised needs: Size
- there is little space within many embedded devices for a modem box
Power consumption - some devices are battery powered and need low power modems Environment - machines can be deployed and need wide temperature range. Integration - modems need to be integrated within the machine and not external
TUTORIAL
MODEM
- WHAT IS A MODEM?
Modems provide access to field-based equipment A modem provides the communication interface. It transports device protocols transparently over the network through a serial inteface. A modem adapts the machine to communicate over various networks in order to gain access to the machine including: -
195
MODEM
PSTN - a wireline dial-up network GSM - a wireless dial-up network GPRS - a wireless "always on" network
TUTORIAL
- WHY USE
MODEMS?
Modems provide remote access to machines in the field to eliminate unnecessary site visits and provide fast access to information in the machine. However, integrating modems
Modems are "black art" products, surrounded by complex compliance and regulatory issues.
Designing your own modem solutions requires specialised skills. Using off-the-shelf modems enables designers to focus on their core application strengths, and not be drawn into solving issues that are not related to core competency yielding potentially unreliable products.
MODEM USE
comtech offer interchangability between PSTN, GSM and GPRS modem modules M2M Modems are embedded with the machine and transport higher level protocols between the machine and central location via the network.
TCP/IP enabled remote machines such as Embedded PC's, where modems provide the physical
Front Channel - This refers to the actual broadcast between the TV content provider and the TV viewer (end-user.) Its one-way in nature. In non-ITV systems, the front channel is the only channel as the signal is only going to the viewer, not the viewer back to the content provider. But in ITV, a separate Back Channel is also needed for the return flow of data from the end-user (viewer.)
command line interpreter. This command line interpreter may be a text terminal, terminal emulator, or remote shell client such as PuTTY. The concept of the CLI originated when teletype machines (TTY) were connected to computers in the 1950s, and offered results on demand, compared to 'batch' oriented mechanical punch card input technology. Dedicated text-based CRT terminals followed, with faster interaction and more information visible at one time, then graphical terminals enriched the visual display of information. Currently personal computers encapsulate both functions in software.
The CLI continues to coevolve with graphical user interfaces (GUIs) like those provided by Microsoft Windows, Mac OS and the X Window System. In some applications, such as MATLAB, a CLI is integrated with the GUI, with the benefits of both.
196
What is telnet)
A standard Internet protocol for accessing remote systems.
Telnet FAQ
TELNET FREQUENTLY ASKED QUESTIONS
What is telnet? What can I use telnet for? How can I connect to a telnet address? What is tn3270 and how do I connect? Can I transfer files through a telnet connection? How do I configure telnet software with Netscape or MSIE?
What is telnet?
Telnet and its close cousins rlogin and tn3270 are methods of connecting to a remote computer over the Internet that let you use programs and data just as if you were using the computer locally. Do not confuse telnet with Telenet, the old name for Sprintnet. Telnet is a text-only protocol. At one time it was one of the most common ways to connect to other sites. Now with the growth of the web, it is hardly used. There are still a few sites and resources that can only be reached through telnet.
Delphi's Internet service, the first nationwide Internet service available to the public, closed its telnet access on April 30, 2001.
How can I connect to a telnet address of my choosing? If your Internet provider supports telnet (not all do), you can connect to a telnet address in one of two ways:
Recent versions of Windows include a command line telnet. Begin at Start/Run and type command. On the next screen, type your telnet command. From a SLIP or PPP or ethernet connected account: type a telnet URL into the location window of your browser. To do this, your browser must be configured with a supporting version of telnet software. Two good ones, better than the built-in command line telnet for Windows, are NetTerm and CRT. Check our Internet Software Guide, whatever your platform and operating system. If you are using Windows95, make sure you get a version that supports Win95's 32-bit stack. Although Win95 comes with a version of telnet.exe, it is a bare bones version with no zmodem transfers, and there are much better ones available. A telnet URL takes this form: telnet://some.address:port-number. Most of the time, the port number will be the default 23. If so, it can be omitted. From a unix shell account or other account that lets you type telnet commands, you can issue a command like this: telnet some.address port-number
197
What is tn3270? How can I connect to a tn3270 site? TN3270 is a special type of telnet that is sometimes needed to connect to IBM mainframe sites.
Regular telnet will often work, but if you have trouble with keypresses and commands, you may need to get a tn3270 client to add to your software. Can I transfer files through a telnet connection using zmodem or other methods? It depends on the version of telnet you are using. Some support zmodem, kermit, etc., and some do not. If you do have a version of telnet that supports these transfer methods, it still depends on whether you are using a SLIP or PPP or ethernet account where you run the software or you are using a shell account and using the shell account's software. SLIP, PPP, and networked accounts should have no problem, but shell accounts are not always configured to support binary transfers. Transferring binary files through a shell account requires the remote site to be operating in 8-bit mode, and many shell sites do not. In special circumstances, if you have enough knowledge of the configuration and operating system of the remote site, for example unix, you may be able to reset the mode.
Netscape 3.0 is configured by selecting Options/General Preferences, selecting the Apps tab, and filling in the Telnet Applications window. To set MSIE for your preferred telnet application, load Windows Explorer (not MSIE), click on View/Options/FileTypes. Scroll down to URL: Telnet Protocol, highlight, click Edit and Browse for the software.
For tn3270 configuration with either version of Netscape or MSIE, follow the same steps, but select tn3270 in place of telnet.
Go to Top
Go to Learning Tree
. What is TCP/IP?
TCP/IP is a set of protocols developed to allow cooperating computers to share resources across a network. It was developed by a community of researchers centered around the ARPAnet. Certainly the ARPAnet is the best- known TCP/IP network. However as of June, 87, at least 130 different vendors had products that support TCP/IP, and thousands of networks of all kinds use it
The Internet is a collection of networks, including the Arpanet, NSFnet, regional networks such as NYsernet, local networks at a number of University and research institutions, and a number of military networks. The term "Internet" applies to this entire set of networks.
Whatever it is called, TCP/IP is a family of protocols. A few provide "low- level" functions needed for many applications. These include IP, TCP, and UDP. (These will be described in a bit more detail later.)
198
Others are protocols for doing specific tasks, e.g. transferring files between computers, sending mail, or finding out who is logged in on another computer. Initially TCP/IP was used mostly between minicomputers or mainframes. These machines had their own disks, and generally were self- contained. Thus the most important "traditional" TCP/IP services are:
file transfer. The file transfer protocol (FTP) allows a user on any computer to get files
from another computer, or to send files to another computer. Security is handled by requiring the user to specify a user name and password for the other computer. Provisions are made for handling file transfer between machines with different character set, end of line conventions, etc. This is not quite the same thing as more recent "network file system" or "netbios" protocols, which will be described below. Rather, FTP is a utility that you run any time you want to access a file on another system. You use it to copy the file to your own system. You then work with the local copy. (See RFC 959 for specifications for FTP.) remote login. The network terminal protocol (TELNET) allows a user to log in on any other computer on the network. You start a remote session by specifying a computer to connect to. From that time until you finish the session, anything you type is sent to the other computer. Note that you are really still talking to your own computer. But the telnet program effectively makes your computer invisible while it is running. Every character you type is sent directly to the other system. Generally, the connection to the remote computer behaves much like a dialup connection. That is, the remote system will ask you to log in and give a password, in whatever manner it would normally ask a user who had just dialed it up. When you log off of the other computer, the telnet program exits, and you will find yourself talking to your own computer. Microcomputer implementations of telnet generally include a terminal emulator for some common type of terminal. (See RFC's 854 and 855 for specifications for telnet. By the way, the telnet protocol should not be confused with Telenet, a vendor of commercial network services.) computer mail. This allows you to send messages to users on other computers. Originally, people tended to use only one or two specific computers. They would maintain "mail files" on those machines. The computer mail system is simply a way for you to add a message to another user's mail file. There are some problems with this in an environment where microcomputers are used. The most serious is that a micro is not well suited to receive computer mail. When you send mail, the mail software expects to be able to open a connection to the addressee's computer, in order to send the mail. If this is a microcomputer, it may be turned off, or it may be running an application other than the mail system. For this reason, mail is normally handled by a larger system, where it is practical to have a mail server running all the time. Microcomputer mail software then becomes a user interface that retrieves mail from th e mail server. (See RFC 821 and 822 for specifications for computer mail. See RFC 937 for a protocol designed for microcomputers to use in reading mail from a mail server.)
ABOUT TCP
1. What is TCP? Transmission Control Protocol (TCP) provides a reliable byte-stream transfer service between two endpoints on an internet. TCP depends on IP to move packets around the network on its behalf. IP is inherently unreliable, so TCP protects against data loss, data corruption, packet reordering and data duplication by adding checksums and sequence numbers to transmitted data and, on the receiving side, sending back packets that acknowledge the receipt of data.
199
Before sending data across the network, TCP establishes a connection with the destination via an exchange of management packets. The connection is destroyed, again via an exchange of management packets, when the application that was using TCP indicates that no more data will be transferred. In OSI terms, TCP is a Connection-Oriented Acknowledged Transport protocol.
TCP has a multi-stage flow-control mechanism which continuously adjusts the sender's data
rate in an attempt to achieve maximum data throughput while avoiding congestion and subsequent packet losses in the network. It also attempts to make the best use of network resources by packing as much data as possible into a single IP packet, although this behaviour can be overridden by applications that demand immediate data transfer and don't care about the inefficiencies of small network packets. The fundamentals of TCP are defined in RFC 793, and later RFC's refine the protocol. RFC 1122 catalogues these refinements as of October 1989 and summarises the requirements that a TCP implementation must meet. TCP is still being developed. For instance, RFC 1323 introduces a TCP option that can be useful when traffic is being carried over high-capacity links. It is important that such developments are backwards-compatible. That is, a TCP implementation that supports a new feature must continue to work with older TCP implementations that do not support that feature.
200
201
202
Selection
Also called a decision, one of the three basic logic structures in computer programming. The other two logic structures are sequence and loop. In a selection structure, a question is asked, and depending on the answer, the program takes one of two courses of action, after which the program moves on to the next event.
This structure is sometimes referred to as an if-then-else because it directs the program to perform
in this way: If Condition A is True then perform Action X else perform Action Y. All logic problems in programming can be solved by forming algorithms using only the three logic structures, and they can be combined in an infinite number of ways. The more complex the computing need, the more complex the combination of structures.
H
HEADER
A part of the file structure that contains information required by an application to decompress and render the content. The header in a protected file also contains information required to get a license.
HTTP
See definition for: Hypertext Transfer Protocol (HTTP) HYPERTEXT TRANSFER PROTOCOL (HTTP) The Internet protocol used to deliver information over the World Wide Web.
203
->
CASM UCA (TM) Common Application Service Model (Get, Set, Reporting, Logging, Control, ...) Carrier signal _The underlying frequency or frequencies that are to carry information. They are modulated through one or more modulation techniques to impose information on the signal. Category 3 cable __Standard for UTP voice grade cabling specified by the EIA/TIA 568 standard for use at speeds up to I0Mbit/s including 10BaseT Ethernet. Category 4 Cabling standard specified by EIA/TIA 568 for use at speeds up to 20Mbit/s including 16Mbit/s Token Ring. Category 5 Cabling standard specified by ElA/TIA 568 for use t speeds up to 100Mbit/s including FDDI (TP PMD), 100BaseT and 100BaseVG-AnyLan, and potentially ATM at 155Mbit/s. CCITT (The International Telegraph and Telephone Consultative Committee) __Former name for the ITU-TS (International Telecommunications Union), a Specialized Agency of the United Nations. CCITT Study Groups __The ITU-TS (formerly the CCITT) operates as a series of groups considering specialist areas. There are key study groups applicable to networking and communications such as Study Group VII responsible for data communications networks and the X series Recommendations and Study Group XVIII covering digital networks including ISDN. CCTA Central Computer & Telecommunications Agency - the Government Center for Information Systems. Cell Relay __Generic term for a protocol based on small fixed packet sizes capable of supporting voice, video and data at very high speeds. Information is handled in fixed length cells of 53 octets.
Centronics interface____ A parallel interface with 36 pins that will transmit eight data bits simultaneously. The interface originates from the Centronics Company, a printer manufacturer. It has become widely used as a parallel interface standard.
CEPT The European Conference of Postal and Telecommunications Administrations. An association of European Telecommunications service providers. It in turn participates in relevant areas of the work of Cen/Cenelec. Formerly extremely powerful and was originally responsible for the Net standards, but these
204
Character Interleaving- A form of TDM used for asynchronous protocols. This can be used either with extra channels, or by carrying RS232-C control signals.
Cheapernet Thin wire Ethernet. Circuit switching___The transmission technique in which a physical circuit is established between sender and receiver before transmission takes place. When the transmission is complete, the circuit is freed.
CLI (Calling Line Identification) A service available on digital phone networks that tells the person being called which number is calling them. The central office equipment identifies the phone number of the caller, enabling information about the caller to be sent along with the call itself. Synonymous with ANI (Automatic Number Identification).
Client/server computing -The division of an application into two parts; a front end client and a back end server. It allows multiple front ends running on a PC or Unix workstation (client) to access the same SQL
based server database at the same time over the LAN. The aim is to off-load as much processing as possible to the intelligent desktop leaving only the shared information and the software for managing it at the central server. An application that is running in such a fashion with client and server linked by a LAN is termed a bifurcated application.
Cluster controller An IBM device that allows multiple 3270 terminals to be linked directly to a host computer, or into a SNA network through the use of a communications controller. A cluster controller is a Control Unit in IBM speak.
CMIP/CMIS (Common Management Information Protocol/CMI Services) ISO OSI connection oriented network management protocol and set of services. Well accepted in the WAN and telecommunications world, they have not yet been widely adopted for LAN management.
CMIS common management information service as defined in ISO/IEC 9595: 1991 CMOS complimentary metal oxide semiconductor CMOT (CMIP/CMIS over TCP) The use of SO CMIP/CMIS network management protocols to manage gateways in a TCP/IP Internet. CMOT is a co-recommended standard with SNMP.
Co-axial cable A cable comprising a central wire surrounded by a second tubular screening of fine wire. Associated with IBM for linking terminals and other devices needing high-speed links, coax is used in Ethernet.
205
It
is difficult to add or remove devices from a coaxial LAN as the cable is unwieldy and thick so is
Collision- The result of two devices on a shared transmission medium, like Ethernet, transmitting simultaneously. Data is corrupted and both devices must retry their transmissions. Adelay mechanism used by both senders drastically reduces the chances of another collision. Collision detection _Devices at each end of a link are designed to detect collisions instantly and attempt to resend. This is the principle on which CSMA/CD is based and the access control method for Ethernet. An alternative is to resend if there is no acknowledgment of receipt from the remote device.
Communications Controller -A switching unit central to the implementation of host-based IBM S NA networks. Typically the network is built around a backbone of interlinked communications controllers to which host computers and Control Units (CUs) are attached. Communications Manager- An individual often underpaid and invariably overworked, dedicated to providing cost effective, ultimately flexible networking to users.
Communications Networks The UK's leading monthly magazine for networking professionals and decision makers. Communications Server_ A specialized network server that provides access to external networks, communications facilities and hosts that cannot be directly connected to the LAN. Typically it will enable workstation user running appropriate workstation software, such as terminal emulation software, to access asynchronouscommunications links and typically modems attached to the communications server.
Communications Toolbox -An extension of the Apple Macintosh operating system that provides protocol conversion and the drivers needed for communications tasks.
Concentration __A technique used to get the most out of a composite multiplexer link. Usually a statistical multiplexer, or concentrator, is used to focus channel inputs on to the composite ink by removing the portions of the transmission carrying no data.
Concentrator____ A central chassis into which various modules, such as bridging, supervisory, 10BaseT and other peripheral cards are plugged.
Connection-oriented service- The transport of packets of information from one network node to a destination node following an established network connection.
Connectionless Service -The transport of a single datagram or packet of information from one network node to a destination node or multiple nodes without establishing a network connection.
Contention__-The process whereby multiple users make requests for transmission bandwidth across a transmission link but the pool of bandwidth is less than the aggregate amount of bandwidth the users could request between them. Contention is used to resolve which users gain access to the bandwidth. When this s applied
206
to multiplexers, it is concerned with the multiplexer's ability to allow a number of channels to contend for transmission bandwidth that is less than the sum of all the channel rates.
Control point -A program that manages an APPN network node and its resources, enabling communications to
Converter- A repeater that also converts from one media type to another, such as from fiber to copper. Often called a media adapter. CPE (Customer Premises Equipment) _Telecommunications- communications equipment, including PBXs and wiring, located in a user's premises. CRC (Cyclic Redundancy Check) -A method of detecting errors in the serial transmission of data. A CRC for a block of data is calculated before it is sent, and is then sent along with the data. A new CRC is calculated on the received data. If the new CRC does not match the one that has been sent along with the data then an error has occurred.
Cross-Connect_ An ATM switch usually comprising three functional areas. System control The central control unit, which also provides the management interface of the system; the ATM "fabric block" providing the system switching capacity; termination groups to provide the external interfaces and the functions of the ATM layer of the network node. Each of these functional system areas is configured according to the specified needs of the respective network node. Each functional area usually has its own monitoring and control units for safeguarding the high availability of the complete system.
Crosstalk ____Unwanted interference from another adjacent communications channel . The signal from the adjacent channel is inserted into the original communications channel. CSMA/CD (Carrier Sense Multiple Access with Collision Detection) _The access method used in Ethernet. All nodes are attached to a single cable and contend equally for access to the transmission medium. if two nodes attempt to send data at the same time, they "sense" each other's signal and immediately stop sending. They will both try to send again after Waiting a random number of microseconds. CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) _A method of network access not covered by OSI standards and used in AppleTalk networks.
CSU (Channel Service Unit) (1) In the US, data transmission equipment to repeat the signal from the carrier and ink to CPE. Vendors add value to CSUs by adding performance monitoring and management. (2) In Europe, CSUs are sold for their value features like diagnostics and performance monitoring. The basic repeating function is prd in the NTU (networking terminating unit). CSUs monitor quality on El, E2 or E3 circuits in terms of transmission and line loading. CT1 First generation analog domestic cordless telephone (non-cellular).
207
CT2 Two-way digital cordless telephony technology, particularly relevant to cordless PBXs. In its public guise, it becomes a one way telepoint service now no longer available in the UK but prevalent in the Far East. CT3 Ericsson's proprietary cordless telecommunications system.
PABXS VIA
APPLICATIONS SUCH AS
ACD,
A SO KNOWN
A process for removing redundant data from a digital media file or stream to reduce its size or the bandwidth used.
Glossary
To find a term in the glossary, click the letter of the alphabet that is the first letter in the term you want to look up. You can also read glossary terms within the text of Help by clicking the underlined glossary term links. After you click a glossary link, the glossary term and definition appear in a pop-up window. To close the window, click anywhere on the screen. A B N O C P D Q E R F S G T H U I V J K L Y M Z
W X
A
ACCESS CONTROL LIST
(ACL)
A list of security protections that applies to either an entire object, a set of the object's properties, or an individual property of an object.
ACL
See definition for: access control list (ACL)
ANNOUNCEMENT
A Windows Media metafile that gives a player the information needed to receive content. Announcement files contain Extensible Markup Language (XML) scripts.
ATTRIBUTE
208
The process of verifying that an entity or object is who or what it claims to be. For example, a username and may be used to authenticate a user. See Also: authorization
AUTHORIZATION
password
B
BANDWIDTH
The data transfer capacity of a transmission medium. See Also: bit rate
BIT RATE
The number of bits transferred per unit of time, typically expressed in bits per second. See Also: bandwidth , multiple bit rate (MBR)
BROADCAST
A method by which a client receives a stream. During a broadcast connection, clients cannot control the stream. the opposite of an on-demand presentation.
This is
BROADCAST
PUBLISHING POINT
A type of publishing point that streams content to multiple users at once, similar to a television broadcast. Content streamed from a broadcast publishing point can be delivered as a multicast or unicast stream.
BUFFER
An area of memory reserved for temporarily holding data before that data is used by a receiving device or application. Buffering protects against the interruption of data flow.
209
C
CACHE
A temporary data storage location, or the process of storing data temporarily. A cache is typically used for quick data access.
CACHE PLUG-IN
A type of plug-in that enables a Windows Media server to provide cache and proxy support for another Windows Media server.
CACHE/PROXY SERVER
A server running Windows Media Services for which a cache/proxy plug-in has been enabled, allowing the server to provide cache and proxy support to another Windows Media server.
CALLBACK
A communication approach between a plug-in and a Windows Media server. When the server requests the plug-in to perform a specific task, the plug-in immediately indicates it will do so by returning S_OK. The real result of the executed task is passed back to the server asynchronously through the callback method.
CAPTION
Text that accompanies images or videos, either as a supplemental description or a transcript of spoken words.
CLIENT
Any computer or program connecting to, or requesting the services of, another computer or program. Client can also refer to the software that enables the computer or program to establish the connection.
COMMAND CONTEXT
Used by the OpCenter to describe a single command issued by the end user. Its lifetime is the same as the command duration. The command context itself contains two contexts, a request context and a response context.
COMPRESSION
210
A process for removing redundant data from a digital media file or stream to reduce its size or the bandwidth used.
CONTENT
Audio, video, images, text, or any other information that is contained in a digital media file or stream. See Also: Windows Media file
CONTENT DESCRIPTION CONTEXT
In Windows Media Services, a context that is used to describe the content requested by a client application.
CONTINUOUS CONTENT
An audio file, video file, or other stream that has a measurable and well-understood duration. For example, a 5second audio clip is continuous content because it has a well-understood duration of 5 seconds.
discrete content
CONTROL PROTOCOL PLUG-IN
A type of plug-in that enables a Windows Media server to communicate with clients and other servers through different network protocols.
CUSTOM PLUG-IN
A type of plug-in created by a third-party vendor that is tightly integrated with the Windows Media Services platform architecture. See Also: plug-in D
DATA SOURCE PLUG-IN
A type of plug-in that enables a Windows Media server to use different storage systems.
DATA WRITER PLUG-IN
A type of plug-in that enables a Windows Media server to deliver content as a unicast stream, as a multicast stream, or to an archive file.
211
DISCRETE CONTENT
An image file, text file, or other file that has no obvious duration. For example, if a file contains a still image, the image can be viewed for any desired length of time. See Also: continuous content
DISTRIBUTION
A server running Windows Media Services that publishes content received from another streaming source, such as an encoder or another Windows Media server.
E
ELEMENT
A fundamental syntactic unit in markup languages, such as HTML or XML. Elements are delimited by start tags and end tags. Empty elements are defined using an empty-element tag.
ENCODE
To convert audio and video content to a specified digital format, usually involving compression technology or encryption technology.
ENCODER
A technology that converts live or prerecorded audio and video content to a specified digital format. Typically, content is compressed during encoding. Windows Media Encoder is an example of an encoder.
EVENT
An action or occurrence to which a program might respond. Examples include state changes, data transfers, key presses, and mouse movements.
FIREWALL
A security solution that segregates one portion of a network from another portion, allowing only authorized
212
The number of video frames displayed per second. Higher frame rates generally produce smoother movement in t he picture. Back to Top H
HEADER
A part of the file structure that contains information required by an application to decompress and render the content. The header in a protected file also contains information required to get a license.
HTTP
See definition for: Hypertext Transfer Protocol (HTTP) HYPERTEXT TRANSFER PROTOCOL (HTTP) The Internet protocol used to deliver information over the World Wide Web.
I
Intelligent streaming
A Type of streaming that detects network conditions and adjusts the properties of a video or audio stream to maximize quality.
INTERSTITIAL ADVERTISEMENT
An advertisement that appears between pieces of content. When one piece of content finishes playing, the ad appears before the next piece of content plays. See Also: wrapper playlist
INTRINSIC DURATION
213
The duration of a referenced item that has no explicit timing markup. Continuous content has an intrinsic duration defined by the media, and discrete content has no intrinsic duration.
L
LATENCY
A technique used for scaling the performance of a server-based program by distributing client requests across multiple servers.
LOCAL
Close at hand or restricted to a particular area. In communications, a local device is one that can be accessed directly rather than by means of a communications link. In information processing, a local operation is one performed by the computer at hand rather than by a remote computer. For example, the server computer on which Windows Media Services is installed is the local computer with respect to that server.
LOGGING
To record actions that take place on a computer, or the record of those actions.
LOOP
MBR
See definition for: multiple bit rate (MBR) See Also: bit rate
MEDIA
ELEMENT
A content item that is streamed from a playlist. This can be a file, a stream from an encoder, a remote stream, another playlist file, or a Windows Media file on a Web server.
214
A type of plug-in that that can read different file formats. See Also:
parse
METADATA
Data about data. Title, subject, author, and size are examples of a file's metadata.
MMS PROTOCOL
See definition for: Microsoft Media Server (MMS) protocol
MULTICAST
A content delivery method in which a single stream is transmitted from a media server to multiple clients. The clients have no connection with the server. Instead, the server sends a single copy of the stream across the network o multicast-enabled routers, which replicate the data. Clients can then receive the stream by monitoring a specific multicast IP address and port.
MULTICAST-ENABLED
NETWORK
MULTIPLE
BIT RATE
(MBR)
A characteristic of a data stream in which the same content is encoded at several different bit rates in order to optimize
215
content delivery.
O
ON-DEMAND PUBLISHING POINT
A type of publishing point that streams content to clients by request. Content streamed from an on-demand publishing point is always delivered as a unicast stream.
ORIGIN CONTEXT
P PACKET
A unit of information transmitted from one computer or device to another on a network.
PARSE
To break input into smaller chunks so that a program can act upon the information. See Also: media parser plug-in , playlist parser plug-in
PLAYER
A client program or control that receives digital media content streamed from a server or played from local files. Windows Media Player is an example of a player.
PLAY LIST
216
A type of plug-in that parses system or custom playlist formats and transforms them into SMIL-compliant XML DOM objects supported by Windows Media Services. See Also: parse
PLUG-IN
An auxiliary software component that extends or enhances the features of other software.
PORT
A connection point in a computer through which a peripheral device or another computer can communicate.
PRESENTATION CONTEXT
Describes the instance of the streamed data file, and is different for every streamed file. Contains information such as the URL for the file, a pointer to the DataPath, the play rate, and start and stop
PROTOCOL
A standard set of formats and procedures that enable computers to exchange information. See Also: Hypertext Transfer Protocol (HTTP) , Microsoft Media Server (MMS) protocol , Real-Time Streaming Protocol (RTSP) , Transmission Control Protocol (TCP) , User Datagram Protocol (UDP)
PROTOCOL ROLLOVER
A procedure that enables switching from one protocol to another when a Windows Media server fails to make a connection using a particular protocol.
PROXY SERVER
A server located on a network between client software, such as a Web browser, and another server. It intercepts all
217
requests to the server to determine whether it can fulfill them itself. If not, it forwards the request to another server.
PUBLISHING POINT
An organized memory location that translates a client request for content into the physical path on the server hosting the content. A publishing point essentially acts as a redirector. Q
QOS
See definition for: Quality of Service (QoS)
QUALITY
OF
SERVICE (QOS)
A networking feature that enables system administrators to control the performance properties of a network service, including throughput, transit delay, and priority. R
RSVP
See definition for: Resource Reservation Protocol (RSVP) RTSP See definition for: Real-Time Streaming Protocol (RTSP) S
218
SCOPE
In a multicast transmission, the reach of a stream. The scope of a multicast transmission can be set to reach either an immediate subnetwork only or the entire Internet.
SCRIPT COMMANDS
Named data that is associated with a designated time in Windows Media-based content. The data can be used by players to perform a specific action such as displaying a Web page.
formats
depending on the network bandwidth you choose.
SMIL
See definition for: Synchronized Multimedia Integration Language (SMIL)
STREAM
Digital media that is in the process of being delivered in a continuous flow across a network.
STREAM DATA OBJECT
Data that represents an individual data type within a stream, such as a compressed video frame.
STREAM FORMAT
Information about the properties of a stream, such as the codecs used, frame rate, and frame size. A player uses stream format information to decode a stream.
STREAM FORMAT FILE
A file used by a player to decode a multicast stream. See Also: stream format
219
divide content into separate streams (audio, video, text, and images), send them to a client computer, and then have them displayed as a single stream. This separation reduces the time required for transmission over the Internet.
T TCP
See definition for: Transmission Control Protocol (TCP)
TIME-TO-LIVE
(TTL)
The number of routers through which a multicast stream can pass before a router stops forwarding the stream.
TTL
See definition for: time-to-live (TTL)
U
UDP
See definition for: User Datagram Protocol (UDP)
UDP RESEND
An error correction method that allows the client to request that the server retransmit lost data packets.
UNICAST
A method used by media servers for providing content to connected clients in which each client receives a discrete stream. No other client has access to that stream.
UNICAST ROLLOVER
Redirection of a client to a unicast stream in the event the client cannot access the multicast stream.
USER CONTEXT
220
V
VIDEO CAPTURE DEVICE
WINDOWS MEDIA
METAFILE
In Windows Media technologies, a file that provides information about Windows Media files and their presentation. File name extensions for Windows Media metafiles include .asx, .wax, .wvx, .wmx, and .nsc.
CODEC
A codec used to compress and decompress sequences of computer screen images. See Also: Windows Media Video codec
WINDOWS MEDIA
SERVER
221
CODEC
A codec used to compress and decompress video streams. See Also: Windows Media Screen codec
WMS
Do not use. See Comments.
WRAPPER PLAYLIST
A Windows Media metafile that places additional content at the beginning or end of a stream. Examples of this content include welcome messages, goodbye messages, advertisements, and station branding. See Also: interstitial advertisement Back to Top Previous
What is a modem? A modem allows you to send and receive information over the phone line with your computer. You could send a picture of your dog to a friend, or receive (download) a document sent to you via email.
"Modem" is an acronym that stands for "MOdulator/DEModulator". These are the technical
terms for the way your modem converts information you send from your computer into sounds (the MOdulator part) which a modem on the other end of the phone line can translate back into information (the DEModulator part).
enables a computer to transmit data over, for example, telephone or cable lines. Computer information is stored digitally, whereas information transmitted over telephone lines is transmitted in the form of analog waves. A modem converts between these two forms. Fortunately, there is one standard interface for connecting external modems to computers called RS232. Consequently, any external modem can be attached to any computer that has an RS-232 port, which almost all personal computers have. There are also modems that come as an expansion board
222
that you can insert into a vacant expansion slot. These are sometimes called onboard or internal modems. While the modem interfaces are standardized, a number of different protocols for formatting data to be transmitted over telephone lines exist. Some, like CCITT V.34, are official standards, while others have been developed by private companies. Most modems have built-in support for the more common protocols -- at slow data transmission speeds at least, most modems can communicate with each other. At high transmission speeds, however, the protocols are less standardized. Aside from the transmission protocols that they support, the following characteristics distinguish one modem from another: bps : How fast the modem can transmit and receive data. At slow rates, modems are measured in terms of baud rates. The slowest rate is 300 baud (about 25 cps). At higher speeds, modems are measured in terms of bits per second (bps). The fastest modems run at 57,600 bps, although they can achieve even higher data transfer rates by compressing the data. Obviously, the faster the transmission rate, the faster you can send and receive data. Note, however, that you cannot receive data any faster than it is being sent. If, for example, the device sending data to your computer is sending it at 2,400 bps, you must receive it at 2,400 bps. It does not always pay, therefore, to have a very fast modem. In addition, some telephone lines are unable to transmit data reliably at very high rates. voice/data: Many modems support a switch to change between voice and data modes. In data mode, the modem acts like a regular modem. In voice mode, the modem acts like a regular telephone. Modems that support a voice/data switch have a built-in loudspeaker and microphone for voice communication. auto-answer : An auto-answer modem enables your computer to receive calls in your absence. This is only necessary if you are offering some type of computer service that people can call in to use. data compression : Some modems perform data compression, which enables them to send data at faster rates. However, the modem at the receiving end must be able to decompress the data using the same compression technique. flash memory : Some modems come with flash memory rather than conventional ROM, which means that the communications protocols can be easily updated if necessary. Fax capability: Most modern modems are fax modems, which means that they can send and receive faxes. To get the most out of a modem, you should have a communications software package, a program that simplifies the task of transferring data
Q. What is handshaking? The process by which two devices initiate communication. Handshaking begins when one device sends a message to another device indicating that it wants to establish a communication channel. The two devices then send several messages back and forth that enable them to agree on a communications protocol. Q. What are some of the roles of protocols in a network? o o Data sequencing Data flow control and error control before being sent to final destinations.
223
o Providing data security in a network e.g ensuring that data sent to final destination
is secure and is not read by any person by use of encryption method. o Keeping account of communication task.
224